Hemşirelik Bilişimi

Total Page:16

File Type:pdf, Size:1020Kb

Hemşirelik Bilişimi HEMŞİRELİK BİLİŞİMİ HEMŞİRELİK LİSANS TAMAMLAMA PROGRAMI Editör DOÇ. DR. SELDA SEÇGİNLİ İSTANBUL ÜNİVERSİTESİ AÇIK VE UZAKTAN EĞİTİM FAKÜLTESİ İSTANBUL ÜNİVERSİTESİ AÇIK VE UZAKTAN EĞİTİM FAKÜLTESİ HEMŞİRELİK LİSANS TAMAMLAMA PROGRAMI HEMŞİRELİK BİLİŞİMİ Editör Doç. Dr. Selda SEÇGİNLİ YAZAR NOTU Elinizdeki bu eser, Hemşirelik Bilişimi alanında hazırlanmış bir ders notu niteliğindedir. Eserin, AUZEF Hemşirelik Bölümünde eğitimine devam eden öğrencilerimize faydalı olmasını dileriz. Doç. Dr. Selda SEÇGİNLİ Yrd. Doç. Dr. Gülhan COŞANSU 4 ÖNSÖZ Sevgili öğrenciler, Günümüzde sağ lık verisinin üretildiği pek çok kurumda uygulamalar elektronik ortamda sağlık bilgi sistemleri ile yönetilmektedir. Sağlık kurumlarında kâğ ıtsız uygulamalara doğ ru hızlı bir değ iş im ve geliş im yaş anmakta, sağ lık çalışanlarının bu değişime uyum sağlamaları önem kazanmaktadır. Sağlık alanında çok sık yapılan ölçüm, görüntüleme, değerlendirme, kayıt, raporlama ve paylaşma gibi işlemlerden dolayı her geçen gün artan sağlık bilgisinin yönetimi önem kazanmıştır. Bu nedenle, sağlık bilgisini yönetecek gerekli bilgi ve beceriye sahip sağlık çalışanlarına ihtiyaç artmıştır. Bu noktada, sağlık alanında yaşanan değişimlerden tüm sağlık disiplinleri gibi hemşirelik mesleği de etkilenmiştir. Hemşireler her geçen gün hızla artan hemşirelik ve sağlık bilgisinin yönetiminde sağlık bilgi sistemlerini yoğun bir şekilde kullanmaya başlamıştır. Bu değişimler sağ lık biliş imi ve tıp biliş imi ile birlikte hemş irelik biliş iminin de gelişimine neden olmuştur. Hemşirelik bilişimi, 1992 yılında Amerikan Hemş ireler Birliğ i tarafından hemşirelikte bir uzmanlık alanı olarak kabul edilmiş ve bu yıldan itibaren önemli bir gelişim göstermiştir. Hemş irelik biliş imi, hemş irelik bakımının planlanmasından değerlendirilmesine kadar tüm alanlarda bilgisayar biliminin, bilgi biliminin ve hemşirelik biliminin birlikte kullanılması olarak tanımlanmaktadır. Uluslararası Tıp Biliş imi Derneğ i-Hemş irelik Biliş imi Grubu’na (IMIA Special Interest Group on Nursing Informatics, 2009) göre, hemşirelik bilişimi, bireylerin, grupların ve toplumun sağlığını geliştirmek ve iyileştirmek amacıyla hemşirelik verilerinin paylaşılması, işlenmesi ve yönetilmesi için bilgisayar bilimi ve bilgi biliminin kullanılmasıdır. Diğer bir ifade ile sağlık bilgi sistemlerinde hemşirelik bilgisine nasıl ulaşılacağı, hemşirelik verilerinin nasıl elde edileceği, nasıl kullanılacağı, nasıl kayıt altına alınacağı ve ne şekilde saklanacağını tariflemektedir. Hemşirelik Bilişimi kitabının amacı, İstanbul Üniversitesi Açık ve Uzaktan Eğitim Fakültesi Hemşirelik Lisans Programı öğ rencilerine “temel bilişim terminolojisi, sağlık bilgi sistemleri, hemşirelik bilişimi, bilişim hemşireliği yeterlilikleri, rolleri ve eğitimi, hemşirelikte ortak dil ve hemşirelik sınıflama sistemleri, elektronik sağlık kayıtları, omaha sistemi, vaka çalışması, e-sağlık, telesağlık, teletıp, telehemşirelik, sağlık bilgi sistemlerinde güvenlik ve mahremiyet, kişisel sağlık verilerinin korunması ve etik” konuları hakkında bilgi vermektir. Hemşirelik bilişimi ve bu alan ile ilişkili diğer konuları içeren bu kitap, on dört üniteden oluş maktadır. Kitaptaki yedi ünite tarafımdan, yedi ünite de Yrd. Doç. Dr. Gülhan COŞANSU tarafından yazılmıştır. Hemşirelik Bilişimi kitabının siz sevgili öğrencilere yararlı olmasını diliyorum. Editör Doç. Dr. Selda SEÇGİNLİ Ağustos 2016, İstanbul Üniversitesi, Şişli i ÖNSÖZ ....................................................................................................................................... i KISALTMALAR ....................................................................................................................... 1 YAZAR NOTU .......................................................................................................................... 4 1. TEMEL BİLİŞİM TERMİNOLOJİSİ .................................................................................... 5 1.1. Veri, Enformasyon, Bilgi .................................................................................................. 11 1.1.1. Veri ....................................................................................................................... 11 1.1.2. Enformasyon ......................................................................................................... 11 1.1.3. Bilgi ...................................................................................................................... 11 1.2. Bilişim ............................................................................................................................... 12 1.3. Bilgisayarlar ...................................................................................................................... 