Kierkegaard and the Internet

Author(s):  
Andrew Ward ◽  
Brian Prosser

In the last decade of the twentieth century, with the advent of computers networked through Internet Service Providers and the declining cost of such computers, the traditional topography of secondary and post-secondary education has begun to change. Where before students were required to travel to a geographically central location in order to receive instruction, this is often no longer the case. In this connection, Todd Oppenheimer writes in The Atlantic Monthly that one of the principal arguments used to justify increasing the presence of computer technology in educational settings is that “[W]ork with computers – particularly using the Internet – brings students valuable connections with teachers, other schools and students, and a wide network of professionals around the globe.”1 This shift from the traditional to the “virtual” classroom2 has been welcomed by many. As Gary Goettling writes, “[D]istance learning is offered by hundreds, if not thousands, of colleges and universities around the world, along with a rapidly growing number of corporate and private entities.”3 Goettling’s statement echoes an earlier claim by the University of Idaho School of Engineering that one of the advantages of using computers in distance education is that they “increase access. Local, regional, and national networks link resources and individuals, wherever they might be.”4

2019 ◽  
Vol 2 (3) ◽  
pp. 238-242
Author(s):  
Andreas Tedja ◽  
Charles Lim ◽  
Heru Purnomo Ipung

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.


1994 ◽  
Vol 41 (5) ◽  
pp. 276-281
Author(s):  
M. G. (Peggy) Kelly ◽  
James H. Wiebe

Throughout the Curriculum and Evaluation Standards for School Mathematics (NCTM 1989) the notion of students and teachers as critical thinkers, information seekers, and problem solvers is a priority. The Internet, an electronic highway connected by gateways from one computer network to another, furnishes a telecommunications link around the world. The Internet enables students and teachers to access authentic, real-time data for critical analysis. With access to such Internet service providers as a university computer network or a commercial service like Compuserve, Prodigy, or Applelink, students and teachers become active information seekers.


Repositor ◽  
2020 ◽  
Vol 2 (6) ◽  
pp. 745
Author(s):  
Muhammad Ilham ◽  
Gita Indah Marthasari ◽  
Ilyas Nuryasin

AbstractThe library is a source of knowledge and supporting facilities in each educational institution, especially in this discussion the library is at a college or university. With the library, it will facilitate students in finding various information about teaching and learning, and will also improve the teaching and learning process. The Indonesian Internet Service Providers Association (APPJI) in its survey of several years stated that the use of mobile devices has a very large increase. Recorded from 2013 to 2017 has a very large increase of 61.26 million internet users in Indonesia. The behavior of internet users based on the device used to access the internet is 44.16% in the use of mobile devices, mobile devices and computers ortop 4.49%, the use of mobile devices and computers by 39.28%. This means that the behavior of internet users in Indonesia is very dominant in accessing the internet through mobile devices. Moreover statistics show that mobile internet users are also increasing from year to year. Previously there was a library system at the University of Muhammadiyah Malang web-based. But in this case the tendency of the behavior of internet users in the use of mobile devices, the Muhammadiyah University Library of Malang has a huge opportunity in developing an improving services in meeting the needs of students in finding information needs.AbstrakPerpustakaan adalah sumber ilmu pengetahuan dan sarana penunjang pada setiap instansi pendidikan terutama dalam pembahasannya ini perpustakaan yang ada pada perguruan tinggi atau universitas. Dengan adanya perpustakaan maka akan memudahkan mahasiswa dalam mencari berbagai informasi mengenai belajar mengajar, dan juga akan meningkatkan dalam proses belajar mengajar. Asosiasi Penyelenggara Jasa Internet Indonesia (APPJI) pada surveynya dari beberapa tahun ini menyatakan penggunaa pada perangkat mobile memiliki peningkatan yang sangat besar. Tercatat dari tahun 2013 sampai 2017 memiliki peningkatan yang sangat besar yaitu 61,26 juta jiwa pengguna internet di Indonesia. Perilaku pengguna internet berdasarkan perangkat yang digunakan untuk mengakses internet yaitu 44.16% dalam penggunaan perangkat mobile, perangkat mobile dan komputer ataulaptop 4.49 %, pengunaan perangkat mobile dan komputer sebesar 39.28%.  Hal ini berarti perilaku pengguna internet di Inonesia sangat dominan mengakses internet melalui perangkat mobile. Apalagi statistic menunjukkan bahwa pengguna mobile internet juga semakin meningkat dari tahun ketahun. Sebelumnya sudah ada sistem perpustakaan pada Universitas Muhammadiyah Malang berbasis web. Tetapi dalam hal ini kecenderungan perilaku pengguna internet dalam penggunaan perangkat mobile, maka Perpustakaan Universitas Muhammadiyah Malang memiliki peluang yang sangat besar dalam mengembangkan dan meningkatkan pelayanan dalam memenuhi kebutuhan mahasiswa dalam mencari kebutuhan informasi.


