A hitchhiker’s guide to microscopy and microanalysis using telecommunications, e-mail, and the Internet

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.

1994 ◽  
Vol 2 (9) ◽  
pp. 16-18
Author(s):  
Nestor J. Zaluzec

The Information Superhighway, Email, The Internet, FTP, BBS, Modems,: all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes. All you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the “telecommunication experts”. These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are, in fact, far less complex than the instruments we use on a day to day basis as microscopists and microanalysts. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


1996 ◽  
Vol 20 (3) ◽  
pp. 146-148 ◽  
Author(s):  
Carl Littlejohns ◽  
Martin Briscoe

The Internet, a military creation, is a collection of services shaped by its users, and offers the rapid transfer of vast quantities of information. Already there is concern that Developing World countries may be left behind by this revolution in information availability. Psychiatrists need to be aware of the type of facility the information in the superhighway provides, so that the useful aspects can be refined and directed. The type of facilities in use now by psychiatrists around the world is briefly described.


1996 ◽  
Vol 30 (2) ◽  
pp. 158-164 ◽  
Author(s):  
Haleh Nazeri

The post information age will remove the limitations of geography.—Nicholas Negroponte, Being DigitalThe internet has been a continually changing forum for communicating that has been taken up by diaspora communities to maintain connections with their countrymates all over the world. In that capacity, the technology has been an easy and innovative avenue for cultural expression. Iranians, for instance, have established on-line magazines, newsgroups, media and business directories, human rights organizations, student groups, academic organizations and book publishers for a transnational community. Who goes to these sites and why?


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


2019 ◽  
Vol 14 (3) ◽  
pp. 175-181 ◽  
Author(s):  
Șerbu Răzvan

AbstractThe Internet has reach half of the population of the planet and in the latest three years more than 700 millions users came on line from the emerging world. Most of them are coming now from the poorer population. This it may be a turning point for their economic development. This paper attempts to outline some possible future developments of the contemporary economy within the new digital transformation and development of internet firms in emerging markets, some of the pluses and minuses, some of the opportunities and threats brought by the expansion of the Internet and information and communication technologies at different levels. We will present some significant aspects about this impact for individuals and for companies especially in Eastern Europe but also around the world. The study intends to deliver also analysis at the level of governmental reactions. Governments have gone through different sentiments that have led to different responses to these technologies. A new revolution that is about to begin it will be grounded on blockchain the technologies that cryptocurrencies are based on. What was initially translated as a threat to governments and central banks can become a solution if it’s deal cautiously.


Author(s):  
Yasmin Bouarara

In today's world of globalization and technology without borders, the emergence of the internet and the rapid development of telecommunications have made the world a global village. Recently, the email service has become immensely used, and the main means of communication because it is cheap, reliable, fast, and easy to access. In addition, it allows users with a mailbox (BAL) and email address to exchange messages (images, files, and text documents) from anywhere in the world via the internet. Unfortunately, this technology has become undeniably the original source of malicious activity, in particular the problem of unwanted emails (spam), which has increased dramatically over the past decade. According to the latest report from Radicati Group, which provides quantitative and qualitative research with details of the e-mail, security, and social networks, published in 2012, 70-80% of email traffic consists of spam. The goal of the chapter is to give a state of the art on spam and spam techniques and the disadvantages of this phenomenon.


2011 ◽  
pp. 3340-3345
Author(s):  
Bruce Rollier ◽  
Fred Niederman

Although the Internet has been in existence since 1969, it was not widely used for educational purposes in its first two decades. Few students had access to e-mail, and few educators could visualize its value as a teaching tool. Programs to serve students from remote locations, often called “distance education,” became popular; these were generally delivered synchronously through television broadcasts and did not involve the Internet. When the World Wide Web was created in the early 1990s (Berners-Lee, 1999) and the first browsers became available (Waldrop, 2001), the enormous potential for education began to be recognized. New global users came online at a fantastic pace, and the value of all this connectivity was increasing even more rapidly in accordance with Metcalf’s Law (Gilder, 1996). Nearly all students used e-mail regularly, and college professors were putting syllabi and course assignments online and creating Web pages with increasing sophistication. Soon entire programs were offered completely via the Internet, with students from all over the globe taking courses together.


Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Sign in / Sign up

Export Citation Format

Share Document