46 resultados para Internet and VPN.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information technology has increased both the speed and medium of communication between nations. It has brought the world closer, but it has also created new challenges for translation — how we think about it, how we carry it out and how we teach it. Translation and Information Technology has brought together experts in computational linguistics, machine translation, translation education, and translation studies to discuss how these new technologies work, the effect of electronic tools, such as the internet, bilingual corpora, and computer software, on translator education and the practice of translation, as well as the conceptual gaps raised by the interface of human and machine.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Whilst some authors have portrayed the Internet as a powerful tool for business and political institutions, others have highlighted the potential of this technology for those vying to constrain or counter-balance the power of organizations, through e-collectivism and on-line action. What appears to be emerging is a contested space that has the potential to simultaneously enhance the power of organizations, whilst also acting as an enabling technology for the empowerment of grass-root networks. In this struggle, organizations are fighting for the retention of “old economy” positions, as well as the development of “new economy” power-bases. In realizing these positions, organizations and institutions are strategizing and manoeuvering in order to shape on-line networks and communications. For example, the on-line activities of individuals can be contained through various technological means, such as surveillance, and the structuring of the virtual world through the use of portals and “walled gardens”. However, loose groupings of individuals are also strategizing to ensure there is a liberation of their communication paths and practices, and to maintain the potential for mobilization within and across traditional boundaries. In this article, the unique nature and potential of the Internet are evaluated, and the struggle over this contested virtual space is explored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is located within the corporate social reporting and stakeholder management literature. It is concerned with the use of the Internet as a way of communicating with stakeholders and the extent to which this communication is or is not two-way. The evidence from the electricity industry in the UK is that the Internet is used but this use is selective and there is little true dialogue. It appears that the Internet provides an opportunity for greater corporate accountability in the future but whether this potential will be fulfilled is as yet unclear. Further research of a longitudinal nature is required to see how the Internet and more specifically corporate social or stakeholder reporting develops over time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective To investigate current use of the internet and eHealth amongst adults. Design Focus groups were conducted to explore participants' attitudes to and reasons for health internet use. Main outcome measures The focus group data were analysed and interpreted using thematic analysis. Results Three superordinate themes exploring eHealth behaviours were identified: decline in expert authority, pervasiveness of health information on the internet and empowerment. Results showed participants enjoyed the immediate benefits of eHealth information and felt empowered by increased knowledge, but they would be reluctant to lose face-to-face consultations with their GP. Conclusions Our findings illustrate changes in patient identity and a decline in expert authority with ramifications for the practitioner–patient relationship and subsequent implications for health management more generally.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis investigates corporate financial disclosure practices on Web sites and their impact. This is done, first by examining the views of various Saudi user groups (institutional investors, financial analysts and private investors) on disclosure of financial reporting on the Internet and assessing differences, if any, in perceptions of the groups. Over 303 individuals from three groups responded to a questionnaire. Views were elicited regarding: users attitude to the Internet infrastructure in Saudi Arabia, users information sources about companies in Saudi Arabia, respondents perception about the advantages and disadvantages in Internet financial reporting (IFR), respondents attitude to the quality of IFR provided by Saudi public companies and the impact of IFR on users information needs. Overall, it was found professional groups (Institutional investors, financial analysts) hold similar views in relation to many issues, while the opinions of private investors differ considerably. Second, the thesis examines the use of the Internet for the disclosure of financial and investor-related information by Saudi public companies (113 companies) and look to identify reasons for the differences in the online disclosure practices of companies by testing the association between eight firm-specific factors and the level of online disclosure. The financial disclosure index (167 items) is used to measure public company disclosure in Saudi Arabia. The descriptive part of the study reveals that 95 (84%) of the Saudi public companies in the sample had a website and 51 (45%) had a financial information section of some description. Furthermore, none of the sample companies provided 100% of the 167 index items applicable to the company. Results of multivariate analysis show that firm size and stock market listing are significant explanatory variables for the amount of information disclosed on corporate Web sites. The thesis finds a significant and negative relationship between the proportion of institutional ownership of a companys shares and the level of IFR.