From Webspace to Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

From Webspace to Cyberspace From Webspace to Cyberspace Kevin Hughes Enterprise Integration Technologies July 1995 From Webspace to Cyberspace Version 1.0: December 1994 Version 1.1: July 1995 Copyright 1995 by Kevin Hughes The opinions stated in this document are solely those of the author and do not necessarily represent the views of Enterprise Integration Technologies. This document as a whole may be redistributed freely in any format for non-commercial purposes only. Comments, questions, corrections, and suggestions relating to this document are welcomed and can be sent to [email protected]. Trademarked names are used throughout this document; the trademark sym- bols have been omitted for editorial convenience with no intention of trade- mark infringement. Where such omissions exist the trademarked name has been printed with initial capitals. About the Author Kevin Hughes designs hypermedia products for EIT and is their webmaster. He has written Entering the World-Wide Web: A Guide to Cyberspace, an introduction to the World-Wide Web that has been used as training material in numerous companies and universities, and is a member of the World-Wide Web Hall of Fame. Enterprise Integration Technologies 800 El Camino Real Menlo Park, CA • 94025 Lobby: (415) 617-8000 Fax: (415) 617-8019 World-Wide Web: http://www.eit.com/ Thus science may implement the ways in which man produces, stores, and consults the record of the race. Vannevar Bush As We May Think Atlantic Monthly, July 1945 The trouble with the future is that it usually arrives when you least expect it. Arnold H. Glasow Foreword and Preface 5 of 254 Foreword and May 1993 was a quiet month, and it was business as usual on the Preface Internet. There was email, news, and plenty of other services available online with discussion and software; the community was steeped in things like telnet, FTP, UNIX, and X; in many respects nothing had changed much for years. If my workstation had suddenly time warped to 1988, I would have noticed few dif- ferences. If I wanted to read a book on the Internet, I would have made a trip to the local university bookstore and purchased a good UNIX book. If I wanted to tell my friends about the electronic hobby I had immersed myself in, I would have first asked, “Have you heard of the word ‘Internet’ before?” There was little hope that I could explain things in any coherent manner if they had not first heard about, or read about, the Word. If they knew, by some rare chance, they would inevitably reply, “But there’s nothing there.” They were right. Everything was there for me, for my classmates that pulled allnighters playing xtrek, for the slackers in the computer lab, for the occasional university stu- dent that wanted to learn about email. But there was little for everyone else, and I couldn’t email just anyone else. 1993 was the year of the great Internet explosion, when the charts following net usage on the North American backbones went crazy. The numbers are still increasing. If I want to read a book on the Internet, all I have to do is find the Internet section of the bookstore. Telling my friends about what I do would serve no purpose since they already know; my relatives say, “The Internet sounds nice, but what would I do with all that information?” The World-Wide Web is not a phenomenon. It’s one step in a log- ical evolution. The World-Wide Web is not just a cause. It’s a symptom. It’s a reflection of how thoroughly my generation has been saturated with media, and a reflection of how badly previous generations are adjusting to that fact. The state of the Internet is an indicator of how we choose to act and react and of the ways in which we inform, learn, and dominate over others. Cyberspace, a greatly misunderstood medium, is now upon us. There is a high probability that you have heard of this Word as well. Whatever meanings it has taken on in the past, there is one definition that influences and changes everything: cyberspace is an interconnected computer-mediated environment in which all prior media are represented. This document explores what this means for all of us: Where did it come from? Why? How can we work in this, and what can we do? How can we create and com- municate in this ultimate medium? This is a beginner’s guide, a primer for the Age of the Internet. 