Blockseminar Gesellschaftliche Aspekte Der Informatik FH

Total Page:16

File Type:pdf, Size:1020Kb

Blockseminar Gesellschaftliche Aspekte Der Informatik FH Blockseminar Gesellschaftliche Aspekte der Informatik FH-Schmalkalden SS 2010 24.06.2010 Dozent: Dipl.-Phys. Jo Tzschenscher Inhaltsverzeichnis Ausarbeitung Gruppe 1 – Internationales Jahr der Astronomie Florian Dörrer <[email protected]> Andreas Barth <[email protected]> Vor 400 Jahren verwandte Galileo Galilei die bildvergroessernde Wirkung des Fernrohres fuer den Nachweis, dass die vier der damit sichtbar gewordenenen Jupiter-Monde Mondphasen aehnlich der des Erd-Mondes aufwiesen. Damit war der experimentelle Beweis fuer das heliozentrische Sonnensystem erbracht, und der paepstliche Sitz in Rom hoerte auf, das Zentrum des Universums zu sein. Fuer das Fernrohr interessierten sich im Uebrigen nicht die Astronomen, sondern vielmehr die Generaele, die nun auf Venezia zufahrende feindliche Schiffe bereits frueher erkennen konnten. Mittlerweile werden kosmische Daten unter anderem ueber das Radioteleskop Arecibo auf Puerto Rico erfasst, und in mehreren partizipativen Projekten ausgewertet: Seti@Home ist der prominenteste Vertreter, aber auf der Arecibo-Homepage wird auch noch Einstein@Home genannt. Welche Erkenntnis-Leistung vollbringt hier die Informatik? Wie wuerden die Daten ohne diese Projekte ausgewertet werden? Welche Erkenntnisse wurden durch diese Projekte bereits erreicht? Welcher konkrete Nutzen fuer die Menschheit entsteht durch Seti@Home, Einstein@Home & Co.? Ausarbeitung Gruppe 2 – Post-Monopol Maik Ebert <[email protected]> Sven Spitzner <[email protected]> Bereits im antiken Aegypten wurden die Nachrichten aus den entlegenen Teilen des Reiches als Briefe ueber den Nil transportiert. Im alten Germanien dagegen wurden Nachrichten eher durch missionierende Moenche, fahrende Saenger oder wandernde Boten verbreitet. Dschingis Khan errichtete im Zuge der Ausweitung seines Reiches Pferdewechselstationen, die auch zur Nachrichtenuebermittlung durch berittene Boten dienten. Diese Idee wurde in Europa durch das Adelshaus von Thurn und Taxis weitergefuehrt, um die Post im Habsburgischen Reich zu verteilen. Das so entstandene Netzwerk aus Pferdewechselstationen wurde dann auch fuer den Personentransport herangezogen. Besonders in der juengeren Geschichte wurden die alten, haeufig auch verstaatlichten Post-Monopole zum Nachrichtenaustausch per Brief, Telegramm oder Telephon privatisiert. Mit zunehmender Verbreitung des Internet kam der klassischen Post verstaerkt die neue Rolle zu, nur noch ein kleiner Werbe- und Nachrichtentraeger unter Vielen zu sein, da zum Austausch von Nutzinformation meist unmittelbarere Medien wie Email, Chat, SMS, Twitter oder Telefonie bevorzugt werden. Diskutieren Sie die Veraenderungen im Nachrichtenaustausch im Lichte ihrer Zeit, mit ihren Modeerscheinungen, den zur Verfuegung stehenden Medien oder auch den Arten und Mengen an ausgetauschter Information, und welche Teile der Gesellschaft die unterschiedlichen Medien nutzen. Ausarbeitung Gruppe 3 – Internet-Universitaeten Susanne Schindler <[email protected]> Katja Loehr <[email protected]> Die Universitaet von Bologna (Italien) gibt vor, die vielleicht aelteste im christlichen Europa zu sein. Andere Untersuchungen gestehen der Al-Azhar Universitaet in Kairo diesen Titel zu, obwohl es durch Ausgrabungen Hinweise darauf gibt, dass im Umfeld der Bibliothek von Alexandria eine noch viel aeltere existiert haben muss. Wenn auch heute etliche Universitaeten um diesen Titel buhlen, so wurde doch der Startschuss gegeben fuer eine neue Art des Lernens: In der modernsten Form werden die Inhalte ueber das Internet bereitstellt und die Ergebnisse ueber denselben Weg retour abfragt. Stellen Sie die