首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The essence of mobile computing is having your personal computing environment available wherever you happen to be. Traditionally, this is achieved by physically carrying a computing device (say, a laptop or PDA) which may have some form of intermittent network connectivity, either wireless or tethered. However, at the Olivetti and Oracle Research Laboratory, we have introduced another form of mobility in which it is the user's applications that are mobile. Users do not carry any computing platform but instead bring up their applications on any nearby machine exactly as they appeared when last invoked. We call this form of mobility teleporting, and it has been used continuously and fruitfully by many members of our laboratory. We are extending this idea from our LAN to the entire Internet using Java as the common interface. It is still our personal X sessions that are made mobile, but now they can appear anywhere on the Internet within any Java-enabled browser  相似文献   

2.
华荣 《软件》2012,(7):139-140
云计算是一种基于分布式的计算,以用户为中心,数据存在于云海之中,你可以在任何时间(Anytime)、任何地点(Anywhere)以某种便捷的方式安全地获得它或与他人分享。云计算使得Intemet变成每个人的数据存储中心、数据计算中心,本章具体讨论在高校中的应用。  相似文献   

3.
Data Security in the World of Cloud Computing   总被引:1,自引:0,他引:1  
Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. In this new world of computing, users are universally required to accept the underlying premise of trust. Within the cloud computing world, the virtual environment lets users access computing power that exceeds that contained within their own physical worlds. Typically, users will know neither the exact location of their data nor the other sources of the data collectively stored with theirs. The data you can find in a cloud ranges from public source, which has minimal security concerns, to private data containing highly sensitive information (such as social security numbers, medical records, or shipping manifests for hazardous material). Does using a cloud environment alleviate the business entities of their responsibility to ensure that proper security measures are in place for both their data and applications, or do they share joint responsibility with service providers? The answers to this and other questions lie within the realm of yet-to-be-written law. As with most technological advances, regulators are typically in a "catch-up" mode to identify policy, governance, and law. Cloud computing presents an extension of problems heretofore experienced with the Internet. To ensure that such decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.  相似文献   

4.
Users now know just enough to be dangerous. How many times have you heard that one? How many times have you said it yourself? After a few years of watching users “take over,” some MIS professionals view users as more of a nuisance than in the days before end-user computing. But is this attitude justified, or is it simply the view of MIS professionals disgruntled by the growing computer expertise of those who haven't paid their dues?  相似文献   

5.
Reisman  S. 《Software, IEEE》1995,12(3):111-112
I have been using electronic mail for years, first via Bitnet, then via the Internet. What do you do when you get email from someone you know? Delete it? No, of course not. You read it and you answer it. Therein lies my problem. Everyone is answering me! A few months ago, when I logged on, I had five or six messages each day. Now I log on to find 10 or 20 messages, all of them requiring a response. I suppose I could delete them, but friends are hard to find, so I find myself reading and responding to more and more messages-often on subjects I don't really care about. Everyone, it seems, feels it is better to send than to receive. Did Alvin Toffler warn us about this? I have had a vision of the future. In it, we live in a virtual-reality environment and we spend all our waking hours as employees of the US Electronic Postal Service. Wake me when it's over  相似文献   

6.
Jon David 《Network Security》1996,1996(11):9-12
The opinion of many truly knowledgeable in the areas of security in general, and Internet security in particular, is that the only true security will come from full encryption. If the messages you send are encrypted, what does it matter if they are intercepted and viewed by unauthorized individuals? If an intruder breaks into your system or network and finds that all files are encrypted, what secretes will leak, what vital information can be altered without user knowledge? If your encryption algorithm is solid, and your encryption keys are both good (i.e. not readily guessed) and secure (i.e. not readily stolen — not written on a post-it note on your VDT, not written on the last page of your desk diary, not kept in a clear text file on your disk or sent in clear text on a LAN, etc.), and if you maintain complete, current and correct backups of all critical files (which you should certainly do, independent of any Internet connectivity), then at worst you may suffer inconveniences as a result of security breaches.  相似文献   

7.
What if intelligent computing were centered inside humans? Portending an even braver and newer world, it's now possible to insert wires into a person's nerves to control appliances. We can even send such signals over the Internet, where they are decoded by computer and then fed into another person's nervous system. Human bodies are getting more and more plugged in. It's not easy to set aside questions of ethics and choice. It is not even possible. However, in this essay we simply overlook them in order to work toward our hypothesis. To do that, we must take you on a trip into space. Our argument is that if humanity decides to continue human exploration of space, we will sooner or later-probably sooner-be forced to center some intelligent computing inside humans.  相似文献   

8.
我们知道在Internet中广泛使用的TCP/IP协议就是利用IP地址来区别不同的主机的。如果你曾经进行过TCP/IP协议设置,那么你一定会遇到子网掩码(subnetmask)这一名词,那么你知道什么是子网掩码吗?它有什么作用呢?如何划分子网呢,如何计算子网掩码呢?那就跟我们走进这个课堂吧!  相似文献   

9.
中英文对照     
Electronic Commerce, also known as e-commerce, is the buying and selling of goods over the Internet. Have youever bought anything over the Internet? If you have not,there is a very good chance that you will within the next yearor two Shopping on the Internet is growing rapidly and thereseems to be no end in sight. Just like any other type of commerce, electroniccommerce involves two parties, businesses and consumersThere are three basic types of electronic commerce……  相似文献   

10.
How can you determine what the Internet or even an intranet looks like? The answer is, of course, to draw it on screen. Once you can see the data succinctly, it becomes much easier to understand. The drawing itself can help locate bottlenecks and possible points of failure. Where is that newly acquired subsidiary connected? Which business units have connections to business partners? More important, visual displays of networks have another dimension-color. Color is an easy way to display link use, status, ownership, and network changes  相似文献   

