To see the other types of publications on this topic, follow the link: Server computing.Samba (Computer file).

Journal articles on the topic 'Server computing.Samba (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 journal articles for your research on the topic 'Server computing.Samba (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wiyanti, Dian Tri, David Mubarok, and Muhammad Zuhair Zahid. "File Sharing System Using Samba For Mathematics Laboratory." Jurnal Transformatika 15, no. 2 (January 23, 2018): 114. http://dx.doi.org/10.26623/transformatika.v15i2.759.

Full text
Abstract:
In the computer laboratory of Mathematics Department previously installed in the network of Novell Netware 5 operating system. But file sharing problem is when client upgrades the operating system. The server can not be accessed from the client. So finally the data management was decided not to go through the server. Another constraint is not being able to update regularly, so it certainly will be vulnerable to viruses. Within 1 month required to re-install twice because of virus attacks, malware, and others. The idea is to build a network which is server-based integrated, and make improvements on the server side system more effective and efficient, and safe from hackers or viruses. This research also contributes to the realization of green computing that supports the commitment of college conservation.
APA, Harvard, Vancouver, ISO, and other styles
2

Nugroho, Andi, and Yopi Handrianto. "FILE SHARING SERVER MENGGUNAKAN SAMBA SERVER DAN LINUX UBUNTU 12.04 SERVER." Paradigma - Jurnal Komputer dan Informatika 18, no. 2 (December 9, 2016): 11–17. http://dx.doi.org/10.31294/p.v18i2.1177.

Full text
Abstract:
Data storage on server laboratory at the computer science when needed.It was because application that progressively and document required was handled by more than one person.Currently there are 6 class space the laboratory contained 30 units of computer in each room. All the time, Laboran (person who manage and work in a laboratory) have to bring harddrive external if you want to install application needed for each the lab, but during this laboran has only two external hard drive. This condition resulted in the process of installation application in the laboratory require a long time. In addition, every month laboran have to make recapitulation contract for 22 person laboratory’s assistant. Now, to make contract assistant in the lab, laboran have to open one of the workstations that is in the fasilkom’s laboratory. This can slow performance, because laboran have to coming into the fasilkom’s laboratory. By the presence of the problems mentioned above, then built a file sharing that is used to hold the application of which is required in the entire room of Fasilkom’s laboratory. In addition, a file sharing this can be used to speed up the emoluments of the preparation of reports on the whole lab assistant that until now had been stored luminance space laboratory so that laboran no need to use more external hard disk in installation perform the process of application by opening the Samba through Windows Server Explorer. It is also the case to compile the report honorarium of the lab’s assistant, laboran enough to use of a file sharing fastly. A file sharing development is using the Linux Ubuntu operating system Version 12.04 and the application of the Samba Servers the Samba to connect storage a file that is in linux so that it can be opened in a windows or linux operating system based. Keywords : File Sharing Server, Samba Server, Linux Ubuntu, Computer Lab.
APA, Harvard, Vancouver, ISO, and other styles
3

Kusumaningrum, Anggraini. "PENGUJIAN KINERJA JARINGAN SISTEM AKSES FILE BERBASIS CLIENT SERVER MENGGUNAKAN SAMBA SERVER." Conference SENATIK STT Adisutjipto Yogyakarta 2 (November 15, 2016): 129. http://dx.doi.org/10.28989/senatik.v2i0.31.