Author(s):  
Elisabeth Jay Friedman

This chapter offers an alternative account of the invention of the internet. It tells the story of how social justice-oriented web enthusiasts built the internet as we know it today – a networks of networks – because they wanted to ensure access for activist counterpublics around the world. They concretized their goals with the formation of the Association for Progressive Communications, a network of civil society-based Internet Service Providers. Within this global project, feminist communication activists carved out a space for women’s organizing through the APC’s Women’s Networking Support Programme. From their early efforts to today, such activists have contested the gendering of internet technology as the province of men. In doing so, they have also subverted the West’s domination over the internet by extending resources to women from the Global South, particularly Latin America, to nurture their own counterpublics.


2021 ◽  
pp. 27-35
Author(s):  
Kieron O’Hara

This chapter presents the history of the Internet and associated applications. The Internet grew out of the ARPANET, founded on network engineering ideas such as packet switching and the end-to-end principle. The chapter describes the development of TCP/IP to connect networks by Cerf and Kahn, creating the modern Internet as a permissionless open system which anyone can join without a gatekeeper, allowing it to scale up. The evolution of the governance system of Internet Service Providers (ISPs) and Internet Exchange Points (IXPs) is presented. The chapter also describes the development of applications that sit on the Internet platform, including the World Wide Web, linked data, cloud computing, and social media.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2018 ◽  
Vol 2018 ◽  
pp. 1-9
Author(s):  
Elissar Khloussy ◽  
Yuming Jiang

The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS), by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT) selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE) can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.


Author(s):  
Sadik Haci

The study follows the life and scientific trajectories of the turkologist Hasan Eren from the town of Vidin, lecturer at the University of Ankara, editor and author of various dictionaries, including the first etymological dictionary of the Turkish language. It traces the preparation and growth of the world-famous Turkish linguist and lexicologist, who left Bulgaria to study and after his exceptional training among Hungarian orientalists such as Gyula Németh he grew up as one of the most famous Turkish scholars in the field of llinguistics. This study presents the conditions and possibilities for Turkish intelligentsia in Bulgaria in the twentieth century.


Author(s):  
Kai Erikson

This chapter tells the story of peasants from rural Poland who entered a migrant stream around the turn of the twentieth century that carried them, along with tens of millions of others, across a number of clearly marked national borderlines as well as a number of unmarked cultural ones. The peasants were a couple named Piotr and Kasia Walkowiak, and the words spoken by them as well as the events recalled here are based on the hundreds of letters and diaries gathered in the 1910s by two sociologists from the University of Chicago, W. I. Thomas and Florian Znaniecki. The chapter first describes the world into which Piotr and Kasia were born, focusing on family, village, and land. It then considers their journey, together with millions of other immigrants, and how they changed both the face of Europe and the face of the United States.


2020 ◽  
Vol 2 (1) ◽  
pp. 58-64
Author(s):  
I Komang Pasek Sudiarsa

Management of academic activities at Mahendradata University is still using manually ways, which means that it has not used an integrated information system yet, for the example the process of registering new students, arranging lecture schedules, filling in student KRS, managing lecture attendance, and managing student grades. Nowadays cultural changes have been marked by the increasingly rapid use of the internet. The internet as an information resources for its existence has now become a necessity. The benefits of the internet are quite large, especially in the world of business, entertainment and education. This system is designed to assist academic processes at the University of Mahendradata. The academic processes that have been analyzed and applied in this developed system are the process of preparing schedules, plotting teaching lecturers, printing KRS, printing lecture attendance, presenting inputs, filling in grades, and printing KHS. And the University can immediately develop a new system in order to work optimally. System design that has been used in developing this system uses the SDLC method, the waterfall method. The implementation of the system uses the PHP programming language Codegniter and MySQL database. The results of this study are in the form of an academic system design at the University of Mahendradata. This developed system is aim to assist the academic processes at the University of Mahendradata


Sign in / Sign up

Export Citation Format

Share Document