Radio's Intimate Public: Network Broadcasting and Mass-Mediated Democracy (review)

2007 ◽  
Vol 48 (1) ◽  
pp. 230-231
Author(s):  
Susan. Smulyan
2004 ◽  
Vol 23 (3) ◽  
pp. 151-159
Author(s):  
Dong-Hee Shin

I discuss experiences in the development of four broadband public networking projects in New York State in order to see an implication for future small or medium-sized enterprise over such public networks. The projects were funded under a state program to diffuse broadband/advanced telecommunication technologies in economically depressed areas of the state. Through the broadband networks, I critically argue characterization of next generation public network (NGPN) in reference to small medium-sized enterprises (SMEs). I identify several facets of an NGPN drawing on a longitudinal study of the network development in four New York communities. As broadband public networks diffuse, small businesses being left out of the loop. The idea of SME application and service may itself be at risk. My approach to the socio-technical challenges involved in the design and development of broadband public networks is outlined.


2021 ◽  
pp. 1-1
Author(s):  
Yuqiang Heng ◽  
Vikram Chandrasekhar ◽  
Jeffrey G. Andrews

2021 ◽  
pp. 1-30
Author(s):  
Qingtian Zou ◽  
Anoop Singhal ◽  
Xiaoyan Sun ◽  
Peng Liu

Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.


2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


2008 ◽  
Vol 41 (2) ◽  
pp. 13988-13992
Author(s):  
D. Balzer ◽  
Th. Werner ◽  
R. Messerschmidt
Keyword(s):  

Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 


2018 ◽  
Vol 11 (26) ◽  
pp. 201-218
Author(s):  
Lucken Bueno Lucas ◽  
Renan Guilherme Pimentel ◽  
Simone Luccas

The process of school inclusion for people with disabilities is a recent development, especially for the deaf individuals, so the study of how this inclusion process occurs and the teaching of Sciences/Biology for these individuals is still incipient. The objective of this work was to investigate how science/biology teaching takes place for deaf students in the city of Cornélio Procópio-PR and what difficulties are encountered by the students, teachers, and sign language interpreters in the scenario of school inclusion. To reach this goal, we interviewed teachers and interpreters who work in elementary and middle schools of the public network that attend deaf students in Cornélio Procópio. The results of the interviews demonstrated that all those involved in this process face difficulties, the interpreters indicate language as an obstacle to the interpretation of Sciences and Biology classes, since Brazilian Sign Language presents a deficit of lexicons in relation to the Portuguese Language. On the other hand, the main difficulty for the teachers is the lack of preparation to work in classes which include deaf people, jeopardizing not only their interaction with the students, but also the teaching of Sciences and Biology. 


2011 ◽  
Vol 12 (2) ◽  
pp. 251-263 ◽  
Author(s):  
Massimo Tomassini ◽  
Antonella Barile ◽  
Eleonora Fiumara ◽  
Paola Scarpello
Keyword(s):  

2021 ◽  
Author(s):  
Gustavo Cainelli ◽  
Mitula Donga ◽  
Lutz Rauchhaupt ◽  
Lisa Underberg

Sign in / Sign up

Export Citation Format

Share Document