13 1.3.1. Donanım ve Yazılım ............................................................................................. 14 1.3.2. Bilgisayar Ağı (Network) ..................................................................................... 14 1.3.3. Bilgisayar Çeşitleri ............................................................................................... 15 1.4. Veri Tabanı ........................................................................................................................ 20 1.5. Veri İletişimi ..................................................................................................................... 20 1.5.1. Veri İletişiminin Temel Bileşenleri ...................................................................... 20 1.5.2. Veri Transfer Modelleri ........................................................................................ 21 1.6. İnternet .............................................................................................................................. 21 1.7. Veri Madenciliği ............................................................................................................... 22 2. SAĞLIK BİLGİ SİSTEMLERİNE GİRİŞ ........................................................................... 29 2.1. Bilgi Sistemleri .................................................................................................................. 35 2.2. Sağlık Bilgi Sistemleri ...................................................................................................... 36 2.2.1. Sağlık Bilgi Sistemlerini Oluşturan Yapılar ......................................................... 38 3. SAĞLIK BİLGİ SİSTEMLERİ: .......................................................................................... 49 DÜNYADAKİ VE TÜRKİYE’DEKİ DURUM ...................................................................... 49 3.1. Sağlık Bilgi Sistemleri ...................................................................................................... 55 3.1.1. Dünyada Sağlık Bilgi Sistemlerinde Yaşanan Gelişmeler ................................... 56 3.2.2. Ülkemizde Sağlık Bilgi Sistemlerinde Yaşanan Gelişmeler ................................ 56 4. SAĞLIK BİLGİ SİSTEMLERİ: .......................................................................................... 66 BİRİNCİ BASAMAK BİLGİ SİSTEMLERİ VE .................................................................... 66 HASTANE BİLGİ SİSTEMLERİ ........................................................................................... 66 4.1. Birinci Basamak Sağlık Hizmetleri ................................................................................... 72 ii 4.2. Birinci Basamak Sağlık Bilgi Sistemleri ........................................................................... 73 4.3. Hastane Bilgi Sistemleri .................................................................................................... 75 5. HEMŞİRELİK BİLİŞİMİ .................................................................................................... 82 5.1. Bilgi Teknolojileri ............................................................................................................. 88 5.2. Sağlık Bilişimi ................................................................................................................... 88 5.3. Hemş irelı̇ k Bilişimi ........................................................................................................... 89 6. BİLİŞİM HEMŞİRELİĞİ, YETERLİLİKLERİ, ROLLERİ VE EĞİTİMİ ......................... 99 6.1. Hemşirelik Bilişimi ......................................................................................................... 105 6.2. Bilişim Hemşireliği ......................................................................................................... 106 6.3. Hemşirelik Bilişimi Yeterlilikleri/ Yetkinlikleri ............................................................. 107 6.4. Hemşirelik Bilişimi Uygulama Standartları .................................................................... 108 6.5. Bilişim Hemşiresinin Rolleri ........................................................................................... 109 6.6. Bilişim Hemşireliği Eğitimi ............................................................................................ 110 7. HEMŞİRELİKTE ORTAK DİL VE HEMŞİRELİK SINIFLAMA SİSTEMLERİ .......... 116 7.1. Hemşirelikte Ortak Dil .................................................................................................... 122 7.2. Hemşirelik Sınıflama Sistemleri ..................................................................................... 122 7.3. Hemşirelik Bilgi Sistemleri ............................................................................................
