(VDI) Protocol Problem Statement

Total Page:16

File Type:pdf, Size:1020Kb

(VDI) Protocol Problem Statement Virtual Desktop Infrastructure (VDI) Protocol Problem Statement IETF-81 July 25, 2011 Presenter & Contributor: Liang Liang [email protected] Contributors: Bingyi Fang [email protected] Jun Wang [email protected] 中文标题 Suan Ma [email protected] 字体: 黑体 字号:35-47pt Yu Meng [email protected] 色彩:主题蓝色 中文副标题 Bhumip Khasnabish [email protected] 字体:华文细黑 字号:24-28pt 色彩:反白 What is VDI Cloud Client VDI Protocol VM Control Channel Application Screen Channel Mouse/Keyboard Channel Guest OS Audio Channel USB Device Channel VMM VM: Virtual Machine VMM: Virtual Machine Monitor VDI means Virtual Desktop Infrastructure, in which the client acts as purely I/O devices and the computing moves into the server in the cloud 中文标题 VDI protocol connects Client and server, transporting 字体: 黑体 Theme1 字号:30-32pt the necessary control commands and I/O data. Different 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 I/O data may be encapsulated in different virtual channel. 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Proposed VDI Protocol Stack Architecture Application Layer Application Virtual Channel Layer Screen Mouse/Keyboard Audio USB SmartCard User Provide Channel Channel Channel Channel Channel Channel Plug-in Session Control Layer User Authentication Channel Control Load Balance Session Mobility Transport Layer 中文标题 字体: 黑体 Theme1 字号:30-32pt TCP UDP TLS DTLS 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 VDI is not new VDI is one new name, but the concept is already there for a long time – server-based computing(SBC). This is the same for VDI protocol. Mainframe Computing Age 中文标题 字体: 黑体 Client-Server Computing Theme1 字号:30-32pt Age 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) Cloud Computing Age 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 VDI protocol is not new also VDI protocols at different period: TTY: text input/output Mainframe age X-window/RFB: graphic output Client-Server age multimedia input/output NOW client server IETF has been a place for VDI protocols like: RFC for X Window: RFC1013 RFC for RFB: RFC6143 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 We investigated* current mainstream VDI protocols and 中文副标题 Theme2 字体:华文细黑 found that they are doing the same thing. 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) * Please refer to VDI survey document 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Challenges for non-standard VDI protocols Challenges Interworking Ecosystem Optimization for mobile access …… Currently VDI deployment is in the initial phase, NOW is the right time to look forward to one standard VDI protocol, because the cost of 中文标题 standardization is lowest in the initial phases. Theme1 字体: 黑体 字号:30-32pt 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Big challenge: Interoperability Although current VDI protocols are aiming the same goal, they are defined by different companies using different methodologies. So …… Vendor A Vendor A VDI server VDI client 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 Vendor B Vendor B 中文副标题 Theme2 字体:华文细黑 VDI server VDI client 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Big challenge: Ecosystem VDI Server VDI Server VDI Server VDI Server Vendor A Vendor B Vendor C VDI Protocol VDI Protocol VDI Protocol VDI A B C Protocol VDI Client VDI Client VDI Client Vendor A Vendor B Vendor C VDI Client VDI closed-system Benefiting from standardization of Tomcat, IIS, lighttpd, Web server HTTP protocol, web server vendors and AOLserver, nginx, web browser vendors have no tight- iPlanet, Zeus …… HTTP coupling relationship. They could move Protocol forward independently and attract new 中文标题 IE, Firefox, Chrome, comers at any time. All these composes 字体: 黑体 Theme1 字号:30-32pt Safari, Opera, Icab, one ecosystem. 色彩:蓝色 Web Browser 中文副标题 Aweb, Konqueror, VDI also need such ecosystem. Theme2 字体:华文细黑 Lunascape, OmniWeb 字号:20-22pt Theme3 色彩:黑色 …… 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt Web Ecosystem 色彩:黑色 Challenge – Accessing through mobile devices Current VDI protocol/application has no much optimization for 25000 22118.4 mobile access: K Streaming application in the best b 20000 p current systems consuming extra 8x s Original Bitrate bandwidth compared to original 15000 RDP bitrate. SPICE M-JPEG Replacing M-JPEG encoder with 10000 MPEG4, Bandwidth can be saved 6428.8 SPICE MPEG4(1) 75%-92% SPICE MPEG4(2) 5000 In addition, The audio compression 541.91 960 517.6 still need further optimization to keep 0 up with existing VoIP codec’s Resolution800x600 efficiency Service continuity issue while switching over WiFi different access networks and different LTE 中文标题 字体: 黑体 devices Theme1 字号:30-32pt handoff 色彩:蓝色 