Search (377 results, page 1 of 19)

  • × type_ss:"m"
  1. Reischl, G.: ¬Die Google-Falle : die unkontrollierte Weltmacht im Internet (2008) 0.08
    0.07501865 = product of:
      0.18754663 = sum of:
        0.14630544 = weight(_text_:mail in 2616) [ClassicSimilarity], result of:
          0.14630544 = score(doc=2616,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.5199642 = fieldWeight in 2616, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=2616)
        0.041241184 = weight(_text_:22 in 2616) [ClassicSimilarity], result of:
          0.041241184 = score(doc=2616,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.23214069 = fieldWeight in 2616, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.046875 = fieldNorm(doc=2616)
      0.4 = coord(2/5)
    
    Abstract
    Mit der Suchmaschine Google, den Satelitenkarten auf Google Maps, mit der Volltextsuche in Google Books, mit dem Bildprogramm Picasa, dem Mail-Programm Google Mail, Google Docs und vielen weiteren Services entwickelt sich die Firma von Larry Page und Sergej Brin zur unkontrollierten Weltmacht im Internet: Immer mehr Firmen entwickeln Dienste und Geräte, die ausschließlich auf Google abgestimmt sind. Praktisch zählt nur mehr das Wissen, das man über Google findet. Diese Monopolstellung ist für eine Wissensgesellschaft gefährlich. Sie erleichtert die politische Zensur, wie sie bei Google in China stattfindet, und sie erleichtert das Ausspionieren unserer Privatsphäre. Denn jede Suchanfrage bleibt bei Google über Jahre gespeichert: In den USA wird derzeit eine Frau des Mordes an ihrem Mann verdächtigt, weil sie einmal in Google den Suchbegriff "murder" eingetippt hat.
    Date
    7. 4.2008 21:22:57
  2. Gödert, W.; Lepsky, K.: Informationelle Kompetenz : ein humanistischer Entwurf (2019) 0.06
    0.056403484 = product of:
      0.2820174 = sum of:
        0.2820174 = weight(_text_:3a in 5955) [ClassicSimilarity], result of:
          0.2820174 = score(doc=5955,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.65568775 = fieldWeight in 5955, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.0546875 = fieldNorm(doc=5955)
      0.2 = coord(1/5)
    
    Footnote
    Rez. in: Philosophisch-ethische Rezensionen vom 09.11.2019 (Jürgen Czogalla), Unter: https://philosophisch-ethische-rezensionen.de/rezension/Goedert1.html. In: B.I.T. online 23(2020) H.3, S.345-347 (W. Sühl-Strohmenger) [Unter: https%3A%2F%2Fwww.b-i-t-online.de%2Fheft%2F2020-03-rezensionen.pdf&usg=AOvVaw0iY3f_zNcvEjeZ6inHVnOK]. In: Open Password Nr. 805 vom 14.08.2020 (H.-C. Hobohm) [Unter: https://www.password-online.de/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzE0MywiOGI3NjZkZmNkZjQ1IiwwLDAsMTMxLDFd].
  3. Langham, M.: E-Mail und News : weltweite Kommunikation über UUCP, Internet and andere Computernetzwerke (1994) 0.06
    0.055175234 = product of:
      0.27587616 = sum of:
        0.27587616 = weight(_text_:mail in 8609) [ClassicSimilarity], result of:
          0.27587616 = score(doc=8609,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.98045385 = fieldWeight in 8609, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.125 = fieldNorm(doc=8609)
      0.2 = coord(1/5)
    
  4. Conner-Sax, K.; Krol, E.: ¬The whole Internet : the next generation (1999) 0.05
    0.050012436 = product of:
      0.12503108 = sum of:
        0.09753695 = weight(_text_:mail in 1448) [ClassicSimilarity], result of:
          0.09753695 = score(doc=1448,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.3466428 = fieldWeight in 1448, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.03125 = fieldNorm(doc=1448)
        0.027494125 = weight(_text_:22 in 1448) [ClassicSimilarity], result of:
          0.027494125 = score(doc=1448,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.15476047 = fieldWeight in 1448, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.03125 = fieldNorm(doc=1448)
      0.4 = coord(2/5)
    