Recommended publications
  • 12 Browser Alternativi Dalle Alte Prestazioni
    12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 E' molto probabile che per leggere queste righe stiate utilizzando un browser come Firefox, oppure Internet Explorer, o Google Chrome. Questa considerazione nasce dalla constatazione che questi tre browser assieme coprono circa il 90% del mercato. Il fatto che questi 3 programmi abbiano una così vasta popolarità non comporta che si tratti delle soluzioni migliori, vista l'abbondanza di alternative presenti. {loadposition user7} Ecco, a titolo di esempio, una serie di ben 12 browser disponibili gratuitamente, che potrebbero in realtà corrispondere alle vostre esigenze in maniera migliore rispetto ai nomi più conosciuti. Maxthon Si tratta del progetto nato come MyIE2. Nel corso degli anni è diventato un potente browser a schede adatto per tutti gli utenti. Oltre alle funzionalità di navigazione di base, Maxthon Browser fornisce un ricco set di funzionalità per migliorarei vostri percorsi di navigazione 1 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Sistema Operativo: Windows Arora Arora è un leggero browser web. È dotato di rendering veloce, potente motore JavaScript e supporta plug-in Netscape. Sistema Operativo: Windows, Mac OS X, Linux Amaya 2 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 SistemaAmayaperfettamente non Operativo: è solo integrata un Windows, browser con l'editing, Macweb, OS ma tanto X,è ancheUnix da renderloplatforms un editor un web. prezioso La modalità strumento di visualizzazionecollaborativo. è Flock 3 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Flock è un browser con un focus sui social media.
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • (VDI) Protocol Problem Statement
    Virtual Desktop Infrastructure (VDI) Protocol Problem Statement IETF-81 July 25, 2011 Presenter & Contributor: Liang Liang [email protected] Contributors: Bingyi Fang [email protected] Jun Wang [email protected] 中文标题 Suan Ma [email protected] 字体: 黑体 字号:35-47pt Yu Meng [email protected] 色彩:主题蓝色 中文副标题 Bhumip Khasnabish [email protected] 字体:华文细黑 字号:24-28pt 色彩:反白 What is VDI Cloud Client VDI Protocol VM Control Channel Application Screen Channel Mouse/Keyboard Channel Guest OS Audio Channel USB Device Channel VMM VM: Virtual Machine VMM: Virtual Machine Monitor VDI means Virtual Desktop Infrastructure, in which the client acts as purely I/O devices and the computing moves into the server in the cloud 中文标题 VDI protocol connects Client and server, transporting 字体: 黑体 Theme1 字号:30-32pt the necessary control commands and I/O data. Different 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 I/O data may be encapsulated in different virtual channel. 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 Proposed VDI Protocol Stack Architecture Application Layer Application Virtual Channel Layer Screen Mouse/Keyboard Audio USB SmartCard User Provide Channel Channel Channel Channel Channel Channel Plug-in Session Control Layer User Authentication Channel Control Load Balance Session Mobility Transport Layer 中文标题 字体: 黑体 Theme1 字号:30-32pt TCP UDP TLS DTLS 色彩:蓝色 中文副标题 Theme2 字体:华文细黑 字号:20-22pt Theme3 色彩:黑色 子目录(2-5级) 字体:华文细黑 Theme4 字号:18pt 色彩:黑色 VDI is not new VDI is one new name, but the concept is already there for a long time – server-based computing(SBC).
