A Framework for Virtual Community Business Success the Case
- 格式:pdf
- 大小:286.17 KB
- 文档页数:10
如何激发学生学习英语好奇心的英语作文Curiosity is a powerful driving force in education. It fuels the desire to learn and explore, making the educational journey enjoyable and engaging. When it comes to learning English, a language that opens doors to global opportunities, sparking students’ curiosity can significantly enhance their learning experience and outcomes. Here, we delve into effective strategies to ignite this curiosity and foster a lifelong love for the English language.Understanding the cultural context in which a language is spoken can make learning it more intriguing. English, as a global language, is rich with diverse cultural references from various English-speaking countries. By incorporating elements of culture, such as literature, films, music, and traditions, teachers can create a more immersive and engaging learning environment. For instance, exploring British literature, Americanmovies, or Australian slang can provide students with a deeper appreciation and understanding of the language and its nuances.In the digital age, technology offers endless possibilities to make learning English interactive and fun. Utilizing multimedia resources such as educational apps, online games, and language learning platforms can capture students’ attention and make the learning process more dynamic. Interactive activities like virtual reality tours of English-speaking countries, podcasts, and YouTube channels dedicated to English learning can provide diverse and stimulating content that caters to different learning styles.Creativity is a vital aspect of language learning. Encouraging students to express themselves creatively in English can significantly boost their interest and motivation. Activities such as writing stories, composing poems,participating in drama and role-play, or creating digital content like blogs and videos allow students to use the language in imaginative and personal ways. These activities not only enhance language skills but also make the learning process enjoyable and personally meaningful.Providing real-life communication opportunities can greatly enhance students’ curiosity and enthusiasm for learning English. This can be achieved through language exchange programs, pen pal projects, or connecting with native English speakers via video calls. Engaging with native speakers or peers from different cultural backgrounds helps students practice their language skills in authentic contexts, making the learning experience more relevant and exciting.Gamification, the application of game-design elements in educational settings, can transform the way students learn English. By incorporating elements such as points, badges,leaderboards, and challenges into language learning activities, teachers can create a competitive yet fun learning environment. Games like vocabulary quizzes, grammar challenges, and storytelling competitions not only make learning enjoyable but also encourage students to actively participate and strive for improvement.Recognizing that each student has unique interests and learning preferences is crucial for sparking curiosity. Personalized learning paths that cater to individual interests can make learning English more engaging. For instance, if a student is interested in sports, incorporating English materials related to their favorite sports can make the learning process more relatable and enjoyable. Tailoring lessons to meet students’ personal interests and goals can significantly enhance their motivation and engagement.Visual aids and hands-on activities can make abstract language concepts more concrete and understandable. Using flashcards, infographics, mind maps, and real-life objects can help students grasp vocabulary and grammar more effectively. Additionally, hands-on activities such as cooking following an English recipe, conducting science experiments with English instructions, or creating art projects can make learning interactive and enjoyable, thereby fostering curiosity and deeper understanding.Creating a supportive and collaborative learning community is essential for sparking curiosity in language learning. Encouraging group work, discussions, and peer feedback can foster a sense of belonging and collective effort. When students feel supported and valued, they are more likely to take risks, ask questions, and explore new ideas. A positive classroom environment where mistakes are viewed as learningopportunities can significantly boost students’ confidence and curiosity.Feedback plays a crucial role in the learning process. Providing timely, constructive, and encouraging feedback can motivate students to improve and continue their learning journey. Highlighting students’ strengths and offering specific suggestions for improvement can help them understand their progress and areas for growth. Meaningful feedback that acknowledges effort and celebrates achievements can inspire students to stay curious and engaged in learning English.Demonstrating the real-world applications of English can make learning more purposeful and motivating. Highlighting how English is used in various fields such as science, technology, business, and the arts can show students the practical benefits of learning the language. Inviting guest speakers, organizingfield trips, and exploring case studies can help students see the relevance of English in their future careers and everyday lives.Reflective practices encourage students to think about their learning experiences and processes. By incorporating activities such as journaling, self-assessment, and group reflections, teachers can help students become more aware of their learning strategies and progress. Reflective practices foster a growth mindset and a deeper understanding of the learning journey, which can, in turn, spark curiosity and a desire for continuous improvement.In conclusion, sp arking students’ curiosity in learning English requires a multifaceted approach that incorporates cultural context, technology, creativity, real-life communication, gamification, personalization, visual aids, supportive communities, meaningful feedback, real-world applications, and reflective practices. By creating an engaging and dynamic learning environment, teachers can inspire students to explorethe English language with enthusiasm and curiosity, paving the way for lifelong learning and success.。
小学英语作文衡水体范文照片The Importance of Early English Education: A Holistic Approach to Language LearningIn the rapidly globalizing world of the 21st century, the ability to communicate effectively in English has become an essential skill for individuals seeking success and opportunities both academically and professionally. As such, the importance of introducing English language education at the primary school level cannot be overstated. The Hengshui model of English instruction, with its emphasis on a comprehensive and integrated approach, serves as an exemplary framework for developing well-rounded English proficiency in young learners.At the heart of the Hengshui method lies a deep understanding of the multifaceted nature of language acquisition. Rather than focusing solely on rote memorization of vocabulary and grammar rules, this model recognizes the need for a more holistic approach that encompasses listening, speaking, reading, and writing skills. By fostering a nurturing and engaging learning environment, primaryschools following the Hengshui style are able to cultivate a genuine love for the English language within their students.One of the key distinguishing features of the Hengshui model is its strong emphasis on interactive and communicative activities. In contrast to traditional teacher-centered classrooms, where students passively absorb information, Hengshui-inspired lessons actively involve learners in dynamic discussions, role-playing exercises, and collaborative projects. This approach not only enhances students' practical application of English but also instills in them a sense of confidence and enthusiasm for the language.Through carefully designed lesson plans and a diverse range of teaching materials, Hengshui primary schools seamlessly integrate language learning with other academic subjects. For instance, students might engage in a science-themed English lesson, where they not only learn scientific vocabulary but also practice describing experiments, formulating hypotheses, and presenting their findings in the target language. This interdisciplinary approach not only reinforces the relevance of English in everyday life but also fosters a deeper understanding of the interconnectedness of various fields of study.Moreover, the Hengshui model places a strong emphasis on the development of critical thinking and problem-solving skills. Ratherthan simply regurgitating information, students are encouraged to analyze, synthesize, and apply their knowledge in meaningful contexts. This emphasis on higher-order thinking skills not only enhances their overall academic performance but also prepares them for the challenges of the 21st-century workforce, where adaptability and innovative thinking are highly valued.One of the most striking features of the Hengshui approach to primary English education is its commitment to cultivating a deep appreciation for the cultural aspects of language learning. Through the incorporation of authentic materials, such as literature, music, and films, students are exposed to the rich tapestry of the English-speaking world. This cultural immersion not only broadens their perspectives but also fosters a sense of global citizenship and intercultural understanding – crucial qualities in an increasingly interconnected world.Furthermore, the Hengshui model recognizes the importance of personalized learning and the role of technology in enhancing the educational experience. By leveraging digital tools and platforms, teachers are able to tailor their instruction to the unique needs and learning styles of individual students. From interactive language-learning apps to virtual field trips, the integration of technology in Hengshui classrooms creates a dynamic and engaging learning environment that caters to the diverse needs of the 21st-centurylearner.Perhaps one of the most remarkable aspects of the Hengshui approach to primary English education is its emphasis on the holistic development of the child. Rather than solely focusing on academic achievement, this model recognizes the importance of nurturing the social, emotional, and physical well-being of the learner. Through a range of extracurricular activities, such as sports, arts, and community service, students are given the opportunity to explore their interests, develop their talents, and cultivate important life skills like teamwork, empathy, and resilience.The success of the Hengshui model in producing well-rounded, proficient English speakers is evidenced by the impressive achievements of its students. Year after year, Hengshui primary schools consistently outperform their counterparts in national and international English language assessments, showcasing the effectiveness of their comprehensive approach to language education. Moreover, the alumni of Hengshui-inspired programs have gone on to excel in a wide range of fields, from academia to business, further demonstrating the lasting impact of their early English language learning experiences.As the world continues to evolve and the demand for global communication skills intensifies, the Hengshui model of primaryEnglish education serves as a shining example of what can be accomplished when a holistic, student-centered approach is adopted. By nurturing a love for the English language, fostering critical thinking and problem-solving skills, and promoting cultural awareness and well-rounded development, Hengshui primary schools are paving the way for a new generation of globally competent and socially conscious individuals who are poised to make a meaningful impact on the world.。
⏹在中国学术期刊全文数据库中检索关于“物流专业人才培养”方面的2篇文章,并写出论文作者和题目。
1.《创新性物流人才培养体系研究》王颖, 2003 - 北方交通大学:管理科学与工程2.构建高职高专物流专业的KAO人才培养模式研究郭义祥, 2008 - 中南大学:工商管理⏹在中国学术期刊全文数据库中,检索现任上海复旦大学教授黄丽华教授发表过的所有文章,并写出论文题目。