Entwicklung von den Vorlaeufern der heutigen Universitaeten bis hin zur Web-Universitaet dar. Funktioniert eine Web-Universitaet aehnlich einer klassischen Praesenz-Universitaet? Stellen Sie das Konzept vor. Sind die Ergebnisse gleichwertig? Wie verhaelt es sich mit der Disziplin jedes Einzelnen, den Lern-Angeboten ausreichend Aufmerksamkeit zu schenken? Gibt es alters- und inhaltsspezifische Korrelationen zwischen Benutzern und Inhalten? Ausarbeitung Gruppe 4 – Virales Marketing im Internet Andreas Heinrich <[email protected]> Florian Kühne <[email protected]> Befragt man Youtoube zu diesem Thema, dann erhaelt man unter anderem die Auskunft, dass das Internet ein "neues Medium" ist, und dass da "neue Regeln" gelten. Das klingt nach einem Allgemeinplatz, und wenn man die Vertriebsmethoden eines weltweit bekannten Plastikschuesselherstellers, oder auch die verschiedener sehr erfolgreicher Hersteller von Kosmetika untersucht, kommt man zum Ergebnis, dass die Benutzung eines sozialen Netzwerkes zum Produktvertrieb keineswegs eine neue Regel ist oder dem neuen Medium geschuldet wird. Wie unterscheidet sich das neue virale Marketing vom althergebrachten? Wie funktioniert es genau? Gibt es bevorzugte Produkte, die sich besonders gut dafuer eignen? Gibt es auch Negativbeispiele? Muessen die typischen Kundenkreise in besonderem Masse konditioniert sein oder werden? Unter diesem Fachbegriff bekannt wurde virales Marketing erst in letzter Zeit: Welchen Anteil am Erfolg dieser Methode hat das Internet, und kann man das Volumen der darueber abgesetzten Waren und Dienstleitungen abschaetzen? Ausarbeitung Gruppe 5 – Webbrowser-Krieg Martin Franke <[email protected]> Robert Häfner <[email protected]> Der aus den Anfangszeiten als Webbrowser-Krieg bekannte Wettlauf zwischen dem Hersteller des ersten prominenten Produktes Netscape sowie des Betriebssystemherstellers Microsoft ist inzwischen in eine friedlichere Co- Existenz auch der zwischenzeitlich neu am Markt aufgetauchten aehnlichen Produkte uebergegangen. Dies hat zur Folge, dass die anfaengliche Aufspaltung der Internet-Gemeinde in zwei unversoehnliche Lager in dieser Form nicht mehr existiert. Heute wollen Browser-Hersteller vor allem durch Anbieten spezieller Versionen im Verdraengungswettbewerb um Marktanteile heischen: Anbieten desselben Produktes unter verschiedenen Betriebssystemen und Sprachen sowie fuer weitere Geraetegruppen wie Mobiltelephone oder Embedded Devices. Die Integration mit Sicherheitssoftware soll zum virensicheren Browsen einladen. Weitere Ideen gehen in Richtung der Integration mit Sozialen Netzwerken. Beschreiben Sie den Status Quo und seine Genese. Der anfaenglich gegen Microsoft angestrengte Monopol-Prozess stuetzte sich vor allem darauf, dass der Browser mit dem Betriebssystem im Buendel angeboten wurde. Waere das unter heutigen Gegebenheiten noch ausreichend fuer eine Verurteilung? Diskutieren Sie. Ausarbeitung Gruppe 6 – Vom Kaffeehaus zum Cyber-Café Tim Achtert <[email protected]> Sebastian Streitberger <[email protected]> Die ersten Kaffeehaeuser wurden urspruenglich als religioese Kultstaetten in Mekka begruendet und fanden schnelle Verbreitung: Im Besonderen gefoerdert durch das Alkoholverbot des Islam war der Kaffeegenuss ein probater Ersatz. Der ottomanische Chronist İbrahim Peçevi berichtet, dass im Jahre des Propheten 962 (entspricht dem Jahr 1555 u.Z.) das erste Kaffeehaus in Constantinopel von Kaufleuten aus Aleppo und Damaskus begruendet wurde. Die Kaffeehaeuser entwickelten sich schnell zu Staetten des Informationsaustausches und der Geselligkeit, unter anderem beim Schachspiel, und buhlten durch luxurioese Ausstattung um neue Kundschaft. Es gibt geteilte Ansichten, wann und durch wen das erste Internet-Café begruendet wurde, aber es kann als