    Abstract
    For a snapshot of something that is mutating as quickly as the Internet, The Whole Internet: The Next Generation exhibits remarkable comprehensiveness and accuracy. It's a good panoramic shot of Web sites, Usenet newsgroups, e-mail, mailing lists, chat software, electronic commerce, and the communities that have begun to emerge around all of these. This is the book to buy if you have a handle on certain aspects of the Internet experience--e-mail and Web surfing, for example--but want to learn what else the global network has to offer--say, Web banking or mailing-list management. The authors clearly have seen a thing or two online and are able to share their experiences entertainingly and with clarity. However, they commit the mistake of misidentifying an Amazon.com book review as a publisher's synopsis of a book. Aside from that transgression, The Whole Internet presents detailed information on much of the Internet. In most cases, coverage explains what something (online stock trading, free homepage sites, whatever) is all about and then provides you with enough how-to information to let you start exploring on your own. Coverage ranges from the super-basic (how to surf) to the fairly complex (sharing an Internet connection among several home computers on a network). Along the way, readers get insight into buying, selling, meeting, relating, and doing most everything else on the Internet. While other books explain the first steps into the Internet community with more graphics, this one will remain useful to the newcomer long after he or she has become comfortable using the Internet.
    Footnote
    Rez. in: Internet Professionell. 2000, H.2, S.22
  5. Computervernetzung für Frauen : E-Mail, Internet und alles andere. Ein Handbuch für Einsteigerinnen (1995) 0.05
    0.048278328 = product of:
      0.24139163 = sum of:
        0.24139163 = weight(_text_:mail in 3232) [ClassicSimilarity], result of:
          0.24139163 = score(doc=3232,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.8578971 = fieldWeight in 3232, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.109375 = fieldNorm(doc=3232)
      0.2 = coord(1/5)
    
  6. Internet : Eine Einführung in die Nutzung der Internet-Dienste (2000) 0.04
    0.041381422 = product of:
      0.20690711 = sum of:
        0.20690711 = weight(_text_:mail in 3161) [ClassicSimilarity], result of:
          0.20690711 = score(doc=3161,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.73534036 = fieldWeight in 3161, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.09375 = fieldNorm(doc=3161)
      0.2 = coord(1/5)
    
    Content
    WWW - E-Mail - News - FTP - Telnet
  7. Information ethics : privacy, property, and power (2005) 0.04
    0.039585114 = product of:
      0.098962784 = sum of:
        0.07466118 = weight(_text_:mail in 2392) [ClassicSimilarity], result of:
          0.07466118 = score(doc=2392,freq=6.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.26534313 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.024301602 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
          0.024301602 = score(doc=2392,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.13679022 = fieldWeight in 2392, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
      0.4 = coord(2/5)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  8. E-Text : Strategien und Kompetenzen. Elektronische Kommunikation in Wissenschaft, Bildung und Beruf (2001) 0.04
    0.038585268 = product of:
      0.096463166 = sum of:
        0.06896904 = weight(_text_:mail in 622) [ClassicSimilarity], result of:
          0.06896904 = score(doc=622,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.24511346 = fieldWeight in 622, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.03125 = fieldNorm(doc=622)
        0.027494125 = weight(_text_:22 in 622) [ClassicSimilarity], result of:
          0.027494125 = score(doc=622,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.15476047 = fieldWeight in 622, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.03125 = fieldNorm(doc=622)
      0.4 = coord(2/5)
    