期刊论文:王刚,黄丽华,张成洪. 混合智能系统研究综述,系统工程学报 vol.25(4), 2010, 中文:569-578傅翠晓,黄丽华,曾庆丰. 企业的B2B电子商务转型分析——基于能力理论视角,科学学与科学技术管理 Vol.31(7) , 2010, 中文: 123-129Pejian Song, Cheng Zhang, Yunjie(Calvin) Xu, Lihua Huang. Brand Extension of Online Technology Products: Evidence from Search Engine to Virtual Communities and Online News , Decision Support Systems Vol.49(1), 2010, 英文: 91-99Lihua Huang, Ganglan Hu, Xianghua Lu. E-business Ecosystem and its Evolutionary Path: The Case of the Alibaba Group in China , Pacific Asia Journal of the Association for Information Systems vol.1(4), 2009, in English: 25-36何永刚,黄丽华. 案例研究方法在信息系统领域的应用,计算机工程与应用 Vol.45(32), 2009, 中文: 233-236胡岗岚,卢向华,黄丽华. 电子商务生态系统及其协调机制研究——以阿里巴巴集团为例,软科学 Vol.23(9), 2009, 中文: 5-10Peijian Song ,Cheng Zhang ,Wenbo Chen , Lihua Huang. Understanding Usage-Transfer Behavior Between Nonsubstitutable Technologies:Evidence From Instant Messenger and Portal , IEEE Transactions on Engineering Management Vol.56(3), 2009, 英文: 412-424Sijie Li,Zhanbei Zhu,Lihua Huang. Supply Chain Coordination and Decision Making Under Consignment Contract with Revenue Sharing , International Journal of Production胡岗岚,卢向华,黄丽华. 电子商务生态系统及其演化路径,经济管理 Vol.31(6), 2009, 中文: 110-116胡安安,黄丽华,凌鸿 . 基于文化视角的信息技术应用研究述评,研究与发展管理 Vol.21(3), 2009, 中文: 98-104耿华,陈文波,黄丽华. 面向电子政务的公共服务流程优化方法研究,软科学 Vol.23(5), 2009, 中文: 37-41卢向华,冯俊,黄丽华. 中国信息系统的国际研究分析及对比,信息系统学报 Vol.3(1), 2009, 中文: 75-84胡岗岚卢向华黄丽华. 中国软件产品开发的价值导向,上海管理科学 Vol.31(2), 2009, 中文: 38-44王刚,黄丽华,高阳. 基于方法集的农业产业化综合评价模型,系统工程理论与实践 Vol.29(4), 2009, 中文: 161-168王刚,张成洪,黄丽华. 基于方法集的企业知识管理评价研究,科技进步与对策 Vol.26(7), 2009, 中文: 115-118YANG Qing,HUANG Lihua,XU Yunjie. Role of Trust Transfer in E-CommerceAcceptance , Tsinghua Science and Technology (清华大学学报) Vol.13(3), 2008, 英文: 279-286Chu Yan, Huang Lihua. Mobile Technologies Adoption:An Exploratory CaseStudy , Tsinghua Science and Technology(清华大学学报(英文版)) Vol.13(3), 2008, 英文: 300-305胡安安,姜江,黄丽华. ERP系统实施的用户接受模型及实证研究,研究与发展管理 vol.20(3), 2008, 中文: 46-52,112何永刚,黄丽华. 信息系统开发中的知识转移研究综述,计算机工程与应用 vol.44(25), 2008, 中文: 75-77,114Cui, L.L; Zhang, C.; Zhang, C.H.;Huang, L.H.. Exploring IT Adoption Process in Shanghai Firms: An Empirical Study , Journal of Global InformationManagement vol.16(2), 2008, 英文: 1-17褚燕,黄丽华. 影响员工接受移动商务应用因素研究,研究与发展管理 vol.19(1), 2007, 中文: 72-78何永刚,黄丽华. 我国钢铁企业信息系统应用研究,情报杂志 (7), 2007, 中文: 52-54王刚,黄丽华,张成洪. 混合智能系统R-FC-DENN及其实现,科技导报 vol.25(11), 2007, 中文: 69-73胡安安,姜江,黄丽华. 基于信息技术用户接受理论的ERP系统实施模型研究,科学学与科学技术管理 , 2007, 中文: 20-26宋培建,陈文波,曾庆丰,黄丽华. 基于目标导向行为视角的信息技术使用习惯形成研究,软科学 vol.21(4), 2007, 中文: 9-12罗钢,黄丽华 . 电子商务交易平台的网络外部性初探,商场现代化 (511), 2007, 中文: 123-124何永刚,黄丽华. 信息管理与信息系统专业课程体系研究综述,情报杂志 (8), 2007, 中文: 128-131黄丽华. CIO角色动态变化,每周电脑报 (24), 2007, 中文: 22胡安安,黄丽华. 浅谈信息技术(IT)在服务创新中的作用,中国科技产业 , 2007, 中文: 86-89胡安安,黄丽华. 基于信息系统的企业绩效管理体系--以某石化企业为例,物流科技 vol.30(5), 2007, 中文: 176-182杨青,陈忠民,黄丽华. 基于能力的公司规划与信息系统规划战略关系实证研究,管理工程学报 Vol.21(3), 2007, 中文: 141-145胡安安,黄丽华. 建立中国企业信息化交易公平性监管机制的探索性研究,世界经济情况 (4), 2007, 中文: 56-59罗钢,黄丽华. 网络外部性条件下电子商务平台双边定价策略,企业经济 (4), 2007, 中文: 135-137罗钢,黄丽华. 网络外部性条件下的连锁企业渐进式信息化,科学学与科学技术管理 (4), 2007, 中文: 153-155董亮,卢向华,黄丽华. ASP平台运营的原模型分析,管理学报 vol.4(1), 2007, 中文: 57-60.66Cheng Zhang,Lili Cui,Lihua Huang,Chenghong Zhang. Exploring the Role of government in information technology Diffusion: An Empirical Study of IT Usage in Shanghai Firms , IFIP Dynamics of Technology-Based Innovation: Diversifying the Research Agenda, eds. McMaster, T., Ferneley, E., and DeGross, J. (Boston: Springer) Vol.235, 2007, 英文: 393-408Jin Chen, Cheng Zhang, Yufei Yuan and Lihua Huang. Understanding the Emerging C2C Electronic Market in China: An Experience-Seeking Social Marketplace , Electronic Markets vol.17(2), 2007, 英文: 86-100王刚,黄丽华,张成洪. 基于模糊聚类的神经网络在数据挖掘分类中的应用研究,科技导报 vol.25(15), 2007, 中文: 58-61陈晋,周永佳,张诚,黄丽华. 透视中国C2C电子商务市场——记对eBay、淘宝的案例分析,市场营销导刊 (6), 2006, 中文: 19-22王刚,黄丽华,张成洪,夏洁. 数据挖掘分类算法研究综述,科技导报 vol.24(12), 2006, 中文: 73-76Xiang-Hua Lu,Li-Hua Huang,Michael S.H.Heng. Critical success factors of inter-organizational information systems—A case study of Cisco and Xiao Tong in China , Information & Management vol.43(3), 2006, 英文: 395–408 陈文波,黄丽华. 组织复杂信息技术吸收的探索性案例研究,清华学报(自然科学版) 2006(46:S1), 2006, 中文: 902-908LILI CUI,CHENG ZHANG,CHENGHONG ZHANG,LIHUA HUANG. Exploring E-Government Impact on Shanghai Firms' Informatization Process , Electronic Markets vol.16(4), 2006, 英文: 312-328郑大庆,何永刚,褚燕,黄丽华. 中国大陆与国际信息系统发展状况对比研究,复旦学报(自然科学版) vol.45(5), 2006, 中文: 577-584陈文波,黄丽华,曾庆丰. 基于间断平衡理论的企业复杂信息技术接受分析框架研究,科技导报 vol.24(7), 2006, 中文: 64-67张嵩,黄丽华. 信息技术竞争价值两种观点的比较研究,研究与发展管理vol.18(3), 2006, 中文: 85-92何永刚,黄丽华,戴伟辉. CISC2005的学科贡献,现代大学教育 , 2006, 中文: 11-16王刚,黄丽华,夏洁,高阳. 新的混合智能系统R-FC-DENN ,系统工程与电子技术vol.28(3), 2006, 中文: 448-453陈文波,黄丽华. 组织信息技术采纳的影响因素研究述评,软科学 vol.20(3), 2006, 中文: 1-4郑大庆,黄丽华. 动态能力理论在信息系统领域的应用,科技导报 vol.24(9), 2006, 中文:何永刚,黄丽华,戴伟辉. 基于生态理论的信息系统进化研究,科技导报 vol.24(1), 2006, 中文: 41-43赵昆,黄丽华,孙海. 基于战略竞争优势的信息系统项目选择模型,系统工程学报vol.20(6), 2005, 中文: 661-665俞东慧,方针,黄丽华. 企业实施流程变革管理的模型研究,科技导报 vol.23(3), 2005, 中文: 60-63方针,俞东慧,黄丽华. 用户接受:企业信息技术实施的新视角,科技导报vol.23(2), 2005, 中文: 55-57Chen, Y., Okoli, C., and Lihua Huang. Strategic Growth of Firms in the Digital Economy: A Simonian Research Agenda , Journal of Information Technology Theory & Application Vol.7(2), 2005, 英文: 37-52张嵩,李文立,黄丽华. 电子商务环境下企业IT基础设施能力的构成研究,计算机集成制造系统 vol.10(11), 2004, 中文: 1459-1465李文立,黄丽华,孙海,张嵩. 基于电子商务的制造业销售服务模型研究,计算机集成制造系统 vol.10(10), 2004, 中文: 1278-1283卢向华,黄丽华. 基于评价的信息系统价值促生模式研究,计算机集成制造系统Vol.10(10), 2004, 中文: 1284-1289曾庆丰,王欢,黄丽华. 制造企业的电子商务模式识别研究,计算机集成制造系统vol.10(8), 2004, 中文: 1008-1014赵昆,赵明剑,黄丽华. 战略对应--企业信息化管理的新思路,科技导报 , 2004, 中文: 39-41姚卫新,黄丽华. 智能数据分析中的异常数据管理,科技导报 , 2004, 中文: 54-56张嵩,李文立,黄丽华. 基于结构的企业IT基础设施能力分类研究,中国工业经济vol.6(6), 2004, 中文: 79-84姚卫新,黄丽华. 事件驱动式商务智能——商业竞争的新利器,科技导报 , 2004, 中文: 59-61俞东慧,黄丽华,方针. 企业变革管理模型框架及其实证研究,系统工程理论方法应用 Vol.13(2), 2004, 中文: 106-111赵卫东,黄丽华. 面向角色的多agent工作流模型研究,管理科学学报 vol.7(2), 2004, 中文: 55-62洪丹毅,黄丽华. 制造业电子商务模式决策支持系统研究,计算机工程与应用(28), 2004, 中文: 182-194杨青,黄丽华,何崑. 企业规划与信息系统规划战略一致性实证研究,管理科学学报vol.6(4), 2003, 中文: 43-54庞川,冯叶,黄丽华. 全面质量管理在电子商务中的实施,经济管理 (7), 2003, 中文: 34-37陈风霄,黄丽华. 信息技术基础设施能力及其规划策略,复旦大学学报 vol.42(2), 2003, 中文:俞东慧,黄丽华,石光华. BPR项目的实施:革命性变革和渐进性变革,中国管理科学vol.11(2), 2003, 中文: 55-60陈丽娟,黄丽华,张国春. BPR在电信企业投资项目管理流程创新中的应用研究,复旦学报(自然科学版) vol.42(2), 2003, 中文: 220-225赵卫东,黄丽华,蔡斌. 基于角色的工作流研究,管理工程学报 vol.17(4), 2003, 中文: 9-13赵卫东,黄丽华. 流程的协调管理研究,科学学与科学技术管理 (2), 2003, 中文: 41-45卢向华,黄丽华. The Firm Capability Analysis in Large Information System Project Implementation Process ,中华管理资讯系统CMIS Quarterly vol.1(1), 2003, 中文:卢向华,黄丽华. 信息化项目建设中的全过程评价研究,计算机集成制造系统-CIMS Vol.8(12), 2002, 中文: 931-935赵卫东,黄丽华,蔡斌. 工作流过程模型研究,系统工程理论方法应用 vol.11(3), 2002, 中文: 212-217杨青,乔志刚,黄丽华,薛华成. 动态联盟中企业建模的M e ta-M odel ,管理科学学报 vol.4(6), 2001, 中文: 31-38董超, 黄丽华,项保华. 基于企业资源的视角: IT 与持续竞争优势,科学学与科学技术管理 , 2001, 中文: 36-39俞东慧,黄丽华. 任务不对称对企业流程重组(BPR)的影响,复旦学报(自然科学版) vol.40(2), 2001, 中文: 171-176朱锋英,叶文超,黄丽华. 活动合并对企业流程成本的影响,系统工程理论方法应用vol.10(3), 2001, 中文: 217-220黄丽华,何辉,薛华城. 基于规则和方法的企业过程优化,系统工程学报 Vol.15(3), 2000, 中文: 209-216,266黄丽华,何辉,薛华成. 基于规划和方法的企业过程优化,系统工程学报 vol.15(3), 2000, 中文:郑大兵,黄丽华,李勇. QFD在企业过程优化中的应用,管理科学学报 vol.2(4), 1999, 中文: 8-15彭俊松,黄丽华,薛华成. BPR决策支持系统分布式求解模型的研究,管理科学学报vol.2(4), 1999, 中文: 44-52黄丽华,葛永利,富小丽,薛华成. 企业过程柔性的概念框架,系统工程理论与实践vol.19(10), 1999, 中文: 63-68潘自强,黄丽华,熊伟,薛华成. 信息系统战略规划方法及其组合策略的研究,管理科学学报 vol.2(3), 1999, 中文: 43-50薛华成,黄丽华. 企业持续发展与信息战略,管理科学学报 Vol.2(2), 1999, 中文: 90-92彭俊松,黄丽华,薛华成. 基于知识共享重用的分布式DSS开发平台,管理科学学报Vol.2(1), 1999, 中文: 72-78熊伟,黄丽华,潘自强,薛华成. 基于BPR的信息系统规划方法,系统工程理论方法应用 vol.8(1), 1999, 中文: 27-32潘自强,刘杰,黄丽华,薛华成. 企业过程到企业对象类转换规则及其应用,系统工程理论方法应用 Vol.8(2), 1999, 中文: 5-23黄丽华,黄岳,熊伟,李芳芸. 基与规则的企业过程的简化和集成方法,计算机集成制造系统-CIMS vol.6(3), 1998, 中文:黄丽华,黄岳,熊伟,李芳芸. 基于规则的企业过程简化和集成的方法,计算机集成制造系统 Vol.4(3), 1998, 中文: 10-15Hu Jian,Huang Lihua,Xue Huacheng. Comparative Study on Selecteel BPR Tools ,Journal of china Textile Universiy (中国纺织大学学报(英文版)) Vol.14(2), 1998, 英文: 63-68陈蓉,钱宇,黄丽华. 面向个人的信息系统:经理支持系统,管理信息系统 (sum24), 1998, 中文: 7-10刘伟,杜昌勇,黄丽华. 面向过程的系统分析,管理信息系统 , 1998, 中文:28-31李芳芸,黄丽华. 企业经营过程重组与现代企业管理,计算机集成制造系统——CMS (6), 1997, 中文: 3-8黄丽华.钱宇.葛永利.胡健. 企业过程优化的规则和方法,高技术通讯 vol.7(11), 1997, 中文: 26-32黄丽华,钱宇,薛华成. 企业过程的定义及辩识方法,系统工程学报 Vol.12(3), 1997, 中文: 70-81黄丽华,胡健,陈蓉,李芳芸,杨吉江,李美莺. 企业过程再设计的概念及其实现途径,计算机集成制造系统-CIMS Vol.3(4), 1997, 中文: 8-12徐云杰,黄丽华,薛华成. 企业过程优化决策支持系统概念框架,管理科学学报vol.7(4), 1997, 中文: 35-42唐晓云,黄丽华,薛华成. 面向企业过程重组的信息系统策略,管理信息系统Vol.2(3), 1997, 中文: 11-18徐云杰,黄丽华,周文越,薛华成. 企业过程优化决策支持系统概念框架,决策与决策支持系统 Vol.7(4), 1997, 中文:刘杰,黄丽华,胡建. 建设企业信息管理系统的计划与组织,计算机周刊 (15),1996, 中文: 16-17黄丽华,方晓,胡健. CIMS企业全局信息模型的建模技术,高技术通讯 vol.6(2), 1996, 中文: 38-42黄丽华,方晓,胡健. CIMS企业全局信息模型及信息模式的研究,计算机集成制造系统 (2), 1995, 中文: 5-9胡健,黄丽华,徐至旭,薛华成. 面向对象的分析与设计方法的比较研究,计算机工程与应用 (11、12), 1994, 中文: 4-9会议/研讨会论文:Barney Tan,Shan L Pan,Xianghua Lu,Lihua Huang Leveraging Digital Business Ecosystems for Enterprise Agility: The Tri-Logic Development Strategy of Thirtieth International Conference on Information Systems(ICIS2009) USA,Phoenix: 2009 1-18Peijian Song,Cheng Zhang,Heng Xu,Lihua Huang Product Integration Formats and Consumers' Evaluations of the Online Extended Product: A Product Integration Perspective Proceedings of the Ninth International Conference on Electronic Business(ICEB2009) Macau: 2009 325-334王有为,徐云杰,彭志伟,黄丽华社会网络与网商竞争力关系的实证研究第二届网商及电子商务生态学术研讨会论文集中国,杭州: 2009 3-7曾庆丰,黄丽华中小企业电子商务转型的过程模型研究第二届网商及电子商务生态学术研讨会论文集中国,杭州: 2009 24-29胡岗岚,黄丽华,卢向华网商竞合关系研究第二届网商及电子商务生态学术研讨会论文集中国,杭州: 2009 37-41Ganglan Hu,Xianghua Lu,Lihua Huang E-business Ecosystem and its Evolutionary Path: Exploring the Phenomenon of E-business Industrial Cluster in China with a Case Study of Alibab Group Proceedings of the 3rd International Conference on Risk Management & Global e-Business Incheon,Korea: 2009 902-908Gang Wang,Chenghong Zhang,Lihua Huang A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent Systems Roger Lee,Central Michigan University,USA 9th ACIS International Conference on Software Enginerring,Artificial Intelligence,Networking and Parallel/Distributed Computing(SNPD 2008) In conjunction with 2nd International Workshop on Advanced Internet Technology andApplication(AITA2008) Phuket,Thailand: IEEE computer society, 2008 371-375 Chen Jin,Zhang Cheng,Huang Lihua Determinants of Customer Loyalty in China C2C E-Commerce: From a Social Network Perspective [A] Proceedings of the Fifteenth European Conference on Information Systems(Osterle H, Schelp J, Winter Reds.)University of St. Gallen, St. Gallen [C] : , 2007 24-35Song Peijian,Chen Wenbo,Zhang Cheng,Huang Lihua Determinants of Information Technology Usage Habit Peijian Song Proceedings of the 11th Pacific-Asia Conference on Information Systems : the 11th Pacific Asia Conference on Information Systems, 2007 226-237Chen Jin, Zhang Cheng, Yuan Yufei, Huang Lihua THE NATURE OF THE EMERGING C2C ELECTRONIC MARKET IN CHINA: A CASE STUDY FROM SOCIAL NETWORK THEORY AND CRM PERSPECTIVES [A] Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, Sao Paulo, Brazil [C] : , 2007 Peijian Song,Cheng Zhang,Wenbo Chen and 黄丽华 Post-Adoption Transferring between Non-Substitutable Technologies:The Case of Instant Messenger and Portal Peijian Song Post-Adoption Transferring between Non-Substitutable Technologies:The Case of Instant Messenger and Portal : the 28th International Conference on Information Systems, 2007郑大庆,黄丽华动态能力理论研究现状及其在信息系统领域的发展前景 [A] 郑大庆动态能力理论研究现状及其在信息系统领域的发展前景 [C] : 《知识及资讯资源管理》第十二届海峡两岸资讯管理发展策略研讨会论文集, 2006褚燕,黄丽华工作任务与移动应用匹配模型研究 [A] 知识及资讯资源管理,第十二届海峡两岸资讯管理发展策略研讨会论文集 [C] : , 2006胡安安,黄丽华中国企业信息化过程中交易公平性监管机制的探索性研究 [A]知识及资讯资源管理》第十二届海峡两岸资讯管理发展策略研讨会论文集 [C] : , 2006 曾庆丰,黄丽华企业电子商务转型研究:一个基于能力视角的分析框架 [A] 《知识及资讯资源管理》第十二届海峡两岸资讯管理发展策略研讨会论文集 [C] : , 2006 Daqing Zheng, Lihua Huang, Michael S H Heng, Yonggang He, Songping Chu The Comparison of Information Systems Develop Trends between the Chinese Mainland and International [A] Proceeding of the 10th Pacific Asia Conference on Information Systems (PACIS2006) [C] : , 2006Tianjiao Chen, Cheng Zhang and Lihua Huang Technological and Community Factors that Influence Online Trust and Knowledge Sharing-A Model Based on Virtual Community [A] 10th Pacific Asia Conference on Information Systems [C] : , 2006Cui,L.L.,Zhang,C,Lihua Huang,Zhang,C.H Examining Drivers and Impacts of Informatization in Shanghai Manufacturing Firms Cui,L.L. Examining Drivers and Impacts of Informatization in Shanghai Manufacturing Firms : Proceedings of the 10th Pacific Asia Conference Information Systems(PACIS2006), 2006崔丽丽,张诚,黄丽华,张成洪基于资源视角的企业信息化影响因素实证研究 [A]第十二届海峡两岸信息管理发展策略研讨会论文集 [C] : , 2006WANG Gang, HUANG Lihua, ZHANG Chenghong Study of Artificial Neural Network Model Based on Fuzzy Clustering The 6th World Congress on Intelligent Control and Automation 2006 : 2006 2713-2717褚燕,黄丽华基于任务技术匹配理论的移动技术采纳案例研究信息技术采纳:理论发展与中国实践》,信息系统协会中国分会2006年学术研讨会 : 2006 113-116 方针,黄丽华,俞东慧企业信息安全的影响因素及实现方法的研究 [A] 第十届海峡两岸资讯管理发展策略研讨会 [C] : , 2005Lei DAI,Yuandong Yi,黄丽华 An Empirical Study of B2C Service Quality affecting Website Continuance Lei DAI An Empirical Study of B2C Service Quality affecting Website Continuance : Proceedings of IEEE International Conference on Service Operations and Logistics and Informatics, 2005Wenbo Chen,Lihua Huang,Qing Zhang The Adoption of Inter-OrganizationalSystems in Chinese Local Retail Enterprises [A] Proceeding of the 9th Pacific Asia Conference on Information Systems [C] : , 2005ZHANG Song,HUANG Li-hua Comparative Study of Obtaining Competitive Advantagefrom Information Technology ZHANG Song 2005 IEEE International Conference on Services Systems and Services Management (Proceedings of ICSSSM’05),June, 2005,Chong Qing, China : 2005 IEEE Internatioanl Conference on Services Systems and Services Management (Proceedings of ICSSSM'05), 2005 19-23CHU Yan,HUANG Lihua Mobile Business Applications Adoption Model Based on the Concepts of Task/Technology Fit [A] Jian Chen 2005 International Conference on Services Systems and Services Management vol.1/中国.