Duplicate sign-on issue: mobile user will be 中文副标题 authenticated at least twice (one by the Theme2 字体:华文细黑 字号:20-22pt network, and another by VDI server) Theme3 色彩:黑色 子目录(2-5级) Mobile 字体:华文细黑 Device Theme4 字号:18pt 色彩:黑色 Proposed VDI Protocol Stack Architecture Principle: Protocols defined in IETF and other standard organization will be re-used as many as possible. Application Layer Application Virtual Channel Layer Mouse/ User Provide Screen Audio USB SmartCard Keyboard Channel Channel Channel Channel Channel Channel Plug-in HIP CHAP Session Control Layer LISP Digest NDN PKI User Channel 中文标题 Load Balance Session Mobility …… 字体: 黑体 EAP Authentication Control Theme1 字号:30-32pt 色彩:蓝色 …… 中文副标题 Theme2 字体:华文细黑 Transport Layer 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) TCP UDP TLS DTLS 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 What will we do in IETF next? Extended definition: It is the protocol for communication between client and server, used to exchange input/ output/ control messages. Benefiting from this protocol, user could get the same experience of running tasks in remote server as doing that in local device. Scope: Focus on drafting architecture, framework and basic capability addressing above extended definition. Goal: open and standard remote access protocol: Allowing interworking between different vendors; Well-defined framework and flexible to be extended by separate components for performance optimization; 中文标题 Theme1 字体: 黑体 Built on top of IETF defined protocols and reuse IETF 字号:30-32pt 色彩:蓝色 中文副标题 standards as much as possible. Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 What will we do in IETF next? (Cont.) Next Step: Continue to call for companies/parties/persons with interest in VDI protocol standardization; Discussion meeting with all stakeholders and teamwork for: Developing a comprehensive VDI Problem Statement and Resolution document listing the technical issues of the existing VDI systems; Proposing reference architecture, and defining the scope of VDI protocol standard; Developing a VDI Requirements document that defines the 中文标题 字体: 黑体 functional and operational requirements of the VDI Theme1 字号:30-32pt 色彩:蓝色 protocol; 中文副标题 Theme2 字体:华文细黑 Looking for participation volunteers for a possible BOF 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) on VDI during IETF-82 in Taipei; 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Call for your joining! Pls. feel free to send mail to us: [email protected] 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Thanks for your comments 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 BACKUP 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 VDI services in cloud computing age Many business model could be created to better serve customer: MORE reliable, secure, flexible …… Enterprise IT Infrastructure Personal Virtual Desktop Hosting 中文标题 字体: 黑体 Theme1 字号:30-32pt 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Telecom Terminals hosting SaaS delivery Theme4 字号:18pt 色彩:黑色 .
Recommended publications
  • 12 Browser Alternativi Dalle Alte Prestazioni
    12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 E' molto probabile che per leggere queste righe stiate utilizzando un browser come Firefox, oppure Internet Explorer, o Google Chrome. Questa considerazione nasce dalla constatazione che questi tre browser assieme coprono circa il 90% del mercato. Il fatto che questi 3 programmi abbiano una così vasta popolarità non comporta che si tratti delle soluzioni migliori, vista l'abbondanza di alternative presenti. {loadposition user7} Ecco, a titolo di esempio, una serie di ben 12 browser disponibili gratuitamente, che potrebbero in realtà corrispondere alle vostre esigenze in maniera migliore rispetto ai nomi più conosciuti. Maxthon Si tratta del progetto nato come MyIE2. Nel corso degli anni è diventato un potente browser a schede adatto per tutti gli utenti. Oltre alle funzionalità di navigazione di base, Maxthon Browser fornisce un ricco set di funzionalità per migliorarei vostri percorsi di navigazione 1 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Sistema Operativo: Windows Arora Arora è un leggero browser web. È dotato di rendering veloce, potente motore JavaScript e supporta plug-in Netscape. Sistema Operativo: Windows, Mac OS X, Linux Amaya 2 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 SistemaAmayaperfettamente non Operativo: è solo integrata un Windows, browser con l'editing, Macweb, OS ma tanto X,è ancheUnix da renderloplatforms un editor un web. prezioso La modalità strumento di visualizzazionecollaborativo. è Flock 3 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Flock è un browser con un focus sui social media.
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Java Blocked?
