scholarly journals Efficient incremental data backup of unison synchronize approach

2021 ◽  
Vol 10 (5) ◽  
pp. 2707-2715
Author(s):  
Prakai Nadee ◽  
Preecha Somwang

Data communication and computer networks have enormously grown in every aspect of businesses. Computer networks are being used to offer instantaneous access to information in online libraries around the world. The popularity and importance of data communication has produced a strong demand in all sectors job for people with more computer networking expertise. Companies need workers to plan, use and manage the database system aspects of security. The security policy must apply data stored in a computer system as well as information transfer a network. This paper aimed to define computer data backup policies of the Incremental backup by using Unison synchronization as a file-synchronization tool and load balancing file synchronization management (LFSM) for traffic management. The policy is to be able to perform a full backup only at first as a one time from obtaining a copy of the data. The easiest aspect of value to assess is replacement for restoring the data from changes only and processing the correct information. As a result, the new synchronization technique was able to improve the performance of data backup and computer security system.

2021 ◽  
Vol 9 (1) ◽  
pp. 74
Author(s):  
Elfi Tasrif

Learning is more interesting and helps foster a sense of enthusiasm for learning is the role of multimedia. This study aims to design multimedia learning on the subject of Computer Networks and Data Communication for informatics education students. This type of research uses a development research approach, this research will only focus on stage I, namely designing multimedia learning. Designing multimedia learning in computer networking and data communications subject using Lectora Inspire Software. Furthermore, validation is carried out based on expert trials, on aspects of software engineering, aspects of application design, aspects of visual communication. The results of designing multimedia learning in the subject of Computer Networks and Data Communication for informatics education students are valid, feasible, easy to use, and very friendly. So that with this multimedia learning design greatly contributes to learning in informatics education.


2018 ◽  
Author(s):  
Peter M. Shane

Given the ubiquity of computer networks and our reliance as a society on their integrity and robustness, the quality of cyber-security is an issue that affects everyone. Yet, cyber-security policy making has remained almost entirely within the purview of lobbyists and technical experts. This article argues for both the plausibility and normative imperative of greater public participation in cyber policy making.


Author(s):  
R. Baranenko

Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.


Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.


2018 ◽  
Vol 16 (1) ◽  
pp. 163-171 ◽  
Author(s):  
Frederico N Leite ◽  
Eduardo Shigueo Hoji ◽  
Humberto Abdalla Junior

1988 ◽  
Vol 7 (6) ◽  
pp. 559-562 ◽  
Author(s):  
Jan H.P. Eloff

Sign in / Sign up

Export Citation Format

Share Document