重庆: Proceedings ofICSSSM'05, 2005 p1346-1350Qingfeng ZENG,Weidong ZHAO,黄丽华 A Framework for the Evolution of E-business based on Information Technology [A] Qingfeng ZENG A Framework for the Evolution ofE-business based on Information Technology [C] : 2005 IEEE InternatioanlConference on Services Systems and Services Management (Proceedings of ICSSSM'05), 2005Wenbo CHEN,黄丽华,Xianghua LU The B2B Adoption in Retail Firms in China:An Empirical Study [A] Wenbo CHEN The B2B Adoption in Retail Firms in China:AnEmpirical Study [C] : P2005 IEEE International Conference on Services Systems and Services Management(Proceedings of ICSSSM'05), 2005Xianghua Lu,Lihua Huang The Development of IT Evalution Theoretical Studies Proceedings of ICSSSM'05 Vol.2: 2005Lei DAI,Lihua Huang,Yuandong Yi How B2C Service Quality Influences Website Continuance Lei DAI How B2C Service Quality Influences Website Continuance : Proceeding of the 9th Pacific Asia Conference on Information Systems, 2005 Qing YANG,Lihua HUANG The Acceptance Model of MLS on the basis of"Risk-Value"Analysis Qing YANG The Acceptance Model of MLS on the basis of"Risk-Value"Analysis : Proceedings of 3rd Workshop on e-Business(WEB2004), 2004407-417Qingfeng Zeng,黄丽华 A New Theoretical Framework for Identifying E-Business Models Qingfeng Zeng A New Theoretical Framework for Identifying E-Business Models : Proceeding of the 8th Pacific Asia Conference Information Systems (PACIS2004), 2004 1940-1946Kun Zhao,Zhongmin Chen,黄丽华 SAM/ANP Based Approach for Strategic Information System Project Selection Kun Zhao SAM/ANP Based Approach for Strategic Information System Project Selection : Proceeding of the 8th Pacific Asia Conference Information Systems (PACIS2004), 2004Huan Wang,Lihua Huang Case-Based Study of Interorganizational Information Systems Implementation Critical Success Factors Huan Wang Case-Based Study of Interorganizational Information Systems Implementation Critical Success Factors : Proceedings of the 8th Pacific Asia Conference Information Systems (PACIS2004), 2004 1389-1399⏹利用“期刊导航”功能,找出“管理”类核心期刊有几种?其中排名第一的期刊是什么?复制该刊2009年最后一期中的第一篇文章的篇名。
StarWind Virtual SAN®VAAI (vStorage API for Array Integration) Configuration and Performance Tuning GuideFEBRUARY 2018TECHNICAL PAPERTrademarks“StarWind”, “StarWind Software” and the StarWind and the StarWind Software logos are registered trademarks of StarWind Software. “StarWind LSFS” is a trademark of StarWind Software which may be registered in some jurisdictions. All other trademarks are owned by their respective owners. ChangesThe material in this document is for information only and is subject to change without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, StarWind Software assumes no liability resulting from errors or omissions in this document, or from the use of the information contained herein. StarWind Software reserves the right to make changes in the product design without reservation and without notification to its users.Technical Support and ServicesIf you have questions about installing or using this software, check this and other documents first - you will find answers to most of your questions on the Technical Papers webpage or in StarWind Forum. If you need further assistance, please contact us.About StarWindStarWind is a pioneer in virtualization and a company that participated in the development of this technology from its earliest days. Now the company is among the leading vendors of software and hardware hyper-converged solutions. The company’s core product is the years-proven StarWind Virtual SAN, which allows SMB and ROBO to benefit from cost-efficient hyperconverged IT infrastructure. Having earned a reputation of reliability, StarWind created a hardware product line and is actively tapping into hyperconverged and storage appliances market. In 2016, Gartner named StarWind “Cool Vendor for Compute Platforms” following the success and popularity of StarWind HyperConverged Appliance. StarWind partners with world-known companies: Microsoft, VMware, Veeam, Intel, Dell, Mellanox, Citrix, Western Digital, etc.Copyright ©2009-2018 StarWind Software Inc.No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of StarWind Software.ContentsIntroduction (4)Enabling VAAI support inside StarWind VSAN. (5)Checking the VAAI proper functioning (5)Summary (10)IntroductionThis document is intended for experienced StarWind users and VMware administrators, who want to decrease the workload by using vStorage API for Array Integration (VAAI). The guide describes how to check VAAI proper functioning and its productivity.VAAI is a complex of technologies, designed to offload certain VM disk operations to the storage array. In case VAAI is enabled while working with the disk subsystem, the ESXi host sends the commands to the array to perform the specific operations, without having to process all the data.The screenshot below shows that some of the mounted disks have the hardware acceleration support. To identify if VAAI is supported, the ESXi host sends VAAI SCSI commands to each datastore.A full set of up-to-date technical documentation can always be found here.For any technical inquiries please visit our online community, Frequently Asked Questions page, or use the support form to contact our technical support department.Enabling VAAI support inside StarWind VSAN.By default, VAAI is turned on in the StarWind configuration file. To turn off the VAAI support, the StarWind configuration file needs to be modified by following the steps described below. NOTE: The StarWind service must be stopped before editing the configuration file.1.Stop the StarWind service2.Navigate to the StarWind root directory and locate the StarWind.cfg file.The default location is "C:\Program Files\StarWind Software\StarWind\StarWind.cfg".3.Make the backup of StarWind.cfg file.4.Open the file via text editor, find the VAAI strings <VaaiExCopyEnabled value="yes"/>,<VaaiCawEnabled value="yes"/>,<VaaiWriteSameEnabled value="yes"/> below the <hardwareacceleration> section and change “yes” to “no”.5.Save the changes and close the text editor.6.Restart the host where StarWind VSAN is installed.Checking the VAAI proper functioning7.Create the device in StarWind Management Console8. To discover the StarWind device on ESXi host, navigate to Configuration -> StorageAdapters and click on the iSCSI Software Adapter.9.In Targets -> Dynamic Discovery section, add the ISCSI interface of the StarWind hostby clicking on the Add button.10.Click Rescan All. Once Rescan is done, all the available devices that can be discoveredfrom the StarWind host will appear.11.Create new Datastores based on the StarWind devices.To check how VAAI works, enable its support in the StarWind configuration file and then in ESXi. VAAI can be turned on in ESXi via Web-GUI or through CLI.12.To turn on VAAI through Web-GUI, select the ESX-host, navigate to the Configure tab,select Advanced System Settings, and click Edit button.13.Set HardwareAcceleratedMove and HardwareAcceleratedInit parameters value toAlso, set “VMFS3.HardwareAcceleratedLocking” value to 1.14.To turn on VAAI through CLI, connect to the ESX server via SSH. The commands belowshow the current status of the parameters, allowing to check the parameters valueadditionally.esxcfg-advcfg -g /DataMover/HardwareAcceleratedMoveesxcfg-advcfg -g /DataMover/HardwareAcceleratedInitesxcfg-advcfg -g /VMFS6/HardwareAcceleratedLockingWhen VAAI is turned on, the result should look as demonstrated in the screenshot below:The same commands with -s key will change the value of the parameter.For example, the command:esxcfg-advcfg –s 1 /DataMover/HardwareAcceleratedMove is demonstrated in the picture below:15.In the case below, the virtual machine migrated between two Datastores created onStarWind devices. VAAI has been enabled on the ESXI host and in the StarWindconfiguration file. The virtual machine migration took around 55 seconds and theworkload on the NIC during the migration is shown in the picture below:The maximum network usage was approximately 3 MBps.16.Without VAAI, the virtual machine migration took around 1 minute 15 sec.The maximumnetwork usage was approximately 20 MBps. Contrary to the case above, the network load is higher.SummaryVAAI support allows StarWind to offload multiple storage operations from the VMware hosts to the storage array itself. Thus, these operations are carried out much faster and with no impact on the system’s performance.ContactsStarWind Software, Inc. 35 Village Rd., Suite 100, Middleton, MA 01949 USA ©2018, StarWind Software Inc. All rights reserved.TECHNICAL PAPER 11。
云计算外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)原文:Technical Issues of Forensic Investigations in Cloud Computing EnvironmentsDominik BirkRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyAbstract—Cloud Computing is arguably one of the most discussedinformation technologies today. It presents many promising technological and economical opportunities. However, many customers remain reluctant to move their business IT infrastructure completely to the cloud. One of their main concerns is Cloud Security and the threat of the unknown. Cloud Service Providers(CSP) encourage this perception by not letting their customers see what is behind their virtual curtain. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. Cloud Forensics constitutes a new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the cloud, traditional approaches to evidence collection and recovery are no longer practical. This paper focuses on the technical aspects of digital forensics in distributed cloud environments. We contribute by assessing whether it is possible for the customer of cloud computing services to perform a traditional digital investigation from a technical point of view. Furthermore we discuss possible solutions and possible new methodologies helping customers to perform such investigations.I. INTRODUCTIONAlthough the cloud might appear attractive to small as well as to large companies, it does not come along without its own unique problems. Outsourcing sensitive corporate data into the cloud raises concerns regarding the privacy and security of data. Security policies, companies main pillar concerning security, cannot be easily deployed into distributed, virtualized cloud environments. This situation is further complicated by the unknown physical location of the companie’s assets. Normally,if a security incident occurs, the corporate security team wants to be able to perform their own investigation without dependency on third parties. In the cloud, this is not possible anymore: The CSP obtains all the power over the environmentand thus controls the sources of evidence. In the best case, a trusted third party acts as a trustee and guarantees for the trustworthiness of the CSP. Furthermore, the implementation of the technical architecture and circumstances within cloud computing environments bias the way an investigation may be processed. In detail, evidence data has to be interpreted by an investigator in a We would like to thank the reviewers for the helpful comments and Dennis Heinson (Center for Advanced Security Research Darmstadt - CASED) for the profound discussions regarding the legal aspects of cloud forensics. proper manner which is hardly be possible due to the lackof circumstantial information. For auditors, this situation does not change: Questions who accessed specific data and information cannot be answered by the customers, if no corresponding logs are available. With the increasing demand for using the power of the cloud for processing also sensible information and data, enterprises face the issue of Data and Process Provenance in the cloud [10]. Digital provenance, meaning meta-data that describes the ancestry or history of a digital object, is a crucial feature for forensic investigations. In combination with a suitable authentication scheme, it provides information about who created and who modified what kind of data in the cloud. These are crucial aspects for digital investigations in distributed environments such as the cloud. Unfortunately, the aspects of forensic investigations in distributed environment have so far been mostly neglected by the research community. Current discussion centers mostly around security, privacy and data protection issues [35], [9], [12]. The impact of forensic investigations on cloud environments was little noticed albeit mentioned by the authors of [1] in 2009: ”[...] to our knowledge, no research has been published on how cloud computing environments affect digital artifacts,and on acquisition logistics and legal issues related to cloud computing env ironments.” This statement is also confirmed by other authors [34], [36], [40] stressing that further research on incident handling, evidence tracking and accountability in cloud environments has to be done. At the same time, massive investments are being made in cloud