    Getting started with NRV 1. Browser compatibility The NRV website is fully compatible with the following (current as of 21 January 2020) versions of browsers: NRV Browser 2.0.7 (Windows) / 2.04 (Linux) (http://nrv.jinr.ru/nrv/) Pale Moon 28.8.1 Basilisk 2020.01.12 K-Meleon 76.2G Build 20200118 Waterfox Classic 2020.01 SeaMonkey 2.49.5 Otter Browser 1.0.81 weekly 300 Lunascape 6.15.2 Internet Explorer 11 Most other browsers (current versions) do not support Java any more. 2. Installation of Java and enabling applets At the moment, most of the sections of the NRV web knowledge base use Java to provide interactive user interface and display information. Java may be downloaded at https://java.com/en/download/. Depending on the version of the browser, 32- or 64-bit version of Java must be installed. After installation go to the Java Control Panel, open the Security tab, check Enable java content in the browser, and click OK to apply settings (Fig. 1). Fig. 1. Java Control Panel with the correct settings (Java 8 under Microsoft Windows 7). On the first run in a particular browser a security warning will appear. Check Do not show this again for apps from the publisher and location above and click the Run button (Fig. 2). A Java applet will start. The same warning may also appear periodically later, often after the update of the browser or Java. Fig. 2. Security warning. Please note that the actual look of the Java Control Panel and security warnings may vary.
    [Show full text]
  • Safezone Browser Download Cent Safezone Browser Download Cent
    safezone browser download cent Safezone browser download cent. NOT REGISTERED YET? RETRIEVE YOUR PERNUM FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL. Your PERNUM will be sent to your registered email account. REQUEST PASSWORD FOR BETA TESTERS--> PLEASE ENTER YOUR PERNUM. Your temporary password will be sent to your registered email account. RESET YOUR MASTER PIN FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL AND SAFEZONE PASSWORD. RESET YOUR MASTER PIN FOR BETA TESTERS--> YOUR REQUEST HAS BEEN RECEIVED. An email has been sent to our Support Team and they will contact you at your registered email for assistance. Please allow up to 48 hours for a response, emails are processed in the order they are received. SET UP YOUR MASTER PIN FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL AND SAFEZONE PASSWORD. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Your SafeZone Pass is protected by two-step authentication. For every login process, or if you need to change your profile data, you need a one- time pin which has been randomly generated from your 6-digit Master Pin. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Oops! There is already a Master PIN set up for this account. Please either login using your existing Master PIN or you may reset your Master PIN. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Your Master Pin has been set up successfully! Let us test your first One-Time Pin, which is randomly generated from your Master Pin. Please enter the matching digits of your Master Pin: SafeZone APK. SafeZone app is only available at organizations using the SafeZone solution .
    [Show full text]
  • Web Browser Google 1