    Content
    Aus dem Inhalt: Peter Handler: Das E zum Text. Einführung - Eva-Maria Jakobs: Textproduktion im 21. Jahrhundert - Christoph Sauer: Vom «Alten» im «Neuen». Zur Bestimmung der Integration früherer Medienentwicklungen in multimediale Textgestaltungen - Eva Martha Eckkrammer: Textsortenkonventionen im Medienwechsel - Guido Ipsen: Pragmatik des Hypertextes. Linguistische Aspekte WWW-gebundener Informationsmedien als designtechnisches Instrument - Rolf Todesco: MailTack - Individuelles Wissensmanagement - Carsten Hausdorf/Herbert Stoyan: ScientiFix - ein modellbasiertes Werkzeug zur integrierten Rezeption und Produktion wissenschaftlicher Texte - Dagmar Knorr: Von der Dissertationsschrift zur Publikation oder: Wie wird aus einem Manuskript ein Buch? -Jörg Zumbach/Peter Reimann: Hypermediales Lernen und Kognition. Anforderungen an Lernende und Gestaltende - Bernd Gaede: Konventionalisierung der Gestaltung multimedialer Software durch Automatisierung. Ein Produktionssystem für interaktive Lernsoftware - Helmut Felix Friedrich/Aemilian Hron/Sigmar-Olaf Tergan/Thomas Jechle: Unterstützung kooperativen Schreibens in virtuellen Lernumgebungen - Katrin Lehnen/Kirsten Schindler: Schreiben zwischen Studium und Beruf. Zur didaktischen Vermittlung domänetispezifischer Schreibanforderungen in der Hochschulausbildung - Daniel Perrin: «Wir tun uns hier mal um den Inhalt herummogeln». Strategien computergestützter Textreproduktion beim Nachrichtenschreiben - Horst Silberhom: Das Projekt ForeignSGML. Übersetzungsunterstützung bei technischer Dokumentation - Karl-Heinz Pogner/Anne-Marie Soderberg: Organisationsinterne `E-Mail an alle'-Kommunikation: Informationsübertragung oder Kommunikationsraum? - Marc Rittberger/Frank Zimmermann: Wirtschaftliche und kommunikative Aspekte eines internen Kommunikationsforums in einem Unternehmen der Medienindustrie - Rogier Crijns: Elemente textuellen Appellierens in der digitalen Produktwerbung. Textgestaltung und kulturspezifische Appellformen in Webvertising.
    Date
    12. 8.2012 18:05:22
  9. Clausen, H.: Electronic mail and the information professional : a study of computer-mediated communication and its future prospects in the information field (1993) 0.03
    0.03448452 = product of:
      0.1724226 = sum of:
        0.1724226 = weight(_text_:mail in 7531) [ClassicSimilarity], result of:
          0.1724226 = score(doc=7531,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.6127837 = fieldWeight in 7531, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.078125 = fieldNorm(doc=7531)
      0.2 = coord(1/5)
    
  10. Stolpmann, M.: Internet & WWW für Studenten : WWW, FTP, E-Mail und andere Dienste (1997) 0.03
    0.03448452 = product of:
      0.1724226 = sum of:
        0.1724226 = weight(_text_:mail in 3438) [ClassicSimilarity], result of:
          0.1724226 = score(doc=3438,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.6127837 = fieldWeight in 3438, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.078125 = fieldNorm(doc=3438)
      0.2 = coord(1/5)
    
  11. "Was für ein Service!" : Entwicklung und Sicherung der Auskunftsqualität von Bibliotheken (2007) 0.03
    0.03376211 = product of:
      0.084405266 = sum of:
        0.060347907 = weight(_text_:mail in 1426) [ClassicSimilarity], result of:
          0.060347907 = score(doc=1426,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.21447428 = fieldWeight in 1426, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.02734375 = fieldNorm(doc=1426)
        0.024057359 = weight(_text_:22 in 1426) [ClassicSimilarity], result of:
          0.024057359 = score(doc=1426,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.1354154 = fieldWeight in 1426, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.02734375 = fieldNorm(doc=1426)
      0.4 = coord(2/5)
    