technology. Combined with the fact that information technology increasingly transcendents peoples’ private and professional life, thus mirroring more and more of peoples’actions, it becomes apparent that evidence gathered from cloud environments will be of high significance to litigation or criminal proceedings in the future. Within this work, we focus the notion of cloud forensics by addressing the technical issues of forensics in all three major cloud service models and consider cross-disciplinary aspects. Moreover, we address the usability of various sources of evidence for investigative purposes and propose potential solutions to the issues from a practical standpoint. This work should be considered as a surveying discussion of an almost unexplored research area. The paper is organized as follows: We discuss the related work and the fundamental technical background information of digital forensics, cloud computing and the fault model in section II and III. In section IV, we focus on the technical issues of cloud forensics and discuss the potential sources and nature of digital evidence as well as investigations in XaaS environments including thecross-disciplinary aspects. We conclude in section V.II. RELATED WORKVarious works have been published in the field of cloud security and privacy [9], [35], [30] focussing on aspects for protecting data in multi-tenant, virtualized environments. Desired security characteristics for current cloud infrastructures mainly revolve around isolation of multi-tenant platforms [12], security of hypervisors in order to protect virtualized guest systems and secure network infrastructures [32]. Albeit digital provenance, describing the ancestry of digital objects, still remains a challenging issue for cloud environments, several works have already been published in this field [8], [10] contributing to the issues of cloud forensis. Within this context, cryptographic proofs for verifying data integrity mainly in cloud storage offers have been proposed,yet lacking of practical implementations [24], [37], [23]. Traditional computer forensics has already well researched methods for various fields of application [4], [5], [6], [11], [13]. Also the aspects of forensics in virtual systems have been addressed by several works [2], [3], [20] including the notionof virtual introspection [25]. In addition, the NIST already addressed Web Service Forensics [22] which has a huge impact on investigation processes in cloud computing environments. In contrast, the aspects of forensic investigations in cloud environments have mostly been neglected by both the industry and the research community. One of the first papers focusing on this topic was published by Wolthusen [40] after Bebee et al already introduced problems within cloud environments [1]. Wolthusen stressed that there is an inherent strong need for interdisciplinary work linking the requirements and concepts of evidence arising from the legal field to what can be feasibly reconstructed and inferred algorithmically or in an exploratory manner. In 2010, Grobauer et al [36] published a paper discussing the issues of incident response in cloud environments - unfortunately no specific issues and solutions of cloud forensics have been proposed which will be done within this work.III. TECHNICAL BACKGROUNDA. Traditional Digital ForensicsThe notion of Digital Forensics is widely known as the practice of identifying, extracting and considering evidence from digital media. Unfortunately, digital evidence is both fragile and volatile and therefore requires the attention of special personnel and methods in order to ensure that evidence data can be proper isolated and evaluated. Normally, the process of a digital investigation can be separated into three different steps each having its own specificpurpose:1) In the Securing Phase, the major intention is the preservation of evidence for analysis. The data has to be collected in a manner that maximizes its integrity. This is normally done by a bitwise copy of the original media. As can be imagined, this represents a huge problem in the field of cloud computing where you never know exactly where your data is and additionallydo not have access to any physical hardware. However, the snapshot technology, discussed in section IV-B3, provides a powerful tool to freeze system states and thus makes digital investigations, at least in IaaS scenarios, theoretically possible.2) We refer to the Analyzing Phase as the stage in which the data is sifted and combined. It is in this phase that the data from multiple systems or sources is pulled together to create as complete a picture and event reconstruction as possible. Especially in distributed system infrastructures, this means that bits and pieces of data are pulled together for deciphering the real story of what happened and for providing a deeper look into the data.3) Finally, at the end of the examination and analysis of the data, the results of the previous phases will be reprocessed in the Presentation Phase. The report, created in this phase, is a compilation of all the documentation and evidence from the analysis stage. The main intention of such a report is that it contains all results, it is complete and clear to understand. Apparently, the success of these three steps strongly depends on the first stage. If it is not possible to secure the complete set of evidence data, no exhaustive analysis will be possible. However, in real world scenarios often only a subset of the evidence data can be secured by the investigator. In addition, an important definition in the general context of forensics is the notion of a Chain of Custody. This chain clarifies how and where evidence is stored and who takes possession of it. Especially for cases which are brought to court it is crucial that the chain of custody is preserved.B. Cloud ComputingAccording to the NIST [16], cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal CSP interaction. The new raw definition of cloud computing brought several new characteristics such as multi-tenancy, elasticity, pay-as-you-go and reliability. Within this work, the following three models are used: In the Infrastructure asa Service (IaaS) model, the customer is using the virtual machine provided by the CSP for installing his own system on it. The system can be used like any other physical computer with a few limitations. However, the additive customer power over the system comes along with additional security obligations. Platform as a Service (PaaS) offerings provide the capability to deploy application packages created using the virtual development environment supported by the CSP. For the efficiency of software development process this service model can be propellent. In the Software as a Service (SaaS) model, the customer makes use of a service run by the CSP on a cloud infrastructure. In most of the cases this service can be accessed through an API for a thin client interface such as a web browser. Closed-source public SaaS offers such as Amazon S3 and GoogleMail can only be used in the public deployment model leading to further issues concerning security, privacy and the gathering of suitable evidences. Furthermore, two main deployment models, private and public cloud have to be distinguished. Common public clouds are made available to the general public. The corresponding infrastructure is owned by one organization acting as a CSP and offering services to its customers. In contrast, the private cloud is exclusively operated for an organization but may not provide the scalability and agility of public offers. The additional notions of community and hybrid cloud are not exclusively covered within this work. However, independently from the specific model used, the movement of applications and data to the cloud comes along with limited control for the customer about the application itself, the data pushed into the applications and also about the underlying technical infrastructure.C. Fault ModelBe it an account for a SaaS application, a development environment (PaaS) or a virtual image of an IaaS environment, systems in the cloud can be affected by inconsistencies. Hence, for both customer and CSP it is crucial to have the ability to assign faults to the causing party, even in the presence of Byzantine behavior [33]. Generally, inconsistencies can be caused by the following two reasons:1) Maliciously Intended FaultsInternal or external adversaries with specific malicious intentions can cause faults on cloud instances or applications. Economic rivals as well as former employees can be the reason for these faults and state a constant threat to customers and CSP. In this model, also a malicious CSP is included albeit he isassumed to be rare in real world scenarios. Additionally, from the technical point of view, the movement of computing power to a virtualized, multi-tenant environment can pose further threads and risks to the systems. One reason for this is that if a single system or service in the cloud is compromised, all other guest systems and even the host system are at risk. Hence, besides the need for further security measures, precautions for potential forensic investigations have to be taken into consideration.2) Unintentional FaultsInconsistencies in technical systems or processes in the cloud do not have implicitly to be caused by malicious intent. Internal communication errors or human failures can lead to issues in the services offered to the costumer(i.e. loss or modification of data). Although these failures are not caused intentionally, both the CSP and the customer have a strong intention to discover the reasons and deploy corresponding fixes.IV. TECHNICAL ISSUESDigital investigations are about control of forensic evidence data. From the technical standpoint, this data can be available in three different states: at rest, in motion or in execution. Data at rest is represented by allocated disk space. Whether the data is stored in a database or in a specific file format, it allocates disk space. Furthermore, if a file is deleted, the disk space is de-allocated for the operating system but the data is still accessible since the disk space has not been re-allocated and overwritten. This fact is often exploited by investigators which explore these de-allocated disk space on harddisks. In case the data is in motion, data is transferred from one entity to another e.g. a typical file transfer over a network can be seen as a data in motion scenario. Several encapsulated protocols contain the data each leaving specific traces on systems and network devices which can in return be used by investigators. Data can be loaded into memory and executed as a process. In this case, the data is neither at rest or in motion but in execution. On the executing system, process information, machine instruction and allocated/de-allocated data can be analyzed by creating a snapshot of the current system state. In the following sections, we point out the potential sources for evidential data in cloud environments and discuss the technical issues of digital investigations in XaaS environmentsas well as suggest several solutions to these problems.A. Sources and Nature of EvidenceConcerning the technical aspects of forensic investigations, the amount of potential evidence available to the investigator strongly diverges between thedifferent cloud service and deployment models. The virtual machine (VM), hosting in most of the cases the server application, provides several pieces of information that could be used by investigators. On the network level, network components can provide information about possible communication channels between different parties involved. The browser on the client, acting often as the user agent for communicating with the cloud, also contains a lot of information that could be used as evidence in a forensic investigation. Independently from the used model, the following three components could act as sources for potential evidential data.1) Virtual Cloud Instance: The VM within the cloud, where i.e. data is stored or processes are handled, contains potential evidence [2], [3]. In most of the cases, it is the place where an incident happened and hence provides a good starting point for a forensic investigation. The VM instance can be accessed by both, the CSP and the customer who is running the instance. Furthermore, virtual introspection techniques [25] provide access to the runtime state of the VM via the hypervisor and snapshot technology supplies a powerful technique for the customer to freeze specific states of the VM. Therefore, virtual instances can be still running during analysis which leads to the case of live investigations [41] or can be turned off leading to static image analysis. In SaaS and PaaS scenarios, the ability to access the virtual instance for gathering evidential information is highly limited or simply not