Experiential Learning of Networking Technologies: Understanding Web Performance

2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

It is almost impossible to overstate the importance of the internet in transforming every aspect of modern life. The number of internet users continues to grow, and users increasingly expect immediate responses while interacting with web content. Any perceived delay can be off-putting for users and can result in loss of business and revenue for the corporation offering the web service. Thus, optimizing web delivery is an increasingly important challenge. In this article we discuss several modern best-practices to improve web performance. As always, we design a series of experiments to help readers gain hands-on experience in web performance enhancement and better understand the underlying mechanisms. The performance mechanisms discussed here are primarily applicable to the HTTP/1.1 protocol, which is the default web protocol used today.

2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.


Author(s):  
Liv Merete Nielsen ◽  
Janne Beate Reitan

The Ludvigsen Committee (Ludvigsen-utvalget), which aims to assess primary and secondary educational subjects in terms of the competence Norwegian society and its working life will need in the future, has published an interim report entitled Pupils’ Learning in the School of the Future – A Knowledge Foundation (Norwegian Ministry of Education and Research, 2014). The committee wrote the following about arts and crafts: “That subject will contribute to personal development and simultaneously strengthen opportunities to participate in a democratic society, which can be seen as a desire to protect both individual-oriented and community-oriented training. The breadth of the subject can restrict the ability to delve into individual topics” (NOU 2014: 7, 2014, p. 89, our translation from Norwegian). This will be an important challenge for the team in the near future. The committee shall submit their principal report by June 2015.Practical work with materials must not be removed from primary school. It should be required that qualified teachers are employed on the lower grades. Practical/hands-on work can give the trades a boost, encourage students to choose vocations and prevent dropouts in vocational education programmes. We need skilled craftsmen in the future, and good teaching in Arts & Crafts in compulsory education could provide an important basis for both future craftsmen and customers of good craftsmen.


Author(s):  
Kathleen M. Hart ◽  
Steven B. Shooter ◽  
Charles J. Kim

Hands-on product dissection and reverse engineering exercises have been shown to have a positive impact on engineering education, and many universities have incorporated such exercises in their curriculum. The CIBER-U project seeks to examine the potential to utilize cyberinfrastructure to enhance these active-learning exercises. We have formulated a framework for product dissection and reverse engineering activity creation to support a more rigorous approach to assessing other exercises for satisfaction of the CIBER-U project goals and adapting the best practices. This framework is driven by the fulfillment of learning outcomes and considers the maturity of students at different levels. Prototype exercises developed with the framework are presented. The approach is sufficiently general that it can be applied to the consideration and adaption of other types of exercises while ensuring satisfaction of the established goals.


Author(s):  
Nadja Yang Meng ◽  
Karthikeyan K

Performance benchmarking and performance measurement are the fundamental principles of performance enhancement in the business sector. For businesses to enhance their performance in the modern competitive world, it is fundamental to know how to measure the performance level in business that also incorporates telling how they will performance after a change has been made. In case a business improvement has been made, the performance processes have to be evaluated. Performance measurements are also fundamental in the process of doing comparisons of performance levels between corporations. The best practices within the industry are evaluated by the businesses with desirable levels of the kind of performance measures being conducted. In that regard, it is fundamental if similar businesses applied the same collection of performance metrics. In this paper, the NETIAS performance measurement framework will be applied to accomplish the mission of evaluating performances in business by producing generic collection of performance metrics, which businesses can utilize to compare and measure their organizational activities.


2013 ◽  
pp. 84-102
Author(s):  
Edward Chen

This chapter discusses the Internet phenomenon known as Web 2.0. It explores Internet use, Internet users, and the continuous improvements being made to the Internet. The purpose of this chapter is to explain the impact that social networking has on the modern enterprise; particularly, when it comes to collaboration and knowledge sharing. The growth trajectory of Web 2.0 software such as social networking, blogs, tags, RSS feeds, wikis, YouTube videos, and widgets are presented, and each component is outlined in detail. Each application is also applied to a practical business setting. The benefits and challenges of each application are discussed, and examples of organizations that are implementing Web 2.0 strategies are presented. Some limitations and concerns of Web 2.0 are discussed. The chapter concludes with an examination of the implications of Web 2.0 on companies and their business and marketing strategies.


2016 ◽  
Vol 3 (3) ◽  
pp. 138-166 ◽  
Author(s):  
Jin Xuelian ◽  
Yang Deshan

This article adopts a multi-case study approach to understand how users of internet technologies actually use the technology, and to explore the extent to which users perceive the technologies’ purported democratic and deliberative capacities. In-depth interviews, a focus group, a search and analysis of web content, and digital auto-ethnography were used to produce qualitative data. Those participants who engaged in online political expression with strangers or on public platforms reported a belief in their competence to make a difference through the internet, while those who did so only with acquaintances, and those who engaged in no political expression online, did not. Most of the participants articulated a strong belief that ‘we’, internet users as a whole, are influential, because they believed online public opinion contributed to better solutions to some social problems. This study casts new light on the relationship between internet use, political attitudes, and online political expression.


2018 ◽  
Vol 23 (1) ◽  
pp. 47-56
Author(s):  
Allison M. Price ◽  
Jessica C. Monahan ◽  
Rachel Bergren

Exhibit signage and graphics projects are most successful when they involve collaborative planning and formative evaluation throughout the process. Lincoln Park Zoo set out to combine interpretive best practices and visitor evaluation methods for the newly renovated eastern black rhinoceros yard in 2010. Evaluation methods included prototyping, visitor tracking, and informal interviews. After installation of the new graphics, visitor time spent looking at both the signs and the exhibit increased. Results were most significant among male visitors. The study indicates that hands-on non-personal media of this nature can have a significant effect on visitor behavior in an exhibit space. It also provides a model for making data-informed decisions regardless of limited budgets or resources.


2021 ◽  
Vol 1 (13) ◽  
pp. 6-15
Author(s):  
Yuriy Yakymenko ◽  
Dmytro Rabchun ◽  
Mykhailo Zaporozhchenko

As the number and percentage of phishing attacks on company employees and regular users have tended to increase rapidly over the last two years, it is necessary to cover the issue of protection against this type of social engineering attacks. Throughout the pandemic, intruders are finding more and more new ways to cheat, so even experienced Internet users can become a victim to their scams. Due to the fact that e-mail is used in almost all companies, most fishing attacks use e-mail to send malicious messages. The article discusses the main methods used by attackers to conduct phishing attacks using e-mail, signs that the user has become a victim to social engineers, and provides recommendations how to increase the resilience of the corporate environment to such attacks using organizational methods. Because the user is the target of phishing attacks, and the tools built into the browser and email clients in most cases do not provide reliable protection against phishing, it is the user who poses the greatest danger to the company, because he, having become a victim of a fishing attack, can cause significant damage to the company due to his lack of competence and experience. That is why it is necessary to conduct training and periodic testing of personnel to provide resistance to targeted phishing attacks. Company employees should be familiar with the signs of phishing, examples of such attacks, the principles of working with corporate data and their responsibility. The company's management must create and communicate to the staff regulations and instructions that describe storage, processing, dissemination and transfer processes of information to third parties. Employees should also report suspicious emails, messages, calls, or people who have tried to find out valuable information to the company's security service. Raising general awareness through hands-on training will reduce the number of information security incidents caused by phishing attacks.


Sign in / Sign up

Export Citation Format

Share Document