Full text
Abstract:
Data communication is the process of exchanging data between two or more devices through a transmission medium such as a cable. In order for the data communication can occur, the device must be connected to communicate with each other or be a part of a communication system consisting of hardware (hardware) and software (software). Samba server is a software bridge between the two operating systems that run within a computer network. Samba is able to share files with computers that use operating system linux, unix and windows with a peer to peer system. The time needed on the LAN network access system based on client file servers using Samba server with a minimum file size of 3MB and a maximum of 1GB for the download process is 04 minutes 54 seconds while the upload is 09 minutes 24 seconds. Speed transfer rate that is produced with a minimum file size of 3MB and a maximum of 1GB for the download process is 4.762Kbps and to upload is 1.896Kbps. On QoS testing conducted on 5 PCs, 10PC, 15pc and client 20PC result more and more PC client that accesses 1 file the success rate will be getting worse, it is because the bottleneck on the network.Kata Kunci : Network, client server, Samba Server
APA, Harvard, Vancouver, ISO, and other styles
4

Suhanda, Suhanda. "ANALISIS SISTEM KERJA FILE SERVER UNTUK MENINGKATKAN KEAMANAN DAN MEMPERLANCAR PROSES PERTUKARAN DATA-DATA ADMINISTRASI PERKANTORAN." ENSAINS JOURNAL 3, no. 1 (January 13, 2020): 42. http://dx.doi.org/10.31848/ensains.v3i1.300.

Full text
Abstract:
Abstrak: Jurnal ini akan Membahas dan Menganalisa tentang Pengembangan File Server yang digunakan untuk menangani suatu kesibukan Pengolahan Pertukaran Data di suatu Perkantoran. Data yang diproses menggunakan Jaringan Lokal, untuk mengecek Data-Data hasil kerja, Pertukaran Data sering tidak Akurat, dan Data tidak sesuai dengan kegunaannya, bahkan Data sering keliru dan Hilang. Pengembangan File Server harus disertai dengan adanya Pengamanan terhdap File karena sering adanya gangguan Virus yang datang melalui Jaringan. Disamping Pengamanan Haedware, harus disertai Pengamanan Softwarenya. Supaya jalannya proses Data-Data Administrasi menjadi Lancar dam terjamin Keamanannya. File Server yang dianalisa menggunakan Samba Riga dan Linux Redhat yang Effetif dabn Effisien. Untuk menjaga Keamanan dari File tersebut, maka digunakan pembagian untuk Hak Aksesnya yang digunakan oleh masing-masing Operator Data Administrasi. Jurnal yang diambil dari hasil Penelitian tentang Data Administrasi salah satu Kantor di Kabupaten Garut yang memerlukan Peralatan Komputer dan Jaringannya untuk memperlancar pengolahan Data. Pekerjaan yang sedang dikerjakan didukung oleh teknologi File Sharing yang memadai, supaya pejerjaan dalam Pengolahan data dapat dilaksanakan dengan lancar dan tepat waktu serta Akurat. Dengan menggunakan dan menganalisis File Server dan Keamanannya, maka hasil kerja yang didapat menjadi lebih cepat dan Sumber Daya yang dibutuhkan menjadi lebih hemat, sehingga Biaya yang dikeluarkan lebih kecil, serta dapat memnuhi biaya yang lainya yang berhubungan dengan Pengolahan Data Administrasi di Perkantoran. Dengan Analisis dan Pengembangan File Server Proses Kerja Dara Administrasi terutama Pertukaran Data menjadi lebih lancar dan Aman dari Akurat.Kata kunci : File server, Pertukaran Data, Administrasi Perkantoran.Abstract: This journal will discuss and analyze the development of file servers that are used to handle a busy Exchange of Data Processing in an Office. Data is processed using Local Networks, to check Data on work results, Data Exchange is often inaccurate, and Data is not in accordance with its use, even Data is often wrong and Missing. The development of a File Server must be accompanied by the Security of Files because of frequent Virus interruptions that come through the Network. Besides the security of hardware, it must be accompanied by security software. So that the process of running administrative data becomes smooth and guaranteed. The file server analyzed using Samba Riga and Effetive Linux Redhat and Efficient. To maintain the security of the file, the division for access rights used by each operator of data administration is used. Journals taken from the results of Research on Administrative Data, one of the Offices in Garut Regency that requires Computer and Network Equipment to facilitate data processing. The work that is being worked on is supported by adequate File Sharing technology, so that workers in data processing can be carried out smoothly and on time and accurately. By using and analyzing File Servers and Security, the work results obtained will be faster and the Resources needed will be more efficient, so that the costs incurred are smaller, and can meet other costs associated with Processing Administrative Data in Offices. With Analysis and Development of File Servers the Administration of Work Processes, especially Data Exchange, becomes more smooth and safethanAccurate. Keywords: File server, Data Exchange, Office Administration.
APA, Harvard, Vancouver, ISO, and other styles
5

