Search results
1 – 10 of over 29000The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are…
Abstract
The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are provided. SST runs on IBM/PCs, ATs PSI2s and compatible computers. The package sells for $89.95 from Interoffice Communications Systems, 606 South Olive St., Suite 1420, Los Angeles, CA 90014, USA. Telephone: +1(213)622–5972.
Katherine Chiang, Jan Olsen, William V. Garrison, Leslie McLane, Tom Randolph and Marijo S. Wilson
This article describes the rationale behind the construction of an interactive numeric flies retrieval system, and the creation of the system (project team, project phases, data…
Abstract
This article describes the rationale behind the construction of an interactive numeric flies retrieval system, and the creation of the system (project team, project phases, data preparation, software, and hardware used). The major findings section includes comments on data problem resolution, database design and construction, interface considerations, enhanced cataloging, file transfer, standards adherence, and staff resources. The incorporation of the system into the range of services of Cornell's Mann Library is described.
XChange is a communications package specifically designed to provide automatic transfers of files from remote computers. Passwords, IDs and encryption are provided to keep the file…
JANET(the Joint Academic Network) is a wide‐area network linking together computers and users in British universities, polytechnics, establishments of the research councils, and…
Abstract
JANET(the Joint Academic Network) is a wide‐area network linking together computers and users in British universities, polytechnics, establishments of the research councils, and the British Library. It provides for interactive working, file transfer, electronic mail and job transfer. Online access is possible to many catalogues of university and polytechnic libraries, the British Library's BLAISE‐LINE and ARTel services, and various bibliographic and numeric databases held on university computers. Users registered for electronic mail can use Janet to send this kind of mail to other sites in Britain, or overseas through the EARN, BITNET, and NORTHNET combined network. There are two‐way gateways between Janet and British Telecom network PDN, allowing access to commercial online hosts in Great Britain or overseas. These gateways can provide a faster and cheaper alternative to dial‐up use of PDN.
The upper three OSI layers support communication requirements of applications. To communicate meaningfully, applications must share a common understanding of various aspects. This…
Abstract
The upper three OSI layers support communication requirements of applications. To communicate meaningfully, applications must share a common understanding of various aspects. This is achieved through the use of several OSI‐related concepts described in this article, including application association, application context, and abstract syntax. The Application layer is concerned with semantics and not encoding. The presentation protocol is concerned with the coupling of semantics with a particular encoding. The session protocol provides for organized and synchronized data exchange. Several application protocols are described in this article, and a sidebar about the File Transfer, Access, and Management protocol is included.
Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng and Tzi‐cker Chiueh
This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any…
Abstract
Purpose
This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any prior security association and infrastructure support, to form a secure collaboration workspace, and share files and application content instantly with minimal human intervention.
Design/methodology/approach
The paper looks at the system implementation and experimentation.
Findings
WShare can automatically establish a peer‐to‐peer network among the participating mobile stations, and provides a transparent shared file repository through which the mobile stations can securely exchange files with simple drag‐and‐drop operations. This file sharing application can also be specialized to support the same file beaming service over wireless LAN as that provided by Palm PDAs over infrared links. On the application sharing front, WShare supports a general remote execution mechanism that can synchronize the state of multiple instances of a standard productivity application, such as PowerPoint, Excel, and Word, across different machines. Finally for sharing generic applications, WShare also integrates virtual network computing with reliable wireless broadcast to provide a user‐interface level sharing mechanism. Performance measurement on the fully operational WShare prototype shows that a collaboration workspace among five mobile nodes can be set up within 3.5 seconds.
Originality/value
This paper proposes a new communication paradigm and presents the design, implementation, and evaluation of a fully‐working prototype.
Details
Keywords
No single word processing program suits everybody equally well. The same can be said for spreadsheets, databases, drawing packages and even computers. Different people prefer to…
Abstract
No single word processing program suits everybody equally well. The same can be said for spreadsheets, databases, drawing packages and even computers. Different people prefer to use different tools to create and manipulate machine‐readable data, and sometimes people need to share data with others or move data from one application to another. Not only is it silly to re‐enter data already in machine‐readable form, it may not be necessary. The author discusses categories of file and data conversion, with some examples of techniques available for conversion. He also discusses “interoperability,” an awful word for the useful ability to operate on the same data from more than one program—not merely convert data, but use and modify it without conversion. The author includes a sidebar on The Trailing Edge, his new column that will appear in Library Hi Tech beginning with the next issue.
Discusses the Automated Library Information Exchange electronicbulletin board, and the body of text and program it provides tolibrarians, with examples of ALIX messages. Considers…
Abstract
Discusses the Automated Library Information Exchange electronic bulletin board, and the body of text and program it provides to librarians, with examples of ALIX messages. Considers PC downloading, file‐transfer protocols, finding file directories, the downloading process, and ARChive utility priority. States how files are also available to libraries without modems.
Details
Keywords
The main purpose of PTEL is to perform transfers of files between computer systems. For this use it is a reliable, well functioning package. PTEL is also able to perform automatic…
Abstract
The main purpose of PTEL is to perform transfers of files between computer systems. For this use it is a reliable, well functioning package. PTEL is also able to perform automatic dialling, control automatic logons and emulate a DEC VT‐102 terminal. PTEL lacks the exploding menus, screen windows and colour graphics offered by some other packages. What it offers are sound basic operation and reliability in file transfers.
Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional…
Abstract
Purpose
Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker.
Design/methodology/approach
A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences.
Findings
Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention.
Originality/value
This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.
Details