Human Factors in Telecommunications? Links in Norway, Steinar M
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Invariants: What Really Matters an Internet Society Public Policy Briefing
Internet Invariants: What Really Matters An Internet Society Public Policy Briefing 26 September 2016 Introduction Today’s Internet has We place an enormous amount of faith in the Internet, largely because it facilitates our transformed how more than two billion people connect and everyday lives. We instinctively trust that when we send an email, it will be received by communicate. And it will the intended recipient. When we type a domain name into a browser, we presume that continue to transform our economy, infrastructure, and the results will be what we are looking for. We can make these assumptions because social lives as cloud computing, Internet invariants ensure that if we send data, it arrives; and if we seek content, it will the Internet of Things, and be located. mobile devices evolve in ways we cannot yet imagine. We don’t often talk about how the Starting in the 1970s, a variety of protocols and network architectures were developed, network behind this technology works, just as most of us don’t but none became the driver of economic and social development that the Internet did. concern ourselves with where IBM’s Systems Network Architecture, for example, failed to take off because it could only electricity comes from, so long connect with hardware manufactured by IBM. The technical system that proliferated as our lights turn on. But as the Internet becomes an instead, and which remains at the foundation of the Internet, was TCP/IP because of its increasingly more pervasive and decentralized nature and underlying values of interoperability, flexibility, resilience, and critical piece of infrastructure, we need to understand both global reach. -
GPGS-F User’S Guide 8Th Edition
GPGS-F User’s Guide 8th Edition Norsk samarbeid innen grafisk databehandling Norwegian Association for Computer Graphics 8th Edition GPGS-F User’s Guide PAGE ii Notice SINTEF DELAB / NORSIGD retain all ownership rights to the GPGS-F software and its documentation. The information in this document is subject to change without notice. SINTEF DELAB / NORSIGD assume no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. SINTEF DELAB / NORSIGD are in no way responsible for consequential damages and/or costs from the use of this software. FrameMaker is a registered trademark of Frame Technology Corporation. PostScript is a registered trademark of Adobe Systems Incorporated. X Window System is a trademark of the Massachusetts Institute of Technology. This document was prepared using FrameMaker publishing software. All figures illustrating program examples were generated by using the GPGS-F device driver for PostScript, and subsequently included into the document. Last changed: Apr 7, 1995 8th Edition GPGS-F User’s Guide PAGE iii Table of Contents Page Notice . ii Table of Contents . iii Preface . xi Font Conventions Used in the Manual . xiii Argument Naming Conventions . xiii Manual Distribution and Revisions . xiv Modification Dates . xv Chapter 1 Graphic Devices 1.1 System Initialization . 1-1 1.2 Device Control . 1-2 1.2.1 Device Options. 1-4 1.2.2 Inquiring Available Device Drivers . 1-5 1.3 Synchronizing GPGS-F Output with Other I/O Operations . -
A FACULTY PERSPECTIVES and PRACTICES of SOCIAL PRESENCE in ONLINE POST-SECONDARY LEARNING ENVIRONMENTS a Dissertation SUBMITTED
FACULTY PERSPECTIVES AND PRACTICES OF SOCIAL PRESENCE IN ONLINE POST-SECONDARY LEARNING ENVIRONMENTS A Dissertation SUBMITTED TO THE FACULTY OF THE UNIVERSITY OF MINNESOTA BY Julie Ann Smith IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF EDUCATION Joyce Strand, Ph.D., Adviser April 2018 a Julie Ann Smith 2018 © b Acknowledgements This dissertation would not have been able without my patient adviser, Dr. Joyce Strand, who continued to support me throughout the years and help me to finally finish this research project. The last three years of trying to finish my dissertation included the caregiving to my mother and father. My father spent over two years in assistive care at the end of battling a long war with Alzheimer’s. He needed my mother’s help and she needed mine. This, and a concurrent divorce to my husband of 23 years, prolonged my ability to complete the writing of this dissertation, thus a long time had passed since the literature review. Many thanks go to my committee and doctoral chair who patiently provided me excellent advice in educational theory, interview and survey questionnaire revisions and/or dissertation guidance: Drs. Helen Mongan-Rallis, Craig Stroupe, Terrie Shannon, and Linda Deneen, and Chair Dr. Frank Guldbrandsen. Acknowledgements also go out to the faculty survey respondents and interviewees. Without their volunteer time, participation, and input, I would not have results to advance the study of social presence in the Community of Inquiry model. Additional thanks go to the faculty and staff and my cohort of the Education Doctorate in Teaching and Learning program at the University of Minnesota Duluth in the College of Education and Human Service Professions. -
