... to have. One of the lead articles outlined this concern and dispelled the rumor that China would censor the paper when the city is turned over in July. The Morning Post is a very up to date paper that features an updated breaking news sidebar. A very useful and inviting feature which enables it to keep up with and often scoop the broadcast media. The newspaper also had a technology section which caters to the on-line user. The post also utilizes the use of java script to make it seem more like an interactive medium. Of the papers available from the continent of India the Times of India is the one of the finest. It features an archive that is quite extensive, ...
Words: 955 - Pages: 4
... organizational managers are finding that E-mail archives and files are telling sources of information about an organization's policies and actions. In the antitrust case against Microsoft "E-mail messages dashed off years ago by the Microsoft Corp. chairman and his top lieutenants now figure prominently as digital "smoking guns" . . . Trustbusters say electronic messages, perhaps more than any paper document, could help them prove that Microsoft sought to crush competitors and monopolize access to the Internet." However, Microsoft is not alone. Morgan Stanley Dean Witter & Co. recently agreed to settle a discrimination lawsuit initiated by employees. "The smoking gu ...
Words: 439 - Pages: 2
... (devices that transmit and receive information), and peripheral equipment such as printers (see Computer; Office Systems). The transmission line used can be a normal or a specially purchased telephone line called a leased, or private, line (see Telephone). It can also take the form of a microwave or a communications-satellite linkage, or some combination of any of these various systems. Hardware and Software Each telecommunications device uses hardware, which connects a device to the transmission line; and software, which makes it possible for a device to transmit information through the line. Hardware Hardware usually consists of a transmitter and a cab ...
Words: 3010 - Pages: 11
... tags must be surrounded by angle blankets. With the knowledge of the tags and proper combination of the tags, you can create a web page, as you desire. Now let's start creating a web page. The very first thing you need to put into your HTML document is a tag, it identifies the entire document as an HTML document. The next thing you will do is to create a header. An HTML document can be roughly divided into two sections: header and body. Header is where you display information about your web page, like its title. In a basic HTML document, header has two kinds of tags. First is the tag, it identifies this section as a header section. Inside the head is t ...
Words: 687 - Pages: 3
... for robbers and muggers, while computer-controlled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as "sober-up" drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control. But computer criminals--ranging in age from preteen to senior citizen--will have ample opportunities to violate citizens' rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But incre ...
Words: 2800 - Pages: 11
... can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of the Internet. The question of censorship may also be raised in some unexpected places: one newsgroup is the rec.humor list, which is a collection of jokes submitted to subscribers. There are straightforwardly rude jokes but others are politically incorrect, focusing on sexual stereotypes, mothers-in-law, women and so on. It has been suggested (Interpersonal Computing and Technology, 1994) that discretionary warning labels could be attached to potentially offensive material ...
Words: 2293 - Pages: 9
... known mainly for blowing up oilrigs in South America, and for kidnapping foreign executives. Two years ago, a Swedish hacker managed to go to London, to Atlanta, and then to Florida where he rerouted and tied up phone lines in each country, put 911 services out of commission, impeded the response of police, fire and rescue services. There are also a lot of cyber attacks within the United States, which are referred to as domestic attacks. In 1996, there were 128 cases of cyber attacks on the FBI's files, in 1998 there were 550. If a terrorist wanted to black out New York City he would have to make physical contact with the power plant by means of bombs, or actual ...
Words: 910 - Pages: 4
... of what has changed in the short time since he originally wrote many of the Wired pieces. The result is a read that is often insightful, often madenning, and always provoc ative. In the first part he talks about the communication medium, and how information content is so much more important than bandwidth. If we would only transmit better-labelled bits, we could do so much more with the bandwidth we have today. More elaborately, on 'Bits are Bits' here, he reflects on the difference between bits and atoms: how the shift to an economy based on the transfer o f bits is affecting the structure of the information industry; how the transmission of bits ...
Words: 484 - Pages: 2
... that it did. From there, I will show how these methods of development proceeded to eventually cause widespread environmental damage and it's effect on the local people. . DEVELOPMENT: "WESTERN" STYLE When I refer to "the environment", I mean not only the habitat that humans, plants and animals inhabit, but also the physical, emotional and psychological attitudes that are encompassed by these in their daily existence. Development, by my definition, will consequently refer to the technological advancement of a community as well as the improved status of humans and other species. This is my definition, and one that others employ frequently now. However, the model ...
Words: 1556 - Pages: 6
... Internet access more cost-effectively, while offering a broader range of services. The research for this report consisted of case studies of two commercial deployments of residential Internet access, each introduced in the spring of 1994: · Continental Cablevision and Performance Systems International (PSI) jointly developed PSICable, an Internet access service deployed over upgraded cable plant in Cambridge, Massachusetts; · Internex, Inc. began selling Internet access over ISDN telephone circuits available from Pacific Bell. Internex's customers are residences and small businesses in the "Silicon Valley" area south of San Francisco, California. 2. ...
Words: 2980 - Pages: 11