Vor einiger Zeit erhielt Karl-Friedrich Fischbach eine E-Mail von einer Frau, die sich wegen ihres hohen Alters nicht mehr bewegen konnte. Sie lag den ganzen Tag nur noch im Bett. Die Kinder hätten ihr deshalb einen Laptop geschenkt, schrieb die Frau, mit dem sie vom Bett aus auf das Internet zugreifen konnte. Das habe ihr neuen Mut und Lebensfreude gegeben, da sie wieder mit anderen Menschen kommunizieren konnte. "Die Dame kann heute wieder laufen", sagt Karl-Friedrich Fischbach.
The groundwork is being laid for an intelligent web that will understand links and anticipate needs, says Claudine Beaumont
How will the internet look in five years' time? According to Sir Tim Berners-Lee, the man credited with inventing the world wide web, it will be rather different to the cyberspace of today. He envisages an internet in which all information, applications and data are seamlessly linked and interwoven - everything will work with everything else and that will, in effect, allow us to live our lives almost entirely online.
Sperrungen von Internetseiten, die auf der Analyse von IP-Adressen, Port-Nummern, URLs oder Inhaltsdaten beruhen, sind nicht mit geltendem Recht vereinbar. Zu diesem Ergebnis kommen Juristen des Freiburger Max-Planck-Instituts für ausländisches und internationales Strafrecht in einer neuen Studie. Das Fazit der Experten: Die geltende Rechtslage erlaube keine Sperrungen, "die in das von Artikel 10 Grundgesetz und Paragraph 88 Telekommunikationsgesetz geschützte Fernmeldegeheimnis eingreifen". Die Studie war von der Kommission für Jugendmedienschutz (KJM) in Auftrag gegeben worden, um nach den Sperrverfügungsverfahren der Bezirksregierung in Düsseldorf rechtliche Klarheit zu schaffen.
Unser Video der Woche, [extern] Supermarket 2.0, stammt aus Israel und erklärt am Beispiel eines Supermarktes witzig und anschaulich, wie das [extern] Web 2.0 funktioniert. Und danach geht man tatsächlich mit ganz anderen Augen einkaufen oder durch den
Design Patterns and Business Models for the Next Generation of Software by Tim O'Reilly 09/30/2005 The bursting of the dot-com bubble in the fall of 2001 marked a turning point for the web. Many people concluded that the web was overhyped, when in fact
The Open Directory Project is the largest, most comprehensive human-edited directory of the Web. It is constructed and maintained by a vast, global community of volunteer editors.
We're working on a project that combines the best things about television with the social power of the internet - a project that gives viewers, advertisers and content owners more choice, control and creativity than ever before.
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..