Protection and Restriction to the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Protection and Restriction to the Internet Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application that proposed to be unblocked • Justification/reason for the website/application to be unblocked Thank you. Technology Services, Manager Asia Pacific University (APU) Technology Park Malaysia Bukit Jalil, Kuala Lumpur 57000 Malaysia Tel: +60 3 8992 5050 Protection and restriction to the internet Restricted websites/applications Category Application Bypass Proxies and Tunnels Wujie/UltraSurf Games Battle.net Games Beanfun Game Games Call of Duty 4 Games Cga.com Games Chinagame Games CS Game Games Diablo Games GameTea/GameABC Games Hangame Games Legend Games Lineage Games MapleStory Games Nobol Games Our Game Games PK Game Games Pogo Games PopKart Games POPO Game Games QQ Farm Games QQ Game Games Realgame Games Sina Web Game Games Sohugame Games TEN Game Games Valve Steam Games Wolfenstein Games WOW Game Games Xbox LIVE Instant messaging 9158 Instant messaging Alicall Instant messaging BaiduHi Instant messaging Caihong Instant messaging Camfrog Instant messaging Dii Instant messaging ECP Instant messaging Etnano Protection and restriction to the internet Instant messaging Fetion Instant messaging Gadu-Gadu Instant messaging Google Talk Instant messaging Heyyo Instant messaging ICQ/AIM/iIM Instant messaging Imi Instant messaging IMVU Instant messaging Instan-t Instant messaging IPMSG Instant messaging IRC Instant messaging ISPQ Instant messaging Jctrans Instant messaging Kltx Instant messaging Kubao Instant messaging Lava-Lava Instant messaging Message Send Protocol Instant messaging MySpaceIM Instant messaging Netcall Instant messaging PaltalkScene Instant messaging PiIM Instant messaging POPO Instant messaging Qeshow Instant messaging QQ/TM Instant messaging Rediff BOL Instant messaging RenRen Instant messaging SOQ Instant messaging TELTEL Instant messaging Tlen Instant messaging UcTalk Instant messaging Userplane Instant messaging WinpopupX Instant messaging Wlt Instant messaging Xfire Instant messaging Yahoo Messenger Instant messaging Yoics Mail and Collaboration AOL Mail Mail and Collaboration Comcast Mail and Collaboration COX Protection and restriction to the internet Mail and Collaboration Excite Mail and Collaboration Fastmail Mail and Collaboration Gmx Mail Mail and Collaboration Hushmail Mail and Collaboration IlohaMail Mail and Collaboration IMAP4 Mail and Collaboration InfoSeek Mail Mail and Collaboration Livedoor Mail and Collaboration Mail.com Mail and Collaboration Mail.ru Mail and Collaboration MS Exchange Server Mail and Collaboration NETEASE Mail Mail and Collaboration NNTP Mail and Collaboration Open Mail Mail and Collaboration Optimum Mail and Collaboration POP3 Mail and Collaboration Roundcubemail Mail and Collaboration Secureserver Mail and Collaboration Sina Mail Mail and Collaboration SMTP Mail and Collaboration SquirrelMail Mail and Collaboration Usermin Mail Mail and Collaboration Yandex Network Protocols(2) Service Status update (Sterling Software) Network Protocols(3) Appletalk Update-Based Routing Pro. P2P 100bao P2P aMule P2P AnatomicP2P P2P ApexDC++ P2P Ares P2P Azureus P2P BCDC++ P2P Bearshare P2P BitAnarch P2P BitLord P2P BitTorrent Series P2P BT++ P2P Btbbt P2P Cabos P2P CFos Speed Protection and restriction to the internet P2P ClubBox P2P DAAP P2P Deepnet Explorer P2P DianLei P2P DirectConnect P2P eDonkey Series P2P eMule P2P eMule MorphXT P2P eMule Plus P2P eMuleBT P2P FastTrack P2P FilePipe P2P FileScope P2P Foxy P2P FreeWire P2P G3 Torrent P2P GNUnet P2P Gnutella P2P GoGoBox P2P GreedBT P2P Hydranode P2P Kazaa P2P Kazaa Lite Tools K++ P2P Kceasy P2P Lphant P2P Maze P2P MlDonkey P2P MooPolice P2P Morpheus P2P myMusic P2P MyNapster P2P NEoNapster P2P Pando P2P Phex P2P Poco