6 of 254 From Webspace to Cyberspace This document was first written in December 1994 as an internal white paper. It has since been greatly expanded and updated. The main sections are: ● The State of the Web - A brief history and opening. ● Collaborative Systems - An overview and analysis of current and future collaborative online media. ● Cyberspace - What it means and what can be done with it. ● Creating Cyberspace - Issues related to the development of systems that can be used to create and explore virtual environments within cyberspace. ● Living In Cyberspace - Issues related to building future human-computer environments for information visualization and exploration. ● Tomorrow’s Internet - What the online future will look like. Topics related to business, media, online freedom, and what cyberspace needs. Towards the end is a reference list of works, a timeline, and an index. I would like to apologize for putting the initial version of this work into a paper-based format; I do so for the convenience of those that have traditional printers. Hopefully one day I will not have to think about measurements or double-sided layout when writing. I thank Marty Tenenbaum and William Wong at EIT for supplying resources and supporting my vision. Thanks go also to Mark Pesce, Brian Behlendorf, Tony Parisi, and many others for spreading the cyberspace meme which is now lodging itself firmly in the 21st century. This work is dedicated to all of my (four) parents and my teach- ers, doctors, and friends, not necessarily in that order or role. Although not everyone cared about the message, the important thing is that they listened. Kevin Hughes Menlo Park, California July 1995 Table of Contents 7 of 254 Table of Contents Foreword and Preface . .5 Table of Contents . .7 1.0 The State of the Web . .9 1.1 New Ways of Communication . 13 1.2 Collaborative Systems . 13 2.0 Cyberspace . .35 2.1 A New Definition. 36 2.2 Encapsulation . 37 2.3 Notes on Successful Terminology . 41 2.4 Myths . 43 2.5 Why Virtual Environments? . 46 2.6 Applications . 47 3.0 Creating Cyberspace. .65 3.1 VRML and HTML . 65 3.2 New Definitions . 65 3.3 Tools. 66 3.4 MOO/WOO Thoughts. 68 3.5 Coordinate Systems. 69 3.6 Editing . 70 3.7 Objects. 71 3.8 Constructs . 74 3.9 Links. 80 3.10 Sensing Proximity and Location. 80 3.11 Moving and Viewing. 81 3.12 World Issues . 92 3.13 Other Issues. 94 3.14 A Prototype VRML/HTML System . 94 3.15 Cyberspace Guidelines . 99 4.0 Living In Cyberspace. .101 4.1 Next Generation Environments . 101 4.2 Vision . .114 4.3 Input/Output Devices . 120 4.4 Possibilities . 127 4.5 Designing Worlds. 144 4.6 Common Problems . 158 4.7 The Open Interface . 160 5.0 Tomorrow’s Internet. .161 5.1 The Future of the Web . 161 5.2 New Business . 165 8 of 254 From Webspace to Cyberspace 5.3 The Medium is Still the Message . 173 5.4 New Society . 178 5.5 What Does Cyberspace Need? . 193 A History of Cyberspace . .197 References . .239 Timeline References . 243 Other Media. 247 Index . .249 1 The State of the Web 9 of 254 Everything good in the computer field has come about because someone said, “I want this, and I will build it for myself.” Ted Nelson 1 Computer Lib The State It has been over two years since the explosive growth of the of the Web World-Wide Web began. NCSA’s What’s New page, one of the most popular Web pages on the Internet, has evolved from what was once a meager listing of a few dozen sites to a corporate- sponsored page that is now updated three times weekly. From The Economist to Wired, from the San Francisco Chronicle to Time, from one person garage startups to billion-dollar multina- tional companies, news of the Web has spread faster than a jour- nalist can type “information superhighway”. Some say that we are in the midst of a second revolution - while the first brought the word computer into daily conversation, the second has sparked the commercialization of the Internet, it has made online space a trendy place to hang out, it has done noth- ing less than tell people that one no longer has to be an under- graduate computer science student to enjoy surfing the net on weekends. It is bringing the world together online and its impact will be felt as long as anyone has something to say to anyone else. From 100 sites to well over 20,000 sites in the last 24 months - the Web, the fastest growing service on the Internet today, has sparked a renaissance among the net life. This is, of course, despite the fact that the World-Wide Web project was created within the European physics community as a text-only system for allowing researchers to view scattered pieces of information in one place. And this is despite the fact that for four years the Web was mostly used by scientific institutions and was mostly ignored by everyone else.