Lougher, P., and D. Shepherd. "The Design of a Storage Server for Continuous Media." Computer Journal 36, no. 1 (January 1, 1993): 32–42. http://dx.doi.org/10.1093/comjnl/36.1.32.

Full text
Abstract:
Abstract The increasing use of multimedia in computing is demanding more powerful computer hardware and system software. In particular, the stringent demands placed on multimedia file servers are unable to be satisfied by current magnetic disk technology or by current file systems techniques. This paper describes the design and implementation of a file server which has been specially optimized for continuous media. The critical performance issues which this paper addresses are the use of disk striping to provide high bandwidth, optimized disk layouts, hard real-time disk scheduling to ensure stream storage and retrieval guarantees are met, and a user interface to support high level multimedia abstractions.
APA, Harvard, Vancouver, ISO, and other styles
6

Hiraga, Kohei, Osamu Tatebe, and Hideyuki Kawashima. "Scalable Distributed Metadata Server Based on Nonblocking Transactions." JUCS - Journal of Universal Computer Science 26, no. 1 (January 28, 2020): 89–106. http://dx.doi.org/10.3897/jucs.2020.006.

Full text
Abstract:
Metadata performance scalability is critically important in high-performance computing when accessing many small files from millions of clients. This paper proposes a design of a scalable distributed metadata server, PPMDS, for parallel file systems using multiple key-value servers. In PPMDS, hierarchical namespace of a file system is efficiently managed by multiple servers. Multiple entries can be atomically updated using a nonblocking distributed transaction based on an algorithm of dynamic software transactional memory. This paper also proposes optimizations to further improve the metadata performance by introducing a server-side transaction processing, multiple readers, and a shared lock mode, which reduce the number of remote procedure calls and prevent unnecessary blocking. Performance evaluation shows the scalable performance up to 3 servers, and achieves 62,000 operations per second, which is 2.58x performance improvement compared to a single metadata performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Januar Al Amien and Doni Winarso. "ANALISIS PENINGKATAN KINERJA FTP SERVER MENGGUNAKAN LOAD BALANCING PADA CONTAINER." JURNAL FASILKOM 9, no. 3 (November 14, 2019): 8–18. http://dx.doi.org/10.37859/jf.v9i3.1667.

