Grace: A System to Support the Development and Use of Global Computer‐Supported Cooperative (CSCW) Applications

1993 ◽  
Vol 3 (1) ◽  
Author(s):  
Steve Benford ◽  
Adrian Bullock ◽  
Paul Harvey ◽  
Howidy Howidy ◽  
Alan Shepherd ◽  
...  
Keyword(s):  
2015 ◽  
Vol 7 (3) ◽  
pp. 641-648
Author(s):  
A. V. Bogdanov ◽  
Ya. A. Degtyreva ◽  
E. A. Zakharchuk ◽  
N. A. Tikhonova ◽  
V. R. Foux ◽  
...  

Information ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 9
Author(s):  
Alexander Zimin ◽  
Andrey Shumov ◽  
Vladislav Troynov ◽  
Ivan Zemtsov

This paper deals with an integrated Internet-based education laboratory that allows both practical lab sessions and full-blown research projects to be carried out using state-of-the-art experimental facilities. The setup of a system that controls lab equipment via a global computer network is described, and a distributed hardware and software control facility supporting remote lab operations is considered in terms of its structural arrangement and component interaction. We present a computer-aided dispatch-and-information system that allows students to generate their own experiment scenarios, conduct experiments remotely, and store/process experimental results from their personal cabinets. We also discuss the peculiarities of developing a computerized system to support plasma spectroscopy hands-on education and research. Further emphasis is given to the laboratory modernization, regarding both hardware and result processing software.


1989 ◽  
Vol 18 (4) ◽  
pp. 271-279 ◽  
Author(s):  
A.Coskun Samli ◽  
James R. Wills

Author(s):  
Marcus Foth

The emergence of global computer networks and the widespread availability of advanced information communication technology (ICT) since the mid-nineties has given rise to the hope that the traditional disadvantages faced by regional economies and regional communities could be alleviated easily and swiftly. Yet, the experience of both researchers and practitioners in community informatics and community development tells a different tale. Although the potential of ICT is in fact realised in some situations and locations, and does provide a means to ensure sustainability in some regional communities, elsewhere it has not achieved change for the promised better. Too many communities are still faced by a centralised structure in the context of commerce, service provision or governance and by various degrees of digital divides between the connected and disconnected, between the media literate and illiterate, between young and old, between consumers and producers, and between urban and rural.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Data security is a way to ensure that stored data is safe from corruption and that access to it is accordingly controlled. Data security helps to ensure privacy. It also helps protect personal data from theft. Data theft is one that often occurs on global computer networks. It includes criminal acts in the internet world. Chronology of theft is that an intruder enters a system and retrieves essential information without the owner's knowledge. Intruders use data that has been taken for various crimes. Various ways that intruders take to retrieve the data. This action is proven by the amount of internet traffic that is looking for a gap to infiltrate a system. Cryptography is needed to protect essential data. One of the classic algorithms used is Gronsfeld Cipher. This algorithm works by exchanging characters in messages using substitution tables. The key used is a number that determines the shift of plaintext and key. The resulting ciphertext is the result of plaintext substitution with the key table. This algorithm is constructive for users to secure their essential information when it will be sent through a global network.


Sign in / Sign up

Export Citation Format

Share Document