997 resultados para internet tools


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cada vez mais, se torna necessário, apresentar, transpor e adequar as Novas Tecnologias ao ambiente de aprendizagem na sala de aula, interligando não só as Áreas Curriculares Não Disciplinares (ACND) como as Áreas Curriculares Disciplinares (ACD) a um trabalho colaborativo. Por conseguinte, o objetivo deste projeto de investigação é aplicar um projeto de aprendizagem colaborativa denominado “Triângulo das Histórias”, utilizando como instrumento de partilha um blogue na internet, e avaliar o tipo de aceitação que a sua aplicação gerou. A aplicação do projeto em contexto educativo visará uma interação entre a comunidade educativa, possibilitando assim, a experimentação de comunidades virtuais de comunicação e de colaboração escolar. Para complementar este estudo pretende-se também perceber os hábitos de utilização da Internet dos alunos envolvidos no projeto. A amostra utilizada para este estudo foi um conjunto de dezoito alunos dos 1.º e 2.º Ciclos do Ensino Básico, com idades compreendidas entre os 6 e os 12 anos de idade, dos regimes público, cooperativo e particular, repartidos por três escolas distintas, com meios socioeconómicos também diferentes. Para a recolha dos dados foi realizado um inquérito aos alunos envolvidos no projeto e realizadas observações sobre as suas interações e comportamentos. Os dados extraídos dos inquéritos foram apresentados sob a forma de gráfico. A implementação deste projeto permitiu perceber que os alunos foram recetivos a esta nova abordagem de realização de trabalho de grupo colaborativo recorrendo às comunidades virtuais. A criação de uma história associando três escolas distintas permitiu que os alunos, para além de terem de elaborar um texto de forma coletiva, tivessem acesso a novas ferramentas tanto da internet como do sistema operativo, tornando-se, desta forma, um bom complemento de aprendizagem.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Information technology has increased both the speed and medium of communication between nations. It has brought the world closer, but it has also created new challenges for translation — how we think about it, how we carry it out and how we teach it. Translation and Information Technology has brought together experts in computational linguistics, machine translation, translation education, and translation studies to discuss how these new technologies work, the effect of electronic tools, such as the internet, bilingual corpora, and computer software, on translator education and the practice of translation, as well as the conceptual gaps raised by the interface of human and machine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents aspects of a longitudinal study in the design and practice of Internet meetings between farmer their advisors and researchers in rural Australia. It reports on the use of Microsoft NetMeeting (NM) by a group of agricultural researchers from Australia's CSIRO (Commonwealth Scientific and Industrial Research Organisation) for regular meetings, over nine years, with farmers and the commercial advisers. It describes lessons drawn from this experience about the conditions under which telecollaborative tools, such as NM and video conferencing, are likely to be both useful and used.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The impact of Web 2.0 and social networking tools such as virtual communities, on education has been much commented on. The challenge for teachers is to embrace these new social networking tools and apply them to new educational contexts. The increasingly digitally-abled student cohorts and the need for educational applications of Web 2.0 are challenges that overwhelm many educators. This chapter will make three important contributions. Firstly it will explore the characteristics and behaviours of digitally-abled students enrolled in higher education. An innovation of this chapter will be the appli- cation of Bourdieu’s notions of capital, particularly social, cultural and digital capital to understand these characteristics. Secondly, it will present a possible use of a commonly used virtual community, Facebook©. Finally it will offer some advice for educators who are interested in using popular social networking communities, similar to Facebook©, in their teaching and learning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis investigates how modern individuals relate to themselves and others in the service of shaping their ethical conduct and governing themselves. It considers the use of online social networking sites (SNSs) as one particular practice through which people manage their day-to-day conduct and understandings of self. Current research on the use of SNSs has conceptualised them as tools for communication, information-sharing and self-presentation. This thesis suggests a different way of thinking about these sites as tools for self-formation. A Foucaultian genealogical, historical and problematising approach is applied in order to explore processes of subjectivation and historical backgrounds involved in the use of SNSs. This is complimented with an ANT-based understanding of the role that technologies play