Recommended publications
  • Los Angeles Lawyer October 2006 California Aon Attorneys’ Advantage Insurance Program Building the Foundation for Lawyers’ Protection ONE BLOCK at a TIME
    2006 California State Bar Meeting LACBA 2006-07Directory PULLOUT SECTION October 2006 / $4 EARN MCLE CREDIT Hidden Implications of Arbitration Clauses page 35 MEET andCONFER Los Angeles Superior Court Judge Michael L. Stern offers insight on the new local trial preparation rules page 26 PLUS Local Regulation of Alcohol Sales page 14 Fugitive Disentitlement page 44 Lawyers Who Use Macs page 53 THIS IS MY POST OFFICE. Download My Desktop Post OfficeTM at usps.com/smartbusiness Introducing the online shortcut that lets you pick and choose the services you use most at usps.com and access them instantly. Request pickups, ship, track packages and more. ©2006 United States Postal Service. Eagle symbol and logotype are registered trademarks of the United States Postal Service. *Over 50% of malpractice suits start with client communication, calendaring and deadline issues. Do you remember what you were doing three weeks ago at this time? Your client does. A MEMBER BENEFIT OF Time Matters® Manage your: Communications • Calendars • Deadlines • E-mail • To Dos • Conflict Checks • Matters • Billing For a demo disk at no cost† or more information call 800.328.2898 or go to lexisnexis.com/TMinfo *Law Practice Today, November 2005 †Some restrictions may apply. Offer ends 12/29/06. LexisNexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Time Matters is a registered trademark of LexisNexis, a division of Reed Elsevier Inc. AL9202 © 2006 LexisNexis, a division of Reed Elsevier Inc. All rights reserved. October 2006 Vol. 29, No. 7 26 Meet and Confer BY JUDGE MICHAEL L.
    [Show full text]
  • IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta
    IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta-Psychology. Participate in open peer review by commenting through hypothes.is directly on this preprint. The full editorial process of all articles under review at Meta-Psychology can be found following this link: https://tinyurl.com/mp-submissions You will find this preprint by searching for the first author's name. Writing a Psychological Blitz Literature Review with Nothing but a Browser Bogdan Cocoş1 1Department of Psychology, University of Bucharest Author Note Correspondence regarding this article should be addressed to Bogdan Cocoş, 90 Panduri Road, Sector 5, 050663, Bucharest, Romania. E-mail: [email protected] https://orcid.org/0000-0003-4098-7551 IN-BROWSER BLITZ LITERATURE REVIEWS 2 Abstract The ways so far of writing literature reviews represent valid, but not sufficient, landmarks, connected to the current technological context. In this sense, this article proposes a research method called blitz literature review, as a way to quickly, transparently, and repeatably consult key references in a particular area of interest, seen as a network composed of elements that are indispensable to such a process. The tutorial consists of six steps explained in detail, easy to follow and reproduce, accompanied by publicly available supplementary material. Finally, the possible implications of this research method are discussed, being brought to the fore a general recommendation regarding the optimization of the citizens’ involvement in the efforts and approaches of open scientific research. Keywords: blitz literature review, open access, open science, research methods IN-BROWSER BLITZ LITERATURE REVIEWS 3 Writing a Psychological Blitz Literature Review with Nothing but a Browser Context The term “blitz literature review” refers to an adaptation of the concept of literature review.
