<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 3491 to 3505.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/copy_of_GujaratiMedia1.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/guidelines-for-examination-of-computer-related-inventions-cris"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/gsma-partners-meeting.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/growth-of-telecom"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-india-chronicles"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/growing-cyberspace-controls"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Grover.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/GroupPhoto.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Photo.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ground-zero-summit-2014"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/copy_of_GujaratiMedia1.png">
    <title>Gujarati Media Coverage</title>
    <link>http://editors.cis-india.org/copy_of_GujaratiMedia1.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/copy_of_GujaratiMedia1.png'&gt;http://editors.cis-india.org/copy_of_GujaratiMedia1.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-12-07T10:21:00Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013">
    <title>Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act  in India</title>
    <link>http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013</link>
    <description>
        &lt;b&gt;The Research Center of Media and Communication at the University of Hamburg organized the Summer School 2013 at Hamburg, Germany from July 29 to August 2, 2013. Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act  in India".&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Summer School Book of Abstracts/Information brochure can be &lt;a class="external-link" href="http://repeatremixremediate.files.wordpress.com/2013/06/rrremediate_brochure_web.pdf"&gt;downloaded here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This year’s Summer School offered by the Research Center of Media and  Communication at the University of Hamburg picked up upon a crucial  issue for current media development – a topic relevant to academia,  media practice and media policy. In the age of digitisation, the  landscape of media and communications is being increasingly influenced  by phenomena that can be viewed as reappropriations of previously  published media communications. The Summer School pursued central  questions about the kinds of reappropriated media communications that were being developed and the relationship between ‘old’ and ‘new’ shaping  them. This repurposing was analysed from four different  perspectives: repurposing as recombination, as reactualisation, as  piracy and as plagiarism.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013'&gt;http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T10:19:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/guidelines-for-examination-of-computer-related-inventions-cris">
    <title>Guidelines for Examination of Computer Related Inventions (CRIs) </title>
    <link>http://editors.cis-india.org/a2k/news/guidelines-for-examination-of-computer-related-inventions-cris</link>
    <description>
        &lt;b&gt;Anubha Sinha attended this meeting organized by the Office of The Controller General, Patents, Designs &amp; Trade Marks in Mumbai on January 12, 2016&lt;/b&gt;
        &lt;p&gt;&lt;a href="http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris" class="internal-link"&gt;Download the Meeting Notice&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/guidelines-for-examination-of-computer-related-inventions-cris'&gt;http://editors.cis-india.org/a2k/news/guidelines-for-examination-of-computer-related-inventions-cris&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-02-05T14:01:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris">
    <title>Guidelines for Examination of Computer Related Inventions (CRIs)</title>
    <link>http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris</link>
    <description>
        &lt;b&gt;.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris'&gt;http://editors.cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-cris&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-05T13:58:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/gsma-partners-meeting.pdf">
    <title>GSMA Partners Meeting</title>
    <link>http://editors.cis-india.org/internet-governance/blog/gsma-partners-meeting.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/gsma-partners-meeting.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/gsma-partners-meeting.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-05-05T07:03:40Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf">
    <title>GSMA Conference Invite</title>
    <link>http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-14T01:49:36Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf">
    <title>Growth of Telecom Industry in India (Poster)</title>
    <link>http://editors.cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf'&gt;http://editors.cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-26T10:38:59Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/growth-of-telecom">
    <title>Growth of Telecom Industry in India</title>
    <link>http://editors.cis-india.org/telecom/blog/growth-of-telecom</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/growth-of-telecom'&gt;http://editors.cis-india.org/telecom/blog/growth-of-telecom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-03T09:59:12Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-india-chronicles">
    <title>Growing Wikipedia: The India Chronicles</title>
    <link>http://editors.cis-india.org/news/the-india-chronicles</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Tory Read, a professional researcher, writer and journalist was commissioned by the Wikimedia Foundation to create a vivid description of its work in India. This was done in the interest of transparency and to ensure that it captured lessons from this new approach. Tory travelled for a couple of weeks across Mumbai, Pune, Bangalore and some towns in Kerala — attending community meet-ups speaking with a host of individual community members in these cities. Tory has given a journalistic account and analysis, based on document review, interviews and observations conducted between November 2010 and June 2011, including 16 days in India in June 2011.The views expressed herein are his own and do not necessarily reflect the views of Wikimedia Foundation.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society has been quoted in this report. The following are some direct quotes extracted out from this report:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Feuding and flaming is an integral part of free software culture.” “You can’t imagine a mailing list without flaming." [The Chapter and the Community Tangle, page 16]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The crisis on the mailing list was ultimately a great thing.” “There was conflict, dozens of offline conversations, private and public negotiation and airing of views and doubts, followed by a public commitment to work together for a shared purpose." [Necessity Breeds Collaboration, page 19]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Foundation’s job is having meetings and growing and holding the consensus." "It should&amp;nbsp;be creating situations in which trust is gained, and you do this through radical transparency and participation. The point of the Foundation’s work is to build the community." [For the Foundation, page 24]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Download the entire report &lt;a href="http://editors.cis-india.org/internet-governance/india-chronicles.pdf" class="internal-link" title="The India Chronicles"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 2.9 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-india-chronicles'&gt;http://editors.cis-india.org/news/the-india-chronicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-14T09:17:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/growing-cyberspace-controls">