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Der vorliegende Beitrag untersucht die Frage, in welchem Maße sich Institutionen, die niederdeutsche Kulturszene und individuelle Sprecher des Niederdeutschen moderne Kommunikationstechnologien wie das Internet zunutze machen und ob computervermittelte Kommunikation helfen kann, dem Rückgang des Niederdeutschen Einhalt zu gebieten. Die grundsätzliche Herangehensweise ist eine soziolinguistische, die das Internet als sozialen Handlungsraum versteht, in dem Individuen und Institutionen kommunizieren. Für eine derartige Perspektive stehen weniger das Medium oder das Genre im Mittelpunkt des Interesses als vielmehr das kommunizierende Individuum und die Sprachgemeinschaft, in diesem Fall die virtuelle Sprachgemeinschaft. Based on studies that analyse the potential of computer-mediated communication (cmc) to help fight language shift in lesser-used languages, this paper discusses the situation of Low German in Northern Germany. Over the last three decades, Low German has lost more than half of its active speakers. The article raises the question of whether and, if so, how Low German speakers make use of cmc to stem this tide. Following a sociolinguistic approach focussed on the individual speakers who use the Internet as a space for social interaction, it gives an overview of the discursive field of Low German on the internet and analyses in detail the most popular Low German discussion board. It shows that one of the main obstacles to a more successful use of cmc can be found in speakers' complex attitude toward written Low German. © Franz Steiner Verlag Stuttgart.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: As Internet use grows, health interventions are increasingly being delivered online. Pioneering researchers are using the networking potential of the Internet, and several of them have evaluated these interventions. Objective: The objective was to review the reasons why health interventions have been delivered on the Internet and to reflect on the work of the pioneers in this field in order to inform future research. Methods: We conducted a qualitative systematic review of peer-reviewed evaluations of health interventions delivered to a known client/patient group using networked features of the Internet. Papers were reviewed for the reasons given for using the Internet, and these reasons were categorized. Results: We included studies evaluating 28 interventions plus 9 interventions that were evaluated in pilot studies. The interventions were aimed at a range of health conditions. Reasons for Internet delivery included low cost and resource implications due to the nature of the technology; reducing cost and increasing convenience for users; reduction of health service costs; overcoming isolation of users; the need for timely information; stigma reduction; and increased user and supplier control of the intervention. A small number of studies gave the existence of Internet interventions as the only reason for undertaking an evaluation of this mode of delivery. Conclusions: One must remain alert for the unintended effects of Internet delivery of health interventions due to the potential for reinforcing the problems that the intervention was designed to help. Internet delivery overcomes isolation of time, mobility, and geography, but it may not be a substitute for face-to-face contact. Future evaluations need to incorporate the evaluation of cost, not only to the health service but also to users and their social networks. When researchers report the outcomes of Internet-delivered health care interventions, it is important that they clearly state why they chose to use the Internet, preferably backing up their decision with theoretical models and exploratory work. Evaluation of the effectiveness of a health care intervention delivered by the Internet needs to include comparison with more traditional modes of delivery to answer the following question: What are the added benefits or disadvantages of Internet use that are particular to this mode of delivery? © Griffiths, Frances, Lindenmeyer, Antje, Powell, John, Thorogood, Margaret.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Convergence of technologies in the Internet and the field of expert systems have offered new ways of sharing and distributing knowledge. However, there has been a general lack of research in the area of web-based expert systems (ES). This paper addresses the issues associated with the design, development, and use of web-based ES from a standpoint of the benefits and challenges of developing and using them. The original theory and concepts in conventional ES were reviewed and a knowledge engineering framework for developing them was revisited. The study considered three web-based ES: WITS-advisor - for e-business strategy development, Fish-Expert - for fish disease diagnosis, and IMIS - to promote intelligent interviews. The benefits and challenges in developing and using ES are discussed by comparing them with traditional standalone systems from development and application perspectives. © 2004 Elsevier B.V. All rights reserved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The fast spread of the Internet and the increasing demands of the service are leading to radical changes in the structure and management of underlying telecommunications systems. Active networks (ANs) offer the ability to program the network on a per-router, per-user, or even per-packet basis, thus promise greater flexibility than current networks. To make this new network paradigm of active network being widely accepted, a lot of issues need to be solved. Management of the active network is one of the challenges. This thesis investigates an adaptive management solution based on genetic algorithm (GA). The solution uses a distributed GA inspired by bacterium on the active nodes within an active network, to provide adaptive management for the network, especially the service provision problems associated with future network. The thesis also reviews the concepts, theories and technologies associated with the management solution. By exploring the implementation of these active nodes in hardware, this thesis demonstrates the possibility of implementing a GA based adaptive management in the real network that being used today. The concurrent programming language, Handel-C, is used for the description of the design system and a re-configurable computer platform based on a FPGA process element is used for the hardware implementation. The experiment results demonstrate both the availability of the hardware implementation and the efficiency of the proposed management solution.