    富山大学総合情報基盤センター広報 vol.3 (2006) 47-72頁. Web Browser Google ɄΜ͵K[ȜɪǢ ɯȩîÎΚ^b Ğ ဎʇ Ąȳ [email protected] 2005 9 ȼወȱ 28 !6෉ǃ Unicode ˣ߿ü` ƸወGoogle ø Welcome tiFϟϕ5ወ ዊ 2ϙ Hurricane KatrinaዄȸƂ༁੖ 280Km/hወŕ੖ =؅ϗ ˣðϊƓà Google Earth j ŻϟùϗϗϢ%ʖ ϟወGoogle Earth ŌųȸŻ ŗϕ ڵ=[͚ 78m/sዅϟnM ϗϙ_ƽĚŋወ4ϢϦ Google Erath Ӡ5ወ ዊTnϞ4ɺ ôϗ؛Ƹ͕đ= ዊ Google Erath =Â̎ؑƚş؅=ϙ> ąʿȴϦj 30 -ϕ6ዊϦϦወ ĚɪȰϠć,ނȢƚ=ወȫɨ ށb ϦȢƚወȩîëǂŔΡĞŔȰɪ۳ P̦ɪ7ϗ6xۉWWW ോۙ`xkIJEϕ6IJyyIY Web Browser ɋϞ4ወȾʇ͛ ȩî=źŸۀDGExLfR FirefoxወM} Opera Â̎ŗǢ=ūüወȩîʽˎɋϞ4Ž ͛üΜ͵K[ Search Engine ȽɴSSXd Google SearchወxXd Yahoo! SearchወGR`xkpfkRXd MSN Search ዏƂK[ወKmG A9ወUb GETAወS goo labs ʱወyS Blog Μ͵K[ወiRqiF Technoratiወy ዊ[4][3][2][1]6ށSILfdBlogWatcher äŵወʰ΍*ȜɪǢ=۳ 1 WWW ďɤʰ΍* 1.1 WWW ďɤ ¶5ዅiFsm]Tim Berners-Leeዄ PRۉWorld Wide WebዄȾʇ͛ π 1ዅዙTimothy John Berners-Lee ϟወ1989 Gftͳ̐ʖÛǂʧ_ƽ̪ CERN ዄConseil Europeen pour la Recherche Nucleaireዅ¥ȩî=Ƚ6 ,Zi യ͒ϗ -=ወGbpfkȴŔʧĚശȩîʔEZiĘϛ - ዊ ¶π 1 ȴȡ =̊Ȱ ዄhttp://www.w3.org/People/Berners-Lee/ http://www.w3.org/Proposal.html 35ͦ̌ዅ ňHTML(Hyper Text Markup Language)܂ϙȰôZiወjb=/556z kV http(hyper text transfer protocol)ወURL(Uniform Resource Locator)El=ˏåወ ዄ1 2ዅዊ i)=̎5ወGbpfkȡ)ôZ؛) ēĈ͛ Browser ) ወȴąVwb̎5ȴϥ6ĵȰ=~}[ʵወϦ74=ʣ6zf 富山大学総合情報基盤センター広報 vol.3 (2006) 47-72頁. k~VwbǙɀ{6 ,ወʰ%Ȱf^[=Gbpfk#ȡወ Ⱦʇ#ȩî=യ) ዊ̋ޓϟወũȸēηȾʇϟ6ȩîϚθϗϙɟ ʯηlGlfZ(ϚΡ)θʶɴϗ) ዊϞηfZθϟη PʁɲθϗϙɟʯۉηȾʇ ዊ θ-ŎϦϛ6ወɕșϗɁ઀Ψ{7) )ϙወŽēĘϛ ɓηIJfy(R 5)θ ϗϗ)ዊ ǃ/ወI˘zkVയ͒%੤ወWWW ͓؊ീ6ȩî̀ۉƻWLee ũ WWW ͓؊ =̿=Ρ͛6 W3C(World Wide Web Consortium)jFRbወÜȾʽ Web ͓؊ϕ6η^ifR WebዄSymantec WebዅθI˘ǃɊ5΍>ϗ)ዊ tVwbƍ6GqG(Illinois)Ƃʧ6DZ؀ŗወ1993 ĨƸENɯ ɪ^bNational Center for Supercomputing
    [Show full text]
  • PWC Gr8 Gals@Technology June 23, 2015 Browsers and Email
    PWC Gr8 Gals@Technology June 23, 2015 Browsers and Email PWC Gr8 Gals@Technology 2015-16 meeting topics. Location: West Lafayette Library 1:30-3PM, except where noted. Meeting date: 4th Tuesdays Topic June 23 at DANL Organization meeting: review program ideas, gauge interest/need. Topic: Browsers and Email Best practices on their use. July 28 – at Best Buy Update at Best Buy before the store opens. Topics: Update on Smart TVs, tablets/smart phones, health &fitness wearable technology. 8:15-10 AM August 25 Topic: Backup, Security, Software to use, or do you use the cloud? September 22 Photos: uploading, managing, printing, view on TV October 27 Ideas for holiday gifts. Tech for kids Apps for various devices. November 24 No meeting December 22 No meeting January 26 What did you get for holiday gifts…..and now what do you do with it!! Practice for Feb. Webinar. February 23 Webinar….so we don’t have to go out in the cold? TV’s, music, FaceTime, Skype March 22 – (Scott away) Yet to be determined: See what Tippecanoe Library can do….. April 26 Help session. Schedule a time with Scott to go over specific issues. May 24 (Memorial Day 30th) Plan for 2016-17 year Phones….cells….house over cell…voip…. Ideas: How many browsers do I need? Or what is the best browser to use? What are the really good search engines (like Google)? What mapping systems are best? Email. What should I be using? Back up practices/software; security How to remember passwords. What are the dangers of buying things online, and is PayPal the most secure way to pay? How do I know what I need in computing devices? Software…where is it going? Computer resident or cloud.