Full text
Abstract:
Abstract Cloud computing is a technology that answers the challenge of the need for efficient computing technology. There are many things that can be implemented using cloud computing technologies such as web services, storage services, applications and others. Use of cloud computing using container technology can help in the management of applications and optimize the use of resources in the form of memory and processor usage on the server. In this research docker containers implemented by service of FTP (File Transfer Protocol). The FTP service is made into 3 containers within a single server computer. To handle load problems performance on the FTP server against overload requests, load balancing is used. Load balancing is a method to improve performance while reducing the performance load on FTP servers. Based on the test results, the use of multi container and load balancing in the FTP server in load with two algorithm least connection and raound robin handling has result of smaller memory usage and utilization of processor usage evenly. Both algorithms are recommended for handling loads for FTP servers and will be more efficient when applied to servers with the same specifications and loads Keywords: Cloud Computing, Docker, FTP, Load Balancing, HAProxy, Least Connection, Round Robin. Abstrak Cloud computing merupakan teknologi yang menjawab tantangan akan kebutuhan teknologi komputasi yang efisien. Terdapat banyak hal yang dapat diimplementasikan menggunakan teknologi cloud computing seperti web service, layanan penyimpanan, aplikasi dan lain-lain. Penerapan cloud computing dengan menggunakan teknologi container dapat membantu dalam pengelolaan aplikasi serta mengoptimalkan penggunaan sumber daya berupa penggunaan memory dan prosesor pada server. Dalam penelitian ini penerapan docker container diimplementasikan menggunakan layanan aplikasi FTP (File Transfer Protocol). Layanan FTP dibuat menjadi 3 container didalam satu computer server. Untuk menangani permasalahan beban kinerja pada FTP server terhadap permintaan yang terlalu berat (overload) digunakan load balancing. Load balancing merupakan metode untuk meningkatkan kinerja sekaligus mengurangi beban kinerja pada FTP server. Berdasarkan hasil pengujian, penerapan multi container serta load balancing didalam FTP server dalam penanganan beban dengan dua algortima least connection dan round robin memiliki hasil penggunaan memory yang lebih kecil dan pemanfaatan penggunaan prosesor yang merata kedua algoritma tersebut direkomendasikan untuk penanganan beban untuk ftp server dan akan lebih efisien apabila diterapkan pada server dengan spesifikasi dan beban yang sama. Kata Kunci: Cloud Computing, Docker, FTP, Load Balancing, HAProxy, Least Connection, Round Robin .
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.

Full text
Abstract:
The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-enabled public key encryption scheme with multi-keyword search (BPKEMS), and our scheme supports file updates. In addition, smart contract is used to ensure the fairness of transactions between data owner and user without introducing a third party. At the data storage stage, our scheme realizes the verifiability by numbering the files, which ensures that the ciphertext received by the user is complete. In terms of security and performance, our scheme is secure against inside keyword guessing attacks (KGAs) and has better computation overhead than other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
9

COSTA, FERNANDO, LUIS SILVA, GILLES FEDAK, and IAN KELLEY. "OPTIMIZING DATA DISTRIBUTION IN DESKTOP GRID PLATFORMS." Parallel Processing Letters 18, no. 03 (September 2008): 391–410. http://dx.doi.org/10.1142/s0129626408003466.

Full text
Abstract:
Current infrastructures for Volunteer Computing follow a centralized architecture for data distribution, creating a potential bottleneck when tasks require large input files or the central server has limited bandwidth. In this paper we propose two new data models for Berkeley Open Infrastructure for Network Computing (BOINC): an approach based on the popular BitTorrent protocol; and a Content Delivery Network approach. While the latter remains on a theoretical level, we developed a prototype that adds BitTorrent functionality for task distribution and conducted medium-scale tests of the environment. Our preliminary results indicate that the BitTorrent client had a negligible influence on the BOINC client's computation time. The BOINC server showed an unexpectedly low bandwidth output when seeding the file, as well as spikes on CPU usage. This paper discusses the tests that were performed, how they were evaluated, as well as some improvements that could be made in future research on both approaches.
APA, Harvard, Vancouver, ISO, and other styles
10

Dahlö, Martin, Frέdέric Haziza, Aleksi Kallio, Eija Korpelainen, Erik Bongcam-Rudloff, and Ola Spjuth. "Biolmg.org: A Catalog of Virtual Machine Images for the Life Sciences." Bioinformatics and Biology Insights 9 (January 2015): BBI.S28636. http://dx.doi.org/10.4137/bbi.s28636.

Full text
Abstract:
Virtualization is becoming increasingly important in bioscience, enabling assembly and provisioning of complete computer setups, including operating system, data, software, and services packaged as virtual machine images (VMIs). We present an open catalog of VMIs for the life sciences, where scientists can share information about images and optionally upload them to a server equipped with a large file system and fast Internet connection. Other scientists can then search for and download images that can be run on the local computer or in a cloud computing environment, providing easy access to bioinformatics environments. We also describe applications where VMIs aid life science research, including distributing tools and data, supporting reproducible analysis, and facilitating education. BioImg.org is freely available at: https://bioimg.org .
APA, Harvard, Vancouver, ISO, and other styles
11

Elangovan, Dinesh, and Ramesh Muthiya. "Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 895–905. http://dx.doi.org/10.34028/iajit/17/6/8.

