Universidadandina Néstor Cáceres Velásquez Escuela De Posgrado

Total Page:16

File Type:pdf, Size:1020Kb

Universidadandina Néstor Cáceres Velásquez Escuela De Posgrado 1 U N I V E R S I D A D A N D I N A NÉSTOR CÁCERES VELÁSQUEZ ESCUELA DE POSGRADO MAESTRÍA EN EDUCACIÓN MENCIÓN: INVESTIGACIÓN Y DOCENCIA EN EDUCACIÓN SUPERIOR TESIS USO DEL INTERNET Y EL RENDIMIENTO ACADÉMICO DE LOS ESTUDIANTES DE LA CARRERA PROFESIONAL TÉCNICA DE COMPUTACIÓN E INFORMÁTICA DE LOS INSTITUTOS DE EDUCACIÓN SUPERIOR TECNOLÓGICOS PRIVADOS DEL CUSCO 2017 PRESENTADA POR FREDY SOTA ESCOBAR PARA OPTAR EL GRADO ACADÉMICO DE MAGÍSTER EN EDUCACIÓN JULIACA – PERÚ 2018 UNIVERSIDAD ANDINA NÉSTOR CÁCERES VELÁSQUEZ ESCUELA DE POSGRADO MAESTRÍA EN EDUCACIÓN MENCIÓN: INVESTIGACIÓN Y DOCENCIA EN EDUCACIÓN SUPERIOR TESIS USO DEL INTERNET Y EL RENDIMIENTO ACADÉMICO DE LOS ESTUDIANTES DE LA CARRERA PROFESIONAL TÉCNICA DE COMPUTACIÓN E INFORMÁTICA DE LOS INSTITUTOS DE EDUCACIÓN SUPERIOR TECNOLÓGICOS PRIVADOS DEL CUSCO 2017 PRESENTADA POR FREDY SOTA ESCOBAR PARA OPTAR EL GRADO ACADÉMICO DE PRESIDENTE PRIMER MIEMBRO SEGUNDO MIEMBF ASESOR DE TESIS Dr. SEGUNDO ORTIZ CANSA YA RESOLUCIÓN DIRECTORAL NQ 051 - 2018 - D - EPG/UANCV-J Juliaca, 2018 abril 04 VISTOS: El expediente N° 5723 del (a) Bachiller SOTA ESCOBAR FREDY, con número de matrícula 22017826 de la Maestría en Educación Mención: Investigación y Docencia en Educación Superior, de la Escuela de Posgrado de la Universidad Andina “Néstor Cáceres Velásquez” de Juliaca; CONSIDERANDO: Que, el (a) Bach., SOTA ESCOBAR FREDY, con número de matrícula 22017826 de la Maestría en Educación Mención: Investigación y Docencia en Educación Superior, de la Escuela de Posgrado de la Universidad Andina Néstor Cáceres Velásquez de Juliaca; ha Solicitado la Sustentación del Dictamen de Tesis denominada USO DEL INTERNET Y EL RENDIMIENTO ACADÉMICO DE LOS ESTUDIANTES DE LA CARRERA PROFESIONAL TÉCNICA DE COMPUTACIÓN E INFORMÁTICA DE LOS INSTITUTOS DE EDUCACIÓN SUPERIOR TECNOLÓGICOS PRIVADOS DEL CUSCO 2017 Para ser sustentada; Que, el (a) referido (a) Dictamen de Tesis aprobado por los jurados el 27 de marzo del 2018, establece la fecha de sustentación; habiendo para el efecto cumplido los requisitos establecidos en el reglamento de Grado de Investigación conducente al Grado Académico de Magister y Doctor de la Escuela de Posgrado de la UANCV, Que, en el Artículo 66 del Reglamento General de la Escuela de Posgrado de la UANCV, establece que la sustentación de Tesis de Postgrado es un trabajo de investigación original y crítico, de actualidad y de alto valor científico; En uso de las atribuciones conferidas a la Dirección en el inciso "J” del artículo 17 del Reglamento General de la Escuela de Posgrado, y el Art 74 del Estatuto Universitario, SE RESUELVE: ARTICULO PRIMERO.- NOMBRAR a los miembros del Jurado que calificarán la sustentación de la tesis del (a) Bach. SOTA ESCOBAR FREDY, con número de matrícula 22017826 de la Maestría en Educación Mención: Investigación y Docencia en Educación Superior, de la Escuela de Posgrado de la Universidad Andina Néstor Cáceres Velásquez de Juliaca; quien ha presentado el Dictamen de Tesis USO DEL INTERNET Y EL RENDIMIENTO ACADÉMICO DE LOS ESTUDIANTES DE LA CARRERA PROFESIONAL TÉCNICA DE COMPUTACIÓN E INFORMÁTICA DE LOS INSTITUTOS DE EDUCACIÓN SUPERIOR TECNOLÓGICOS PRIVADOS DEL CUSCO 2017 Nominado como ASESOR la Mgtr. SEGUNDO ORTIZ CANSAYA y siendo los jurados los siguientes docentes Presidente DR OBDULIO COLLANTES MENIS Primer Miembro Dr MARIO AGUILAR FRUNA Segundo Miembro| Mgtr FIDEL CARACELA BORDA ARTÍCULO SEGUNDO.