    Abstract
    Von der Suche über das Finden zum Wissen - Routine in wohl jeder Bibliothek. Die zielgerichtete Suche im Auftrag des Kunden bildet den roten Faden des vorliegenden Themenheftes, das ausgewählte Beiträge aus Theorie und Praxis beinhaltet. Die ersten beiden Abhandlungen setzen sich grundlegend mit dem Auskunftsdienst in Bibliotheken auseinander. Während Tom Becker (Münchner Stadtbibliothek Am Gasteig) eine Standortbestimmung der Face-to-Face-Interaktion im Auskunftsdienst vornimmt, setzt sich Ursula Georgy (Fachhochschule Köln) mit den Chancen auseinander, die der Auskunftsdienst als Bestandteil eines bibliotheksweiten Total-Quality- und Service-Quality-Ansatzes einnehmen kann. Einführend wird so verdeutlicht, dass Bibliotheken über eine hohe Informationskompetenz im Auskunftsdienst verfügen, diese aber sowohl als Serviceprodukt wie auch als Marketingobjekt ständiger Optimierung unterwerfen müssen. Im Weiteren werden Rahmenbedingungen für diese qualitativ hochwertige Dienstleistung näher betrachtet. Jutta Zimmermann (Stadtbibliothek Reutlingen) beschreibt theoretische Grundlagen und Entwicklungsschritte von Auskunftsdienstkonzepten und die praktischen Erfahrungen, die die Stadtbibliothek Reutlingen in der bisherigen Umsetzung gemacht hat. Das Auskunftsinterview als das zentrale Instrument zur Klärung des realen Informationsbedarfes des Kunden erläutert. Hermann Rösch (Fachhochschule Köln). Ziele, Verlauf, Methoden und Techniken des Auskunftsinterviews werden behandelt und ein besonderes Augenmerk gilt den Spezifika, die im digitalen Umfeld durch Auskunft per E-Mail, Webformular oder Chat bestehen. Katharina Schaal (starkewortarbeit Stuttgart) greift den Themenkomplex Stressbewältigung und Motivation im Auskunftsdienst auf und stellt - basierend auf Fallbeispielen aus dem Alltag - Handlungsanleitungen für ein gelassenes Agieren an der Infotheke vor. Vor allem digitale Ressourcen für den Auskunftsdienst stellt Frank Daniel (Stadtbibliothek Köln) in den Fokus seines Beitrags und beleuchtet die Wechselbeziehung eines sich ändernden Nutzerverhaltens mit einem komplexer und spezifischer werdenden Informationsmarkt bezogen auf den Auskunftsdienst von Bibliotheken. Qualitätsstandards im Auskunftsdienst von Bibliotheken bilden den abschließenden Themenkomplex. Ingeborg Simon (HdM Stuttgart) kommentiert und übersetzt die 'Guidelines for Behavioral Perfomances of Reference and Information Service Providers' der American Library Association und unterstreicht den Stellenwert solcher Guidelines als Instrument kontinuierlicher Qualitätsverbesserung. Der Artikel von Cornelia Vonhof (HdM Stuttgart) untersucht die Einführung von Auskunftsstandards als Change-Management-Prozess und beschreibt unter diesem Blickwinkel Möglichkeiten zum Umgang mit Widerständen, Erfolgsfaktoren in sowie Möglichkeiten der Stabilisierung von Veränderungsprozessen. Das praktische Beispiel einer qualitativen Untersuchung des Auskunftsdienstes liefert Carmen Barz (Münchner Stadtbibliothek Am Gasteig): Studierende begaben sich "inkognito" in eine Auskunftssituation, um Stärken und Schwächen dieser Dienstleistung in der Münchener Zentralbibliothek festzuhalten. In dem Artikel werden die Methode, die Ergebnisse der Studie und die daraus abgeleiteten Maßnahmen vorgestellt. Daran anknüpfend stellen Tom Becker und Hanne Riehm (beide Münchner Stadtbibliothek Am Gasteig) den Weg von eben dieser Evaluation hin zu der Definition eines Katalogs von Standards und dazugehörigen Verhaltensweisen unter aktiver Einbindung aller dortigen Mitarbeiter vor. Die erarbeiteten Qualitätsstandards und Verhaltensweisen werden anschließend aufgeführt. Die Stadtbücherei Stuttgart hinterfragt das vorhandene Servicelevel im Auskunftsdienst und entwickelt aufbauend auf vorhandenen Bausteinen eine systemweit einheitliche Auskunfts-Konzeption. Warum die stetig steigenden und sehr differenzierten Anforderungen seitens der Kunden durch klar formulierte Qualitätsstandards besser kanalisiert und bewältigt werden können, berichtet Katinka Emminger (Stadtbücherei Stuttgart).
    Date
    22. 2.2008 14:05:48
  12. Hajer, H.; Kolbeck, R.: Internet : der schnelle Start ins weltweit größte Rechnernetz (1994) 0.03
    0.029261088 = product of:
      0.14630544 = sum of:
        0.14630544 = weight(_text_:mail in 1539) [ClassicSimilarity], result of:
          0.14630544 = score(doc=1539,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.5199642 = fieldWeight in 1539, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=1539)
      0.2 = coord(1/5)
    