Full text
Abstract:
Cloud computing is the method of employing a set-up of isolated servers to be hosted on the web to accumulate and supervise information instead of an area server or a private laptop. Storage of data in cloud sometimes creates security issues in the data stored so, security in provided for the stored cloud data. In order to provide secured cloud data transaction, our proposed method initially verifies the authentication of the user followed by splitting the information of the user using pattern-matching technique. The blowfish computation is used to encrypt the alienated data. After encryption, resorting to the selection of the optimal position of a data center by means of the cross grey wolf optimization and firefly technique is done. Finally, the encrypted data are stored at an optimal location in the cloud. Then the data split column wise and separated at an optimal location in the cloud, this method is highly secured since the user cannot retrieve the file without authentication verification
APA, Harvard, Vancouver, ISO, and other styles
12

PHANEENDRA, H. D., and M. S. SHIVAKUMAR. "TARGETED QUANTUM SEARCH: REDUCES THE TIME AND COST FOR SEARCHING FOR OBJECTS IN MULTIPLE-SERVER PEER-TO-PEER NETWORKS." International Journal of Quantum Information 07, no. 01 (February 2009): 413–25. http://dx.doi.org/10.1142/s021974990900458x.

Full text
Abstract:
In a number of Internet applications, we need to search for objects to download them. This includes peer-to-peer (P2P) file sharing, grid computing and content distribution networks. Here the single object will be searched for in multiple servers. There are many searching algorithms in existence today for this purpose based on the concept of classical physics and classical algorithms. The principles of quantum mechanics can be used to build and analyze a quantum computer and its algorithms. Quantum searching is such an algorithm. In this paper we are proposing a search method based on the quantum physics and quantum algorithms. Our method, the targeted quantum search is found to be more cost effective than any other classical searching algorithms like linear and two-way linear, simulated annealing, including broadcast based searching. Our targeted quantum search method is analyzed and simulated to show the best results.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Jinzhong, Zheng-Dong Ma, and Gregory M. Hulbert. "A Distributed Mechanical System Simulation Platform Based on a “Gluing Algorithm”." Journal of Computing and Information Science in Engineering 5, no. 1 (March 1, 2005): 71–76. http://dx.doi.org/10.1115/1.1846056.

Full text
Abstract:
Three key concepts are presented in this paper, which comprise the foundation of a distributed simulation platform for design and virtual prototyping of general mechanical systems that have their subsystems distributed amongst dispersed development units in multilayered supply chains. First, a general and efficient model description for simulation is defined using XML. Each model is described with an XML file and stored in model database. A complete model can then be assembled based on these model descriptions. Simulation of a model is started simply by sending the model description to a simulation server and running it through a web-based graphics user interface. Second, a new gluing algorithm, denoted as the T-T method, is developed, which enables distributed simulations (both the component models and simulation of the components) to be coupled while maintaining the independence of the separate component simulations. Third, a logical distributed simulation architecture is laid out that can be implemented with one of the existing technologies for distributed computing. Interfaces between different network components have been standardized to enable extensibility of the architecture. These concepts have been incorporated into a prototype web-based distributed simulation system that demonstrates the potential of the new techniques for solving real engineering design problems.
APA, Harvard, Vancouver, ISO, and other styles
14

Gao, Hongmin, Zhaofeng Ma, Shoushan Luo, Yanping Xu, and Zheng Wu. "BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control." Wireless Communications and Mobile Computing 2021 (February 19, 2021): 1–20. http://dx.doi.org/10.1155/2021/6658920.