P2P PP365 P2P PTC P2P QQDownload P2P RevConnect P2P Rufus Protection and restriction to the internet P2P SababaDC P2P Share P2P Shareaza P2P Shareaza Plus P2P Soulseek P2P Thunder Series P2P Torrentflux P2P TorrentStorm P2P TorrentTopia P2P TrustyFiles P2P Turbo Torrent P2P TurboBT P2P uTorrent P2P Vagaa P2P Vuze P2P Winny P2P XBT Client P2P XNap P2P Yet ABC P2P Zultrax Remote Access Terminals Beinsync Remote Access Terminals Danware Remote Access Terminals Fastviewer Remote Access Terminals GoToMyPC Remote Access Terminals IBM Remote monitoring and Control Remote Access Terminals MS Remote Desktop Protocol (RDP) Remote Access Terminals Netviewer Remote Access Terminals PCAnywhere Remote Access Terminals Radmin Remote Access Terminals Remote Remote Access Terminals Secure Shell (SSH) Remote Access Terminals Synergy Remote Access Terminals Techinline Remote Access Terminals Telnet Remote Access Terminals VNC Remote Access Terminals X11 Security Update Adobe Security Update Apple Security Update Avast Security Update AVG Security Update Avira Protection and restriction to the internet Security Update Duba Security Update Emsisoft Security Update F-Secure Security Update InstallAnyWhere Security Update Jiangmin Security Update Kaspersky Security Update Mcafee Security Update Mircosoft Windows Update Security Update NOD32 Security Update Norton Security Update Outpost Security Update Panda Security Update PCTools Security Update Sophos Security Update Spybot Security Update TrendMicro Security Update Yum Social Network Facebook Game Streaming Media 3TV Streaming Media 56.com Streaming Media ASF Streaming Media ASFV1 Streaming Media AVI Streaming Media Babelgum Streaming Media BARKS Streaming Media BBC-iplayer Streaming Media CNTV Streaming Media Cradio Streaming Media CSlive.tv Streaming Media Dailymotion Streaming Media FLV Streaming Media Freecast Streaming Media FreeeTV Streaming Media Funshion Streaming Media GVOD Streaming Media GYAO Streaming Media GysofTV Streaming Media Hulu Streaming Media ITVSky Streaming Media Justin.tv Streaming Media Ku6 Protection and restriction to the internet Streaming Media KuGo TV Streaming Media LastFM Streaming Media Letv Streaming Media Live365 Streaming Media Livestation Streaming Media Meabox Streaming Media Metacafe Streaming Media Miro Streaming Media MMS Streaming Media MoodAmp Streaming Media Mop Streaming Media MOV Streaming Media MoveNetworks Streaming Media MP3 Streaming Media mp4 Streaming Media MPD Streaming Media Napster Streaming Media Netflix Streaming Media Netpd.org Streaming Media NicoNicoDouga Streaming Media Ooyala Streaming Media Orb Streaming Media Pandora Streaming Media Photobucket Streaming Media Player365 Streaming Media PPfilm Streaming Media PPStream Streaming Media PPVod Streaming Media QQLive Streaming Media QuickTime Streaming Media Qyule Streaming Media RealPlayer Streaming Media RMVB Streaming Media Rtlgemist Streaming Media SeeTV Streaming Media Shoutcast Streaming Media SinaTV Streaming Media SiriusXM Streaming Media Sohu TV Streaming Media SopCast Streaming Media Spotify Protection and restriction to the internet Streaming Media SqueezeCenter Streaming Media Stickam Streaming Media Streamaudio Streaming Media SWF Streaming Media Thunderkankan Streaming Media TTlive Streaming Media Tudou Streaming Media TudouVa Streaming Media TVUPlayer Streaming Media Uitzendinggemist Streaming Media Ustream.tv Streaming Media UUSee Streaming Media Vakaka X-TV Streaming Media Veetle Streaming Media VeohTV Streaming Media Vizrt System Streaming Media VLC Streaming Media Winamp Streaming Media Windows Media Player Streaming Media WMA Streaming Media WMV Streaming Media XiaoTV Streaming Media Yahoo Douga Streaming Media Youku Streaming Media Youtube Voice over IP Skype Web / Web 2.0 Evernote Web / Web 2.0 Google-earth Web IM Yahoo Web Messenger .