gesichert gelten, dass dies in der ersten Haelfte der 1990-er Jahre geschah. Stellen Sie die Geschichte vom Kaffehaus zum Internet- Kaffeehaus sowie deren Bedeutung fuer die verschiedenen Teile der Menschheit dar, und geben Sie einen Ausblick auf die Zukunft, insonderheit in den weniger entwickelten Teilen des Planeten. Ausarbeitung Gruppe 7 – Industrie-Spionage Martin Schwarzkopf <[email protected]> Tommy Waldinger <[email protected]> Der Sonnenkoenig Louis XIV von Frankreich liebte es, sich in so vielen Spiegeln wie moeglich gleichzeitig betrachten zu koennen. So stellte der Zukauf neuer Spiegel aus Venedig die stets klamme Staatskasse vor neue Herausforderungen. Daher wurde sein Finanzminister Colbert beauftragt, die erste franzoesische Spiegelglas-Manufaktur "Manufacture Royale des glaces de Miroirs" aufzubauen, die auch noch heute unter dem Namen Saint-Gobain produziert. Gegen Geld wurden vier Spiegelmacher von der Insel Murano in der venezianischen Lagune angelockt. Deren Ehefrauen wurden sogar nach Frankreich entfuehrt, nachdem diese vonseiten der venezianischen Behoerden unter Druck gesetzt worden waren, ihre Ehegatten zur Rueckkehr zu bewegen. Im Internet- Zeitalter greift die Industrie-Spionage auf die in Suchmaschinen gespeicherte Information zu, benuetzt aber auch die Hilfe der amerikanischen NSA und weiterer Man-in-the-Middle-Lauschdienste. Beschreiben Sie die Zustaende und die Moeglichkeiten zur Industrie-Spionage damals und heute. Gab es seit Louis XIV noch weitere prominente Faelle? Ausarbeitung Gruppe 8 – Scheidung per Internet Johannes Werner <[email protected]> Patrick Groß <[email protected]> Die Talaq-Scheidung ist bereits im juedischen Talmud erwaehnt, und wurde im roemischen und dem darauf basierenden germanischen Recht ebenso wie im Koran uebernommen: Durch dieses Recht konnte sich der Ehegatte seiner geehelichten Frau durch dreimaliges Aussprechen des Wortes "Talaq" (=Verstossung) entledigen. Auch Karl der Grosse soll von dieser Rechtspraxis Gebrauch gemacht haben. In manchen Weltgegenden kann die Verstossung bereits per SMS
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Windows 7 – Hands-On Training Table of Contents PINNING PROGRAMS and USING JUMP LISTS
    Windows 7 – Hands-on Training Table of Contents PINNING PROGRAMS AND USING JUMP LISTS ..................................................................................... 3 THE START MENU .............................................................................................................................................. 3 Pin a program icon to the Start menu ............................................................................................................. 3 View the Jump List for a program .................................................................................................................. 4 Open an item from the Jump List ................................................................................................................... 4 Pin an item to a Jump List .............................................................................................................................. 4 Unpin an item ................................................................................................................................................. 4 THE TASKBAR .................................................................................................................................................... 5 Pin a program icon to the taskbar ................................................................................................................... 5 View the Jump List for a program .................................................................................................................