Full text
Abstract:
Privacy protection and open sharing are the core of data governance in the AI-driven era. A common data-sharing management platform is indispensable in the existing data-sharing solutions, and users upload their data to the cloud server for storage and dissemination. However, from the moment users upload the data to the server, they will lose absolute ownership of their data, and security and privacy will become a critical issue. Although data encryption and access control are considered up-and-coming technologies in protecting personal data security on the cloud server, they alleviate this problem to a certain extent. However, it still depends too much on a third-party organization’s credibility, the Cloud Service Provider (CSP). In this paper, we combined blockchain, ciphertext-policy attribute-based encryption (CP-ABE), and InterPlanetary File System (IPFS) to address this problem to propose a blockchain-based security sharing scheme for personal data named BSSPD. In this user-centric scheme, the data owner encrypts the sharing data and stores it on IPFS, which maximizes the scheme’s decentralization. The address and the decryption key of the shared data will be encrypted with CP-ABE according to the specific access policy, and the data owner uses blockchain to publish his data-related information and distribute keys for data users. Only the data user whose attributes meet the access policy can download and decrypt the data. The data owner has fine-grained access control over his data, and BSSPD supports an attribute-level revocation of a specific data user without affecting others. To further protect the data user’s privacy, the ciphertext keyword search is used when retrieving data. We analyzed the security of the BBSPD and simulated our scheme on the EOS blockchain, which proved that our scheme is feasible. Meanwhile, we provided a thorough analysis of the storage and computing overhead, which proved that BSSPD has a good performance.
APA, Harvard, Vancouver, ISO, and other styles
15

Chang, Bao-Rong, Hsiu-Fen Tsai, Yun-Che Tsai, Chin-Fu Kuo, and Chi-Chung Chen. "Integration and optimization of multiple big data processing platforms." Engineering Computations 33, no. 6 (August 1, 2016): 1680–704. http://dx.doi.org/10.1108/ec-08-2015-0247.

Full text
Abstract:
Purpose – The purpose of this paper is to integrate and optimize a multiple big data processing platform with the features of high performance, high availability and high scalability in big data environment. Design/methodology/approach – First, the integration of Apache Hive, Cloudera Impala and BDAS Shark make the platform support SQL-like query. Next, users can access a single interface and select the best performance of big data warehouse platform automatically by the proposed optimizer. Finally, the distributed memory storage system Memcached incorporated into the distributed file system, Apache HDFS, is employed for fast caching query results. Therefore, if users query the same SQL command, the same result responds rapidly from the cache system instead of suffering the repeated searches in a big data warehouse and taking a longer time to retrieve. Findings – As a result the proposed approach significantly improves the overall performance and dramatically reduces the search time as querying a database, especially applying for the high-repeatable SQL commands under multi-user mode. Research limitations/implications – Currently, Shark’s latest stable version 0.9.1 does not support the latest versions of Spark and Hive. In addition, this series of software only supports Oracle JDK7. Using Oracle JDK8 or Open JDK will cause serious errors, and some software will be unable to run. Practical implications – The problem with this system is that some blocks are missing when too many blocks are stored in one result (about 100,000 records). Another problem is that the sequential writing into In-memory cache wastes time. Originality/value – When the remaining memory capacity is 2 GB or less on each server, Impala and Shark will have a lot of page swapping, causing extremely low performance. When the data scale is larger, it may cause the JVM I/O exception and make the program crash. However, when the remaining memory capacity is sufficient, Shark is faster than Hive and Impala. Impala’s consumption of memory resources is between those of Shark and Hive. This amount of remaining memory is sufficient for Impala’s maximum performance. In this study, each server allocates 20 GB of memory for cluster computing and sets the amount of remaining memory as Level 1: 3 percent (0.6 GB), Level 2: 15 percent (3 GB) and Level 3: 75 percent (15 GB) as the critical points. The program automatically selects Hive when memory is less than 15 percent, Impala at 15 to 75 percent and Shark at more than 75 percent.
APA, Harvard, Vancouver, ISO, and other styles
16

Romadhon, Febri, Toibah Umi Kalsum, and Eko Prasetyo Rohmawan. "PEMANFAATAN SAMBA SERVER DALAM PERTUKARAN DATA BERBASIS CLIENT SERVER." GATOTKACA Journal (Teknik Sipil, Informatika, Mesin dan Arsitektur) 1, no. 1 (March 30, 2020). http://dx.doi.org/10.37638/gatotkaca.v1i1.77.