possible.2) Network Layer: Traditional network forensics is knownas the analysis of network traffic logs for tracing events that have occurred in the past. Since the different ISO/OSI network layers provide several information on protocols and communication between instances within as well as with instances outside the cloud [4], [5], [6], network forensics is theoretically also feasible in cloud environments. However in practice, ordinary CSP currently do not provide any log data from the network components used by the customer’s instances or applications. For instance, in case of a malware infection of an IaaS VM, it will be difficult for the investigator to get any form of routing information and network log datain general which is crucial for further investigative steps. This situation gets even more complicated in case of PaaS or SaaS. So again, the situation of gathering forensic evidence is strongly affected by the support the investigator receives from the customer and the CSP.3) Client System: On the system layer of the client, it completely depends on the used model (IaaS, PaaS, SaaS) if and where potential evidence could beextracted. In most of the scenarios, the user agent (e.g. the web browser) on the client system is the only application that communicates with the service in the cloud. This especially holds for SaaS applications which are used and controlled by the web browser. But also in IaaS scenarios, the administration interface is often controlled via the browser. Hence, in an exhaustive forensic investigation, the evidence data gathered from the browser environment [7] should not be omitted.a) Browser Forensics: Generally, the circumstances leading to an investigation have to be differentiated: In ordinary scenarios, the main goal of an investigation of the web browser is to determine if a user has been victim of a crime. In complex SaaS scenarios with high client-server interaction, this constitutes a difficult task. Additionally, customers strongly make use of third-party extensions [17] which can be abused for malicious purposes. Hence, the investigator might want to look for malicious extensions, searches performed, websites visited, files downloaded, information entered in forms or stored in local HTML5 stores, web-based email contents and persistent browser cookies for gathering potential evidence data. Within this context, it is inevitable to investigate the appearance of malicious JavaScript [18] leading to e.g. unintended AJAX requests and hence modified usage of administration interfaces. Generally, the web browser contains a lot of electronic evidence data that could be used to give an answer to both of the above questions - even if the private mode is switched on [19].B. Investigations in XaaS EnvironmentsTraditional digital forensic methodologies permit investigators to seize equipment and perform detailed analysis on the media and data recovered [11]. In a distributed infrastructure organization like the cloud computing environment, investigators are confronted with an entirely different situation. They have no longer the option of seizing physical data storage. Data and processes of the customer are dispensed over an undisclosed amount of virtual instances, applications and network elements. Hence, it is in question whether preliminary findings of the computer forensic community in the field of digital forensics apparently have to be revised and adapted to the new environment. Within this section, specific issues of investigations in SaaS, PaaS and IaaS environments will be discussed. In addition, cross-disciplinary issues which affect several environments uniformly, will be taken into consideration. We also suggest potential solutions to the mentioned problems.1) SaaS Environments: Especially in the SaaS model, the customer does notobtain any control of the underlying operating infrastructure such as network, servers, operating systems or the application that is used. This means that no deeper view into the system and its underlying infrastructure is provided to the customer. Only limited userspecific application configuration settings can be controlled contributing to the evidences which can be extracted fromthe client (see section IV-A3). In a lot of cases this urges the investigator to rely on high-level logs which are eventually provided by the CSP. Given the case that the CSP does not run any logging application, the customer has no opportunity to create any useful evidence through the installation of any toolkit or logging tool. These circumstances do not allow a valid forensic investigation and lead to the assumption that customers of SaaS offers do not have any chance to analyze potential incidences.a) Data Provenance: The notion of Digital Provenance is known as meta-data that describes the ancestry or history of digital objects. Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud environments, yet it is still a challenging issue today [8]. Albeit data provenance is of high significance also for IaaS and PaaS, it states a huge problem specifically for SaaS-based applications: Current global acting public SaaS CSP offer Single Sign-On (SSO) access control to the set of their services. Unfortunately in case of an account compromise, most of the CSP do not offer any possibility for the customer to figure out which data and information has been accessed by the adversary. For the victim, this situation can have tremendous impact: If sensitive data has been compromised, it is unclear which data has been leaked and which has not been accessed by the adversary. Additionally, data could be modified or deleted by an external adversary or even by the CSP e.g. due to storage reasons. The customer has no ability to proof otherwise. Secure provenance mechanisms for distributed environments can improve this situation but have not been practically implemented by CSP [10]. Suggested Solution: In private SaaS scenarios this situation is improved by the fact that the customer and the CSP are probably under the same authority. Hence, logging and provenance mechanisms could be implemented which contribute to potential investigations. Additionally, the exact location of the servers and the data is known at any time. Public SaaS CSP should offer additional interfaces for the purpose of compliance, forensics, operations and security matters to their customers. Through an API, the customers should have the ability to receive specific information suchas access, error and event logs that could improve their situation in case of aninvestigation. Furthermore, due to the limited ability of receiving forensic information from the server and proofing integrity of stored data in SaaS scenarios, the client has to contribute to this process. This could be achieved by implementing Proofs of Retrievability (POR) in which a verifier (client) is enabled to determine that a prover (server) possesses a file or data object and it can be retrieved unmodified [24]. Provable Data Possession (PDP) techniques [37] could be used to verify that an untrusted server possesses the original data without the need for the client to retrieve it. Although these cryptographic proofs have not been implemented by any CSP, the authors of [23] introduced a new data integrity verification mechanism for SaaS scenarios which could also be used for forensic purposes.2) PaaS Environments: One of the main advantages of the PaaS model is that the developed software application is under the control of the customer and except for some CSP, the source code of the application does not have to leave the local development environment. Given these circumstances, the customer obtains theoretically the power to dictate how the application interacts with other dependencies such as databases, storage entities etc. CSP normally claim this transfer is encrypted but this statement can hardly be verified by the customer. Since the customer has the ability to interact with the platform over a prepared API, system states and specific application logs can be extracted. However potential adversaries, which can compromise the application during runtime, should not be able to alter these log files afterwards. Suggested Solution:Depending on the runtime environment, logging mechanisms could be implemented which automatically sign and encrypt the log information before its transfer to a central logging server under the control of the customer. Additional signing and encrypting could prevent potential eavesdroppers from being able to view and alter log data information on the way to the logging server. Runtime compromise of an PaaS application by adversaries could be monitored by push-only mechanisms for log data presupposing that the needed information to detect such an attack are logged. Increasingly, CSP offering PaaS solutions give developers the ability to collect and store a variety of diagnostics data in a highly configurable way with the help of runtime feature sets [38].3) IaaS Environments: As expected, even virtual instances in the cloud get compromised by adversaries. Hence, the ability to determine how defenses in the virtual environment failed and to what extent the affected systems havebeen compromised is crucial not only for recovering from an incident. Also forensic investigations gain leverage from such information and contribute to resilience against future attacks on the systems. From the forensic point of view, IaaS instances do provide much more evidence data usable for potential forensics than PaaS and SaaS models do. This fact is caused throughthe ability of the customer to install and set up the image for forensic purposes before an incident occurs. Hence, as proposed for PaaS environments, log data and other forensic evidence information could be signed and encrypted before itis transferred to third-party hosts mitigating the chance that a maliciously motivated shutdown process destroys the volatile data. Although, IaaS environments provide plenty of potential evidence, it has to be emphasized that the customer VM is in the end still under the control of the CSP. He controls the hypervisor which is e.g. responsible for enforcing hardware boundaries and routing hardware requests among different VM. Hence, besides the security responsibilities of the hypervisor, he exerts tremendous control over how customer’s VM communicate with the hardware and theoretically can intervene executed processes on the hosted virtual instance through virtual introspection [25]. This could also affect encryption or signing processes executed on the VM and therefore leading to the leakage of the secret key. Although this risk can be disregarded in most of the cases, the impact on the security of high security environments is tremendous.a) Snapshot Analysis: Traditional forensics expect target machines to be powered down to collect an image (dead virtual instance). This situation completely changed with the advent of the snapshot technology which is supported by all popular hypervisors such as Xen, VMware ESX and Hyper-V.A snapshot, also referred to as the forensic image of a VM, providesa powerful tool with which a virtual instance can be clonedby one click including also the running system’s mem ory. Due to the invention of the snapshot technology, systems hosting crucial business processes do not have to be powered down for forensic investigation purposes. The investigator simply creates and loads a snapshot of the target VM for analysis(live virtual instance). This behavior is especially important for scenarios in which a downtime of a system is not feasible or practical due to existing SLA. However the information whether the machine is running or has been properly powered down is crucial [3] for the investigation. Live investigations of running virtual instances become more common providing evidence data that。