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Eurosim Mk7.1 Software User's Manual
    EuroSim Mk7.1 Software User’s Manual iss: 8 rev: 1 SUM NLR-EFO-SUM-2 Summary EuroSim Mk7.1 is an engineering simulator framework to support the quick development of hard real- time simulators. EuroSim provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. Extensive Graphical User Interfaces assist the user in constructing, using and analysing real-time simulations, resolving the user from the specialist software engineering knowledge required to built hard real-time systems. EuroSim has been developed initially to support the verification of space (sub) systems defined by ESA programmes of various scales. It’s heritage lies in the development of the European Robotic Arm(ERA) project where EuroSim was essential in the development and verification of the large symmetrical arm that can move accross the International Space Station. Up to today, EuroSim installations are still used around the world to support ERA’s mission preparation, verification and training. After initial devel- opment and application for ERA, EuroSim has been succesfully used in the development, verification and training of the Autonomous Transfer Vehicle (ATV) with multiple installations worldwide. Other space programs where EuroSim has been applied since are Galileo, Herschel & Planck, Gaia to name a few major missions. Currently EuroSim has made its way in to other domains as well, with application in the F-35 Lightning-II Embedded Training program and simulations in support of road tunnel system verification. This document contains both the User Guide as well as the Reference Guide documentation and consists of five volumes.
    [Show full text]
  • Download Article (PDF)
    Advances in Social Science, Education and Humanities Research, volume 123 2nd International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2017) The Application of New Media Technology in the Ideological and Political Education of College Students Hao Lu 1, a 1 Jiangxi Vocational & Technical College of Information Application, Nanchang, China [email protected] Keywords: new media; application; the Ideological and Political Education Abstract: With the development of science and technology, new media technology has been more widely used in teaching. In particular, the impact of new media technology on college students’ ideological and political education is very important. The development of new media technology has brought the opportunities to college students’ ideological and political education while bringing the challenges. Therefore, it is an urgent task to study on college students’ ideological and political education under the new media environment. 1. Introduction New media technology, relative to traditional media technology, is the emerging electronic media technology on the basis of digital technology, internet technology, mobile communication technology, etc. it mainly contains fetion, wechat, blog, podcast, network television, network radio, online games, digital TV, virtual communities, portals, search engines, etc. With the rapid development and wide application of science and technology, new media technology has profoundly affected students’ learning and life. Of course, it also brings new challenges and opportunities to college students’ ideological and political education. Therefore, how to better use the new media technology to improve college students’ ideological and political education becomes the problems needing to be solving by college moral educators. 2. The intervention mode and its characteristics of new media technology New media technology, including blog, instant messaging tools, streaming media, etc, is a new network tools and application mode and instant messaging carriers under the network environment.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Audience Affect, Interactivity, and Genre in the Age of Streaming TV
    . Volume 16, Issue 2 November 2019 Navigating the Nebula: Audience affect, interactivity, and genre in the age of streaming TV James M. Elrod, University of Michigan, USA Abstract: Streaming technologies continue to shift audience viewing practices. However, aside from addressing how these developments allow for more complex serialized streaming television, not much work has approached concerns of specific genres that fall under the field of digital streaming. How do emergent and encouraged modes of viewing across various SVOD platforms re-shape how audiences affectively experience and interact with genre and generic texts? What happens to collective audience discourses as the majority of viewers’ situated consumption of new serial content becomes increasingly accelerated, adaptable, and individualized? Given the range and diversity of genres and fandoms, which often intersect and overlap despite their current fragmentation across geographies, platforms, and lines of access, why might it be pertinent to reconfigure genre itself as a site or node of affective experience and interactive, collective production? Finally, as studies of streaming television advance within the industry and academia, how might we ponder on a genre-by- genre basis, fandoms’ potential need for time and space to collectively process and interact affectively with generic serial texts – in other words, to consider genres and generic texts themselves as key mediative sites between the contexts of production and those of fans’ interactivity and communal, affective pleasure? This article draws together threads of commentary from the industry, scholars, and culture writers about SVOD platforms, emergent viewing practices, speculative genres, and fandoms to argue for the centrality of genre in interventions into audience studies.