    [Show full text]
  • Open Source Used in Cisco 7600 Wireless Security Gateway Release 4.4
    Open Source Used In Cisco 7600 Wireless Security Gateway Release 4.4 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Open Source Used In Cisco 7600 Wireless Security Gateway Release 4.4 1 Text Part Number: 78EE117C99-66606837 Open Source Used In Cisco 7600 Wireless Security Gateway Release 4.4 2 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-66606837 Contents 1.1 Apache HTTP Server 2.2.3 :5.0.0.0801182 1.1.1 Available under license 1.2 audit 1.2.9 :7.0.0 1.2.1 Available under license 1.3 base-passwd 3.5.7 :11.0.0.0801182 1.3.1 Available under license 1.4 bash 3.0 :6.0.2.0801182 1.4.1 Available under license 1.5 binutils 2.17.50 :10.0.5.0801182 1.5.1 Available under license 1.6 busybox 1.6.0 :7.0.2.0801182 1.6.1 Available under license 1.7 busybox-static 1.6.0 :7.0.2.0801182 1.7.1 Available under license 1.8 cron 3.0pl1 :5.0.2.0801182 1.8.1 Available under license 1.9 db 4.3.28 :1.0.0.0801182 1.9.1 Available under license 1.10 e2fsprogs 1.41.3 :1.0.0 1.10.1 Available
    [Show full text]
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Formal Aspects of Mobile Code Security
    FORMAL ASPECTS OF MOBILE CODE SECURITY RICHARD DREWS DEAN ADISSERTATION PRESENTED TO THE FACULTY OF PRINCETON UNIVERSITY IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY RECOMMENDED FOR ACCEPTANCE BY THE DEPARTMENT OF COMPUTER SCIENCE JANUARY 1999 c Copyright by Richard Drews Dean, 1998. All Rights Reserved Abstract We believe that formal methods of all kinds are critical to mobile code security, as one route to gaining the assurance level necessary for running potentially hos- tile code on a routine basis. We begin by examining Java, and understanding the weaknesses in its architecture, on both design and implementation levels. Iden- tifying dynamic linking as a key problem, we produce a formal model of linking, and prove desirable properties about our model. This investigation leads to a deep understanding of the underlying problem. Finally, we turn our attention to crypto- graphic hash functions, and their analysis with binary decision diagrams (BDDs). We show that three commonly used hash functions (MD4, MD5, and SHA-1) do not offer ideal strength against second preimages. The ability of a cryptographic hash function to resist the finding of second preimages is critical for its use in digi- tal signature schemes: a second preimage enables the forgery of digital signatures, which would undermine confidence in digitally signed mobile code. Our results show that modern theorem provers and BDD-based reasoning tools are effective for reasoning about some of the key problems facing mobile code security today. iii Acknowledgments My advisor, Andrew Appel, offered sure guidance through what turned out to be an exceptionally smooth journey through graduate school.
    [Show full text]
  • The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy?
    EDIT IN MASTER The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy? Andrés Arrieta - Dir of Consumer Privacy Engineering EDIT IN MASTER Who are we? Non-profit that fights for your civil liberties in the digital world. ● Certbot, HTTPS Everywhere, Panopticlick, Privacy Badger... ● AI, Coders Rights, Freedom of Speech, Privacy… We fight for the users EDIT IN MASTER Why does it matter? Browsers are most users’ window the Internet, and most users do not change the defaults. The out of the box window to the Internet defines the defaults for the rights most users enjoy. The Internet should be opt-in and empower users where the default is respecting our rights EDIT IN MASTER Who cares about more relevant ads anyway? So what if they gather some information? EDIT IN MASTER What can third-parties learn from your browser or other sources? ● Age ● Gender ● Race ● Address physical and email ● Location ● Browser ● Device ● Time spent ● What you clicked ● What you hovered ● What you buy online and offline ● Health data EDIT IN MASTER They can learn directly or infer a lot of things from your browsing habits! ● Politics ● Health condition ● Religious beliefs ● Sexual orientation ● Hobbies and interests ● Personality ● Where you are going ● Who you know and who you’ve met EDIT IN MASTER What can they do with it? ● Marketing for more “relevant” ads (That you probably learned to ignore) ● Decide what you see from your friends ● Decide what news and which outlets you see ● Decide what you should interact with (what has more engagement)
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Oh Bondage up Yours
    Oh bondage up yours Continue Some people think little girls should be seen and not heard. Iconic vocalist Paulie Styrene certainly isn't, as screeching is the call to arms that opens her band X-Ray Spex debut single Oh Bondage! Up on yours! defiantly testified. For the group so strongly rooted in its era, and it was together so fleeting (they formed in 1976, and disintegrated three years later); For all the simplicity of rapid fire and punk vitriol, not to mention Paulie's vocals (described by one journalist as a sizzling dissonance) - X-Ray Spex feel relevant and important today, forty years later, more than ever. A new book, Dayglo: Paulie Styrene's story tells the story of a woman 'real name Marie Elliott' who has managed to bring a playfully joyful, satirical female voice to a man dominated by nihilism punk. Co-authored with Paulie's daughter Celeste Bell with writer, musician and artist zoe howe, and designed by Laura Findlay, the comprehensive volume combines a series of interviews with Paulie's friends, family and fans with a wealth of gorgeous archival photographs, hand-scrawled lyrical sheets and works of art, flyers and more to create an oral portrait of a woman's history with more than a few stories. Paulie died of breast cancer in 2011 at the age of just fifty-three, so it's left for those who knew her (and those who knew her music) to tell her tales. These contributors make up a formidable list, including Vivienne Westwood, Tessa Politt, John Savage and Thurston Moore (formerly Sonic Youth).