    [Show full text]
  • 1. Webinar Potrwa 45 Minut + Pytania 2. Tu Mnie Widać 3. a Tu Można Zadawać Pytania 4
    Technologia webinarów 5 kwietnia – godz. 16:00 1. Webinar potrwa 45 minut + pytania 2. Tu mnie widać 3. A tu można zadawać pytania 4. Pytania zadajemy na bieżąco, ale… 5. Ja też będę pytał! 6. Webinar jest rejestrowany wideo film webcast webinar e-learning mobile •Jak oglądamy webinar? •Co musisz powiedzieć uczestnikowi? 45 •Przygotuj swoje stanowisko pracy! minut •Wybierz oprogramowanie dla siebie •Pytania… Trener Prezentacja treści Uczestnicy Czat Materiały https://panel.clickmeeting.com/popup_tester.html http://www.transmisjeonline.pl/tester/ http://na1cps.adobeconnect.com/common/help/en/support/meeting_test.htm 1.Flash Player i JavaScript 2.Rozdzielczość 3.Przeglądarka 4.Porty 5.Prędkość pobierania danych, prędkość pobierania strumienia, opóźnienie połączenia 6.Głośniki Flash Player i JavaScript Rozdzielczość Amaya , AOL Explorer , Arora , Avant , Camino , Przeglądarka Chromium, Comodo Dragon,Dillo , Dooble , ELinks , Flock , Galeon , Google Chrome, iCab, Internet Explorer , K-Meleon , Konqueror , Links , Lunascape, Lynx , Maxthon , Midori, Mosaic , Mozilla, Mozilla Firefox , Netscape , Netscape Browser , Netscape Navigator, NetSurf, OmniWeb, Opera, Qupzilla, Safari, SeaMonkey, Shiira, Sleipnir, Torch Browser, Web, WorldWideWeb, w3m Przeglądarka Internet Firefox Chrome Safari Opera Explorer Świat 13.5 % 29.6 % 50.0 % 4.1 % 1.8 % My % % % % % http://www.w3schools.com/browsers/browsers_stats.asp http://blogs.technet.com/b/drrez/p/lync_2010_workloads.aspx download Prędkość pobierania 10 Mb/s upload danych, prędkość 2 Mb/s pobierania strumienia, opóźnienie połączenia Opóźnienie do kilkudziesięciu milisekund audio Ze złączem mini jack Ze złączem USB W jednym czasie może być używany tylko jeden mikrofon i tylko dla jednej aplikacji!! Upewnij się, że wybrany został właściwy mikrofon (np. ten w słuchawkach, a nie obudowie laptopa czy kamery), oraz że w tle nie działają aplikacje korzystające z mikrofonu (np.
    [Show full text]
  • Tugas Akhir – Ks09 1336
    TUGAS AKHIR – KS09 1336 PEMBUATAN SISTEM INFORMASI PENATAUSAHAAN SURAT DAN ARSIP BERBASIS WEB STUDI KASUS : JURUSAN SISTEM INFORMASI INSTITUT TEKNOLOGI SEPULUH NOPEMBER LUTFI ICHSAN EFFENDI NRP 521O 100 088 Dosen Pembimbing I Dr. Eng. Febriliyan Samopa, S.Kom, M.Kom. Dosen Pembimbing II Radityo Prasetyo Wibowo, S.Kom, M.Kom. JURUSAN SISTEM INFORMASI Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya 2015 FINAL PROJECT – KS09 1336 THE MAKING OF MAIL FLOW AND ARCHIVES INFORMATION SYSTEM BASED ON WEB STUDY CASE : INFORMATION SYSTEMS DEPARTMENT INSTITUT TEKNOLOGI SEPULUH NOPEMBER LUTFI ICHSAN EFFENDI NRP 521O 100 088 Supervisor I Dr. Eng. Febriliyan Samopa, S.Kom, M.Kom. Supervisor II Radityo Prasetyo Wibowo, S.Kom, M.Kom. INFORMATION SYSTEMS DEPARTEMENT Faculty of Information Technology Sepuluh Nopember Institute of Technology Surabaya 2015 KATA PENGANTAR Segala puji dan syukur penulis tuturkan ke hadirat Allah SWT yang telah memberikan kekuatan dan kehidupan untuk penulis sehingga penulis dapat menyelesaikan laporan tugas akhir dengan judul: PEMBUATAN SISTEM INFORMASI PENATAUSAHAAN SURAT DAN ARSIP BERBASIS WEB STUDI KASUS : JURUSAN SISTEM INFORMASI INSTITUT TEKNOLOGI SEPULUH NOPEMBER Tugas akhir ini tidak akan pernah terwujud tanpa bantuan dan dukungan dari berbagai pihak yang telah meluangkan waktu, jiwa dan pikirannya bagi penulis untuk menyelesaikan tugas akhir ini. Pada kesempatan ini penulis mengucapkan terima kasih kepada pihak-pihak di bawah ini, yaitu: Allah SWT yang telah memberikan kelancaran, kemudahan
    [Show full text]