- DETERMINAR que la fecha de sustentación de Tesis, que se llevará siguiente lugar, fecha y hora: Fecha : miércoles 04 de abril del 2018 Hora : 11:00 a.m. Local : Aula 309 Escuela de Posgrado - UANCV - JULIACA A cuya finalización el Jurado registrará los resultados en el Libro de Actas de Sustentación de Tesis de Maestría con el grado de MAGÍSTER a los estudiantes que ingresaron Anterior a la aprobación de la ley Universitaria N° 30220 ARTICULO TERCERO.- ELEVAR la presente Resolución al Rectorado, Vicerrectorado Académico, Vicerrectorado Administrativo y Oficina del Órgano de Inspección y Control para conocimier Regístrese, comuniqúese y Archívese. NÉS! r Ucms VttASOUEZ /« > ^>0E LA D¿ TOSORAOO 'JT Cj ^ _ vc\ \ / / / i 'D r .l ¡¿554/aca. orno Collames Mena Cc./Archv.EPG (01) DIRECTOR Interesado (01) Cargo (01) 3 A mis padres, sencillos, cariñosos, combatientes, maestros; A mis hijos Luana Arabela y Nicolás Gael, porque representan el centro de mi vida, custodio independiente de mis desvelos; A mi esposa, mi crítica y ayudante mayor; A mis hermanos, por la comprensión y ayuda; A los grandes amigos, los de siempre, los que encontré en el camino de la búsqueda de soluciones para hacer realidad una trabajosa entrega. Es mi deseo retribuir tanto amor con este trabajo, si no con sus resultados, que deberán otros juzgar. 4 A Dios por ser mi mejor amigo, mi fortaleza, por todo lo que tengo y no dejarme caer. A todas aquellas personas que de una forma u otra hicieron posible la realización de esta tesis. A mis docentes que con tanta dignidad y modestia me abrieron las puertas a sus experiencias y conocimientos: ¡mi gran lección! i ÍNDICE ÍNDICE ............................................................................................................. i RESUMEN ....................................................................................................... iii ABSTRACT ..................................................................................................... v INTRODUCCIÓN ............................................................................................. vii CAPÍTULO I EL PROBLEMA 1.1. EXPOSICIÓN DE LA SITUACIÓN PROBLEMÁTICA ............................... 1 1.2. PLANTEAMIENTO DEL PROBLEMA ....................................................... 4 1.2.1. Problema general ............................................................................ 4 1.2.2. Problemas específicos ..................................................................... 5 1.3. JUSTIFICACIÓN DE LA INVESTIGACIÓN ............................................... 5 1.4. OBJETIVOS .............................................................................................. 8 1.4.1. Objetivo general ............................................................................... 8 1.4.2. Objetivos específicos ....................................................................... 8 CAPÍTULO II EL MARCO TEÓRICO 2.1. ANTECEDENTES DE LA INVESTIGACIÓN ............................................. 10 2.2. BASES TEÓRICAS ................................................................................... 24 2.2.1. Uso de internet ................................................................................ 29 2.2.2. Rendimiento académico .................................................................. 54 2.3. MARCO CONCEPTUAL ........................................................................... 63 2.4. HIPÓTESIS ............................................................................................... 68 2.4.1. Hipótesis general ............................................................................. 68 2.4.2. Hipótesis específicas ....................................................................... 