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • UTEP Standard 20: Software Licensing 20.1 All Software Used On
    UTEP Standard 20: Software Licensing 20.1 All software used on University devices will be used in accordance with the applicable software license. Unauthorized or unlicensed use of software is regarded as a serious violation subject to disciplinary action and any such use is without the consent of the University. (a) UTEP Information Security Policies: UTEP provides a sufficient number of cost-effective, licensed copies of core business software to enable faculty members, staff, and students to perform their work in an expedient and effective manner. (b) Systems administrators have the right to remove software from University devices for cause. For example, if a user in unable to show proof of license, or if the software is not required for University business purpose, or causes problems on the University- owned device. (c) All departments/colleges are responsible for the accurate accounting of software purchased by their respective department/ college and must ensure that the installation of the software complies with the license agreement of the software. For audit purposes, departments/colleges must maintain proof of purchase and/or original installation media for each software package. Third- party software in the possession of UTEP must not be copied unless such copying is consistent with relevant license agreements and prior management approval of such copying has been obtained, or copies are being made for contingency planning purposes. (d) All software purchases shall go through the UTEP Purchasing Department. (e) All commercial software used on computing systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product and shall be purchased through the Purchasing Department.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • Psichogios.Pdf
    1 ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΕΙΡΑΙΩΣ Τμήμα Ψηφιακών Συστημάτων «Διαχείριση κατανεμημένου πολυμεσικού περιεχομένου με χρήση υπηρεσιοστρεφών αρχιτεκτονικών » ΨΥΧΟΓΥΙΟΣ ΕΥΣΤΑΘΙΟΣ Η εργασία υποβάλλεται για την μερική κάλυψη των απαιτήσεων με στόχο την απόκτηση του Μεταπτυχιακού Διπλώματος Σπουδών στα Ψηφιακά Συστήματα του Πανεπιστήμιο Πειραιώς 2 ΠΙΝΑΚΑΣ ΠΕΡΙΕΧΟΜΕΝΩΝ ΠΙΝΑΚΑΣ ΠΕΡΙΕΧΟΜΕΝΩΝ ............................................................................... 2 ΠΕΡΙΛΗΨΗ ............................................................................................................. 4 ΚΑΤΑΛΟΓΟΣ ΣΧΗΜΑΤΩΝ .................................................................................. 5 ΕΙΣΑΓΩΓΗ .............................................................................................................. 6 ΜΕΡΟΣ ΠΡΩΤΟ ..................................................................................................... 7 0 ΚΕΦΑΛΑΙΟ 1 - ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ ........................................ 7 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΕΙΣΑΓΩΓΗ ........................................... 7 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΠΛΕΟΝΕΚΤΗΜΑΤΑ ............................. 9 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΠΑΡΑΔΕΙΓΜΑΤΑ................................ 10 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΤΙ ΑΛΛΑΖΕΙ; ....................................... 11 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – TO ΜΕΛΛΟΝ ΤΟΥΣ ΣΤΗΝ ΕΛΛΑΔΑ .. 12 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΟΡΙΣΜΟΣ ....................................................ΠΕΙΡΑΙΑ 14 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΜΟΝΤΕΛΟ ..................................................
    [Show full text]