    RSWK
    Internet / DFÜ / Datenfernübertragung / Usenet / E-Mail (ÖVK)
    Subject
    Internet / DFÜ / Datenfernübertragung / Usenet / E-Mail (ÖVK)
  13. Olsen, K.A.: ¬The Internet, the Web, and eBusiness : formalizing applications for the real world (2005) 0.03
    0.029031634 = product of:
      0.072579086 = sum of:
        0.048768476 = weight(_text_:mail in 149) [ClassicSimilarity], result of:
          0.048768476 = score(doc=149,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.1733214 = fieldWeight in 149, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
        0.02381061 = weight(_text_:22 in 149) [ClassicSimilarity], result of:
          0.02381061 = score(doc=149,freq=6.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.1340265 = fieldWeight in 149, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
      0.4 = coord(2/5)
    
    Classification
    004.678 22
    DDC
    004.678 22
    Footnote
    Each chapter provides suggestions for exercises and discussions, which makes the book useful as a textbook. The suggestions in the exercise and discussion section at the end of each chapter are simply delightful to read and provide a basis for some lively discussion and fun exercises by students. These exercises appear to be well thought out and are intended to highlight the content of the chapter. The notes at the end of chapters provide valuable data that help the reader to understand a topic or a reference to an entity that the reader may not know. Chapter 1 on "formalism," chapter 2 on "symbolic data," chapter 3 on "constraints on technology," and chapter 4 on "cultural constraints" are extremely well presented and every reader needs to read these chapters because they lay the foundation for most of the chapters that follow. The analogies, examples, and points of view presented make for some really interesting reading and lively debate and discussion. These chapters comprise Part 1 of the book and not only provide a foundation for the rest of the book but could be used alone as the basis of a social science course on computing, networking, and the Web. Chapters 5 and 6 on Internet protocols and the development of Web protocols may be more detailed and filled with more acronyms than the average person wants to deal with but content is presented with analogies and examples that make it easier to digest. Chapter 7 will capture most readers attention because it discusses how e-mail works and many of the issues with e-mail, which a majority of people in developed countries have dealt with. Chapter 8 is also one that most people will be interested in reading because it shows how Internet browsers work and the many issues such as security associated with these software entities. Chapter 9 discusses the what, why, and how of the World Wide Web, which is a lead-in to chapter 10 on "Searching the Web" and chapter 11 on "Organizing the Web-Portals," which are two chapters that even technically oriented people should read since it provides information that most people outside of information and library science are not likely to know.
    Chapter 12 on "Web Presence" is a useful discussion of what it means to have a Web site that is indexed by a spider from a major Web search engine. Chapter 13 on "Mobile Computing" is very well done and gives the reader a solid basis of what is involved with mobile computing without overwhelming them with technical details. Chapter 14 discusses the difference between pull technologies and push technologies using the Web that is understandable to almost anyone who has ever used the Web. Chapters 15, 16, and 17 are for the technically stout at heart; they cover "Dynamic Web Pages," " Embedded Scripts," and "Peer-to-Peer Computing." These three chapters will tend to dampen the spirits of anyone who does not come from a technical background. Chapter 18 on "Symbolic Services-Information Providers" and chapter 19 on "OnLine Symbolic Services-Case Studies" are ideal for class discussion and students assignments as is chapter 20, "Online Retail Shopping-Physical Items." Chapter 21 presents a number of case studies on the "Technical Constraints" discussed in chapter 3 and chapter 22 presents case studies on the "Cultural Constraints" discussed in chapter 4. These case studies are not only presented in an interesting manner they focus on situations that most Web users have encountered but never really given much thought to. Chapter 24 "A Better Model?" discusses a combined "formalized/unformalized" model that might make Web applications such as banking and booking travel work better than the current models. This chapter will cause readers to think about the role of formalization and the unformalized processes that are involved in any application. Chapters 24, 25, 26, and 27 which discuss the role of "Data Exchange," "Formalized Data Exchange," "Electronic Data Interchange-EDI," and "XML" in business-to-business applications on the Web may stress the limits of the nontechnically oriented reader even though it is presented in a very understandable manner. Chapters 28, 29, 30, and 31 discuss Web services, the automated value chain, electronic market places, and outsourcing, which are of high interest to business students, businessmen, and designers of Web applications and can be skimmed by others who want to understand ebusiness but are not interested in the details. In Part 5, the chapters 32, 33, and 34 on "Interfacing with the Web of the Future," "A Disruptive Technology," "Virtual Businesses," and "Semantic Web," were, for me, who teaches courses in IT and develops ebusiness applications the most interesting chapters in the book because they provided some useful insights about what is likely to happen in the future. The summary in part 6 of the book is quite well done and I wish I had read it before I started reading the other parts of the book.
  14. Veljkov, M.; Hartnell, G.: Pocket guides to the Internet : Vol.1: Telnetting; vol.2: Transferring files with File Transfer Protocol (FTP); vol.3: Using and navigating Usenet; vol.4: The Internet E-Mail system; vol.5: Basic Internet utilities; vol.6: Terminal connections (1994) 0.03
    0.027587617 = product of:
      0.13793808 = sum of:
        0.13793808 = weight(_text_:mail in 8680) [ClassicSimilarity], result of:
          0.13793808 = score(doc=8680,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.49022692 = fieldWeight in 8680, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0625 = fieldNorm(doc=8680)
      0.2 = coord(1/5)
    