NORSK DATA AS SINTRAN Iii Reference Manual
SINTRAN Il Reference Manual NORSK DATA AS SINTRAN IiI Reference Manual ND-60.128.03 NOTICE The information in this document is subject to change without notice. Norsk Data A.S assumes no responsibility for any errors that may appear in this document. Norsk Data A.S assumes no responsibility for-the use or reliability of its software on equipment that is not furnished or supported by Norsk Data A.S. The information described in this document is protected by copyright. It may not be photocopied, reproduced or translated without the prior consent of Norsk Data A.S. Copyright © 1983 by Norsk Data A.S This manual is in loose leaf form for ease of updating. Old pages may be removed and new pages easily inserted if the manual is revised. The loose leaf form also allows you to place the manual in a ring binder (A) for greater protection and convenience of use. Ring binders with 4 rings corre- sponding to the holes in the manual may be ordered in two widths, 30 mm and 40 mm. Use the order form below. The manual may also be placed in a plastic cover (B). This cover is more suitable for manuals of less than 100 pages than for large manuals. Plastic covers may also be ordered below. M= | ~ . IB== B 'S NORSK DATA AS NORSK DATA AS Bil=i & e lll\ ® A Ring Binder B Plastic Cover Please send your order to the local ND office or {in Norway) to: Documentation Department Norsk Data A.S P.0O. Box 4, Lindeberg gérd Oslo 10 ORDER FORM | would like to order Ring Binders, 30 mm, at nkr 20,- per binder Ring Binders, 40 mm, at nkr 25,- per binder Plastic Covers at nkr 10,- per cover NAME .. -
Digital Image Steganalysis Techniques
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted Rita Chhikara, Latika Singh ITM University, Gurgaon, Haryana, India presence or absence of embedded message. Images are Abstract- The overwhelming growth in communication often used as a carrier because of their extensive technology and usage of public domain channels (i.e. availability with high resolution of pixels. Data Internet) has greatly facilitated transfer of data. However, embedding in a multimedia carrier like image may such open communication channels have greater vulnerability involve varying parameters such as different image to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data formats, different embedding algorithms and various through apparently innocuous carriers such as text, image, steganographic keys. This has made steganalysis a more audio or video in an effort to conceal the existence of the difficult and challenging task. Earliest work on secret data and the fact that communication is even taking steganalysis was reported by Johnson and Jajodia [9] and place. Steganalysis is an attack on steganography. Both Chandramouli et al.[10]. It has gained prominence in steganography and steganalysis have received a great deal of national security and forensic sciences as detection of attention from law enforcement and the media. In the past hidden messages can lead to the prevention of disastrous years many powerful and robust methods of steganography security incidents. Algorithms for Steganalysis are and steganalysis have been reported in the literature. -
Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries
Volume 11, Summer 2017 Assistive Technology Outcomes and Benefits Volume 11, Summer 2017, pp. 66-81 Copyright ATIA 2017 ISSN 1938-7261 Available online: www.atia.org/atob Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries Diane Nelson Bryen, PhD Professor Emerita, Temple Univeristy – USA Juan Bornman, PhD Professor and Director, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa John Morris, PhD Clinical Research Scientist, Shepherd Center – USA Enid Moolman Lecturer, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa F. Mark Sweatman, PhD Data Analyst, Shepherd Center – USA Abstract are important, but some Find it diFFicult to use requiring a variety of modifications. More than 50% Mobile technology – cell phones, smartphones and of participants From each country used their mobile tablets – has expanded communication and social devices For text-messaging, web browsing, keeping interaction, commerce, and access to inFormation a directory oF contacts, voice calling, sharing photos for many people with disabilities. Little is known or videos online, listening to music, and social about the use of these mainstream technologies by networking. Recommendations are made For adults who use augmentative and alternative industry and people who rely on AAC. communication (AAC). InFormation comparing their use by adults who rely on AAC From both high- Keywords: augmentative and alternative income and low or middle-income countries is communication, AAC, cell phones, mobile technol- nonexistent. This article presents data on the use oF ogy mobile technology by 38 adults From the United States and 30 adults From South AFrica who use AAC. -
