scholarly journals Netscan and Networx for Management Bandwidth and Traffic with Simple Routing

2017 ◽  
Author(s):  
mufadhol mufadhol

Currently, approximately 3.4 billion people are accessing the internet around the world and that number is still growing. This phenomena creates the Internet culture that has a great influence on science, technology and even the world economy. Internet bandwidth is very expensive, which makes an information technology based company have to map the internet accurately either daily, monthly or yearly. That data will be taken into consideration by the company to decide how to provide services that make an internet surfing is a pleasant experience. If not regulated, most likely the traffic and bandwidth will be used up even when it is only shared by a few users. To anticipate this, we need a bandwidth and management traffic system using Netscan and Networx in order to monitoring the usage of Internet.

Author(s):  
Hamisu Alhaji Ali

In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy continually understand that by just outsourcing or tapping the cloud  resources, a package of virtualise, elastic, instant on-demand provision, and scalable; infrastructure, platform, and software can be access fast and easy inform of services at a negligible amount via the internet. However, as individuals and organizations embarked on the course of deploying their information and data into the cloud, anxieties are beginning to develop on whether the cloud environment is safe. This research provides an overview of the cloud deployment model, the services they offer and discusses the security issues and challenges of cloud computing in both data storage and virtual applications/servers.


2012 ◽  
Vol 426 ◽  
pp. 372-375
Author(s):  
Xin Yong Zeng

With the continuous development of information technology and widespread of the Internet, e-commerce has become the mainstream business mode in the world economy. Under the context of e-commerce, enterprises are faced with enormous information resources, and the competition among the enterprises is also built on the basis of informatization, while business information safety is the essence of business informatization. The paper has conducted profound researches on the business information safety from three aspects: collection, application and management of information.


Author(s):  
J. Paynter

Historically, information and services can only be obtained through narrow, one to one, phones, and agency-specific shop fronts (Caffrey, 1998). Information technology, especially the Internet, opens possibilities of using methods to distribute information and deliver services on a much grander scale. The Internet provides a foundation for a variety of communications media. The Web is one of the most important media built upon the Internet. It can be accessed from almost anywhere in the world by means of computers and electronic devices; it is possible to elicit more information, establish platforms for online payment, online consultation and e-voting. Security concerns can be overcome by data-authentication technologies. It can deliver government services and encourage greater democracy and engagement from citizens. Governments around the world are exploring the use of Web-based information technology (Grönlund, 2002). Attention has focused on the design and delivery of portals as a major component of government electronic service infrastructures. The N.Z. government portal site (http://www.govt.nz/en/home/) or the Local Government Online Ltd (LGOL) Web site, (www.localgovt.co.nz/AboutCouncils/Councils/ByRegion/) are examples. Since the mid-1990s governments have been tapping the potential of the Internet to improve and governance and service provision. “In 2001, it was estimated that globally there were well over 50,000 official government Web sites with more coming online daily. In 1996 less than 50 official government homepages could be found on the world-wide-Web” (Ronaghan, 2002). Local governments are faced with growing demands of delivering information and services more efficiently and effectively and at low cost. Along with the rapid growth of technological developments, people demand high quality services that reflect their lifestyles and are accessible after normal office hours from home or work. Thus, the goals of delivering electronic government services are to simplify procedures and documentation; eliminate interactions that fail to yield outcomes; extend contact opportunities (i.e., access) beyond office hours and improve relationships with the public (Grönlund, 2002). Having an effective Web presence is critical to the success of local governments moving to adopt new technologies. Of equal importance is the evaluation of Web sites using different manual and automated methodologies and tools. In this study an evaluation of local authority Web sites was conducted to gain a practical understanding of the impact of the Internet on local governments in New Zealand using a tailor-made model specific to local governments. Issues studied focused on the information and services provided by the local authority Web sites. What is more important is whether the local government operations can or are able to support the expectations for speed, service, convenience, and delivery that the Web creates. Through identification of best practice Web sites and a set of evaluation methods and tools, this paper will provide a set of design guidelines to local authorities that would benefit and better meet the needs of their local communities.