    [Show full text]
  • Java Blocked?
    Getting started with NRV 1. Browser compatibility The NRV website is fully compatible with the following (current as of 21 January 2020) versions of browsers: NRV Browser 2.0.7 (Windows) / 2.04 (Linux) (http://nrv.jinr.ru/nrv/) Pale Moon 28.8.1 Basilisk 2020.01.12 K-Meleon 76.2G Build 20200118 Waterfox Classic 2020.01 SeaMonkey 2.49.5 Otter Browser 1.0.81 weekly 300 Lunascape 6.15.2 Internet Explorer 11 Most other browsers (current versions) do not support Java any more. 2. Installation of Java and enabling applets At the moment, most of the sections of the NRV web knowledge base use Java to provide interactive user interface and display information. Java may be downloaded at https://java.com/en/download/. Depending on the version of the browser, 32- or 64-bit version of Java must be installed. After installation go to the Java Control Panel, open the Security tab, check Enable java content in the browser, and click OK to apply settings (Fig. 1). Fig. 1. Java Control Panel with the correct settings (Java 8 under Microsoft Windows 7). On the first run in a particular browser a security warning will appear. Check Do not show this again for apps from the publisher and location above and click the Run button (Fig. 2). A Java applet will start. The same warning may also appear periodically later, often after the update of the browser or Java. Fig. 2. Security warning. Please note that the actual look of the Java Control Panel and security warnings may vary.
    [Show full text]
  • Safezone Browser Download Cent Safezone Browser Download Cent
    safezone browser download cent Safezone browser download cent. NOT REGISTERED YET? RETRIEVE YOUR PERNUM FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL. Your PERNUM will be sent to your registered email account. REQUEST PASSWORD FOR BETA TESTERS--> PLEASE ENTER YOUR PERNUM. Your temporary password will be sent to your registered email account. RESET YOUR MASTER PIN FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL AND SAFEZONE PASSWORD. RESET YOUR MASTER PIN FOR BETA TESTERS--> YOUR REQUEST HAS BEEN RECEIVED. An email has been sent to our Support Team and they will contact you at your registered email for assistance. Please allow up to 48 hours for a response, emails are processed in the order they are received. SET UP YOUR MASTER PIN FOR BETA TESTERS--> PLEASE ENTER YOUR REGISTERED EMAIL AND SAFEZONE PASSWORD. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Your SafeZone Pass is protected by two-step authentication. For every login process, or if you need to change your profile data, you need a one- time pin which has been randomly generated from your 6-digit Master Pin. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Oops! There is already a Master PIN set up for this account. Please either login using your existing Master PIN or you may reset your Master PIN. SET UP YOUR MASTER PIN FOR BETA TESTERS--> Your Master Pin has been set up successfully! Let us test your first One-Time Pin, which is randomly generated from your Master Pin. Please enter the matching digits of your Master Pin: SafeZone APK. SafeZone app is only available at organizations using the SafeZone solution .