69 ii 2.5. VARIABLES .............................................................................................. 70 2.5.1. Variable independiente .................................................................... 70 2.5.2. Variable dependiente ....................................................................... 70 2.6. OPERACIONALIZACIÓN DE VARIABLES .............................................. 70 CAPÍTULO III LA METODOLOGÍA DE LA INVESTIGACIÓN 3.1. MÉTODO DE INVESTIGACIÓN ............................................................... 72 3.2. DISEÑO DE LA INVESTIGACIÓN ............................................................ 72 3.3. POBLACIÓN Y MUESTRA ....................................................................... 74 3.4. TÉCNICAS E INSTRUMENTOS ............................................................... 76 CAPÍTULO IV RESULTADOS Y DISCUSIÓN 4.1. USO DE INTERNET ................................................................................. 78 4.2. RENDIMIENTO ACADÉMICO .................................................................. 102 4.3. PRUEBA DE HIPÓTESIS ........................................................................ 105 4.4. APORTACIÓN TEÓRICO – PRÁCTICA ................................................... 108 CONCLUSIONES SUGERENCIAS REFERENCIAS BIBLIOGRÁFICAS ANEXOS iii RESUMEN La presente investigación intitulada como: uso del internet y el rendimiento académico de los estudiantes de la carrera profesional técnica de computación e informática de los institutos de educación superior tecnológicos privados del cusco 2017; trata esencialmente sobre la relación existente entre los diferentes aspectos de la utilización del internet como el origen de información, compendio educativo, educación virtual y canal de comunicación; del mismo modo en cuanto respecta al rendimiento académico aspectos como los niveles, factores y medición a fin de establecer la asociación o relación entre las variables estudiadas. Cuyo objetivo es la de establecer la relación existente entre el uso del internet y el rendimiento académico de los estudiantes de la carrera profesional técnica de computación e informática de los institutos de educación superior tecnológicos privados del cusco. Para el presente estudio se ha elegido la muestra de estudio conformada por estudiantes de los IEST privados de la ciudad del Cusco específicamente
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • TRABAJO DE DIPLOMA Título: Diseño De La Página Web De Antenas
    FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TRABAJO DE DIPLOMA Título: Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos Tutor: Dr. Roberto Jiménez Hernández Santa Clara 2006 “Año de la Revolución Energética en Cuba” Universidad Central “Marta Abreu” de Las Villas FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TTRRAABBAAJJOO DDEE DDIIPPLLOOMMAA Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos e-mail: [email protected] Tutor: Dr. Roberto Jiménez Hernández Prof. Dpto. de Telecomunicaciones y electrónica Facultad de Ing. Eléctrica. UCLV. e-mail: [email protected] Santa Clara Curso 2005-2006 “Año de la Revolución Energética en Cuba” Hago constar que el presente trabajo de diploma fue realizado en la Universidad Central “Marta Abreu” de Las Villas como parte de la culminación de estudios de la especialidad de Ingeniería en Telecomunicaciones y Electrónica, autorizando a que el mismo sea utilizado por la Institución, para los fines que estime conveniente, tanto de forma parcial como total y que además no podrá ser presentado en eventos, ni publicados sin autorización de la Universidad. Firma del Autor Los abajo firmantes certificamos que el presente trabajo ha sido realizado según acuerdo de la dirección de nuestro centro y el mismo cumple con los requisitos que debe tener un trabajo de esta envergadura referido a la temática señalada. Firma del Tutor Firma del Jefe de Departamento donde se defiende el trabajo Firma del Responsable de Información Científico-Técnica PENSAMIENTO “El néctar de la victoria se bebe en la copa del sacrificio” DEDICATORIA Dedico este trabajo a mis padres, a mí hermana y a mi novia por ser las personas más hermosas que existen y a las cuales les debo todo.