博士英语多维教程通达课文解释及课后答案!Unit 1 What Will BeBackground InformationLanguage PointsKey to Exercises1.We’ve now acknowledged some fundamental ancient human forces and the ways they will affect and be affected by the Information Marketplace. And throughout the course of this book we’ve answered the questions we raised at the very beginning. So it is time to finally consider the greatest transformation that the Information Marketplace ha to offer. To get to it, let’s reconstruct the growing crescendo of key discoveries we have made, which together describe “what will be.”2.We began with a simple but far-reaching model of the future world of information as an Information Marketplace, where people and their computers will buy, sell, and freely exchange information. Our first discovery was that this Information Marketplace can indeed be built on a technological foundation: the information infrastructure. We went on to explore the many human-machine interfaces people will use to get in and out of this new edifice, from virtual reality and fancy bodysuits to the lowly keyboard, and singled out speech interfaces as perhaps the most significant and imminent. We explored the pipes that will carry our information and the ways we will bend them to give us the speed, reliability, and security we need. We also saw how a vast array of new shared software tools will evolve on this infrastructure, shifting the attention of the entire software business from individual to interconnected computers. The arrival of this foundation is certain, but it could be delayed by a decade or more if the key players continue their wars for control and their indifference toward the shared infrastructure they all need. We saw too that there won’t be just a handful of winners that will survive t hese wars; the terrain is vast, rich, and full of challenges for almost every supplier and consumer of information to be a winner.3.Our second major discovery was that the Information Marketplace will dramaticallyaffect people and organizations on a wide scale. Besides its many uses in commerce, office work, and manufacturing it will also improve health care, provide new ways to shop, enable professional and social encounters across the globe and generally permeate the thousands of thins we do in the course of our daily lives. It will help us pursue old and new pleasures, and it will encourage new art forms, which may be criticized but will move art forward, as new tools have always done. It will also improve education and training first in specific and established ways and later through breakthroughs that are confidently awaited. Human organizations from tiny companies to entire national governments will benefit too, because so much of the work they do is information work.4.Putting all these detailed uses in perspective, we came to realize that they are different faces of two major new forces: electronic bulldozers and electronic proximity. Each has broad consequences for society. The electronic bulldozers’ effect is primarily economic, increasing human productivity in both our personal lives and the workplace. The rapid, widespread distribution of information in the form of info-nouns (text, photos, sounds, video) and especially info-verbs (human and machine work on information) is one simple way in which productivity will increase. Automatization is the other powerful effector; machine-to-machine exchanges will off-loaded human brain work the way machines of the Industrial Revolution off-loaded muscle work. We concluded, however, that to enjoy the productivity benefits we will have to avoid and correct certain technological and human pitfalls.5.To better understand the economic impact of the Information Marketplace, we explored the value of information and its consequences. This led us to a few troublesome discoveries: the huge amount of info-junk we’ll have to work hard to avoid and the gap between rich and poor nations (and people) that will increase if we do nothing to stop it. Other economic consequences were less clear, like the unemployment rate ov er the long run, which we can’t fore cast even though we can foresee many new types of jobs.6.Another important discovery from these explorations was the power of the Information Marketplace to customize information and information work to different huma n and organizational needs. To leverage this power, we’ll need to make our machines considerably easier to use that they are today. With increased productivityand customization, we can look forward to a larger array of better, cheaper. More customized products and services that will reach us even faster than before. More important, by making machines easier to use and giving ourselves the ability to fashion software painlessly and rapidly, we can fulfill the promise of the Information Age to tailor the new technologies to our individual human and organizational purposes, rather than the other way around.7.The second of the two major forces --- electronic proximity --- will increase bya thousand times the number of people we can easily reach and will bring people together across space and time. Many social consequences, good and bad, will arise as this new proximity distributes powers of control from central authorities to the many hands of the world’s people. Groupwork and telework will further help impro ve human productivity. Democracy will spread, as will people’s knowledge of one another’s beliefs, wishes, and problems. The voiceless millions of the world will come to be heard and be better understood, provided that the wealthy nations help the less wealthy ones enter the Information Club. Ethnic groups may become more cohesive, as people belonging to a certain tribe use the Information Marketplace to bind themselves together regardless of where they may be. At the same time. The Information Marketplace will help shared cultures grow in nations that thrive on diversity.And though we need not change our legal framework in any major way to accommodate the Information Marketplace, different nations will need to cooperate on shared conventions for security, billing, and other transnational issues that will surely arise as shared information crosses international barriers. On another level, electronic proximity will foster a shared universal culture, a thin veneer on top of all the world’s individual national cultures. We hope that this ecumenical property of the Information Marketplace to enhance the co-existence of nationalistic identity and international community will help us understand one another and stay peaceful.8.Our exploration then brought us squarely before human emotions and human relationships. We discovered that they will pass only partially through eh Information Marketplace. Physical proximity will still be necessary to consummate these emotions and recharge the batteries that will sustain human relationships between virtual encounters. Finally, we discovered that the primitive forces of the cave that lie at the roots of our emotions and passions do not pass through theInformation Marketplace; deep down, our psyches know that 1s and 0s cannot love, nurture, hurt, or kill us at a distance. Because many of our most valued actions and decisions involve these forces like trust, love, and fear --- the information world will not be a substitute for the physical world.9.Given all these possibilities for change, we considered what might happen when they bump up against the ancient human beings that we are and have been for thousands of years. Predictably, we discovered that we will have difficulty coping with the increased social and technological complexity and overload brought forth by the Information Marketplace. Though we will be potentially close to hundreds of millions of people, we will be able to deal with only a very few of them at any given time. Yet we saw that we might be able to reduce some of these complexity problems by making the artifacts of the Information Age easier to use --- a primary goal for the technologists of the twenty-first century.10.The Information Marketplace will make of us urban villagers --- half urban sophisticate, roaming the virtual globe, and half villager, spending more time at home and tending to family, friends, and the routines of the neighborhood. If our psyches tilt toward the crowded urban info-city, we will become more jaded, more oriented toward the self, and more indifferent, fickle, and casual in our relationships with others, as well as less tightly connected to our families and friends. If we tilt toward the village, we may be surprised by a resurgence of more closely knit families rooted in our tighter human bonds. Indeed, if we use it correctly, the Information Marketplace can be a powerful magniying lens that can amplify goodness --- employing disabled and home-bound workers, matching help needed with help offered via the Virtual Compassion Corps, and helping people learn and stay healthy, among many other possibilities.11.Reflecting on our exploration, we also discovered that people will exploit the newness, vagueness, and breadth of the Information Marketplace to support their wishes and predilections, whatever they may be. Some proclaim that the world of information can stand out only by offering educationally and culturally rich opportunities that will benefit humanity. Others will use the Information Marketplace as a new battle ground for the familiar disputes --- capitalism versus socialism, greed versus compassion. Materialism versus spiritualism, practicality versus abstraction --- all suitably described as ‘new’ issues. As in the case ofmoney, there is hardly and event, action, or process that is not linked to and affected by information, so such arguments can sound plausible. But they should not deceive us; the discerning eye w8ill distinguish that which is likely from that which is merely possible.12.The wise eye will also see that the Information Marketplace is much more influential than its parts --- the interfaces, middleware and pipes that make up the three-story building on which we stand. Once they are integrated, they present a much greater power --- the power to prevent an asthmatic from dying in a remote town in Alaska, to enable an unemployed bank loan officer to find and succeed at a new form of work, to allow a husband and wife to revel in the accomplishments of a distant daughter while also providing emotional and financial support. These powers are far greater than the ability to send an e-mail message, or to have give hundred TV channels.13.The Information Marketplace will transform our society over the next century as significantly as the two industrial revolutions, establishing itself solidly and rightfully as the Third Revolution in modern human history. It is big, exciting, and awesome. We need not fear it any more or any less than people feared the other revolutions, because it carries similar promises and pitfalls. What we needed to do, instead, is understand it, feel it, and embrace it so that we may use it to steer our future human course.14.We could stop here, after putting all these discoveries together, satisfied and impressed with our overarching vision of a third socioeconomic revolution. However, if we look even deeper at the bold and historic imperative that the Information Marketplace calls us to embrace, we will see all three revolutions as part of a far greater movement, well beyond combines, steam engines, and computer --- a movement toward a new age that may liberate the total human potential within each of us.15.On to our final discovery.Background InformationAbout the author and the bookFor two decades, technological oracle, entrepreneur, and consultant Michael policymakers and CEOs (i.e. chief executive officers) on the future course and impact of these technologies. In 1980 Dertouzos predicted today’s world of information with stunning accuracy. Now, in What Will Be he charts a unique and richly detailed map of the ways information technology will alter every facet of our public and private lives, from a few years to a century hence.Dertouzos heads the MIT Laboratory for Computer Science - home of the World Wide Web and birthplace of many of the high-tech products and processes that surround us today. In What Will Be, he offers the ultimate insider’s preview of the inventions that will usher in a Third Revolution to rival the Agricultural and Industrial Revolutions. And in deft and detailed analysis, Dertouzos reveals the changes we will experience in everyday life, in the pursuit of pleasure, health, learning, office work, commerce, manufacturing, and governance. Debunking the starry-eyed view of new technology promoted by many commentators - while taking the Luddites firmly to task -Dertouzos unveils a crisp picture of the new century’s global information marketplace and shows how it will affect one-half of the world’s industrial economies. He uncovers what’s wrong with technology, explains how we can right the wrongs, and identifies the key trade-offs tomorrow will bring. Dertouzos even highlights what aspects of our society and ourselves will never be altered by technology and offers an inspiring blueprint for how new tech could bridge the centuries-old gaps between reason and the spirit.Bill Gates wrote the foreword to the book. The book has three parts: I. Shaping the Future, which explains the new technologies so that readers can judge unfolding events for themselves; II. How Your Life Will Change, which imagines how and justifies why our lives will be recast; and III. Reuniting Technology and Humanity, which assesses the impact of these changes on our society and our humanity.some fundamental ancient human forcesDertouzos points out that no matter how powerful and pervasive a technological force may be, it will face some immutable human trait that will always act to conserve the constancy and stability of our species. We carry the features and mannerisms of our ancestors as well as our common