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • SILK Using the Remote Desktop Scheduler Logging Into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide
    SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Overview As of October 21, 2015, there are two methods of logging into the SILK Scheduler: LBLESD Citrix Login Interface or the new LBL Remote Desktop User Logon Interface. Citrix Login Interface is used to provide a secured entry into SILK applications. Citrix requires a license for each person logging into using SILK. The Remote Desktop Login Interface (for SILK - RD SILK Scheduler) is another type of secure login method for accessing SILK. LBL has purchased a single license for this product that allows an unlimited number of client users. LBL Information Systems and LBL Network are promoting the use of the Remote Desktop Login Interface for SILK because of: • Security control • Quicker logon response • No idle time limits • No limit to the number of users logged into SILK • Uses the same security – Domain, User ID and Password • SILK works as it always has • And works with web browsers: IE (10 and up), Mozilla Firefox, and Google Chrome Logging into SILK using RD SILK Scheduler To log into SILK using the RD SILK Scheduler you will need to know the Domain, your User ID, and password. For most SILK users the domain is SIS. The user id and password is the same that you currently use for SILK. During your first time using this URL address, you may encounter several Firefox browser security windows before you are allowed to log into your SILK district. Using Mozillia Firefox, enter the following URL to access the RD SILK Scheduler: https://scheduler.lblesd.k12.or.us Linn Benton Lincoln ESD Help Desk: 541.812.2800 or 866.914.2800 firefox browser-remote desktop silk scheduler.docx www.lblesd.k12.or.us https://swhelpdesk.lblesd.k12.or.us version date: 2015.12.04 SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Once the User Login page is displayed, enter your SILK security information.
    [Show full text]
  • ARCHIVE 2711.Pdf
    ComputorEdge 3/13/09 ComputorEdge™ Online — 03/13/09 This issue: Flash Drives: Computing in Your Pocket The little memory chips have become more than just a way to save and move files. Now you can carry all your computing with you to work with any computer. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader wants to run antivirus software from a flash drive; a reader's new external SATA drive isn't much faster than his old ATA drive; why would a reader's computer be shutting down at random intervals? Flash Drive Security by Michael J. Ross They're handy, portable and easy to lose. The diminutive size and light weight of flash drives makes them ideal for portable data storage, but it also makes them easily lost or stolen. Flash drive manufacturers and security software developers are creating a variety of solutions. Linux on a Flash Drive by Michael J. Ross Shrinking OS meets growing-capacity drives. (Click Banner) Linux is an operating system shrinking in size, while USB flash drives are growing in capacity. It was inevitable that a point would be reached at which Linux could be running on a simple flash drive. Windows Vista Tips and Tricks by Jack Dunning Save Time by Using Favorite Links in Windows Explorer Many people ignore the existence of the Favorite Links feature. However, if you take the time to play with it, you will most likely fall in love with this extra feature of Windows Vista. Wally Wang's Apple Farm by Wally Wang New Macintosh Models After a seeming eternity of waiting, Apple released updates to the Mac Pro, (Click Banner) iMac and Mac mini.