Full text
Abstract:
Junior High School 8 Lubuk Linggau is one of the schools located in Lubuk Linggau City in South Sumatra Province. It has already 30 computers in the Laboratory, but the computers are not connected to each other, so it is often difficult for the teachers who teach in sending files to all computers. The purpose of this research is to utilize Samba Server in Client Server-Based Data Exchange. The research method used is the Network Development Life Cycle (NDLC) method. The samba installation and configuration process is successful, and the client can access files that have been shared by the server. Network configuration for Laptop Server with IP Address 192.168.1.1, Laptop Clientwith IP Address 192.168.1.2 through 192.168.1.50. Base don the testing that has beendone, a computer that is used as a server often lags/error freezes, thus a server computer with more adequate specifications is needed. The suggestion from the researcher is tobe able to use a file sharing system using samba server, where the files that will be shared are on the file server.
APA, Harvard, Vancouver, ISO, and other styles
17

Rasyidah, Fifi. "MEMBANGUN SERVER BERBASIS LINUX PADA JARINGAN LAN DI LABOR SISTEM INFORMASI JURUSAN TEKNOLOGI INFORMASI POLITEKNIK NEGERI PADANG." MATICS 1, no. 1 (March 1, 2014). http://dx.doi.org/10.18860/mat.v1i1.2644.

Full text
Abstract:
<p>The System Information Laboratory of Information Technology Department Polytechnic State of Padang has 30 units computer as education facilities to support learning process. All of computers used at same time in a learning section. This case causing trouble to monitoring each students activities.</p> <p>In order to get the solution for the lecturer, the writer then construct a server by using Linux operation system and client by using windows system operation in which Samba File Server is needed. By using this samba, the lecturer will be able to share the data and will be able to use the server as data storage media. Besides that, the writer will also use VNC (Virtual network connection) to simplify the process of monitoring and supervising client working system. Based on the result gotten after the writer done some experiment, it can be concluded that Samba File Server can also be used after some configuration is applied on certain files. Moreover, the writer also conclude that VNC can control the entire of the client. The writer suggests that Samba File server which will be used is the latest version one which has more feature than the previous one, it is suggested that the configuration of VNC is applied on Ubuntu Linux since the service is available.<strong> </strong><strong></strong></p> <strong><em>Kata Kunci</em></strong><em> : Samba File Server, VNC, Ubuntu installation</em>
APA, Harvard, Vancouver, ISO, and other styles
18

Wintolo, Hero, and Lalu Septian Dwi Paradita. "LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID." Compiler 4, no. 2 (November 1, 2015). http://dx.doi.org/10.28989/compiler.v4i2.91.

Full text
Abstract:
Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
APA, Harvard, Vancouver, ISO, and other styles
19

Veluppillai, Tevaganthan, Brandon Ortiz, and Robert E. Hiromoto. "BIG DATA TRANSFER FOR TABLET-CLASS MACHINES." International Journal of Computing, August 1, 2014, 316–23. http://dx.doi.org/10.47839/ijc.12.4.611.