  15. Levine, J.R.: Internet für Dummies : gegen den täglichen Frust mit dem Internet (1998) 0.03
    0.027587617 = product of:
      0.13793808 = sum of:
        0.13793808 = weight(_text_:mail in 1603) [ClassicSimilarity], result of:
          0.13793808 = score(doc=1603,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.49022692 = fieldWeight in 1603, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0625 = fieldNorm(doc=1603)
      0.2 = coord(1/5)
    
    Abstract
    Einführung in die Internet-Grundlagen. Beschreibt sowohl den Anschluß über Online-Dienste als auch über ISPs, hilft bei deren Auswahl und erklärt die Unterschiede. Websurfen, Browser, E-Mail, Suche, Chat mit und ohne IRC, FTP und die Erstellung der eigenen Homepage - hier findet sich kurz, anschaulich und praxisnah alles, was der Internet-Einsteiger wissen möchte, ohne daß er mit zuviel Technikhintergrund gelangweilt wird. Sogar PPP und UNIX-Shell-Accounts inklusive Benutzung mit Lynx werden behandelt
  16. Lambert, S.: Internet basics : your online access to the global electronic super highway (1993) 0.03
    0.027587617 = product of:
      0.13793808 = sum of:
        0.13793808 = weight(_text_:mail in 6133) [ClassicSimilarity], result of:
          0.13793808 = score(doc=6133,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.49022692 = fieldWeight in 6133, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0625 = fieldNorm(doc=6133)
      0.2 = coord(1/5)
    