reflexes and human patterns acquired through evolution. The fear, love, anger, greed, and sadness that we feel today are rootedin the caves that we inhabited thousand of years ago. It was in that ancient setting that the predator’s growl and the enemy’s attack defined primal fear. It was there, too, that our other primal feelings became reinforced - protecting our children, enjoying the pleasure of physical contact with our mate, relying on our fellow tribes people, and so on. These are the forces of the cave. In the new world of information, these fundamental human qualities haven’t left us.the information MarketplaceDertouzos thinks that there is great confusion in the world today about what the “Information Age” is , both physically and functionally. The model of an Information Marketplace is a clean way to envision both. In this Information Marketplace, people and machines buy, sell, and freely exchange information and information services.the questions we raised at the very beginningIn Chapter One of Part I Shaping the Future, the author lists a number of questions the book will tackle. They include: Will computers increase the industrial performance of the world’s nations, or is the help they offer irrelevant to that quest? Will our way of life improve through cheaper, faster, and higher-quality health care and a greater access to knowledge? Or is better information a minor player in these quests? What new software will flourish in the Information Marketplace? How close to the real world can we get wit goggles, tactile bodynets, virtual “feelies” and “ smellies”? Will ordinary citizens be better heard by their governments, or are electronic town halls impossible or achiev3e? What will happen to human relationships?the information infrastructureThe Information Marketplace is more extensive than a village market. It is closer to a bustling metropolis where many people, shops, offices, and organizations busily conduct millions of personal and commercial interactions in pursuit of their own goals. In a real city, these activities are supported by a shared foundation - an infrastructure of roads for the transportation of people and goods; of pipes and wires for moving water, electricity, and phone conversations; of door, locks, andpolice that maintain order; and of some agreed-upon conventions like a common language a nd accepted behaviors t5hat facilitate interactions among the city’s people.In exactly the same way, the Information Marketplace is built on a shared infrastructure made up of all the information tools and services that enable its many activities to function smoothly and productively. This infrastructure will be distributed and owned by all us, not a single organization. It will move the data, voice, text, and X-ray images in the severe-asthma scenario by negotiating automatically with phone, cable, satellite, and wireless carriers and with the kiosk and computers at the radiology lab and doctors’ offices. The infrastructure will support all the online interviews and reviews people will perform in their daily jobs. And it will help transact all the business from the World Shop.virtual realityIt’s a system that enables one or more users to move and react in a computer-simulated environment. Various types of devices allow uses to sense and manipulate virtual objects much as they would real objects. This natural style of interaction gives participants the feeling of being immersed in the simulated world. Virtual worlds are crated by mathematical models and computer programs.electronic bulldozers and electronic proximityAccording to Dertouzos, ultimately most of the hardware and communications technologies, human-machine interfaces, middleware, and information infrastructures will either serve as electronic bulldozers or create electronic proximity. The bulldozers will relieve us of the burden of human work, either by completely replacing information-related human activities or by augmenting our ability to carry out these activities with less human work - in short, by increasing our productivity.The second new force arising from the Information Marketplace is electronic proximity. During the Industrial Age people’s physical mobility expanded tremendously, widening a person’s universe of potential relationships from a few hundred village neighbors to hundreds of thousand of people within driving range.As a result, our proximity to people whom we could reach grew a thousandfold. Incredibly, the Information Marketplace will increase this range by yet another thousandfold, to hundreds of millions of people who will be within electronic reach, That is the essence of the gigantic new force we call kilometers but in keystrokes and other electronic gesture, the whole scene will resemble a billion people and machines all squeezed into one electronic city block.two industrial revolutionsThe first industrial revolution began in England when the steam engines was invented in the middle of the eighteenth century. The appearance of the internal combustion engine, electricity, synthetic chemicals, and the automobile by the end of the nineteenth century marked the second industrial revolution.Language Points1.crescendo : a sound or a piece of music that becomes gradually louder; a time when people are becoming more and more excited, anxious, or angrye.g. In the past ten days Zaire has published a mounting crescendo of attacks on Belgium.A crescendo of resentment was built up between the two companies because of series of conflicts in trade transactions.rise to/ reach a crescendo: become gradually loudere.g. It’s possible for the organist to reach a very quick crescendo by using all these stops.2.interface: [C] the part of a computer system through which two different machines are connected; the way in which two subjects, events etc. affect each othere.g. In a press conference, the Prime Minister proposed some new ways of involving young people with the interface between technology and design.They have just designed a new interface between a computer and a typesetting machine, which works extremely well.v.:[+with] connect; cooperatee.g. interface a device with a computerThe computer technicians interface with the flight controllers.3.single out: choose, select one person or thing from among several for special comment, treatment etc.e.g. I imagine that to be singled out by the Captain for a farewell luncheon is indeed an honor.Nana and Margaret were singled out for special praise for their outstanding performance during the experiment.4.imminent : about to happen, usu. Used in reference to things that are unpleasant or that you think will prove to be unpleasante.g. The report points out that there does not seem to be an imminent danger of amine on a world scale.With the election imminent, Churchill returned to London before the meeting was finished.5.We explored the pipes that will carry our information and the ways we will bend them to give us the speed, reliability, and security we need: We search for the pipes that can transfer our information and the way s we will manipulate and apply them to offer us the speed, reliability and security we need. Here the complete clause for “the ways we will bend them” is “ the ways in which we will bend them”. When the preposition “in” is combined with “way” to introduce an attributive clause, it is often omitted.bend v.: focus, apply; force to submite.g. He is very firm about it; I cannot bend him.Anyone who applies for this position in the company should bend his or her will to corporate goals.6.The arrival of this foundation is certain, but it could be delayed by a decade or more if the key players continue their wars for control and their indifference toward the shared infrastructure they all need.: Here the word “they” refers to “the key players”. According to the foregoing sentences, key players are “the computer, software, media, telecom, and cable companies”.indifference n.:[U] a complete lack of interest in sth. or someonee.g. Many native speakers of a language show indifference to /towards grammatical points.His attitude to his work is one of bored indifference.7.permeate vt.: penetrate wholly, pervade, soak throughe.g. Toxic chemicals may permeate the soil, threatening the environment.Changes in civilian life have not yet begun to permeate the army.putting all these detailed uses in perspective, we came to realize that﹍: judging the importance of all these detailed uses correctly, we began to find that﹍8.perspective n.: a specific point of view in understanding or judging things or events, esp. one that show them in their true relations to one anothere.g. He wants to leave the country in order to get a better perspective on things.From the top of the hill you can get a perspective of the entire lake.get/keep/put sth in perspective: judge the importance of sth correctlye.g. It will help to put in perspective the vast gulf that separates existing groups.First of all, we ought to get our temporary advantage into some kind of perspective.from the perspective of/from a﹍perspective: from a specific point of viewe.g. Feminists say that the book was written from a male perspective.The novel is written from the perspective of a primary school pupil.in/out of perspective: showing the correct/incorrect relationship between visible objectse.g. The houses don’t seem to be in perspective in your drawing.The drawing of the house is good, but the car is out of perspective.9.Another important discovery from these explorations was the power of the Information Marketplace to customize information and information work to different human and organizational needs.: One more key finding of these explorations was the power of the Information Marketplace to make information and information work more suited to human and organizational needs.customize v.: make or change sth according to the buyer’s or user’s needse.g. General Motors will customize Cadillas for special clients.The computer programs can be customized for individual users.10.To leverage this power, we’ll need t o make our machines considerably easier to use than they are today.: To make the best use of the power of the Information Marketplace for economic profits, we’ll need to redesign our machines till they are much more easier to use than now.11.fashion v. :shape or make sth, using your hands or only a few tools; influenceor form someone’s ideas and opinionse.g. He fashioned a box from a few old pieces of wood.The Japanese authorities want to fashion a new political role for the country.in a ﹍fashion: in a particular waye.g. The authorities appear to have abandoned any attempt to distribute food and water in an orderly fashion.Latha joined her hands together in an Indian fashion and gave a little bow.In/out of fashion: popular/not populare.g. This is a policy that is increasingly out of fashion.Capability and efficiency seem to be coming back into fashion.after the fashion of: (sth.)done in a way that is typical of someonee.g. Leibnitz was another child prodigy who, after the fashion of his kind, was writing Greek and Latin from an early age.12.tailor﹍to: adapt to; make, devise, in such a way that it fits particular needse.g. Our insurance policies are specially tailored to the earnings pattern of the insured at different stages in his career.Experience has taught us to tailor our merchandise to the particular requirements of each overseas market.tailor-made: make-to-measure; make-to-order; exactly suited to a particular need or a particular persone.g. The club is tailor-made for Jane.(The activities of the club fit in perfectlywith HJane’s interests.)John has a new tailor-made suit.(John’s new suit was made especially to fit him.)Mr. Black’s clothes were all tailor-made.(Mr. Black’s clothes were all specially made to his own measurements and wishes.)13.Many social consequences, good and bad, will arise as this new proximity distributes powers of control from central authorities to the many hands of the world’s people.: In this sentence, “good and bad” might be expanded into “b oth good ones and bad ones”.proximity n.: nearness in distance, time etc.e.g. No longer is it the case that national suppliers, because of their proximity, are favored over foreign ones.My newly bought house is in close proximity to the supermarket and the station.14.The voiceless millions of the world will come to be heard and be better understood, provided that the wealthy nations help the less wealthy ones enter the Information Club. “provided” can be replace by “if”.15.cohesive a.: tending to fit together well and form a united wholee.g. The poor do not see themselves as a cohesive group.The members of the group remained remarkably cohesive in the face of difficulty.16.thrive on: enjoy and do well as a result of, perhaps unexpectedlye.g. David throve on a pure meat diet for some time.This is the style of life on which he seems to thrive.17.accommodate v.: get used to a new situatione.g. The eye can accommodate itself to seeing objects at different distances.When you are employed in a new firm you should first of all accommodate yourself to the new circumstances.Or: give someone a place to stay, live, or worke.g. Once you have been accepted at the university they promise to accommodate you in a residence hall nearby.Or: have or provide enough space for a particular number of people or thingse.g. Several jails house twice as many prisoners as they were originally built to accommodate.18.property n.: [C] an attribute, characteristice.g. One of the most important properties of gold is its malleability.Besides having nitrogen-fixing properties, trees can be used as a source of fuel. Or: [U] the thing or things someone ownse.g. They have requested the confiscation of millions of dollar’s worth of property.19.Our exploration then brought us squarely before human emotions and human relationships: Our exploration then brought us face to face with such issues as human emotions and human relationships.20.Physical proximity will still be necessary to consummate these emotions and recharge the batteries that will sustain human relationships between virtual encounters.: People still need body contact or face-to-face communication to thoroughly express their emotions and also receive others’ to maintain the relationships when they exchange emotions on the Internet.。
