Search results
11 – 20 of over 23000Discusses the microcomputer policy implemented by Las Vegas‐ClarkCounty Library District. Examines the goals of the computer publicaccess facility, the software used, the staff…
Abstract
Discusses the microcomputer policy implemented by Las Vegas‐Clark County Library District. Examines the goals of the computer public access facility, the software used, the staff, the access policies, and the staff training program. Summarises that public access to computers should be kept manageable, that Macs have proved as popular as IBMs, and that only the most popular software should be used initially.
Details
Keywords
There has been a recent surge of interest in open source software development, which involves developers at many different locations and organizations sharing code to develop and…
Abstract
There has been a recent surge of interest in open source software development, which involves developers at many different locations and organizations sharing code to develop and refine programs. To an economist, the behavior of individual programmers and commercial companies engaged in open source projects is initially startling. This paper makes a preliminary exploration of the economics of open source software. We highlight the extent to which labor economics, especially the literature on career concerns’, can explain many of these projects’ features. Aspects of the future of open source development process, however, remain somewhat difficult to predict with off-the-shelf’ economic models.
The OMPX (pronounced ahm'pix) sounds like it might be a creature in a Dr. Seuss story. A picture of a heavy‐set walrus‐like animal in a teal blue stocking cap comes to mind. This…
Abstract
The OMPX (pronounced ahm'pix) sounds like it might be a creature in a Dr. Seuss story. A picture of a heavy‐set walrus‐like animal in a teal blue stocking cap comes to mind. This powerful creature is almost always good‐natured but is sometimes hard to find. With this image in mind, let's begin to find out what OMPX really is.
Using a modem, telephone, and telecommunications software, a computer can put you in touch with people and services. A computer isn't needed to go online. With a computer…
Abstract
Using a modem, telephone, and telecommunications software, a computer can put you in touch with people and services. A computer isn't needed to go online. With a computer, however, services can be used more effectively and cheaply. The author defines and discusses modems, software, and several services, and notes one major problem with telecommunications: money.
Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…
Abstract
Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.
This paper examines some of the ethical problems involved in undertaking Internet research and draws on historical accounts as well as contemporary studies to offer an analysis of…
Abstract
This paper examines some of the ethical problems involved in undertaking Internet research and draws on historical accounts as well as contemporary studies to offer an analysis of the issues raised. It argues that privacy is a misleading and confusing concept to apply to the Internet, and that the concept of non‐alienation is more resourceful in addressing the many ethical issues surrounding Internet research. Using this as a basis, the paper then investigates the Free/Libre and Open Source research model and argues for the principles of “open source ethics” in researching the online world, which includes a participatory and democratic research method.
Details
Keywords
In Cataloging Service Bulletin No. 38 (Fall 1987), pp. 2–10, the Library of Congress announced that headings for computer programs and software should be treated as uniform…
Abstract
In Cataloging Service Bulletin No. 38 (Fall 1987), pp. 2–10, the Library of Congress announced that headings for computer programs and software should be treated as uniform titles. In subjects, therefore, they would be assigned the tag 630, with a second indicator of “zero.” Computer programming languages and computer systems (including specific model names) continue to be established as 650s, with a second indicator of zero.
Schubert Foo, Peng Chor Leong, Siu Cheung Hui and Shigong Liu
The study outlines a number of security requirements that are typical of a host of Web‐based applications using a case study of a real life online Web‐based customer support…
Abstract
The study outlines a number of security requirements that are typical of a host of Web‐based applications using a case study of a real life online Web‐based customer support system. It subsequently proposes a security solution that employs a combination of Web server security measures and cryptographic techniques. The Web server security measures include the formulation and implementation of a policy for server physical security, configuration control, users’ access control and regular Web server log checks. Login passwords, in conjunction with public key cryptographic techniques and random nonces, are used to achieve user authentication, provide a safeguard against replay attacks, and prevent non‐repudiatory usage of system by users. These techniques, together with the use of session keys, will allow data integrity and confidentiality of the customer support system to be enforced. Furthermore, a number of security guidelines have been observed in the implementation of the relevant software to ensure further safety of the system.
Details
Keywords
Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical…
Abstract
Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical advances, applications and legal attitudes. There is also a review of current software for downloading. Recent developments mean a trend to higher internal memory and storage capacity, and greater transmission speeds. Packages now offer access to more than one host, give maximum assistance to the user without being menu‐driven and incorporate the latest developments in artificial intelligence. Disadvantages are in the length of time involved in the process and the fact that the legal issue of copyright has not yet been finalised. Database producers have turned to licensing under contract law, but there is still need to rely on user ethics, and the need for a standard permissions form is highlighted.
Details
Keywords
Have you ever wished your IBM‐compatible PC ran faster? Not everyone can afford a new AT, but for a few dollars and an hour's effort, you can increase the speed of your PC from…
Abstract
Have you ever wished your IBM‐compatible PC ran faster? Not everyone can afford a new AT, but for a few dollars and an hour's effort, you can increase the speed of your PC from five to ten percent. The secret of this increase is the new NEC V20 chip.