Enhancing Endpoint Trusted Connect Using Lightweight Virtualization

2014 ◽  
Vol 631-632 ◽  
pp. 165-170
Author(s):  
Shu Hui Shi ◽  
Zao Ping Li ◽  
Ya Feng Liu

With the computer technology boomingly developing and the internet applications gradually spreading all over the world, more and more requirements of endpoint user acquires all kinds of resources via different security level networks. TCG provides approaches to prevent endpoint device from being ruined. However, more NARs on a single physical platform handle connections to different networks which lead to security problems, due to tightly coupled of NARs. In this paper, a lightweight trusted connect framework based hardware-level virtualization is proposed. And we illustrate core implement with improved KVM.

Author(s):  
Марина Михайловна Молчанова ◽  
Патимат Абдулаевна Лекова

Исследуется кризис вербальности контента в интернет-дискурсе, его активная визуализация, связанная с новыми открытиями в области компьютерных технологий. Цель работы - дать полиаспектную характеристику этому явлению и обозначить перспективы его влияния на речемыслительную деятельность подрастающего поколения, составляющего большую часть пользователей социальных сетей. Актуальность данной проблематики обусловлена обеспокоенностью филологической общественностью тем, что мир становится все менее лингвистическим. Новизна заключается в том, что впервые интернет-дискурс рассматривается в контексте кризиса вербальности контента. При таких темпах визуализации медиатекстов вполне вероятно обострение кризиса вербальности, последствия которого могут негативно сказаться на мыслетворческой деятельности у подрастающего поколения, которая возможна только при высокой языковой компетенции. The paper examines the crisis of content verbality in the Internet discourse, its active visualization associated with new discoveries in the field of computer technology. The aim of the work is to give a multi-aspect characterization of this phenomenon and outline the prospects of its influence on the speech-thinking activity of the younger generation, which makes up the majority of users of social networks. The relevance of this issue is due to the concern of the philological community that the world is becoming less and less linguistic. The novelty lies in the fact that for the first time Internet discourse is considered in the context of the crisis of content verbality. At such a rate of visualization of media texts, it is likely that the crisis of verbality will aggravate, the consequences of which can negatively affect the thinking activity of the younger generation, which is possible only with high linguistic competence.


2018 ◽  
pp. 90-97 ◽  
Author(s):  
Reshu Goyal ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Time has changed and so does the world. Today everything has become as a matter of one click. With this effort we are trying to explore the new opportunities features and capabilities of the new compeers of Internet applicability known as Social Media or Web 2.0. The effort has been put in to use the internet, social media or web 2.0 as the tool for marketing issues or the strategic business decision making. The main aim is to seek social media, web 2.0 internet applications as the tool for marketing.


Author(s):  
N. Kirichenko

The relevance of the study of this problem is that information and computer technologies contribute to the development of digital society, based on the development of human resources that are intellectual capital.  Information and computer technology affect the development of machines that replaced people and gave rise to "technological unemployment."  The purpose of the study is to show how the information revolution of the twenty-first century contributes to the reduction of labor as a result of progressive robotization.  The technologies that are used today to replace people are different; the need for human resources is reduced thanks to robots, computers and other high-tech gadgets.  Methods of theoretical analysis - deduction and induction, historical and logical, comparative and structural-genetic analysis, information method, which contribute to the insight into the essence of the phenomenon under study as a complex phenomenon and dynamic process.  Results: It has been proven that, thanks to various well-known developments in information-computer technologies and robotics, many experts believe that society is at an early stage of the new industrial (post-industrial) revolution, which in the future can change the way people live and work just like  200 years ago made a steam engine.  Technological unemployment is one of the main reasons for the increase in the overall unemployment rate in Western countries over the past 30 years.  Although to some extent this is due to the demographic revolution and the changing structure of the economy in many countries, the development of information and computer technologies, as well as other types of automation and the Internet have played a significant role, especially since 2000.  Findings.  We have shown that many jobs with cheap labor can disappear, because the digital society focuses on the development of human (intellectual) resources.  The world is turning into a digital society and the world is ruled by a figure based on intelligence, intelligence, algorithms, digitalization.  The digital society consists of a set of algorithms that are controlled by information and computer technologies that penetrate digital management, which is based on intellectual-rational force represented by human resources.  It is human resources that develop robotics, artificial intelligence, computerization, mechanization, robotization, which are based on robotics, artificial intelligence.  These varieties of digital society will accelerate the potential for long-term productivity gains through intellectualization.  Practical recommendations - to develop a small business that rests on the network of intelligent platforms, in connection with which to create jobs on the Internet and create new types of employment.


Cryptography ◽  
2020 ◽  
pp. 193-213
Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