    [Show full text]
  • Technical Blueprint for Vertical Use Cases and Validation Framework
    Deliverable 1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Version 1.0 Partners This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 957242 Abstract This document describes the five use cases that are the targets for 5G Non-Public Network (NPN) developments within the FUDGE-5G project. The use cases addressed are: (i) Concurrent Media Delivery, (ii) Public Protection and Public Relief (PPDR), (iii) 5G Virtual Office, (iv) Industry 4.0, (v) Interconnected NPNs. List of Authors and Reviewers 1.1. Authors Author Partner Carlos Barjau, Josep Ribes, Borja Iñesta, David Gomez-Barquero UPV Kashif Mahmood (Editor), Pål Grønsund, Ole Grøndalen, Andres Gonzalez TNOR Daniele Munaretto, Marco Centenaro, Nicola di Pietro ATH Jose Costa, Mika Skarp CMC Pousali Charkaborty, Marius Corici FHG Peter Sanders O2M Thanos Xirofotos UBI Luis Cordeiro, André Gomes, António Borges ONE Manuel Fuentes, Andrés Meseguer, Teresa Pardo, David Martín-Sacristán 5CMM Sebastian Robitzsch, Kay Hänsge IDE Zoran Despotovic, Artur Hecker, Dirk Trossen HWDU Filippo Rebecchi THA D1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Page 2 of 85 1.2. Reviewers Reviewer Partner Erik Vold NRK Waqas Ikram ABB Kennet Nomeland Norwegian Defense Materiel Agency (NDMA) Karl Øyri Oslo University Hospital (OUS) Steve Appleby British Telecom (BT) Disclaimer This FUDGE-5G D1.1 deliverable is not yet approved nor rejected, neither financially nor content-wise by the European Commission. The approval/rejection decision of work and resources will take place at the Mid-Term Review Meeting planned in November 2021, after the monitoring process involving experts has come to an end.
    [Show full text]
  • Security Analysis of Browser Extension Concepts
    Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Bachelor's thesis Security Analysis of Browser Extension Concepts A comparison of Internet Explorer 9, Safari 5, Firefox 8, and Chrome 14 submitted by Karsten Knuth submitted January 14, 2012 Supervisor Prof. Dr. Michael Backes Advisors Raphael Reischuk Sebastian Gerling Reviewers Prof. Dr. Michael Backes Dr. Matteo Maffei Statement in Lieu of an Oath I hereby confirm that I have written this thesis on my own and that I have not used any other media or materials than the ones referred to in this thesis. Saarbr¨ucken, January 14, 2012 Karsten Knuth Declaration of Consent I agree to make both versions of my thesis (with a passing grade) accessible to the public by having them added to the library of the Computer Science Department. Saarbr¨ucken, January 14, 2012 Karsten Knuth Acknowledgments First of all, I thank Professor Dr. Michael Backes for giving me the chance to write my bachelor's thesis at the Information Security & Cryptography chair. During the making of this thesis I have gotten a deeper look in a topic which I hope to be given the chance to follow up in my upcoming academic career. Furthermore, I thank my advisors Raphael Reischuk, Sebastian Gerling, and Philipp von Styp-Rekowsky for supporting me with words and deeds during the making of this thesis. In particular, I thank the first two for bearing with me since the release of my topic. My thanks also go to Lara Schneider and Michael Zeidler for offering me helpful advice.
    [Show full text]
  • Optimizing Windows 10, Build 2004, for a Virtual Desktop Role
    Optimizing Windows 10, Build 2004, for a Virtual Desktop role Written by Robert M. Smith, Program Manager, Azure Global Customer Engineering Date Created: May 12, 2020 Date Updated: July 08, 2020 Date Published: tbd Contributors: Tim Muessig, Senior Premier Field Engineer; Narklis Engler, Principal Program Manager Version 1.2 Document Change History Version Changes 1.0 Adding verbiage for Windows Virtual Desktop, and Windows 10 build 2004 specifically 1.1 Additional updates for 2004 1.2 Final pass, updated group policy, services, tasks, and added info about Storage Sense for disk cleanup. Introduction This article is intended to provide suggestions for configurations for Windows 10, build 2004, for optimal performance in Virtualized Desktop environments, including Virtual Desktop Infrastructure (VDI) and Windows Virtual Desktop (WVD). All settings in this guide are suggested optimization settings only and are in no way requirements. The information in this guide is pertinent to Windows 10, version 2004, operating system (OS) build 19041. The guiding principles to optimize performance of Windows 10 in a virtual desktop environment are to minimize graphic redraws and “effects”, background activities that have no major benefit to the virtual desktop environment, and generally reduce running processes to the bare minimum. A secondary goal is to reduce disk space usage in the base image to the bare minimum. With virtual desktop implementations, the smallest possible base, or “gold” image size, can slightly reduce memory utilization on the host system, as well as a small reduction in overall network operations required to deliver the desktop environment to the consumer. No optimizations should reduce the user experience.