    [Show full text]
  • Dissertation
    DISSERTATION Titel der Dissertation “We’re Punk as Fuck and Fuck like Punks:”* Queer-Feminist Counter-Cultures, Punk Music and the Anti-Social Turn in Queer Theory Verfasserin Mag.a Phil. Maria Katharina Wiedlack angestrebter akademischer Grad Doktorin der Philosophie (Dr. Phil.) Wien, Jänner 2013 Studienkennzahl lt. Studienblatt: A 092 343 Studienrichtung lt. Studienblatt: Anglistik und Amerikanistik Betreuerin / Betreuer: Univ. Prof.in Dr.in Astrid Fellner Earlier versions and parts of chapters One, Two, Three and Six have been published in the peer-reviewed online journal Transposition: the journal 3 (Musique et théorie queer) (2013), as well as in the anthologies Queering Paradigms III ed. by Liz Morrish and Kathleen O’Mara (2013); and Queering Paradigms II ed. by Mathew Ball and Burkard Scherer (2012); * The title “We’re punk as fuck and fuck like punks” is a line from the song Burn your Rainbow by the Canadian queer-feminist punk band the Skinjobs on their 2003 album with the same name (released by Agitprop Records). Content 1. Introduction .......................................................................................................... 1 2. “To Sir With Hate:” A Liminal History of Queer-Feminist Punk Rock ….………………………..…… 21 3. “We’re punk as fuck and fuck like punks:” Punk Rock, Queerness, and the Death Drive ………………………….………….. 69 4. “Challenge the System and Challenge Yourself:” Queer-Feminist Punk Rock’s Intersectional Politics and Anarchism……...……… 119 5. “There’s a Dyke in the Pit:” The Feminist Politics of Queer-Feminist Punk Rock……………..…………….. 157 6. “A Race Riot Did Happen!:” Queer Punks of Color Raising Their Voices ..……………..………… ………….. 207 7. “WE R LA FUCKEN RAZA SO DON’T EVEN FUCKEN DARE:” Anger, and the Politics of Jouissance ……….………………………….………….
    [Show full text]
  • University of the Philippines Manila College of Arts and Sciences Department of Physical Sciences and Mathematics
    UNIVERSITY OF THE PHILIPPINES MANILA COLLEGE OF ARTS AND SCIENCES DEPARTMENT OF PHYSICAL SCIENCES AND MATHEMATICS Health Insurance Corporation Customer Relationship Management Tool (HICorpCRM) A special problem in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science Submitted by: Paul John N. Macaraeg June 2015 Permission is given for the following people to have access to this SP: Available to the general public Yes Available only after consultation with author/ SP adviser No Available only to those bound by confidentiality agreement No ACCEPTANCE SHEET The Special Problem entitled “Health Insurance Corporation Customer Relationship Management Tool (HICorpCRM)” prepared and submitted by Paul John N. Macaraeg in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science has been examined and is recommended or acceptance. Ma. Sheila A. Magboo, M.Sc. Adviser EXAMINERS: Approved Disapproved 1. Gregorio B. Baes, Ph.D. 2. Avegail D. Carpio, M.Sc. 3. Perlita E. Gasmen, M.Sc. 4. Richar Bryann L. Chua, M.Sc. 5. Vincent Peter C. Magboo, M.D., M.Sc. 6. Bernie B. Terrado, M.Sc. Accepted and approved as partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science. Ma. Sheila A. Magboo, M.Sc. Marcelina B. Lirazan, Ph.D. Unit Head Chair Mathematical and Computing Sciences Unit Department of Physical Sciences Department of Physical Sciences and Mathematics and Mathematics Alex C. Gonzaga, Ph.D., Dr.Eng. Dean College of Arts and Sciences iii Abstract The health insurance industry is saturated by big companies competing for market share.