11.
What do you get when you give your source code away and encourage programmers around the world to make changes to it? Some Internet software development engineers believe you get a robust system with a large market share and development that is highly responsive to user needs. The team behind the InterNetNews Usenet server package is one such group of believers. INN provides programs to exchange Usenet messages with other servers and to deliver those messages to end users. The Internet Software Consortium oversees the INN and has been supporting its development under an open model. INN is a moderate-sized software project with more than 430 files containing nearly 150,000 lines in the uncompiled distribution. Programs are written mainly in C, Bourne shell, and Perl. The CVS revision control system manages all changes to files. The paper describes the logistics of InterNetNews  相似文献   

12.
开放平台大势图   总被引:1,自引:0,他引:1  
李大维 《程序员》2009,(8):38-42
一年间,翻天覆地的开放平台大势如何?应用产品的商业化带来了什么价值?本期封面报道为您带来众多开放平台以及应用开发者的故事,并请专家评点如何保持创新的优势,一睹开放平台最新大势图。  相似文献   

13.
What about this for a dramatic opener? “Greetings! Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer’s data to the entire world at this very moment!” The website from which this is taken is called Shields Up (https://grc.com) and is dedicated to researching Internet security for Windows users. There are tools here for the taking that will give you an instant picture of your current level of security — or lack of it, as the case may be.  相似文献   

14.
《IT Professional》2004,6(2):62-63
Log on to the Internet Archive Web site (http:// www.archive.org) and load up the oldest version of your organization's Web site. Now view the source. Does the code you see give you a headache? Because they placed little emphasis on code quality in the early days of the Web, developers instead focused on doing whatever it took to make their sites look a certain way when a viewer used a particular browser. Proprietary extensions were common, ensuring that a page that worked one way in Netscape would work differently in Internet Explorer unless the developer took the time to code multiple versions of the same page. After many years of sloppy code piling up around the Web, a movement is formed to standardize browsers and the HTML that they were interpreting. The industry has finally begun to accept the wisdom of designing with Web standards. But perhaps you're still not convinced; let me try to persuade you.  相似文献   

15.
ABSTRACT

Included in this bibliography are Internet sites pertaining to the United States Congress. Covered are the official sites from Congress and its supporting agencies. In addition, there are unofficial sites that contain Congress-related information. These include general Web sites of interest groups, document collections sites, general Congress-related sites, voter information and e-mail sites, as well as sites providing access to newsgroups, newsletters, and bulletin boards.

There is a great deal of information on Congress to be found on the Internet. With public Internet stations popping up in libraries, and the increase in personal Internet accounts, the Internet can help technology meet democracy. And with the ever-increasing trend by government agencies, including the Government Printing Office, to move toward electronic information, it will be important to know where to find the information. Hopefully, this bibliography will help you locate the information you are seeking on Congress.  相似文献   

16.
Don't you just hate it when you get pop-ups for no reason whilst accessing Web pages and your Internet browser seems to have a mind of its own – throwing new screens open left and right. All of the links on the Web page are suddenly re-programmed to go to some pointless shopping site no matter what you do.  相似文献   

17.
OpenAPI解读互联网新趋势   总被引:2,自引:0,他引:2  
OpenAPI已成为众多互联网开发者的热门话题。什么是所谓的OpenAPI?OpenAPI是互联网行业新的突破点吗?如何运营一个成熟社区的OpenAPI?今天的OpenAPI有哪些标准和阵营?本期封面报道为您解读互联网新一轮潮流与趋势。  相似文献   

18.
Gray  W.D. 《Software, IEEE》1997,14(4):26-28
The issue here is not whether discount techniques should be used; they are inevitable. The issue is, in trying to do the best job you can with the ridiculously limited resources provided you, what should you do? How confident should you be in the techniques you are using? A bad design may come back and bite you. When you choose a technique to use in a hurry, you are placing your professional reputation and perhaps your job on the line. You deserve to know four things about any technique that you apply. The hit rate: How many real problems will this technique uncover? The false-alarm rate: How many (and what sorts) of things will it falsely identify as problems (that may not exist, but are costly and time consuming to “fix”)? What does it miss? What types of problems (and how many) does this technique not discover? The correct rejections: How confident are you in your discount technique's ability to flag problems? Discount techniques are not a substitute for the potent combination of analytic and empirical methodologies that usability professionals can bring to bear in designing and evaluating an interface  相似文献   

19.
无论是普适计算还是物联网,定位都是其关键技术之一,为了解决现有的定位技术多面向某一特定应用开发、缺乏通用性等问题,构建了一个通用的实时位置感知中间件UbiRTLM.将应用服务从位置感知技术中分离出来,可以不需要更改原有的应用及服务而动态扩展新的定位技术.通过实验验证了UbiRTLM的定位精度及相关功能.结果表明:UbiRTLM能够满足大多数应用的精度需书并能处理相应的服务请求.  相似文献   

20.
Nanotechnology: the growing impact of shrinking computers   总被引:1,自引:0,他引:1  
Nanotechnology helps make the pervasive aspect of pervasive computing possible. One obstacle to putting computers everywhere is size. You can put a desktop computer, well, on your desktop. But you can't put it in your bloodstream (such pervasive computing applications are indeed being explored). Shrinking computers makes it possible to put them almost anywhere. To envision nanotechnology's potential, think about building things from the molecular level up. At that level, you can build in characteristics and capabilities that aren't readily apparent. Fueled by numerous drivers, projects from data storage to power generation to medical exploration are all putting nanotechnology to use.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号