    [Show full text]
  • ASP.NET Developer Guidance Map
    ASP.NET Developer Guidance Map J.D. Meier, Principal PM, Microsoft http://blogs.msdn.com/jmeier Contents at a Glance • Introduction • Sources of ASP.NET Developer Guidance • Topics and Features Map (a “Lens” for Finding ASP.NET Content) • Summary Table of Topics • How The Map is Organized (Organizing the “Content Collections”) • Getting Started • Architecture and Design • Code Samples • How Tos • Videos • Training Introduction Welcome to the Microsoft ASP.NET Developer Guidance Map! This map is a consolidated index of ASP.NET content collections for developers. The primary content collections included in this map are: Code Samples, How Tos, Videos, and Training. Within the content collections, the resources are organized by ASP.NET features, common tasks, and common categories for ASP.NET. Usage Scenarios • Use the map to discover the various sources of developer content at Microsoft • Use the map to find some of the most useful content for helping you solve your problems with ASP.NET • Use the map as an example to help you create your own map of content resources Mental Model ASP.NET Developer Guidance Map (Mental Model) Sources Lens Content Collections Code How Tos Videos Training q Documentation Samples q Dev Centers Topics q MDSN Library q Channel9 Tasks q Code Gallery q Forums Features q … etc. Types Sources of ASP.NET Developer Guidance You can think of this as a “topology map” of some of the main sources of ASP.NET developer guidance from Microsoft. Simply by knowing what types of resources are available (code, forums, documentation, training, etc.), and by knowing where to look, you improve your success at finding the resources you need to get your job done, whether that’s figuring out how to code for a particular scenario, ramping up on the technology, or finding the latest news.
    [Show full text]
  • Eventtracker V7.1 Enterprise User Guide
    EventTracker Enterprise User Guide Version 7.3 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Copyright All intellectual property rights in this work belong to Prism Microsystems, Inc. The information contained in this work must not be reproduced or distributed to others in any form or by any means, electronic or mechanical, for any purpose, without the prior permission of Prism Microsystems, Inc., or used except as expressly authorized in writing by Prism Microsystems, Inc. Copyright © 1999 - 2012 Prism Microsystems, Inc. All Rights Reserved. Trademarks All company, brand and product names are referenced for identification purposes only and may be trademarks or registered trademarks that are the sole property of their respective owners. Disclaimer Prism Microsystems, Inc. reserves the right to make changes to this manual and the equipment described herein without notice. Prism Microsystems, Inc. has made all reasonable efforts to ensure that the information in this manual is accurate and complete. However, Prism Microsystems, Inc. shall not be liable for any technical or editorial errors or omissions made herein or for incidental, special, or consequential damage of whatsoever nature resulting from the furnishing of this manual, or operation and performance of equipment in connection with this manual. EventTracker Ver.7.3 Enterprise User Guide Contents Contents About this Guide ...................................................................................................................................