    Abstract
    A step-by-step guide to the most popular Internet resources. Covers free access, e-mail, file transfers with FTP, Listserv and Usenet, discussion forums, and search utilities such as Telnet, Archie, Gopher, and Finger. Includes a glossary.
  17. Schindler, W.; Bader, R.; Eckmann, B.: Bildung in virtuellen Welten : Praxis und Theorie außerschulischer Arbeit mit Internet und Computer (2001) 0.03
    0.027587617 = product of:
      0.13793808 = sum of:
        0.13793808 = weight(_text_:mail in 6743) [ClassicSimilarity], result of:
          0.13793808 = score(doc=6743,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.49022692 = fieldWeight in 6743, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0625 = fieldNorm(doc=6743)
      0.2 = coord(1/5)
    
    Content
    In T.1. werden Erfahrungen aus der konkreten Projektarbeit mit Jugendlichen gebündelt, z.B. "Lernen durch Produzieren" von E-Mail Planspielen, CD-ROMs & Co, etc. T.2 enthält Theorieelemente, die den Einfluss des Umgangs mit digitalen Medien auf die Lebenswirklichkeit klären. In T.3 klären konzeptionelle Bausteine den Konnex von Theorie und Praxis. T.4 rundet das Buch durch praktische Bausteine aus der Computer-Medienpädagogik ab
  18. Panizzi, A.K.C.B.: Passages in my official life (1871) 0.03
    0.027217796 = product of:
      0.13608898 = sum of:
        0.13608898 = weight(_text_:22 in 935) [ClassicSimilarity], result of:
          0.13608898 = score(doc=935,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.76602525 = fieldWeight in 935, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.109375 = fieldNorm(doc=935)
      0.2 = coord(1/5)
    
    Date
    22. 7.2007 12:05:26
    22. 7.2007 12:08:24
  19. Advances in librarianship (1998) 0.03
    0.027217796 = product of:
      0.13608898 = sum of:
        0.13608898 = weight(_text_:22 in 4698) [ClassicSimilarity], result of:
          0.13608898 = score(doc=4698,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.76602525 = fieldWeight in 4698, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.109375 = fieldNorm(doc=4698)
      0.2 = coord(1/5)
    
    Issue
    Vol.22.
    Signature
    78 BAHH 1089-22
  20. Eddings, J.: How the Internet works (1994) 0.02
    0.024384238 = product of:
      0.12192119 = sum of:
        0.12192119 = weight(_text_:mail in 1514) [ClassicSimilarity], result of:
          0.12192119 = score(doc=1514,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.43330348 = fieldWeight in 1514, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1514)
      0.2 = coord(1/5)
    
    Abstract
    How the Internet Works promises "an exciting visual journey down the highways and byways of the Internet," and it delivers. The book's high quality graphics and simple, succinct text make it the ideal book for beginners; however it still has much to offer for Net vets. This book is jam- packed with cool ways to visualize how the Net works. The first section visually explores how TCP/IP, Winsock, and other Net connectivity mysteries work. This section also helps you understand how e-mail addresses and domains work, what file types mean, and how information travels across the Net. Part 2 unravels the Net's underlying architecture, including good information on how routers work and what is meant by client/server architecture. The third section covers your own connection to the Net through an Internet Service Provider (ISP), and how ISDN, cable modems, and Web TV work. Part 4 discusses e-mail, spam, newsgroups, Internet Relay Chat (IRC), and Net phone calls. In part 5, you'll find out how other Net tools, such as gopher, telnet, WAIS, and FTP, can enhance your Net experience. The sixth section takes on the World Wide Web, including everything from how HTML works to image maps and forms. Part 7 looks at other Web features such as push technology, Java, ActiveX, and CGI scripting, while part 8 deals with multimedia on the Net. Part 9 shows you what intranets are and covers groupware, and shopping and searching the Net. The book wraps up with part 10, a chapter on Net security that covers firewalls, viruses, cookies, and other Web tracking devices, plus cryptography and parental controls.

Languages

  • d 200
  • e 168
  • m 3
  • de 1
  • pl 1
  • More… Less…

Types

  • s 70
  • i 13
  • el 5
  • b 1
  • d 1
  • n 1
  • u 1
  • More… Less…

Themes

Subjects

Classifications