Search results

1 – 10 of over 29000
Article
Publication date: 1 February 1990

Steven J. Bell

The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are…

Abstract

The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are provided. SST runs on IBM/PCs, ATs PSI2s and compatible computers. The package sells for $89.95 from Interoffice Communications Systems, 606 South Olive St., Suite 1420, Los Angeles, CA 90014, USA. Telephone: +1(213)622–5972.

Details

The Electronic Library, vol. 8 no. 2
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 March 1993

Katherine Chiang, Jan Olsen, William V. Garrison, Leslie McLane, Tom Randolph and Marijo S. Wilson

This article describes the rationale behind the construction of an interactive numeric flies retrieval system, and the creation of the system (project team, project phases, data…

Abstract

This article describes the rationale behind the construction of an interactive numeric flies retrieval system, and the creation of the system (project team, project phases, data preparation, software, and hardware used). The major findings section includes comments on data problem resolution, database design and construction, interface considerations, enhanced cataloging, file transfer, standards adherence, and staff resources. The incorporation of the system into the range of services of Cornell's Mann Library is described.

Details

Library Hi Tech, vol. 11 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 1988

Jim Perry

XChange is a communications package specifically designed to provide automatic transfers of files from remote computers. Passwords, IDs and encryption are provided to keep the file

Abstract

XChange is a communications package specifically designed to provide automatic transfers of files from remote computers. Passwords, IDs and encryption are provided to keep the file contents secure.

Details

Online Review, vol. 12 no. 3
Type: Research Article
ISSN: 0309-314X

Article
Publication date: 1 April 1988

Andrew Buxton

JANET(the Joint Academic Network) is a wide‐area network linking together computers and users in British universities, polytechnics, establishments of the research councils, and…

Abstract

JANET(the Joint Academic Network) is a wide‐area network linking together computers and users in British universities, polytechnics, establishments of the research councils, and the British Library. It provides for interactive working, file transfer, electronic mail and job transfer. Online access is possible to many catalogues of university and polytechnic libraries, the British Library's BLAISE‐LINE and ARTel services, and various bibliographic and numeric databases held on university computers. Users registered for electronic mail can use Janet to send this kind of mail to other sites in Britain, or overseas through the EARN, BITNET, and NORTHNET combined network. There are two‐way gateways between Janet and British Telecom network PDN, allowing access to commercial online hosts in Great Britain or overseas. These gateways can provide a faster and cheaper alternative to dial‐up use of PDN.

Details

The Electronic Library, vol. 6 no. 4
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 April 1990

Wayne Davison

The upper three OSI layers support communication requirements of applications. To communicate meaningfully, applications must share a common understanding of various aspects. This…

Abstract

The upper three OSI layers support communication requirements of applications. To communicate meaningfully, applications must share a common understanding of various aspects. This is achieved through the use of several OSI‐related concepts described in this article, including application association, application context, and abstract syntax. The Application layer is concerned with semantics and not encoding. The presentation protocol is concerned with the coupling of semantics with a particular encoding. The session protocol provides for organized and synchronized data exchange. Several application protocols are described in this article, and a sidebar about the File Transfer, Access, and Management protocol is included.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 20 November 2009

Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng and Tzi‐cker Chiueh

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any…

Abstract

Purpose

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any prior security association and infrastructure support, to form a secure collaboration workspace, and share files and application content instantly with minimal human intervention.

Design/methodology/approach

The paper looks at the system implementation and experimentation.

Findings

WShare can automatically establish a peer‐to‐peer network among the participating mobile stations, and provides a transparent shared file repository through which the mobile stations can securely exchange files with simple drag‐and‐drop operations. This file sharing application can also be specialized to support the same file beaming service over wireless LAN as that provided by Palm PDAs over infrared links. On the application sharing front, WShare supports a general remote execution mechanism that can synchronize the state of multiple instances of a standard productivity application, such as PowerPoint, Excel, and Word, across different machines. Finally for sharing generic applications, WShare also integrates virtual network computing with reliable wireless broadcast to provide a user‐interface level sharing mechanism. Performance measurement on the fully operational WShare prototype shows that a collaboration workspace among five mobile nodes can be set up within 3.5 seconds.

Originality/value

This paper proposes a new communication paradigm and presents the design, implementation, and evaluation of a fully‐working prototype.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 April 1988

Walt Crawford

No single word processing program suits everybody equally well. The same can be said for spreadsheets, databases, drawing packages and even computers. Different people prefer to…

Abstract

No single word processing program suits everybody equally well. The same can be said for spreadsheets, databases, drawing packages and even computers. Different people prefer to use different tools to create and manipulate machine‐readable data, and sometimes people need to share data with others or move data from one application to another. Not only is it silly to re‐enter data already in machine‐readable form, it may not be necessary. The author discusses categories of file and data conversion, with some examples of techniques available for conversion. He also discusses “interoperability,” an awful word for the useful ability to operate on the same data from more than one program—not merely convert data, but use and modify it without conversion. The author includes a sidebar on The Trailing Edge, his new column that will appear in Library Hi Tech beginning with the next issue.

Details

Library Hi Tech, vol. 6 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1989

Erik Delfino and Bruce Miller

Discusses the Automated Library Information Exchange electronicbulletin board, and the body of text and program it provides tolibrarians, with examples of ALIX messages. Considers…

Abstract

Discusses the Automated Library Information Exchange electronic bulletin board, and the body of text and program it provides to librarians, with examples of ALIX messages. Considers PC downloading, filetransfer protocols, finding file directories, the downloading process, and ARChive utility priority. States how files are also available to libraries without modems.

Details

OCLC Micro, vol. 5 no. 1
Type: Research Article
ISSN: 8756-5196

Keywords

Article
Publication date: 1 May 1987

Audry Grosch

The main purpose of PTEL is to perform transfers of files between computer systems. For this use it is a reliable, well functioning package. PTEL is also able to perform automatic…

Abstract

The main purpose of PTEL is to perform transfers of files between computer systems. For this use it is a reliable, well functioning package. PTEL is also able to perform automatic dialling, control automatic logons and emulate a DEC VT‐102 terminal. PTEL lacks the exploding menus, screen windows and colour graphics offered by some other packages. What it offers are sound basic operation and reliability in file transfers.

Details

Online Review, vol. 11 no. 5
Type: Research Article
ISSN: 0309-314X

Article
Publication date: 4 September 2019

Jason M. Walter

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional…

Abstract

Purpose

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker.

Design/methodology/approach

A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences.

Findings

Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention.

Originality/value

This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of over 29000