    [Show full text]
  • 코딩 예제) Window.External.Isserviceinstalled( „Map');
    웹 서비스의 한계를 넘어 - IE8 for Developer 한국마이크로소프트 개발자 및 플랫폼 사업 본부 차세대 웹 플랫폼 팀 김대우 http://www.uxkorea.net IE8 for Developer!!! 웹 개발자를 위한 IE8 디버깅 Accelerator Web Slice Visual Search 웹 개발자를 위한 IE8 디버깅 시작은 F12 한눈에 보이는 HTML DOM CSS 벗기기 Script 디버깅 프로파일러 브라우져 호홖성 체크 … Accelerator 현재 보고 있는 사이트에서 기존의 서비스로 직접 연결가능 Web Slice 웹의 다양한 컨텐츠를 빠르게 조회 사용자의 직접적인 구독 UI 모듈을 최소화한 개발 가능 Visual Search 다양한 검색 제공자로부터 빠른 검색을 수행 시각적인 검색 제공 UI모듈 개발 필요 없음 Guest - Auction Accelerator Accelerator – Developer Web 페이지의 컨텐츠와 다양한 온라인 서비스를 갂단한 동작으로 제휴 기능 추가적인 클라이언트 UI 개발 필요 없음 – 개발 모듈 최소화 표준 XML기반 OpenService 포맷 XML 문서 기반 Accelerator 등록 제공 Accelerator – Developer <?xml version="1.0" encoding="utf-8" ?> <openServiceDescription xmlns="http://www.microsoft.com/schemas/openservicedescription/1.0"> <homepageUrl>http://maps.live.com</homepageUrl> <display> <name>Live Maps 지도 서비스</name> <icon>http://maps.live.com/favicon.ico</icon> </display> <activity category="Map"> <activityAction context="selection"> <execute method="get“ action="http://maps.live.com/default.aspx?where1={selection}" /> <preview method="get" action="http://maps.live.com/geotager.aspx"> <parameter name="b" value="{selection}" /> <parameter name="clean" value="true" /> <parameter name="w" value="320" /> <parameter name="h" value="240" /> <parameter name="format" value="full" /> </preview> </activityAction> </activity> </openServiceDescription> Accelerator – OpenService 포맷 Accelerator의 XML 네임 스페이스 <openServiceDescription xmlns="http://www.microsoft.com/schemas/openservicedescription/1.0"> homepageUrl:Accelerator에 의해 액세스하는 Web 서비스의 URL <homepageUrl>http://maps.live.com</homepageUrl> diaplay:Accelerator의 메뉴에 표시되는 항목 <display> <name>Live Maps의 지도</name> <icon>http://maps.live.com/favicon.ico</icon> </display> activity:Accelerator의 동작 설정 - category :Accelerator가 제공하는 기능별로 그룹화 Map: Windows Live Map, Google Maps Blog: Windows Live Spaces, Blogger Define: Encarta, Wikipedia Add: Del.icio.us ··· <activity category="Map“> Accelerator – OpenService 포맷 context : Accelerator가 동작할 때 데이터 형식 설정 - 디폴트 「selection」 - 「selection」.
    [Show full text]
  • More Skills 14 Add Web Slices and Feeds
    M03_TOWN5764_01_SE_SM3.QXD 11/17/10 11:13 AM Page 1 CHAPTER 3 Windows 7 More Skills 14 Add Web Slices and Feeds ᭤ You can subscribe to services that inform you when updated information is available from your favorite websites. ᭤ You can add shortcuts to feeds to the Favorites bar or to the Favorites Center. To complete this project, you will need the following file: ᭿ New blank WordPad document You will save your file as: ᭿ Lastname_Firstname_w7_03_Feeds 1. On the taskbar, click the Internet Explorer button . 2. On the Command bar, click the Tools button, and then click Manage Add-ons. 3. In the lower-left corner of the Manage Add-ons dialog box, click Find more toolbars and extensions. 4. Maximize the Add-ons Gallery window, and then scroll to the bottom of the page. In the vertical navigation bar, below Internet Explorer 8 only, click Web Slices. If that link no longer displays on the page, navigate to www.ieaddons.com/en/webslices. Compare your screen with Figure 1. If necessary, scroll to display the Get the latest eBay.com Daily Deals thumbnail and button. A Web Slice is a portion of a web page to which you can subscribe to get updated information. For example, the eBay.com Daily Deals Web Slice informs you whenever there is a new deal from eBay.com. Web Slices add-ons gallery (yours may be different) Get the latest eBay.com Daily Deals Figure 1 Browse with Internet Explorer | Microsoft Windows 7 Chapter 3 More Skills: SKILL 14 | Page 1 of 5 From Skills for Success with Windows 7 Comprehensive Copyright © 2011 by Pearson Education Inc.
    [Show full text]