Judaica Resources on the Internet, for Adults and Children

1995 ◽  
Vol 9 (1) ◽  
pp. 9-15
Author(s):  
Diane Romm ◽  
Naomi M. Steinberger

Introduces the reader to the history of the Internet and the requirements for accessing it. The three major capabilities of the Internet-electronic mail, telnet, and file transfer protocol are discussed. Examples of how Jewish Internet resources may be used in the educational arena are included. The article concludes with a list of Jewish Internet sites.

2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


2014 ◽  
Vol 15 (5) ◽  
pp. 3086-3092 ◽  
Author(s):  
Jae-Won Ahn ◽  
Beom-Jin Choi ◽  
Sung-Jin Ok ◽  
Jung-Ha Kang ◽  
Jae-Young Kim ◽  
...  

Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


2021 ◽  
pp. 259-286
Author(s):  
Laszlo Solymar

Chapter 16 discusses the history of the computer. Important events include IBM bringing out the personal computer, and Xerox PARC inventing the graphical user interface. Paul Allen and Bill Gates left Harvard in 1975 to set up a computer laboratory. A year later Steve Jobs and Steve Wozniak set up Apple, followed soon by Dan Bricklin inventing the electronic spreadsheet. At the start of the 1980s Gates leased the MS-DOS operating system to IBM. Prior to all this, in 1969 the Advanced Research Product Agency set up ARPANET, the predecessor of the Internet. Other topics covered in this chapter include the birth of electronic mail, uses and abuses of the Internet, security and coding, and the Minitel in France. The last part of the chapter looks at the Soviet Union and the InterNyet.


Sign in / Sign up

Export Citation Format

Share Document