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to reach back such destinations. We propose to use directed graphs to properly represent how destinations propagate through the Internet and the number of arc-disjoint paths to quantify this network's path diversity. Moreover, in order to understand the effects that policies have on the connectivity of the Internet, numerical analyses of the resulting directed graphs were conducted. Results demonstrate that, even after policies have been applied, there is still path diversity which the Border Gateway Protocol cannot currently exploit.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis presents a number of methodological developments that were raised by a real life application to measuring the efficiency of bank branches. The advent of internet banking and phone banking is changing the role of bank branches from a predominantly transaction-based one to a sales-oriented role. This fact requires the development of new forms of assessing and comparing branches of a bank. In addition, performance assessment models must also take into account the fact that bank branches are service and for-profit organisations to which providing adequate service quality as well as being profitable are crucial objectives. This study analyses bank branches performance in their new roles in three different areas: their effectiveness in fostering the use of new transaction channels such as the internet and the telephone (transactional efficiency); their effectiveness in increasing sales and their customer base (operational efficiency); and their effectiveness in generating profits without compromising the quality of service (profit efficiency). The chosen methodology for the overall analysis is Data Envelopment Analysis (DEA). The application attempted here required some adaptations to existing DEA models and indeed some new models so that some specialities of our data could be handled. These concern the development of models that can account for negative data, the development of models to measure profit efficiency, and the development of models that yield production units with targets that are nearer to their observed levels than targets yielded by traditional DEA models. The application of the developed models to a sample of Portuguese bank branches allowed their classification according to the three performance dimensions (transactional, operational and profit efficiency). It also provided useful insights to bank managers regarding how bank branches compare between themselves in terms of their performance, and how, in general, the three performance dimensions are connected between themselves.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network's performance compared to WCPS.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is considerable international interest in online education of patients with bipolar disorder, yet little understanding of how patients use the Internet and other sources to seek information. 1171 patients with bipolar disorder diagnosis in 17 countries completed a paper-based, anonymous survey. 81% of the patients used the Internet, a percentage similar to the general public. Older age, less education, and challenges in country telecommunications infrastructure and demographics decreased the odds of using the Internet. About 78% of the Internet users looked online for information on bipolar disorder or 63% of the total sample. More years of education in relation to the country mean, and feeling very confident about managing life decreased the odds of seeking information on bipolar disorder online, while having attended support groups increased the odds. Patients who looked online for information on bipolar disorder consulted medical professionals plus a mean of 2.3 other information sources such as books, physician handouts, and others with bipolar disorder. Patients not using the Internet consulted medical professionals plus a mean of 1.6 other information sources. The percentage of patients with bipolar disorder who use the Internet is about the same as the general public. Other information sources remain important.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

IEEE 802.11 standard has achieved huge success in the past decade and is still under development to provide higher physical data rate and better quality of service (QoS). An important problem for the development and optimization of IEEE 802.11 networks is the modeling of the MAC layer channel access protocol. Although there are already many theoretic analysis for the 802.11 MAC protocol in the literature, most of the models focus on the saturated traffic and assume infinite buffer at the MAC layer. In this paper we develop a unified analytical model for IEEE 802.11 MAC protocol in ad hoc networks. The impacts of channel access parameters, traffic rate and buffer size at the MAC layer are modeled with the assistance of a generalized Markov chain and an M/G/1/K queue model. The performance of throughput, packet delivery delay and dropping probability can be achieved. Extensive simulations show the analytical model is highly accurate. From the analytical model it is shown that for practical buffer configuration (e.g. buffer size larger than one), we can maximize the total throughput and reduce the packet blocking probability (due to limited buffer size) and the average queuing delay to zero by effectively controlling the offered load. The average MAC layer service delay as well as its standard deviation, is also much lower than that in saturated conditions and has an upper bound. It is also observed that the optimal load is very close to the maximum achievable throughput regardless of the number of stations or buffer size. Moreover, the model is scalable for performance analysis of 802.11e in unsaturated conditions and 802.11 ad hoc networks with heterogenous traffic flows. © 2012 KSI.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.