Full text
Abstract:
Several well-known data transfer protocols are presented in a comparative study to address the issue of big data transfer for tablet-class machines. The data transfer protocols include standard Java and C++, and block-data transfers protocols that use both the Java New IO (NIO) and the Zerocopy libraries, and a block-data C++ transfer protocol. Several experiments are described and results compared against the standard Java IO and C++ (stream-based file transport protocols). The motivation for this study is the development of a client/server big data file transport protocol for tablet-class client machines that rely on the Java Remote Method Invocation (RMI) package for distributed computing.
APA, Harvard, Vancouver, ISO, and other styles
20

Mitra, Anirban, and Ramanuja Nayak. "Studying Security Issues in HPC (Super Computer) Environment." International Journal of Computer and Communication Technology, July 2012, 164–67. http://dx.doi.org/10.47893/ijcct.2012.1134.

Full text
Abstract:
HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular location and connected with the Internet can reduce the installation of computational power and making it centralise. However, centralise system has some advantages and disadvantages over the distributed system, but we avoid discussing those issues and focusing more on the HPC systems. HPC can also be used to build web and file server and for applications of cloud computing. Due to cluster type architecture and high processing speed, we have experienced that it works far better and handles the loads in much more efficient manner then series of desktop with normal configuration connected together for application of cloud computing and network applications. In this paper we have discussed on issues re lated to security of data and information on the context of HPC. Data and information are vanurable to security and safety. It is the purpose of this paper to present some practical security issues related to High Performance Computing Environment. Based on our observation on security requirements of HPC we have discuss some existing security technologies used in HPC. When observed to various literatures, we found that the existing techniques are not enough. We have discussed, some of the key issues relating to this context. Lastly, we have made an approach to find an appropriate solution using Blowfish encryption and decryption algorithm. We hope that, with our proposed concepts, HPC applications to perform better and in safer way. At the end, we have proposed a modified blow fish algorithmic technique by attaching random number generator algorithm to make the encryption decryption technique more appropriate for our own HPC environment.
APA, Harvard, Vancouver, ISO, and other styles
21

"Ascendable and Protected Allocation of Personal Health Records in Cloud Computing Expending Multi Ability Attribute-Based Encryption." International Journal of Recent Technology and Engineering 8, no. 2S8 (September 17, 2019): 908–14. http://dx.doi.org/10.35940/ijrte.b1174.0882s819.

Full text
Abstract:
character fitness document (PHR) is stored up within the integrated server to keep up the affected person's near domestic andPHR administrations are redistributed to outsider professional co-ops. The essential trouble is prepared analysis information. The affected individual facts ought to be whether the patients must actually manipulate the imparting saved up to immoderate protection and security. the safety plans are carried out to shield the character information from unfastened. Tolerant records can be gotten to through diverse human beings. each expert is alloted with get right of entry to consent for a specific association of residences. the doorway manage and safety the board is an unpredictable project in the affected character well-being record the executives approach. allotted computing is a conversational articulation used to painting a large kind of types of registering thoughts that encompass infinite desktops which may be associated via a continuous correspondence organize. it's miles an equal word for disseminated processing over a tool and manner the capacity to run a software program on many associated computer systems concurrently. statistics proprietors replace the person facts into outsider cloud server farms. The story know-how driven machine and a set of facts get to components to manipulate PHRs placed away in semi-confided in servers. to perform outstanding-grained and flexible statistics get access to control for PHRs, we effect function based absolutely Encryption (ABE) structures to scramble every affected man or woman's PHR file. severa information proprietors can get to similar statistics esteems. The proposed plan may be reached out to Multi Authority feature primarily based Encryption (MA-ABE) for numerous expert primarily based get right of entry to manipulate mechanism.current years distributed computing actions toward turning into animportant worldview within the IT agency. extra undertakings desires to make use of allocated computing techniques for their groups, so distributed computing has become a giant studies place. In allotted computing cloud expert co-ops and customers are from various trust areas so records protection and protection are the sizable and primary troubles for far flung facts stockpiling. A blanketed patron compelled statistics get right of entry to manipulate system need to take delivery of earlier than cloud clients have the freedom to redistribute sensitive information to the cloud for capability. in this paper we have examined various get admission to control component for cloud protection
APA, Harvard, Vancouver, ISO, and other styles
22

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography