This class is a very basic internet class. In this class you will learn terms such as browser, URL, search engines, links, etc. After this class you will be able to open a browser, navigate to a website, and navigate within a website.
This class is a very basic internet class. In this class you will learn terms such as browser, URL, search engines, links, etc. After this class you will be able to open a browser, navigate to a website, and navigate within a website.
Introduction of internet.....
Basic internet terms....
Internet evolution and history......
1G...
2G...
3G...
4G...
Download and Upload...
ONLINE and OFFLINE
Web Server
ISP
URL
Website
Browser
Web page
Hypertext
PRESENTATION
BEST OF LUCK
Networks are collections of computers, software, and hardware that are all connected to help their users work together.
A network enables users to share files and resources, such as printers, as well as send messages electronically (e-mail) to each other.
Computer networks fall into two main types: client/server networks and peer-to-peer networks.
For More Information:Dr. Jayarama Reddy, Professor, St. Joseph's College (Autonomous)36, Langford Road, Bengaluru-27. India. Director, Centre for Molecular and Computational Biology.
Editor in Chief, International Journal of Biological Research -ISSN-2321-0524.
www.biovistas.org www.sjc.ac.in drjayaramreddy@sjc.ac.in
Research Gate: https://www.researchgate.net/profile/Jayarama_Reddy2
www.ArtPal.com/drjayaramreddy
YouTube Channel: Dr. Jayarama Reddy St. Joseph's College ID: UCVsumndiFmODvSrrL_TUClQ
Introduction of internet.....
Basic internet terms....
Internet evolution and history......
1G...
2G...
3G...
4G...
Download and Upload...
ONLINE and OFFLINE
Web Server
ISP
URL
Website
Browser
Web page
Hypertext
PRESENTATION
BEST OF LUCK
Networks are collections of computers, software, and hardware that are all connected to help their users work together.
A network enables users to share files and resources, such as printers, as well as send messages electronically (e-mail) to each other.
Computer networks fall into two main types: client/server networks and peer-to-peer networks.
For More Information:Dr. Jayarama Reddy, Professor, St. Joseph's College (Autonomous)36, Langford Road, Bengaluru-27. India. Director, Centre for Molecular and Computational Biology.
Editor in Chief, International Journal of Biological Research -ISSN-2321-0524.
www.biovistas.org www.sjc.ac.in drjayaramreddy@sjc.ac.in
Research Gate: https://www.researchgate.net/profile/Jayarama_Reddy2
www.ArtPal.com/drjayaramreddy
YouTube Channel: Dr. Jayarama Reddy St. Joseph's College ID: UCVsumndiFmODvSrrL_TUClQ
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
3. Internet
The Internet is a global
system of interconnected
computer networks.
http://www.youtube.com/watch?v=iDbyYGrswtg
The World Wide Web
(abbreviated as WWW or
W3, commonly known as the
Web or the "Information
Superhighway"), is a system
of interlinked hypertext
documents accessed via the
Internet.
The origins of the Internet reach
back to research of the 1960s.
United States government build
robust, fault-tolerant, and
distributed computer networks.
The commercialization of what was
by the 1990s an international
network resulted in its
popularization and incorporation into
virtually every aspect of modern
human life.
As of 2011, more than 2.2 billion
people – nearly a third of Earth's
population — use the services of the
Internet.
7. Looking for more information?
Chris Harrison
www.chrisharrison.net/index.
php/Visualizations/InternetMap/
The Dimes Project
www.netdimes.org
What does the Internet look like?
How does it evolve?
DIMES is a distributed scientific
research project, aimed to study the
structure and topology of the
Internet, with the help of a
volunteer community (similar in
spirit to projects such as
SETI@Home).
8. Servers and data centers (DC)
Server
In most common use, server is a physical
computer dedicated to running one or more
such services (as a host),to serve the needs of
users of the other computers on the network.
Special program designed to provide service.
(email server, FTP server, web server)
If regular computer can be a server?
Data Center
A data center or computer centre (also
datacenter) is a facility used to house
computer systems and associated
components, such as telecommunications
and storage systems.
9. IP address, domain name, hosting
IP address
An Internet Protocol address (IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in
a computer network that uses the Internet Protocol for
communication.
In IPv4 an address consists of 32 bits which limits the address
space to 4 294 967 296.
example: 203.45.29.198
A domain name is an identification string that defines
a realm of administrative autonomy, authority, or
control on the Internet. Domain names are formed by
the rules and procedures of the Domain Name System
(DNS).
imagination.com, google.com, ebay.com.au
where is www. ?
hosting A web hosting service is a type of Internet hosting service that
allows individuals and organizations to make their website
accessible via the World Wide Web.
domain name
11. HTML
HyperText Markup Language
(HTML) is the main markup
language for displaying web pages
and other information that can be
displayed in a web browser.
In 1980, physicist Tim Berners-Lee, who was a contractor at CERN, proposed and
prototyped ENQUIRE, a system for CERN researchers to use and share documents. In
1989, Berners-Lee wrote a memo proposing an Internet-based hypertext system.
Berners-Lee specified HTML and wrote the browser and server software in the last
part of 1990.
First specifications
The first publicly available description of HTML was a document called "HTML Tags",
first mentioned on the Internet by Berners-Lee in late 1991. It describes 18 elements
comprising the initial, relatively simple design of HTML. Eleven of these elements
still exist in HTML 4.
13. CSS - Cascading Style Sheets
CSS is a style sheet language
used for describing the
presentation semantics (the
look and formatting) of a
document written in a markup
language.
CSS is designed primarily to
enable the separation of
document content (written in
HTML or a similar markup
language) from document
presentation, including
elements such as the layout,
colors, and fonts
14. JavaScript
JavaScript (sometimes
abbreviated JS) is a scripting
language.
JavaScript was formalized in the
ECMAScript language standard
and is primarily used in the form
of client-side JavaScript,
implemented as part of a Web
browser in order to give
enhanced user interfaces and
dynamic websites. This enables
programmatic access to
computational objects within a
host environment.
15. web browsers
The first web browser
was invented in 1990 by
Sir Tim Berners-Lee.
In 1993, browser
software was further
innovated by Marc
Andreessen with the
release of Mosaic (later
Netscape), "the world's
first popular browser" why bother?
17. Protocols
HTTP
The Hypertext Transfer Protocol (HTTP) is an application protocol
for distributed, collaborative, hypermedia information systems.
HTTP is the foundation of data communication for the World Wide
Web.
HTTPS
Same as above but encrypted
FTP
File Transfer Protocol (FTP) is a standard network protocol used to
transfer files from one host to another host over a TCP-based
network, such as the Internet.
18. Email
POP3
Post Office Protocol (POP) is an
application-layer Internet standard
protocol used by local e-mail clients
to retrieve e-mail from a remote
server over a TCP/IP connection
SMTP
Simple Mail Transfer Protocol (SMTP)
is an Internet standard for electronic
mail (e-mail) transmission across
Internet Protocol (IP) network
IMAP
The Internet Message Access Protocol
is an Application Layer Internet
protocol that allows an e-mail client
to access e-mail on a remote mail
server.
Electronic mail, also
known as email or e-
mail, is a method of
exchanging digital
messages from an author
to one or more
recipients.
In 1971 the first
ARPANET email was sent
19. Why we shouldn't send big files
via email?
Email standards such as MIME don't
specify any file size limits, but in
practice email users will find that
they can't send very large files.
As an example, when Google's gmail
service increased its arbitrary limit
to 25MB it warned that: "you may not
be able to send larger attachments
to contacts who use other email
services with smaller attachment
limits".
In general, 10MB is considered safe
for the maximum size of an email,
But why ?
base64
The particular choice of character
set selected for the 64 characters
required for the base varies between
implementations.
Each attachments grows +30% from it
original size
20. CLOUD
Cloud computing is the delivery
of computing and storage
capacity as a service to a
community of end-recipients.
The name comes from the use of
a cloud-shaped symbol as an
abstraction for the complex
infrastructure.
Cloud computing entrusts
services with a user's data,
software and computation over a
network.
cloud storage, cloud music, cloud...
21. So... what actually Cloud is
about?
It's just the way how
data and services are
stored.
No limitations, pay for
what you use.
Easy marketing tool.
Dropbox,
iCloud,
Gmail,
Google Drive,
Amazon AWS