    [Show full text]
  • Web Browser Google 1
    富山大学総合情報基盤センター広報 vol.3 (2006) 47-72頁. Web Browser Google ɄΜ͵K[ȜɪǢ ɯȩîÎΚ^b Ğ ဎʇ Ąȳ [email protected] 2005 9 ȼወȱ 28 !6෉ǃ Unicode ˣ߿ü` ƸወGoogle ø Welcome tiFϟϕ5ወ ዊ 2ϙ Hurricane KatrinaዄȸƂ༁੖ 280Km/hወŕ੖ =؅ϗ ˣðϊƓà Google Earth j ŻϟùϗϗϢ%ʖ ϟወGoogle Earth ŌųȸŻ ŗϕ ڵ=[͚ 78m/sዅϟnM ϗϙ_ƽĚŋወ4ϢϦ Google Erath Ӡ5ወ ዊTnϞ4ɺ ôϗ؛Ƹ͕đ= ዊ Google Erath =Â̎ؑƚş؅=ϙ> ąʿȴϦj 30 -ϕ6ዊϦϦወ ĚɪȰϠć,ނȢƚ=ወȫɨ ށb ϦȢƚወȩîëǂŔΡĞŔȰɪ۳ P̦ɪ7ϗ6xۉWWW ോۙ`xkIJEϕ6IJyyIY Web Browser ɋϞ4ወȾʇ͛ ȩî=źŸۀDGExLfR FirefoxወM} Opera Â̎ŗǢ=ūüወȩîʽˎɋϞ4Ž ͛üΜ͵K[ Search Engine ȽɴSSXd Google SearchወxXd Yahoo! SearchወGR`xkpfkRXd MSN Search ዏƂK[ወKmG A9ወUb GETAወS goo labs ʱወyS Blog Μ͵K[ወiRqiF Technoratiወy ዊ[4][3][2][1]6ށSILfdBlogWatcher äŵወʰ΍*ȜɪǢ=۳ 1 WWW ďɤʰ΍* 1.1 WWW ďɤ ¶5ዅiFsm]Tim Berners-Leeዄ PRۉWorld Wide WebዄȾʇ͛ π 1ዅዙTimothy John Berners-Lee ϟወ1989 Gftͳ̐ʖÛǂʧ_ƽ̪ CERN ዄConseil Europeen pour la Recherche Nucleaireዅ¥ȩî=Ƚ6 ,Zi യ͒ϗ -=ወGbpfkȴŔʧĚശȩîʔEZiĘϛ - ዊ ¶π 1 ȴȡ =̊Ȱ ዄhttp://www.w3.org/People/Berners-Lee/ http://www.w3.org/Proposal.html 35ͦ̌ዅ ňHTML(Hyper Text Markup Language)܂ϙȰôZiወjb=/556z kV http(hyper text transfer protocol)ወURL(Uniform Resource Locator)El=ˏåወ ዄ1 2ዅዊ i)=̎5ወGbpfkȡ)ôZ؛) ēĈ͛ Browser ) ወȴąVwb̎5ȴϥ6ĵȰ=~}[ʵወϦ74=ʣ6zf 富山大学総合情報基盤センター広報 vol.3 (2006) 47-72頁. k~VwbǙɀ{6 ,ወʰ%Ȱf^[=Gbpfk#ȡወ Ⱦʇ#ȩî=യ) ዊ̋ޓϟወũȸēηȾʇϟ6ȩîϚθϗϙɟ ʯηlGlfZ(ϚΡ)θʶɴϗ) ዊϞηfZθϟη PʁɲθϗϙɟʯۉηȾʇ ዊ θ-ŎϦϛ6ወɕșϗɁ઀Ψ{7) )ϙወŽēĘϛ ɓηIJfy(R 5)θ ϗϗ)ዊ ǃ/ወI˘zkVയ͒%੤ወWWW ͓؊ീ6ȩî̀ۉƻWLee ũ WWW ͓؊ =̿=Ρ͛6 W3C(World Wide Web Consortium)jFRbወÜȾʽ Web ͓؊ϕ6η^ifR WebዄSymantec WebዅθI˘ǃɊ5΍>ϗ)ዊ tVwbƍ6GqG(Illinois)Ƃʧ6DZ؀ŗወ1993 ĨƸENɯ ɪ^bNational Center for Supercomputing
    [Show full text]
  • PWC Gr8 Gals@Technology June 23, 2015 Browsers and Email
    PWC Gr8 Gals@Technology June 23, 2015 Browsers and Email PWC Gr8 Gals@Technology 2015-16 meeting topics. Location: West Lafayette Library 1:30-3PM, except where noted. Meeting date: 4th Tuesdays Topic June 23 at DANL Organization meeting: review program ideas, gauge interest/need. Topic: Browsers and Email Best practices on their use. July 28 – at Best Buy Update at Best Buy before the store opens. Topics: Update on Smart TVs, tablets/smart phones, health &fitness wearable technology. 8:15-10 AM August 25 Topic: Backup, Security, Software to use, or do you use the cloud? September 22 Photos: uploading, managing, printing, view on TV October 27 Ideas for holiday gifts. Tech for kids Apps for various devices. November 24 No meeting December 22 No meeting January 26 What did you get for holiday gifts…..and now what do you do with it!! Practice for Feb. Webinar. February 23 Webinar….so we don’t have to go out in the cold? TV’s, music, FaceTime, Skype March 22 – (Scott away) Yet to be determined: See what