|
|
|
|
What Is Virtual Reality
... generating visual, auditory
or other sensual outputs to the user of a world within the computer. This
world may be a CAD model, a scientific simulation, or a view into a
database. The user can interact with the world and directly manipulate
objects within the world. Some worlds are animated by other processes,
perhaps physical simulations, or simple animation scripts. Interaction with
the virtual world, at least with near real time control of the viewpoint,
in my opinion, is a critical test for a 'virtual reality'.
Some people object to the term "Virtual Reality", saying it is an oxymoron.
Other terms that have been used are Synthetic Environments, Cyberspace, ...
|
Freedom Of Speech & Censorship On The Internet
... on their home page that there may be pornographic material on the Internet. Pornographic material is not the only material to be found on the net which can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of the Internet. The question of censorship may also be raised in some unexpected places: one newsgroup is the rec.humor list, which is a collection of jokes submitted to subscribers. There are straightforwardly rude jokes but others are politically incorrect, focusing on sexual stereotypes, mothers-in-law, women and so on. It h ...
|
Development Of The Submarine
... capability to level entire countries. However,
after a series of innovations in nuclear missile and submarine designs, the
submarine-launched ballistic missile has become an integral part of our naval
weapons arsenal.
To understand the need for the development of nuclear missile submarines,
there is a need to examine the political climate of the world in the era after
World War II. The realignment of the superpowers after the war resulted in a
unique situation. The two major naval powers of the day, Great Britain and the
United States, were now allied against the greatest land power in history in the
Soviet Union. In the period from 1955 to 1965, the advantage ...
|
Linux Operating System
... so they can run Linux on their computers (Windows can only run on Intel Based PCs). Because of this Linux has the potential to be more attractive to a larger number of users and a larger variety of users. (Linux.com)
Linux has a powerful security system. It is almost impossible to write a virus for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill c ...
|
Superconductors
... all changed in 1986 when Karl Muller and George Bednorz were working at the IBM Research Division in Zurich, Switzerland. They found a material that reached superconductivity at around 35 degrees Kelvin or –238 degrees Celsius. In the next year, a team of Chinese-American physicists declared that they had found a material that reached superconductivity at 92 degrees Kelvin. This was a big improvement. 92 degrees Kelvin is not a very high temperature, in fact, it is the equivalent of –181 degrees Celsius. Locating superconducting material above 77 degree Kelvin is a good thing because it means that the material will be easily produced and used. A theoretical unde ...
|
The Bulgarian And Soviet Virus Factories
... za vas" ("Computer for you") [KV88] in a paper, translated from
the German magazine "Chip" [Chip]. Soon after that, the same Bulgarian
magazine published an article [KV89]], explaining why computer viruses
cannot be dangerous. The arguments presented were, in general, correct, but
the author had completely missed the fact that the majority of PC users are
not experienced programmers.
A few months later, in the fall of the same year, two men came in the
editor's office of the magazine and claimed that they have found a computer
virus. Careful examination showed that it was the VIENNA virus.
At that time the computer virus was a completely new idea fo ...
|
Internet And Censorship
... activists for censorship of the Internet mainly have one thing on their minds. They want to protect children from pornography. Although I view this as a big concern, there is a greater issue at hand. Since censorship encompasses all forms of expression, censoring the Internet would hurt many people. Since the Internet is an international community, we must view it as pertaining to other countries; not just the United States. Not all countries have the privilege of living in a democracy and under the Bill of Rights. As a result, the Internet as brought newfound freedom to most people who are oppressed by tyrannical governments, or those that disagree with gov ...
|
“Sin In The Global Village”: Privacy In Cyberspace
... user gets access to the private preferences and thoughts of the public. Wright suggests that people should be careful when publishing a Web page containing personal thoughts because anyone with Web-authoring software can easily trace the URL (electronic address) back to its origin. In short, people’s visions about a totally anonymous Internet are false because of the electronic trail that is left for others to find.
Linda Tripp, who taped her conversations with the former White House intern Monica Lewinsky, exposed President Clinton’s recent oral sex scandal by means of surveillance. Wright is suggesting that this could happen to anyone. Computer surveillance isn’t ...
|
Identity Theft
... can fall victem to a ghost. Nobody is really truely
safe because our personal information is distrubted like candy on halloween. We
use our social security numbers as identification numbers Credit card numbers
are printed on every receipt. And our liscense number is used on a daily basis.
Despite this there are ways to prevent yourself from falling victem to identity
theft. you see a criminal likes easy prey. They don't want to have to work for
it. It's like locking your car at the mall, sure someone might break in anyway,
but chance are if your doors are lock the will probably move on to another car.
First off... Never give your credit card number online ou ...
|
Internet Regulation: Policing Cyberspace
... and operated by the government, which gives them the
obligation to restrict the materials available through it. Though it
appears to have sprung up overnight, the inspiration of free-spirited
hackers, it in fact was born in Defense Department Cold War projects of the
1950s.2 The United States Government owns the Internet and has the
responsibility to determine who uses it and how it is used. The government
must control what information is accessible from its agencies.
This material is not lawfully available through the mail or over the
telephone, there is no valid reason these perverts should be allowed
unimpeded on the Internet. Since our initiative, the ind ...
|
Browse:
« prev
58
59
60
61
62
more »
|
|
|