A Comparison of Four End-User Devices as Thin Clients for Public Access to the Internet in Poor Communities

Author(s):  
Kevin Duff ◽  
Ingrid Siebörger ◽  
Alfredo Terzoli
2009 ◽  
Vol 28 (2) ◽  
pp. 81 ◽  
Author(s):  
John Carlo Bertot

<span>Public libraries were early adopters of Internet-based technologies and have provided public access to the Internet and computers since the early 1990s. The landscape of public-access Internet and computing was substantially different in the 1990s as the World Wide Web was only in its initial development. At that time, public libraries essentially experimented with publicaccess Internet and computer services, largely absorbing this service into existing service and resource provision without substantial consideration of the management, facilities, staffing, and other implications of public-access technology (PAT) services and resources. This article explores the implications for public libraries of the provision of PAT and seeks to look further to review issues and practices associated with PAT provision resources. While much research focuses on the amount of public access that </span><span>public libraries provide, little offers a view of the effect of public access on libraries. This article provides insights into some of the costs, issues, and challenges associated with public access and concludes with recommendations that require continued exploration.</span>


2007 ◽  
Vol 26 (1) ◽  
pp. 14 ◽  
Author(s):  
John Carlo Bertot ◽  
Charles R. McClure

Based on data collected as part of the 2006 Public Libraries and the Internet study, the authors assess the degree to which public libraries provide sufficient and quality bandwidth to support the library’s networked services and resources. The topic is complex due to the arbitrary assignment of a number of kilobytes per second (kbps) used to define bandwidth. Such arbitrary definitions to describe bandwidth sufficiency and quality are not useful. Public libraries are indeed connected to the Internet and do provide public-access services and resources. It is, however, time to move beyond connectivity type and speed questions and consider issues of bandwidth sufficiency, quality, and the range of networked services that should be available to the public from public libraries. A secondary, but important issue is the extent to which libraries, particularly in rural areas, have access to broadband telecommunications services.


Author(s):  
Alexandre B. Augusto ◽  
Manuel E. Correia

The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users’ identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities’ identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.


Author(s):  
Siddath Raghavan ◽  
Saideep M ◽  
Shivashankar S ◽  
Dr. Durga Devi M

An interactive Student Information system in the cloud is an one stop portal on the internet where the students can get answers to their queries and look up relevant information. The users can check their personal details, communicate with faculties and avail a ”livechat” to get their queries solved. They are also able to access relevant information regarding different activities and events including and not limited to ”attendance”, ”timetable”, ”subject list”, ”college events”, etc. Cloud technologies reduce the challenges faced by traditional systems such as costs associated with development and maintenance. The student support system is ubiquitous in nature since it is hosted in the cloud and uses the power of cloud computing to make the application secure, scalable, and fast. Along with the power of cloud computing, good User Interface/User Experience(UI/UX) is focused upon to ensure that the end-user has a great hassle-free experience. Load balancers are used to handle huge traffic the website might face. User experience principles are used in order to make the portal easy to use.


2015 ◽  
Vol 1 (1) ◽  
pp. 46
Author(s):  
Fatimah Nur Arifah ◽  
Abidarin Rosidi ◽  
Hanif Al Fatta

Penelitian ini bertujuan untuk mengetahui dan mengukur tingkat kepuasan pengguna terhadap aplikasi Online Public Access Catalog (OPAC) pada Perpustakaan STMIK AMIKOM Yogyakarta. Subjek penelitian ini ialah mahasiswa yang terdaftar sebagai anggota perpustakaan dan objek penelitian ini adalah aplikasi OPAC Perpustakaan STMIK AMIKOM Yogyakarta. Analisis data dalam penelitian ini menggunakan diagram Importance Performance Analysis (IPA) dipadukan dengan Indeks Kepuasan Pengguna (IKP) didasarkan pada indikator-indikator dari lima dimensi End User Computing Satisfaction yaitu isi (content), keakuratan (accuracy), bentuk (format), kemudahan penggunaan (ease of use) dan ketepatan waktu (timeliness). Hasil penelitian menunjukkan pengguna OPAC Perpustakaan STMIK AMIKOM Yogyakarta cukup puas dengan hasil perhitungan IKP 78,01 %. Penelitian ini diharapkan dapat memberi masukan pada pengelola OPAC sebagai bahan acuan untuk meningkatkan kinerja OPAC.This study aims to identify and measure the level of satisfaction of users of the application Online Public Access Catalog (OPAC) in the library STMIK AMIKOM Yogyakarta. These subjects are students who are registered as members of the library and the object of this study is OPAC STMIK Library AMIKOM Yogyakarta. Analysis of the data in this study using a diagram of Importance Performance Analysis (IPA) which is combined with User Satisfaction Index (IKP) based on the five dimensions of End User Computing Satisfaction; content, accuracy, format, ease of use and timeliness. The results showed users of OPAC STMIK AMIKOM Yogyakarta quite satisfied with the results of the calculation IKP 78.01%. This research is expected to provide input to the manager of the OPAC as a reference to improve performance of the OPAC.


Media Iuris ◽  
2020 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Chrisna Arwiandra Leuwol ◽  
Ludevikus Limdianda ◽  
Arjuna Rizky Dwi Krisnayana

The development of advanced technology and faster, ease of accessing the virtual world leads to equal public access to information collected on the internet, one of which is a song, a recording of rhythmic sound that was originally shaped physics from the record vinyl then to become a tape cassette for radio tape and now evolved along with technology into digital media like DVD, Flash disk, and Hard disk. The Internet connects the global world to a single location. Based on this case KEMENKOMINFO (Ministry of Communication and Informatics) has attempted to enforce the closure of a number of sites that commit illegal acts such as uploading, downloading and reproduction of songs on the internet without the permission of the author and copyright holder. From the problematic law is written this thesis about copyright protection of songs on the internet, what the copyright standards of songs on the internet together with the form of copyright infringement of songs on the internet and recovery efforts.


1998 ◽  
Vol 531 ◽  
Author(s):  
R. W. Wyndrum

AbstractToday I will focus on telecommunications technology for the first decade of the 21st century. Few things incite speculation about the future more than a year ending in the numeral “zero.” With the approaching millennium and its near-mystical three zeroes, everyone everywhere hungers for a glimpse into the future. My vision of the telecommunications future shows a collective of universal capabilities made possible by limitless digital networks with ubiquitous access and functionality. Mobile communications, the Internet, video, telephony and a broad array of end-user services will be the major drivers moving network providers to fuse capability with transparency. Integration of the full spectrum of communication possibilities will be the trend of the 21st century.


Author(s):  
Manuel Mogollon

In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted using transport layer security (TLS) or secure socket layer (SSL) protocols. When a purchase is made online using a credit card, does the customer’s bank need to know what was purchased? Not really. Does the seller need to know the customer’s credit card number? Actually, the answer is no. The responses to these questions were the main premises of the secure electronic transaction (SET). In the late 1990’s, SET was approved as the credit card standard, but it failed to be accepted because of its cost and the problems regarding distribution of end-user certificates. However, SET is explained in this chapter as an ideal protocol, from the point of view of certificates, digital signatures, and cryptography for securing credit card transactions over the Internet.


2003 ◽  
pp. 133-143
Author(s):  
Georg Disterer

Many elderly people (age of 60+) are keen on getting familiar with the Internet. At the same time, end-user training gets more and more important for IT management. Therefore, we implemented a graduate Information Systems course, where students have to design, organize, manage, and run a training session, where elderly people can see and try using the Internet. The students learned to design a teaching curriculum and teaching materials, to set up and maintain the technical infrastructure, to organize end-user training, and, most importantly, to teach and to train end-users.


Sign in / Sign up

Export Citation Format

Share Document