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,960,121 B2 Wohlgemuth Et Al
    US007960121B2 (12) United States Patent (10) Patent No.: US 7,960,121 B2 Wohlgemuth et al. (45) Date of Patent: Jun. 14, 2011 (54) METHODS AND COMPOSITIONS FOR 5,079,352 A 1/1992 Gelfand et al. DAGNOSING AND MONITORING 5,091,310 A 2f1992 Innis 5, 120,525 A 6/1992 Goldenberg TRANSPLANT RELECTION 5,142,033. A 8, 1992 Innis 5,143,854 A 9/1992 Pirrung et al. (75) Inventors: Jay Wohlgemuth, Menlo Park, CA 5,210,015 A 5/1993 Gelfand et al. 5,212,071 A 5/1993 Fearon et al. (US); Kirk Fry, Palo Alto, CA (US); 5,215,882 A 6/1993 Bahl et al. Robert Woodward, Pleasanton, CA 5,219,727 A 6/1993 Wang et al. (US); Ngoc Ly, Albany, CA (US) 5,264,351 A 1 1/1993 Harley 5,278,043 A 1/1994 Bannwarth et al. (73) Assignee: XDX, Inc., Brisbane, CA (US) 5,310,652 A 5/1994 Gelfand et al. 5,314,809 A 5/1994 Erlich et al. 5,322,770 A 6/1994 Gelfand (*) Notice: Subject to any disclaimer, the term of this 5,340,720 A 8, 1994 Stetler patent is extended or adjusted under 35 5,346,994 A 9/1994 Chomczynski U.S.C. 154(b) by 0 days. 5,352,600 A 10, 1994 Gelfand et al. 5,374,553 A 12/1994 Gelfand et al. (21) Appl. No.: 12/823,090 5,385,824 A 1/1995 Hoet et al. 5,389,512 A 2/1995 Sninsky et al.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Acom Internet User Guide
    Acom Internet User Guide Aeom GrtK: URL [hl^.r>Simv«.ac3om.co.uk''aoorrv' Products w Vornf i htejds»aA t Ncy^lrava» t teittaM t f iU-v.'.y- ;'. •.! Va I't! At. At-f i.'till .'-iin^-.M'riT'»'*i<1*'"i'>^n<1>ll'llMHn^rirtlTi'r»"i'f"'W >1ii1iPiiK>Ti-<i-fifiir <'»l ^Vtewrtg "Acwm Gfotjppte" ! Table of Contents Introduction Acom Internet Background How do I get an Internet connection? Setting up Modem Configuration instructions Configuring the Internet server Setting up communications functions Configuring IMail Installing !Mail Setting the Post_In and Post_Out directories Configuring the Web browser Page caches Browser configuration Network configuration Managing the mail server Setting up users and user groups Managing newsgroups Allowing and disallowing Web URLs N^l statistics L flaying the server log Finger Quitting Connea Saving space Using Mail Starting IConnect Connecting with the mail system Sending mail Reading mail Forwarding a mail message Connecting with the Internet Logging off and Quitting Using the Web browser Starting the Web browser Overview Finding>starting and stopping links The browser menu Viewing locally-stored pages Using news Reading news Forwarding an article by email Following up an article Replying to an article (by email) Saving an article Starting a new thread Playing other multimedia data types BWing Java applets ISnbckwave World Wide Web pages What are Web pages? Creating Web pages Identifying resources - URLs Serving pages AppendixA: Acronyms and Smilies Acronyms Smilies ^pendix B; Writing Acorn Internet Command Scripts Ii>. oduction Protocols and Interfaces Anatomy of a logon script Writing your Own Scripts Handling Dynamic IPAllocation Scripting Language Conunand Set pppconnect for RISC OS Authentication Routing Bibliography Appendix C; Glossary Copyright notices Copyright © 1995,1996,1997,1998 Acom Computers Limited.