    <title>Growing cyberspace controls, Internet filtering</title>
    <link>http://editors.cis-india.org/news/growing-cyberspace-controls</link>
    <description>
        &lt;b&gt;OpenNet Initiative investigates, analyses filtering and surveillance practices, writes T Ramachandran in this article published in the Hindu on Sunday, February 20, 2011.&lt;/b&gt;
        
&lt;p&gt;Governments in many parts of the world have been aggressively adopting a new generation of controls aimed at filtering and controlling information flow on the Internet, citing concerns such as cyber security, crime and terrorism, according to the OpenNet Initiative.&lt;/p&gt;
&lt;p&gt;The OpenNet Initiative, which says it “investigates and analyses Internet filtering and surveillance practices in a credible and non-partisan fashion,” in its updated study released last year titled, “Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace,” said that it was fast becoming the global norm to control information flow on the Internet.&lt;/p&gt;
&lt;p&gt;The OpenNet is a collaborative partnership between the Citizen Lab at the Munk School of Global Affairs, University of Toronto, the Berkman Centre for Internet and Society at Harvard University, and the Ottawa-based SecDev Group.&lt;/p&gt;
&lt;p&gt;Asked whether the trend was likely to become more pronounced, given the recent developments in the Middle East, one of the contributors to the study, Ethan Zuckerman, a senior researcher at the Berkman Centre, said, “In general, we see governments becoming more aggressive and more overt about their Internet filtering.”&lt;/p&gt;
&lt;p&gt;The OpenNet has described the recent Internet blackout in Egypt as ‘just-in-time-blocking' - when information flow is brought to a halt during critical times such as political crises, elections, or social unrest. Discussions have resurfaced about the deployment of 'Internet kill switches,' a way in which nations could snuff out the Internet when such a crisis occurs.&lt;/p&gt;
&lt;p&gt;“For all the talk of Internet kill switches, turning off the Internet is a relatively easy and unsophisticated thing to do. What is hardest to do is filtering on finer, more granular levels,” Mr. Zuckerman told The Hindu.&lt;/p&gt;
&lt;p&gt;The first-generation controls were deployed primarily at Internet “choke points,” places in the network where Internet addresses that had been blacklisted by the authorities could be filtered and blocked. These were mainly the gateways run by the Internet Service Providers (ISPs). The number-based IP addresses connected to particular websites or domain names could be used for the blocking. Keywords could also be used in weeding out proscribed sites or pages.&lt;/p&gt;
&lt;p&gt;Reports of watchdogs such as the OpenNet and Freedom House indicate that though not pronounced, selective filtering has been a part of the Indian Internet scene. Google's Transparency Report for the first half of 2010 also shows that India is among the nations from where a number of government inquiries for information about users and requests to remove or censor content emanate.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“As far as censorship of Internet goes in India it is still first generation in terms of blocking and filtering at the Internet choke points. However, the Indian government has made and is making several moves that continue to undermine privacy and anonymity on the Internet. This has a chilling effect on freedom of expression and information accessing behaviour on the Internet,” says Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Second and third generation techniques of Internet filtering, as described in Access Controlled, are “more subtle, flexible, and even offensive in character,” often using legal regulations to supplement or legitimise technical filtering measures, extralegal or covert practices. These include the use of viruses to infiltrate computer systems, the launching of distributed denial-of-service (DDoS) attacks and surveillance at strategic points in the Internet and telecommunications infrastructure. The DDoS attacks involve directing traffic of such large volume at targeted sites during a particular period, in order to crash them, or keep them largely inaccessible. Counter-information campaigns could also be mounted, supplemented by policy measures and other strategies, including legal ones.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Governments have also been assiduously building up capabilities for monitoring and intercepting the large volume of information that flows on the Internet, including email, which mostly flows through the infrastructure of Internet Service Providers (ISPs) and Internet exchange points. In the Indian context, the I.T. Act “along with the ISP licences allows for blanket surveillance and also data retention,” says Mr. Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It is difficult to say if this sort of monitoring and interception is really effective in countering terrorism and other national security threats, says Mr. Zuckerman. “I don't believe trading privacy for security is a fair trade.”&lt;/p&gt;
&lt;p&gt;Read the original news in&amp;nbsp; the &lt;a class="external-link" href="http://www.hindu.com/2011/02/20/stories/2011022053711000.htm"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/growing-cyberspace-controls'&gt;http://editors.cis-india.org/news/growing-cyberspace-controls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-20T14:36:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Grover.jpg">
    <title>Grover</title>
    <link>http://editors.cis-india.org/home-images/Grover.jpg</link>
    <description>
        &lt;b&gt;Gurshabad Grover&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Grover.jpg'&gt;http://editors.cis-india.org/home-images/Grover.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-07-24T01:50:31Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/GroupPhoto.png">
    <title>Group Photo of Participants</title>
    <link>http://editors.cis-india.org/home-images/GroupPhoto.png</link>
    <description>
        &lt;b&gt;Group Photo of Participants&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/GroupPhoto.png'&gt;http://editors.cis-india.org/home-images/GroupPhoto.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-30T05:42:16Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Photo.png">
    <title>Group Photo</title>
    <link>http://editors.cis-india.org/home-images/Photo.png</link>
    <description>
        &lt;b&gt;Group photo of Telegu Wikipedians&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Photo.png'&gt;http://editors.cis-india.org/home-images/Photo.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-16T11:22:21Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ground-zero-summit-2014">
    <title>Ground Zero Summit 2014</title>
    <link>http://editors.cis-india.org/internet-governance/news/ground-zero-summit-2014</link>
    <description>
        &lt;b&gt;Geeta Hariharan participated in this event organized by India Infosec Consortium on November 13 and 14, 2014 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Living from the successes of last year and our recent conference in Colombo, Ground Zero Summit 2014, in its second year promises to be Asia's largest information security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in the field of cyber security. The event will feature a panel discussion on cyber diplomacy.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf" class="external-link"&gt;Click to read more about the event&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ground-zero-summit-2014'&gt;http://editors.cis-india.org/internet-governance/news/ground-zero-summit-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-05T00:42:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf">
    <title>Ground Zero</title>
    <link>http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/ground-zero.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-05T00:35:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