Tippecanoe Library can do….. April 26 Help session. Schedule a time with Scott to go over specific issues. May 24 (Memorial Day 30th) Plan for 2016-17 year Phones….cells….house over cell…voip…. Ideas: How many browsers do I need? Or what is the best browser to use? What are the really good search engines (like Google)? What mapping systems are best? Email. What should I be using? Back up practices/software; security How to remember passwords. What are the dangers of buying things online, and is PayPal the most secure way to pay? How do I know what I need in computing devices? Software…where is it going? Computer resident or cloud.
    [Show full text]
  • 1. Webinar Potrwa 45 Minut + Pytania 2. Tu Mnie Widać 3. a Tu Można Zadawać Pytania 4
    Technologia webinarów 5 kwietnia – godz. 16:00 1. Webinar potrwa 45 minut + pytania 2. Tu mnie widać 3. A tu można zadawać pytania 4. Pytania zadajemy na bieżąco, ale… 5. Ja też będę pytał! 6. Webinar jest rejestrowany wideo film webcast webinar e-learning mobile •Jak oglądamy webinar? •Co musisz powiedzieć uczestnikowi? 45 •Przygotuj swoje stanowisko pracy! minut •Wybierz oprogramowanie dla siebie •Pytania… Trener Prezentacja treści Uczestnicy Czat Materiały https://panel.clickmeeting.com/popup_tester.html http://www.transmisjeonline.pl/tester/ http://na1cps.adobeconnect.com/common/help/en/support/meeting_test.htm 1.Flash Player i JavaScript 2.Rozdzielczość 3.Przeglądarka 4.Porty 5.Prędkość pobierania danych, prędkość pobierania strumienia, opóźnienie połączenia 6.Głośniki Flash Player i JavaScript Rozdzielczość Amaya , AOL Explorer , Arora , Avant , Camino , Przeglądarka Chromium, Comodo Dragon,Dillo , Dooble , ELinks , Flock , Galeon , Google Chrome, iCab, Internet Explorer , K-Meleon , Konqueror , Links , Lunascape, Lynx , Maxthon , Midori, Mosaic , Mozilla, Mozilla Firefox , Netscape , Netscape Browser , Netscape Navigator, NetSurf, OmniWeb, Opera, Qupzilla, Safari, SeaMonkey, Shiira, Sleipnir, Torch Browser, Web, WorldWideWeb, w3m Przeglądarka Internet Firefox Chrome Safari Opera Explorer Świat 13.5 % 29.6 % 50.0 % 4.1 % 1.8 % My % % % % % http://www.w3schools.com/browsers/browsers_stats.asp http://blogs.technet.com/b/drrez/p/lync_2010_workloads.aspx download Prędkość pobierania 10 Mb/s upload danych, prędkość 2 Mb/s pobierania strumienia, opóźnienie połączenia Opóźnienie do kilkudziesięciu milisekund audio Ze złączem mini jack Ze złączem USB W jednym czasie może być używany tylko jeden mikrofon i tylko dla jednej aplikacji!! Upewnij się, że wybrany został właściwy mikrofon (np. ten w słuchawkach, a nie obudowie laptopa czy kamery), oraz że w tle nie działają aplikacje korzystające z mikrofonu (np.
    [Show full text]