    [Show full text]
  • Web Browser a C-Class Article from Wikipedia, the Free Encyclopedia
    Web browser A C-class article from Wikipedia, the free encyclopedia A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content.[1] Hyperlinks present in resources enable users to easily navigate their browsers to related resources. Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by Web servers in private networks or files in file systems. Some browsers can also be used to save information resources to file systems. Contents 1 History 2 Function 3 Features 3.1 User interface 3.2 Privacy and security 3.3 Standards support 4 See also 5 References 6 External links History Main article: History of the web browser The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. That browser brought together a variety of existing and new software and hardware technologies. Ted Nelson and Douglas Engelbart developed the concept of hypertext long before Berners-Lee and CERN. It became the core of the World Wide Web. Berners-Lee does acknowledge Engelbart's contribution. The introduction of the NCSA Mosaic Web browser in 1993 – one of the first graphical Web browsers – led to an explosion in Web use. Marc Andreessen, the leader of the Mosaic team at NCSA, soon started his own company, named Netscape, and released the Mosaic-influenced Netscape Navigator in 1994, which quickly became the world's most popular browser, accounting for 90% of all Web use at its peak (see usage share of web browsers).
    [Show full text]
  • Forensic Investigation of User's Web Activity on Google Chrome Using
    IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016 123 Forensic Investigation of User’s Web Activity on Google Chrome using various Forensic Tools Narmeen Shafqat, NUST, Pakistan Summary acknowledged browsers like Internet Explorer, Google Cyber Crimes are increasing day by day, ranging from Chrome, Mozilla Firefox, Safari, Opera etc. but should confidentiality violation to identity theft and much more. The also have hands on experience of less popular web web activity of the suspect, whether carried out on computer or browsers like Erwise, Arena, Cello, Netscape, iCab, smart device, is hence of particular interest to the forensics Cyberdog etc. Not only this, the forensic experts should investigator. Browser forensics i.e forensics of suspect’s browser also know how to find artifacts of interest from older history, saved passwords, cache, recent tabs opened etc. , therefore supply ample amount of information to the forensic versions of well-known web browsers; Internet Explorer, experts in case of any illegal involvement of the culprit in any Chrome and Mozilla Firefox atleast, because he might activity done on web browsers. Owing to the growing popularity experience a case where the suspected person is using and widespread use of the Google Chrome web browser, this older versions of these browsers. paper will forensically analyse the said browser in windows 8 According to StatCounter Global market share for the web environment, using various forensics tools and techniques, with browsers (2015), Google Chrome, Mozilla Firefox and the aim to reconstruct the web browsing activities of the suspect. Microsoft’s Internet Explorer make up 90% of the browser The working of Google Chrome in regular mode, private usage.
    [Show full text]
  • Unix Quickref.Dvi
    Summary of UNIX commands Table of Contents df [dirname] display free disk space. If dirname is omitted, 1. Directory and file commands 1994,1995,1996 Budi Rahardjo ([email protected]) display all available disks. The output maybe This is a summary of UNIX commands available 2. Print-related commands in blocks or in Kbytes. Use df -k in Solaris. on most UNIX systems. Depending on the config- uration, some of the commands may be unavailable 3. Miscellaneous commands du [dirname] on your site. These commands may be a commer- display disk usage. cial program, freeware or public domain program that 4. Process management must be installed separately, or probably just not in less filename your search path. Check your local documentation or 5. File archive and compression display filename one screenful. A pager similar manual pages for more details (e.g. man program- to (better than) more. 6. Text editors name). This reference card, obviously, cannot de- ls [dirname] scribe all UNIX commands in details, but instead I 7. Mail programs picked commands that are useful and interesting from list the content of directory dirname. Options: a user's point of view. 8. Usnet news -a display hidden files, -l display in long format 9. File transfer and remote access mkdir dirname Disclaimer make directory dirname The author makes no warranty of any kind, expressed 10. X window or implied, including the warranties of merchantabil- more filename 11. Graph, Plot, Image processing tools ity or fitness for a particular purpose, with regard to view file filename one screenfull at a time the use of commands contained in this reference card.