    [Show full text]
  • ABSTRACT the Emphasis of the Symposium Was the Internet, Or Information Superhighway, and the Provision of Information Services to End Users
    DOCUMENT RESUME ED 381 176 IR 055 472 AUTHOR Helal, Ahmed H., Ed.; Weiss, Joachim W., Ed. TITLE Information Superhighway: The Role of Librarians, Information Scientists, and Intermediaries. Proceedings of the International Essen Symposium (17th, Essen, Germany, October 24-27, 1994). INSTITUTION Essen Univ. (Germany). Library. REPORT NO ISBN-3-922602-19-3; ISSN-0931-7503 PUB DATE 95 NOTE 488p.; Festschrift in honor of Frederick Wilfrid Lancaster. PUB TYPE Collected Works Conference Proceedings (021) EDRS PRICE MF02/PC20 Plus Postage. DESCRIPTORS Academic Libraries: *Access to Information; *Computer Networks: Cooperation; Developing Nations; Electronic Publishing; Foreign Countries; Higher Education; 'Information Networks; Information Technology; 'Librarians; *Library Role; Library Services, Professional Training; Quality Control; Users (information) IDENTIFIERS 'Information Superhighway; *Internet; Virtual Libraries ABSTRACT The emphasis of the symposium was the Internet, or information superhighway, and the provision of information services to end users. Many internationally recognized librarians shared their experiences and expressed their ideas on new developments and possibilities related to the information superhighway. The 34 papers presented at the symposium addressed the following issues:(1) definition, applications, cost, security, privacy, access, delivery, and ease of use;(2) strategies and tactics for accessing information . on the superhighway, as well as concern for unauthorized use; (3) tremendous amounts of irrelevant information,
    [Show full text]
  • 1 Chapter -3 Designing Simple Website Using Kompozer
    RSCD Chapter -3 Designing Simple Website Using KompoZer ------------------------------------------------------------------------------------------- 1. ……………plays a very important role in a business now-a-days. a) Website b) webpage c) Web browser d) Web host 2. …………….is a collection of interlinked web pages for a specific purpose. a) Website b) webpage c) Web browser d) Web host 3. ………….defines what we want to achieve by developing a website. a)Objective b) Goal c) Planning d) Target 4. Once by knowing the reason for developing a website, you must decide …….of the website. a)Objective b) Goal c) Planning d) Target 5. ……….means for whom the website is to be developed. a)Objective b) Goal c) Planning d) Target audience 6. From the following which is important for content of a webpage? a) Text and graphics for website b) Content as per visitor’s requirements c) Too short or too long content d) All of these 7. Who provides trial version of the software for free download? a) Editor b) Vendor c) Visitor d) None 8. The visual diagram of the website is known as ……………… a) Site Map b) Image Map c) Site Editor d) Site Browser 9. The website should contain should be classified into ………….categories. a) General b) Detailed c) Simple d) Both a and b 10. What is the first step for planning a website? a) Homepage b) Target audience c) Objective and Goal d) Browser compatibility 11. The website must contain ………………….information. a) Complete b) relevant c) incomplete d) Both a and b 12. What is the key point of a website? a) Content b) Homepage c) Objective and Goal d) Browser Compatibility 13.
    [Show full text]