Author(s):  
James Griffin

Electronic commerce has been recognised as a source of fundamental, pan-sectoral change to the conduct of business; Chan and Swatman (2000) use the term: “A new paradigm for doing business.” Other authors have gone further, viewing modern IT developments as the latter part of a period starting in the mid-1970s that represents a transition to nothing less than a new phase of capitalist development (Amin, 1994). Benjamin, Rockhart, Scott Morton, and Wyman (1983) also suggest that the world economy has been fundamentally altered by the globalisation of competition which has largely been caused by the declining cost and consequent increasing spread of IT developments.


Author(s):  
Soraj Hongladarom

The problem of global digital divide, namely disparity in Internet access and use among the various regions of the world, is a growing concern. Even though, according to some reports, the gap is getting narrower, this does not mean that the problem is disappearing, because the problem does not just consist in getting more people to become “wired,” so to speak. This chapter investigates the various relationships among the global digital divide, global justice, cultures and epistemology. Very briefly stated, not getting access to the Internet constitutes an injustice because the access is a social good that can lead to various other goods. Furthermore, as information technology is a second-order technology, one that operates on meaning bearing symbols, access to the technology is very much an issue of social epistemology, an attempt to find out the optimal way to distribute knowledge across the social and cultural domains.


Author(s):  
Stephan Kudyba ◽  
Richard Hoptroff

The world of commerce has undergone a transformation since the early 1990s, which has increasingly included the utilization of information technologies by firms across industry sectors in order to achieve greater productivity and profitability. In other words, through use of such technologies as mainframes, PCs, telecommunications, state-of-the-art software applications and the Internet, corporations seek to utilize productive resources in a way that augment the efficiency with which they provide the most appropriate mix of goods and services to their ultimate consumer. This process has provided the backbone to the evolution of the information economy which has included increased investment in information technology (IT), the demand for IT labor and the initiation of such new paradigms as e-commerce.


Author(s):  
A. J. Pitman ◽  
M. Gosper ◽  
D. C. Rich

<span>The design of a first year course with enrolments of about 400 students which is delivered using information technology via the Internet or Intranet is reviewed. The course is composed of a variety of information technology based applications including course materials, bulletin boards, email, quizzes, access to the World Wide Web and multimedia packages linked together using a single Internet browser interface. Access statistics through the entire course were collected hourly over the sixteen weeks of semester and separated on the basis of gender and final grade. Statistical analysis is presented which shows that different groups of students access the course in different ways. Performance in the course is statistically related to the number of times the student accesses the package. We find no evidence that males are advantaged or disadvantaged compared to females through the use of information technology although females appear to use the communications part of the course more than males. Based on the access statistics, we make recommendations on the components which seem to be well received by students and we note some components which will require more careful integration into a teaching program. Overall, the delivery of a first year course via information technology works well provided the components are carefully integrated into the course framework.</span>


2019 ◽  
Vol 22 (3) ◽  
pp. 60-70
Author(s):  
Demush Bajrami ◽  
Arburim Iseni ◽  
Anesa Topko

Subversion! Is it the symbol of invisibility, or the symbol of the secret power? What does it represent, the ability to carry the messages secretly, or the power to change the world? What are the ideas or objects that subversion challenges? The authority, people, tradition, institution, or the whole of humanity. Can it be considered as a way to brainwash or as a means to manipulate the thoughts and opinions of people? Is the power used by people to hide their feelings from others, be subversive? Is it the point where the change and progress meet? There are a lot of numerous and different questions that can be born from just a simple word subversion. At first glance, we think it is something simple, but its true meaning has power and many methods of expression. The whole idea and aim of subversion are to overthrow the existing state or situation and bring a functioning or desired change. It also supports the idea of staying behind and moving by one's own beliefs and choices. One of the common ways that we are exposed to subversive messages is through advertisements for different products, and the messages they carry on. Because of them, our subconscious mind is made to believe and desire things that we do not truly need or want. In the age of information technology and social media, subversive messages are carried much easier and shaped based on the characteristics of target audiences. Nowadays, advertisement and political campaigns directly respond to the individual requirements of target audiences, making their messages much more acceptable and influential.


Sign in / Sign up

Export Citation Format

Share Document