    [Show full text]
  • Gopher Protocol to Introduce Orb Tracker -- Iot Tracking Server
    Source : InvestorIdeas.com 07 août 2017 07h30 HE Gopher Protocol to Introduce Orb Tracker -- IoT Tracking Server Investor Ideas discusses new developments with Gopher Protocol Chief Technology Officer POINT ROBERTS, WA--(Marketwired - August 07, 2017) - Investorideas.com, a global news source covering leading sectors including tech, issues a follow up on Gopher Protocol Inc. (OTCQB: GOPH), a company developing Internet of Things (IoT) and artificial intelligence enabled mobile technology. Gopher Protocol Inc. (OTCQB: GOPH) is preparing to roll-out Orb Tracker this summer as its first advanced tracking server designed to provide hardware and software support to Internet of Things (IoT) products. "Gopher Protocol plans to build and install a series of servers that provide a seamless way for software applications to read and write data and execute shared computer programs across machines. These servers utilize Gopher's proprietary, private protocol which enables client machines and mobile devices to mount into the file system and access files and programs as if they were hosted locally," said Gopher Protocol's Chief Technology Officer, Dr. Danny Rittman, PhD. Gopher's servers are native to IoT and work in real-time to accommodate tracking hardware. The company is building a number of servers in preparation for initial production of the tracking devices and Gopher's server's array installation and setup was completed at the end of July 2017. In a recent interview with Investor Ideas, Dr. Rittman explained that Gopher's servers utilize parallel computing architecture with several processors that execute and process computations simultaneously. Dividing the workload between more than one processor expedites large computations.
    [Show full text]
  • Before the Web There Was Gopher
    Before the Web There Was Gopher Philip L. Frana Charles Babbage Institute The World Wide Web, universally well known today, was preceded by an efficient software tool that was fondly named Gopher. The Internet Gopher, much like the Web, enabled users to obtain information quickly and easily. Why, then, did it disappear but the Web did not? Gopher faded into obscurity for two main reasons: hypertext and commerce. Before the Web there was Gopher, a nearly anymore, despite the efforts of a handful of defunct Internet application protocol and asso- individuals to revitalize the protocol. Why did ciated client and server software.1 In the early Gopher fail? Many Gopher aficionados have a 1990s, Gopher burrowed a crucial path ready answer: pretty pictures. For them, the through a perceived bottleneck on the Web won and Gopher lost because the Web Information Superhighway. Internet Gopher could display vibrant images of, for example, passed away as a technological and social phe- hand-woven Turkish rugs, animated glyphs of nomenon quickly: Its inventors released mice stuffing email into virtual mailboxes, and Gopher in 1991. Within three years, the World blinking advertising banners. Clearly, the Wide Web had bypassed it. Most people who “Gopher faithful”—as they are often called— surf the Web today have no idea what Gopher are right about the importance of pictures. is, but in the 1990s it helped usher in a new age People get serious when money is at stake, and of user-friendly access to a rapidly growing uni- in the early 1990s lots of people came to accept verse of online information.
    [Show full text]
  • Richard Stallman
    THE FIGHT FOR FREEDOM Free Software isn’t just about getting shiny new programs for no cash – it’s part of a much larger social movement. Mike Saunders and Graham Morrison explore the history and future of FOSS. here’s a problem with the word ‘free’. Software didn’t just pop up as an idea one day, as a Specifically, it can refer to something that “wouldn’t it be cool” notion from some hackers in a Tcosts no money, or something that isn’t held pub. The principles behind Free Software go back to down by restrictions – in other words, something the early days of computing, and many people have that has liberty. This difference is crucial when we fought long and hard to protect freedom in talk about software, because free (as in cost) computing, even when all hope looked lost. software doesn’t necessarily give you freedom. So this issue we want to delve deep into the world There are plenty of no-cost applications out there of Free Software: where exactly did it come from, that spy on you, steal your data, and try to lock you why is it important, and what challenges are ahead. in to specific file formats. And you certainly can’t get We also look at the differences in licences, one of the source code to them. the thorniest issues in FOSS, especially when people To make the distinction clearer, many people refer have different definitions of “free”. But let’s start by to free (as in liberty) software as a proper noun: Free going back to the early days of computing, when the Software.
    [Show full text]