Author(s):  
Matthew Allen

Web 2.0 has been a dominant concept in recent discussion and development of Internet applications, businesses and uses. Dating from 2004, the term Web 2.0 is variously understood as new forms of website development and delivery technology, changing uses of the Internet to emphasise sociability over consumption, new understandings of the possible financial exploitation of the web, and more broadly, a new way of thinking about the Internet as a whole. However, Web 2.0 is, conceptually, both more and less than these various understandings and we can only grasp why it has become such a key term in contemporary usage by appreciating two key discursive foundations for this term. Firstly, much Web 2.0 thinking is a re-expression of long-held ideas about the Internet and the web. Secondly, at the particular time when Web 2.0 was made popular, net technology policy makers and financial analysts were primarily enthused by the possibilities of broadband networks for improved and more profitable versions of the well-established businesses of telephony and audio-visual entertainment, and had to some extent consigned novel, web-based services to a lesser role, following the dot.com crash. Thus, as I argue in this paper, Web 2.0 can be understood as a key intervention, from within the dot.com / new media business sector, recovering from the crash, that re-asserts the equal legitimacy of the use of networked computing, over high-speed lines, for computing-oriented activities, and not just video on demand and voice over IP. In short, in the first years of this century, discussions about the future of the Internet had become dominated by arguments for increased broadband access, substantially concerned with providing more traditional video and voice services in new ways. The World Wide Web was seen as relatively unimportant for this purpose, even though it was part of the so-called 'triple play' of voice and data services. At this time, first in the hands of Tim O'Reilly and then from others who took up his position, Web 2.0 became a catchy simple term under which to mount a campaign for the renaissance of the World Wide Web as a quite distinct, yet equally important, form of media and communications. So, Web 2.0 provides evidence that, while there is a convergence of all forms of media and communications towards similar data traffic over the Internet, there remain diverging views over the nature, control and use of the Internet, views that express the degree to which corporate players imagine themselves to be 'media', 'telephony' or 'computing' in primary orientation.


bit-Tech ◽  
2018 ◽  
Vol 1 (1) ◽  
pp. 40-45
Author(s):  
Nicken Litan Margareta ◽  
Amesanggeng Pataropura

We must recognize the development of technology at this time has developed very rapidly in this era of globalization. Moreover, the development of internet-based computer technology. By using the internet we can search for the information we need from around the world quickly and accurately. However, there are still many companies in Indonesia that have difficulty in implementing computerized systems within the company, especially in internet-based information systems. From the research conducted, there are several weaknesses in the processing of reports that occur, namely it takes a long time to make a form, record the transactions and also take a lot of paper / media recording. In addition, there is no computerized system dedicated to this process. With the creation of a system of making reports with this method, it is expected to assist in generating reports and checking jobs faster and more accurately. After the design, manufacture, and testing of the application application and inventory inventory program, conclusions can be drawn, namely more company performance efficient and prone to errors if data entry is incorrect. In implementing the new system, it is expected to run smoothly.


Author(s):  
Reshu Goyal ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Time has changed and so does the world. Today everything has become as a matter of one click. With this effort we are trying to explore the new opportunities features and capabilities of the new compeers of Internet applicability known as Social Media or Web 2.0. The effort has been put in to use the internet, social media or web 2.0 as the tool for marketing issues or the strategic business decision making. The main aim is to seek social media, web 2.0 internet applications as the tool for marketing.


Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


1997 ◽  
Vol 27 (3) ◽  
pp. 391
Author(s):  
B Cash

Computer technology - whether it is hardware, software or the internet - is the headache that just won't go away for anyone grappling with the law of intellectual property. With the Copyright Act 1994, the New Zealand legislature attempted to meet some of the challenges but it largely avoided the issue, passing the headache onto the judiciary should any tricky issues arise. One such issue is copyright protection for computer programs. The Copyright Act 1994 makes it clear that computer programs are protected as a literary work but how far does that protection extend (or how far do we carry the fiction that a computer program is literary work)? This article attempts to second guess what level of protection our courts might provide. It argues that New Zealand has shown a willingness to protect functional items and would protect the "look and feel" of a program, providing a level of protection which courts in the United States have considered undesirable.


Teknologi ◽  
2012 ◽  
Vol 1 (2) ◽  
Author(s):  
Mukhamad Masrur

ABSTRAK Teknologi Informasi mempunyai peranan sangat penting dalam upaya peningkatan daya saing perguruan tinggi saat ini. Salah satu bentuk teknologi informasi yang sering digunakan adalah internet beserta aplikasinya. Upaya peningkatan daya saing perguruan tinggi melalui internet adalah dengan cara membangun website universitas yang bisa disebut sebagai web portal sebagai ujung tombak dalam merealisasikan cita cita sebagai universitas nomer satu di dunia, didukung dengan Search Engine Optimization (SEO) sebagai cara untuk memudahkan website universitas untuk dicari melalui mesin pencari seperti google, serta adanya webometric sebagai aplikasi berbasis web yang berguna untuk pemeringkatan website universitas seluruh dunia.Website universitas tentunya harus terdaftar pada perangkat teknologi informasi yang telah disebutkan, sehingga kita bisa memantau dan menindak lanjuti hasil dari pemeringkatan webometric. Oleh karena itu seluruh sumberdaya yang berada dilingkungan universitas hendaknya diberdayakan sesuai dengan tri dharma perguruan tingg, baik staft, pimpinan, dosen maupun mahasiswa turut berperan dalam upaya meningkatkan peringkat website universitas pada webometric. Demikianlah langkah strategis yang bisa diambil dalam upaya peningkatan daya saing universitas secara global Kata kunci : teknologi informasi, website, SEO, webomatric ABSTRACT Nowadays, the information technology has a very large and important usefulness in the competitive escalation effort in universities. One of the very vast information technology used is the internet together with its applications. One of the universities competitive escalation effort troughs the internet applications is by universities website making called to be a portal web as a top point in realizing a number one university in the world, supported by the Search Engine Optimization (SEO) as the way to facilitating university website search i.e. Google, and webometric as a web application for universities web ranks in all over the world. The university website, definitely, should be listed in the information technology sets mentioned so the webometric’s ranks can be monitored and followed up. For aiming that goal, all the university’s sources and all the manpower i.e. the staff, lecturers, deans and also students, should be carried out. Key words: information technology, website, SEO, webomatric


Sign in / Sign up

Export Citation Format

Share Document