Search results1 – 10 of over 64000
Considers the different methods used to connect computers into networks. Discusses speeds, costs and sharing issues. Briefly profiles kits using Ethernet cables, USB cables, telephone wires, electric wires and wireless kits including methods of operation, size and basic capabilities.
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Discusses similarities and differences in the various definitions of the word network. It has come to have two meanings in the library and information science field…
Discusses similarities and differences in the various definitions of the word network. It has come to have two meanings in the library and information science field. Firstly there are bibliographic or logical networks and secondly there are computer or physical networks. All definitions comply to it being a series of points interconnected by communications chAnnels. In the past, libraries have used postal, telephone, van and telex services to communicate with other libraries. Increasingly they will need to receive and transmit digital information—information going to and from computer systems. Describes and illustrates the equipment needed to transmit such information on‐line: terminals; modems and acoustic couplers; and telecommunications chAnnels—their speed, mode of sending information, and types. In the context of physical networks, explains and assesses packet‐switching, and discusses: the protocol X25, to be used in EURONET; possible shapes of computer networks; physical networks of use to libraries. Mentions a number of logical networks, and refers to published literature.
In response to provisions in Public Law 99–383, which was passed 21 June 1986 by the 99th Congress, an inter‐agency group under the auspices of the Federal Coordinating…
In response to provisions in Public Law 99–383, which was passed 21 June 1986 by the 99th Congress, an inter‐agency group under the auspices of the Federal Coordinating Council for Science, Engineering, and Technology (FCCSET) for Computer Research and Applications was formed to study the following issues: the networking needs of the nation's academic and federal research computer programs, including supercomputer programs, over the next 15 years, addressing requirements in terms of volume of data, reliability of transmission, software compatibility, graphics capabilities, and transmission security; the benefits and opportunities that an improved computer network would offer for electronic mail, file transfer, and remote access and communications; and the networking options available for linking academic and research computers, including supercomputers, with a particular emphasis on fiber optics. Bell reports on the process and recommendations associated with the committee's work, and suggests a means for accomplishing the network objectives addressed by its report.
The purpose of this paper is to propose and examine the new user support in university network.
The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been studied conventionally by authors.
The new user support is more simplified than the normal user support in the network based on TCP/IP.
As a future research, the authors will implement the system for realizing DACS Scheme and apply that system to practical network. Then, the new user support proposed in this paper will be realized in practical network.
The functions needed for the new user support are confirmed. Some functions was confirmed in the past research. The other function is confirmed in the section of experimental results.
In the network introducing DACS Scheme, the setting of the client does not need to be changed at the time of changing a network system. In addition, annoying communication becomes very simplified. The first point is that the client computer which transmits annoying communication is specified simply. The second point is shown as follows. Because the influence to others is prevented by blocking a communication port of the client computer, time margin for the cause specification of annoying communication and the coping with it is generated effectively.
Recent shifts from mainframes to networking technologies have givenbusiness the ability to meet challenges in the competitive markets withaccurate, timely data…
Recent shifts from mainframes to networking technologies have given business the ability to meet challenges in the competitive markets with accurate, timely data distribution. Meanwhile, the blossoming of data communication has created the potential thorns of computer crimes. This article discusses the impact of networking technology on the business environment, identifies various types of computer misconduct, and presents measures for prevention. The article concludes by enumerating various issues involved in effectively sanctioning computer crimes.
The Fred Meyer Charitable Trust, Division of Library and Information Resources for the Northwest, has funded five research projects that will demonstrate the potential of…
The Fred Meyer Charitable Trust, Division of Library and Information Resources for the Northwest, has funded five research projects that will demonstrate the potential of various techniques and new technologies to facilitate communications and resource sharing in the Northwest. The experience and information derived from these projects will be of value to all libraries and information centers, not just those conducting the research. The techniques and technologies being evaluated include: simultaneous remote searching, which uses inexpensive terminals and modems; a mini‐computer‐based union list and resource sharing network (INFONET); networks using facsimile machines; networks that transmit documents that have been optically scanned into bit‐map image files; and use of optical character recognition equipment to capture ASCII machine‐readable information that can be broadcast by television stations to user‐sites. Contributors of reports are: Verl Anderson, Linda Brander, Millard F. Johnson, Jr., Bruce Morton, and Steve Smith. Summary observations are provided by Joseph R. Matthews.
The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the…
The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the scientific enterprise. Between 1985 and 1990, the Survey of Income and Program Participation (SIPP) ACCESS data facility at the University of Wisconsin‐Madison provided social scientists in the United States and elsewhere with access through the electronic networks to complex and dynamic statistical data; the 1984 SIPP is a longitudinal panel survey designed to examine economic well‐being in the United States. This article describes the conceptual framework and design of SIPP ACCESS; examines how network users communicated with the SIPP ACCESS project staff about the SIPP data; and evaluates one outcome derived from the communications, the improvement of the quality of the SIPP data. The direct and indirect benefits to social scientists of electronic networks are discussed. The author concludes with a series of policy recommendations that link the assessment of our inadequate knowledge base for evaluating how electronic networks advance the scientific enterprise and the SIPP ACCESS research network experience to the policy initiatives of the High Performance Computing Act of 1991 (P.L. 102–194) and the related extensive recommendations embodied in Grand Challenges 1993 High Performance Computing and Communications (The FY 1993 U.S. Research and Development Program).