The Effect of Social Control Models on Motivation and Use in Electronic Communication Infrastructures
THE EFFECT OF SOCIAL CONTROL MODELS ON MOTIVATION 103 The Effect Of Social Control Models On Motivation and Use In Electronic Communication Infrastructures Dan Manson Computer Information Systems Electronic communication can restrict organizational communication, or open communication channels to all employees regardless of status and personality. The purpose of this paper is to explore the relationships between social control patterns and electronic communication infrastructure use. Political, administrative, and computing infrastructure examples are used to provide initial understanding of infrastructure use. Social control models are used to provide insight into employee use of an electronic communication infrastructure. Case data from electronic communication systems is mapped to social control models to illustrate the effect of social control types on electronic communication use. Introduction A communications infrastructure provides an enabling platform for employees to share information to be used for decision-making, problem-definition, and coordination of organiza- tional behaviors. A functioning infrastructure enables the delivery of products and services facilitating human and cognitive processes adding value through information and knowledge exchange. In discussing the role of computing infrastructures, it is important to define infrastructure characteristics being considered. Computing infrastructure refers to the set of human and organizational resources that help make it simpler and faster for skilled people to use computerized systems (Kling, 1993). A computing infrastructure can consist of physical, technological and social characteristics. Physical characteristics can affect the ability to access the system. Technological characteristics involve issues of quality and reliability. Social characteristics address issues of information access and accountability. Physical and technological issues are driven by economic and technical issues, while social issues involve organizational issues. -
Visions of Electric Media Electric of Visions
TELEVISUAL CULTURE Roberts Visions of Electric Media Ivy Roberts Visions of Electric Media Television in the Victorian and Machine Ages Visions of Electric Media Televisual Culture Televisual culture encompasses and crosses all aspects of television – past, current and future – from its experiential dimensions to its aesthetic strategies, from its technological developments to its crossmedial extensions. The ‘televisual’ names a condition of transformation that is altering the coordinates through which we understand, theorize, intervene, and challenge contemporary media culture. Shifts in production practices, consumption circuits, technologies of distribution and access, and the aesthetic qualities of televisual texts foreground the dynamic place of television in the contemporary media landscape. They demand that we revisit concepts such as liveness, media event, audiences and broadcasting, but also that we theorize new concepts to meet the rapidly changing conditions of the televisual. The series aims at seriously analyzing both the contemporary specificity of the televisual and the challenges uncovered by new developments in technology and theory in an age in which digitization and convergence are redrawing the boundaries of media. Series editors Sudeep Dasgupta, Joke Hermes, Misha Kavka, Jaap Kooijman, Markus Stauff Visions of Electric Media Television in the Victorian and Machine Ages Ivy Roberts Amsterdam University Press Cover illustration: ‘Professor Goaheadison’s Latest,’ Fun, 3 July 1889, 6. Cover design: Coördesign, Leiden -
Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction
Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Eversheds Sutherland is pleased to present REDIAL, our annual in-depth analysis of key Telephone Consumer Protection Act (TCPA) issues and trends. REDIAL reports on issues affecting the industries that face TCPA class action liability. Did you know? 2ND 100,000 3X For the fourth consecutive year, The FCC has reported that as many The TCPA imposes liability of TCPA cases are the second most as 100,000 cell phone numbers $500 per call, text or fax, trebled filed type of case in federal are reassigned every day. to $1,500 if the sender’s conduct courts nationwide. is deemed willful. Eversheds Sutherland Industry Knowledge and Focus Few industries are immune from TCPA liability. In 2016, the insurance, financial services, energy and health sectors were uniquely affected by TCPA litigation. REDIAL analyzes key legal issues affecting these industries. Eversheds Sutherland tracks daily all TCPA cases filed across the country. This allows us to spot trends and keep our clients informed. We understand the law and our clients’ businesses, allowing us to design compliance and risk management programs uniquely suited to our clients' specific needs and to spot issues before they result in litigation. When litigation is filed, Eversheds Sutherland’s TCPA team has the depth of experience necessary to zealously defend its clients’ interests in court. Why Eversheds Sutherland? STRENGTH in representing STRENGTH in knowing STRENGTH in advising -
TX-NR636 AV RECEIVER Advanced Manual
TX-NR636 AV RECEIVER Advanced Manual CONTENTS AM/FM Radio Receiving Function 2 Using Remote Controller for Playing Music Files 15 TV operation 42 Tuning into a Radio Station 2 About the Remote Controller 15 Blu-ray Disc player/DVD player/DVD recorder Presetting an AM/FM Radio Station 2 Remote Controller Buttons 15 operation 42 Using RDS (European, Australian and Asian models) 3 Icons Displayed during Playback 15 VCR/PVR operation 43 Playing Content from a USB Storage Device 4 Using the Listening Modes 16 Satellite receiver / Cable receiver operation 43 CD player operation 44 Listening to Internet Radio 5 Selecting Listening Mode 16 Cassette tape deck operation 44 About Internet Radio 5 Contents of Listening Modes 17 To operate CEC-compatible components 44 TuneIn 5 Checking the Input Format 19 Pandora®–Getting Started (U.S., Australia and Advanced Settings 20 Advanced Speaker Connection 45 New Zealand only) 6 How to Set 20 Bi-Amping 45 SiriusXM Internet Radio (North American only) 7 1.Input/Output Assign 21 Connecting and Operating Onkyo RI Components 46 Slacker Personal Radio (North American only) 8 2.Speaker Setup 24 About RI Function 46 Registering Other Internet Radios 9 3.Audio Adjust 28 RI Connection and Setting 46 DLNA Music Streaming 11 4.Source Setup 29 iPod/iPhone Operation 47 About DLNA 11 5.Listening Mode Preset 32 Firmware Update 48 Configuring the Windows Media® Player 11 6.Miscellaneous 32 About Firmware Update 48 DLNA Playback 11 7.Hardware Setup 33 Updating the Firmware via Network 48 Controlling Remote Playback from a PC 12 8.Remote Controller Setup 39 Updating the Firmware via USB 49 9.Lock Setup 39 Music Streaming from a Shared Folder 13 Troubleshooting 51 Operating Other Components Using Remote About Shared Folder 13 Reference Information 57 Setting PC 13 Controller 40 Playing from a Shared Folder 13 Functions of REMOTE MODE Buttons 40 Programming Remote Control Codes 40 En AM/FM Radio Receiving Function Tuning into stations manually 2. -
The Social Imaginary of Telephony
The Social Imaginary of Telephony Fictional Dispositives in Albert Robida’s Le Vingtième Siècle and the Archeology of “Talking Cinema”1 Alain Boillat What I propose to do here, within a perspective involving both epistemology and the archaeology of media, is to approach “talking cinema” through the examination of discourses produced in the last two decades of the nineteenth century, that is, almost fifty years prior to the generalization of talkies and the institutionalization of practices related to sound in the domain of cinema.2 Beyond this specific medium, I will examine the series of machines of audiovisual representation, one of whose many actualiza- tions was “talking cinema” (which is why quotation marks are fitting here, with regard to “cinema” as well as “talking”). Among the many inventions from which various experimentations with “talking cinema” may be said to derive, I will emphasize the technique of telephony. Indeed, its study presents the advantage of encompassing a number of auditive or audiovisual dispositives that are often much more difficult to reduce to their place in the genealogy of (institutionalized) cinema than viewing dispositives. On a methodological level, de-centering the point of view is precisely what appears productive to me, as the discussion of the place given to the voice within various audio(visual) dispositives constitutes the theoretical horizon of my observations.3 1 Translator’s note: the French expression “cinéma parlant” (literally, “talking cinema”) is usually translated as “sound cinema” in English, but given the focus of this chapter and the existence of the term “talkies” in English, it is translated as “talking cinema” here. -
Phoneypot: Data-Driven Understanding of Telephony Threats
Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].