8,148 research outputs found

    Internet sebagai Media Penunjang Studi Mahasiswa

    Full text link
    Technological advances which amounted on Internet has breaking all barriers in whole aspects of life, including on learning and education. For students in university, Internet is vital. This research describes students habit toward Internet for supporting their study. There are several Internet facilities, such as email, search engine, and internet relay chat (IRC). Among those facilities, IRC is found as the most popular. Students use IRC for learning and building social relationship. Newsgroup facilities is proven to be not so popular because newsgroup need special interest and specific knowledge. Those who use web intensively surf the internet merely to seek social and entertainment enjoyment instead of fulfilling academic function

    Virtual Institutes: Between Immersion and Communication

    Get PDF
    In the two expressions "virtual reality" and "virtual community", the term "virtual" has different meanings. A virtual reality is a depiction or, more generally speaking, a sensuous representation of reality that allows - mainly by means of interactivity - to experience various features of reality without actually being in contact with the reality depicted. Therefore, any interactive depiction that is able to imitate reality to such an extent that a high degree of sensory-motor immersion becomes possible is called a virtual reality (Heim 1998, 6f). Since reality is always much more complex than its depiction and full of unpredictable surprises, hardly ever a user has doubts about the difference between the depiction and the thing depicted. Nevertheless, there are good reasons for preferring the imitation to the reality: at least, the imitation is usually not as dangerous as reality sometimes turns out to be. Accordingly, quite different platforms for virtual institutes may be used emphasizing either the immersion aspect or the communication aspect. The decision for a platform depends on the goals pursued with the institute: text-based chat systems allow virtual communities to flourish, single-user VRML scenes convey a highly immersive 3D impression to its users. This is particularly true for virtual institutes realized as a 3D environment, as well as for corresponding virtual communities since 3D environments are adequate for certain tasks only. As an overall framework for the evaluation it is helpful to distinguish three major application areas: research, presentation, and communicative work. The Virtual Institute for Image Science (VIB), which we would like to describe in the following (3) as a case study, is almost exclusively designed for the third task: communicative working. It intends to provide a working space persons can share for joint projects despite being physically separated. Before describing the VIB in more detail we would like to give an overview of virtual institutes between the poles of realistic immersion and of communication in a community (2). The discussion of the case study leads to some more general considerations about the balance virtual institutes must find along that bi-polar dimension (4). In the concluding remarks we focus on the technical tools for virtual communities in 3D presently available

    IRC channel data analysis using Apache Solr

    Get PDF
    Internet Relay Chat (IRC) was one of the first real-time communication protocols over the internet. It was not designed with any form of Authentication, Authorization and Accounting features. This made IRC channels a place to conduct transactions in complete anonymity. On the other hand with the advent of Big Data we are now able to process large quantities of data in a very short period of time. This research presents a method to use Apache Solr, a text indexing server built on top of Lucene to index and search large quantities of IRC data collected over months from public IRC channels. It even presents a highly scalable approach to monitor public IRC channels by creation of IRC Client Bots which are in turn controlled by a robust IRC Parent Bot. The data thus collected is analyzed by Apache Solr and MS SQL servers and the response times are compared. This research concluded that Apache Solr outperforms MS SQL by a very great margin and such an implementation can be used by digital forensic investigators to monitor and search public IRC channels

    Public Libraries and the Internet 2006

    Get PDF
    Examines the capability of public libraries to provide and sustain public access Internet services and resources that meet community needs, including serving as the first choice for content, resources, services, and technology infrastructure

    Second Life: the seventh face of the library?

    No full text
    Viewpoint/Discussion Paper Purpose This paper gives a brief introduction to Second Life, an outline of how one academic librarian has got involved with using it and reviews the issues that have arisen from a library perspective. Approach It offers a reflection on whether library activities in Second Life are different to library services in the real world and suggests that Second Life is just another ‘face’ of the library. Findings Second Life is still in the very early stages of development. There are various barriers and challenges to overcome before it can be used widely within universities. However, this paper shows it does provide an opportunity to experiment and explore what information resources are required in this environment and how librarianship and librarians need to evolve to cater for users in a three dimensional world. Originality/value This paper is based on personal experience and offers as many questions as answers

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Active ageing – Enhancing digital literacies in elderly citizens

    Get PDF
    Being digital and information literate is crucial in nowadays society, although not every citizen has the necessary means and resources to achieve these skills, especially the elderly ones. Therefore it is necessary to develop ways to help them to enhance their digital and information competences. In this paper we will present an ongoing project that was designed and implemented with the goal to provide elderly citizens with the necessary skills of a networked society, contributing for an active ageing. The methods used were based on a set of hands on workshops delivered by a team of voluntary students and teacher, with the help of collaborators from a nursing home. The workshops were developed accordingly with the detected needs of a group of elderly citizens, based on the answers of an implemented questionnaire.info:eu-repo/semantics/publishedVersio
    corecore