in shaping human action. Drawing new connections between three factors will show how they contribute to the ways in which people become selves today. These factors are, one, the psychologisation and rationalisation of modern life that lead people to confess and talk about themselves in order to improve and perfect themselves, two, the transparency or publicness of modern life that incites people to reveal themselves constantly to a public audience and, three, the techno-social hybrid character of Western societies. This thesis will show how some older practices of self-formation have been translated into the context of modern technologised societies and how the care of self has been reinvigorated and combined with the notion of baring self in public. This thesis contributes a different way of thinking about self and the internet that does not seek to define what the modern self is and how it is staged online but rather accounts for the multiple, contingent and historically conditioned processes of subjectivation through which individuals relate to themselves and others in the service of governing their daily conduct.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Remote Sensing Core Curriculum (RSCC) was initiated in 1993 to meet the demands for a college-level set of resources to enhance the quality of education across national and international campuses. The American Society of Photogrammetry and Remote Sensing adopted the RSCC in 1996 to sustain support of this educational initiative for its membership and collegiate community. A series of volumes, containing lectures, exercises, and data, is being created by expert contributors to address the different technical fields of remote sensing. The RSCC program is designed to operate on the Internet taking full advantage of the World Wide Web (WWW) technology for distance learning. The issues of curriculum development related to the educational setting, with demands on faculty, students, and facilities, is considered to understand the new paradigms for WWW-influenced computer-aided learning. The WWW is shown to be especially appropriate for facilitating remote sensing education with requirements for addressing image data sets and multimedia learning tools. The RSCC is located at http://www.umbc.edu/rscc. The Remote Sensing Core Curriculum (RSCC) was initiated in 1993 to meet the demands for a college-level set of resources to enhance the quality of education across national and international campuses. The American Society of Photogrammetry and Remote Sensing adopted the RSCC in 1996 to sustain support of this educational initiative for its membership and collegiate community. A series of volumes, containing lectures, exercises, and data, is being created by expert contributors to address the different technical fields of remote sensing. The RSCC program is designed to operate on the Internet taking full advantage of the World Wide Web (WWW) technology for distance learning. The issues of curriculum development related to the educational setting, with demands on faculty, students, and facilities, is considered to understand the new paradigms for WWW-influenced computer-aided learning. The WWW is shown to be especially appropriate for facilitating remote sensing education with requirements for addressing image data sets and multimedia learning tools. The RSCC is located at http://www.umbc.edu/rscc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The definition of tourism “is the travel for recreational, leisure, family or business purposes, usually of a limited duration. Tourism is commonly associated with trans-national travel, but may also refer to travel to another location within the same country”. Tourism as an industry, in today’s modern language is a means of global communication between nations and travelers of all countries, introducing them to the various cultures and societies abroad, as well there history, ancient, historical sites, and languages. Hence, advertising overall has become a tool of necessity in this ever-growing global industry. Given that, tourism is a part of the infrastructure of any country’s economy the growth and development of tourism is of great importance. Advertising plays a vital and is a crucial tool in developing the countries tourism by attractively presenting the nations points-of-interests, historical and cultural. Advertising has a central role in expanding this industry, generating economic growth in this area, as well as creating direct and indirect employment, but most importantly a creative innovating competition in the national and international travel industry. Importantly, to achieve a successful tourist industry, the Travel Agencies and governmental offices of the Ministry’s of Tourism and Business must work hand-in-hand to attain these goals. This article shows the impact of the various media and advertising methods used in tourism, which assisted in identifying the correct tool for expanding the country’s industry of tourism. The results of this study illustrated that the appropriate tools for promotional strategies to attract domestic and foreign traveler’s, found to be the most effective were, handbook, internet advertising, TV, brochures, newspapers