FortiOS™ 6.0Fortinet’s Network Operating SystemControl all the security and networking capabilities in all your Fortinet Security Fabric elements with one intuitive operating system. Improve your protection and visibility while reducing operating expenses and saving time with a truly consolidated next-generation enterprise firewall solution. FortiOS enables the Fortinet Security Fabric vision for enhancedprotection from IoT to Cloud.FortiOS is a security-hardened, purpose-built operating system that is the software foundation of FortiGate. Control all the security and networking capabilities in all your FortiGates across your entire network with one intuitive operating system. FortiOS offers anextensive feature set that enables organizations of all sizes to deploy the security gateway setup that best suits theirenvironments. As requirements evolve, you can modify them withminimal disruptions and cost.As companies look to transform everything from their business operating models to service delivery methods, they are adopting technologies such as mobile computing, IoT and multi-cloud networks to achieve business agility, automation, and scale. Theincreasing digital connectedness of organizations is driving the requirement for a security transformation, where security is integrated into applications, devices, and cloud networks to protect business data spread across these complex environments. FortiOS™ 6.0 delivers hundreds of new features and capabilities that were designed to provide the broad visibility, integrated threat intelligence, and automated response required for digital business. The Fortinet Security Fabric, empowered by FortiOS 6.0, is an intelligent framework designed for scalable, interconnected security combined with high awareness, actionable threat intelligence, and open API standards for maximum flexibility and integration to protect even the most demanding enterprise environments. Fortinet’s security technologies have earned the most independent certifications for security effectiveness and performance in the industry. The Fortinet Security Fabric closes gaps left by legacypoint products and platforms by providing the broad, powerful, and automated protection that today’s organizations require across their physical and virtual environments, from endpoint to the cloud.Introducing FortiOS 6.0FortiOS 6.0 AnatomyFEATURE HIGHLIGHTS System Integration§Standard-based monitoring output – SNMP Netflow/Sflow and Syslog support to external (third-party) SIEM and logging system§Security Fabric integration with Fortinet products and technology allianceCentral Management and Provisioning§Fortinet/third-party automation and portal services support via APIs and CLI scripts§Rapid deployment features including cloud-based provisioning solutions§Developer community platform and professional service options for complex integrationsCloud and SDN Integration §Multi-cloud support via integration with Openstack, VMware NSX, Nuage Virtualzed Services, and Cisco ACI infrastructure§NEW: Ease of configuration with GUI support and dyanamic address objectsconfident that your network is getting more secure over time.Fortinet offers the most integrated and automated Advanced Threat Protection (ATP) solution available today through an ATP framework that includes FortiGate, FortiSandbox, FortiMail, FortiClient, and FortiWeb. These products easily work together to provide closed loop protection across all of the most common attack vectors.FSA Dynamic Threat DB UpdateDetailed Status Report File Submission124AutomationStitches are new administrator-defined automated work flows that use if/then statements to cause FortiOS to automatically respond to an event in a pre-programmed way. Because stitches are part of the security fabric, you can set up stitches for any device in the Security Fabric.HIGHLIGHTSMonitoring§Real-time monitors§NOC Dashboard§NEW: IOS push notification via FortiExplorer app§Dashboard NOC view allows you to keep mission-critical information inview at all times. Interactive and drill-down widgets avoid dead-endsduring your investigations, keeping analysis moving quickly and smoothly. OperationFortiOS provides a broad set of operation tools that make identification and response to security and network issues effective. Security operations is further optimized with automations, which contribute to faster and more accurate problem resolutions.Policy and ControlFortiGate provides a valuable policy enforcement point in your network where you can control your network traffic and apply security technologies. With FortiOS, you can set consolidated policies that include granular security controls. Every security service is managed through a similar paradigm of control and can easily plug into a consolidated policy. Intuitive drag-and-drop controls allow you to easily create policies, and one-click navigation shortcuts allow you to more quickly quarantine end points or make policy edits.SecurityFortiGuard Labs provides the industry-leading security services and threat intelligence delivered through Fortinet solutions. FortiOS manages the broad range of FortiGuard services available for the FortiGate platform, including application control, intrusion prevention, web filtering, antivirus, advanced threat protection, SSL inspection, and mobile security. Service licenses are available a-la-carte or in a cost-effective bundle for maximum flexibility of deployment.Industry-leading security effectivenessFortinet solutions are consistently validated for industry-leading security effectiveness inindustry tests by NSS Labs for IPS and application control, by Virus Bulletin in the VB100comparative anti-malware industry tests, and by AV Comparatives.§Recommended Next Generation Firewall with near perfect, 99.47% securityeffectiveness rating. (2017 NSS Labs NGFW Test of FortiGate 600D & 3200D)§Recommended Breach Prevention Systems with 99% overall detection. (2017 NSSBreach Prevention Systems Test of FortiGate with FortiSandbox)§Recommended Data Center Security Gateway with 97.87% and 97.97% securityeffectiveness. (2017 NSS Data Center Security Gateway Test with FortiGate 7060Eand 3000D)§Recommended Next Generation IPS with 99.71% overall security effectiveness. (2017NSS Next Generation IPS Test with FortiGate 600D)§ICSA Certified network firewalls, network IPS, IPsec, SSL-TLS VPN, antivirus.NetworkingWith FortiOS you can manage your networking and security in one consistent native OS on the FortiGate. FortiOS delivers a wide range of networking capabilities, including extensive routing, NAT, switching, Wi-Fi, WAN, load balancing, and high availability, making the FortiGate a popular choice for organizations wanting to consolidate their networking and security functions.SD WANFortiGate SD-WAN integrates next generation WAN and security capabilities into a single, multi-path WAN edge solution. Secure SD-WAN makes edge application aware and keeps application performance high with built-in WAN path controller automation. With integrated NGFW, it is easier to enable direct interent access and continues to keep high security posture with reduced complexity.Platform SupportPerformanceThe FortiGate appliances deliver up to five timesthe next generation firewall performance and10 times the firewall performance of equivalentlypriced platforms from other vendors. The highperformance levels in the FortiGate are basedon a Parallel Path Processing architecture in FortiOS that leveragesperformance, optimized security engines, and custom developednetwork and content processors. Thus, FortiGate achieved thebest cost per Mbps performance value results.Ultimate deployment flexibilityProtect your entire network inside and out through a policy-drivennetwork segmentation strategy using the Fortinet solution. It is easyto deploy segment optimized firewalls, leveraging the wide range ofFortiGate platforms and the flexibility of FortiOS to protect internalnetwork segments, the network perimeter, distributed locations,public and private clouds, and the data center — ensuring youhave the right mix of capabilities and performance for eachdeployment mode.Virtual desktop option to isolate the SSL VPN session from the client computer’s desktop environment IPsec VPN:- Remote peer support: IPsec-compliant dialup clients, peers with static IP/dynamic DNS- Authentication method: Certificate, pre-shared key- IPsec Phase 1 mode: Aggressive and main (ID protection) mode- Peer acceptance options: Any ID, specific ID, ID in dialup user group EMAC-VLAN support: allow adding multiple Layer 2 addresses (or Ethernet MAC addresses) to a single physical interfaceVirtual Wire Pair:- Process traffic only between 2 assigned interfaces on the same network segment- Available on both transparent and NAT/route Mode- Option to implement wildcard VLANs setupGLOBAL HEADQUARTERS Fortinet Inc.899 KIFER ROAD Sunnyvale, CA 94086United StatesTel: +/salesEMEA SALES OFFICE 905 rue Albert Einstein 06560 Valbonne FranceTel: +33.4.8987.0500APAC SALES OFFICE 300 Beach Road 20-01The Concourse Singapore 199555Tel: +65.6395.2788LATIN AMERICA SALES OFFICE Sawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430 Sunrise, FL 33323United StatesTel: +1.954.368.9990Copyright© 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST -PROD-DS-FOS FOS-DAT-R6-201804RESOURCEURLThe FortiOS Handbook — The Complete Guide /fgt.html Fortinet Knowledge Base/Virtual Systems (FortiOS Virtual Domains) divide a single FortiGate unit into two or more virtual instances of FortiOS that function separately and can be managed independently.REFERENCESConfigurable virtual systems resource limiting and management such as maximum/guaranteed ‘active sessions’ and log disk quotaVDOM operating modes: NAT/Route or Transparent VDOM security inspection modes: Proxy or Flow-based Web Application Firewall:- Signature based, URL constraints and HTTP method policyServer load balancing: traffic can be distributed across multiple backend servers: - B ased on multiple methods including static (failover), round robin, weighted or based on round trip time, number of connections.- Supports HTTP , HTTPS, IMAPS, POP3S, SMTPS, SSL or generic TCP/UDP or IP protocols.- Session persistence is supported based on the SSL session ID or based on an injected HTTP cookie.NOTE: F eature set based on FortiOS V6.0 GA, some features may not apply to all models. For availability, please refer to Softwarefeature Matrix on 。
梦想社区英语作文全文共3篇示例,供读者参考篇1Dream CommunityA dream community is a place where people come together to support each other in achieving their goals and aspirations. It is a place where dreams are nurtured and encouraged, and where individuals can find the resources and support they need to make their dreams a reality.In a dream community, people are inspired by each other's dreams and work together to help each other succeed. This sense of community and collaboration creates a positive and motivating environment that empowers individuals to pursue their passions and reach their full potential.One of the key principles of a dream community is the belief that everyone has a unique contribution to make to the world. By supporting and encouraging each other, individuals in a dream community can tap into their own talents and strengths, and use them to make a positive impact on the world around them.In a dream community, individuals are also encouraged to set ambitious goals and push themselves beyond their comfort zones. By challenging themselves and taking risks, people in a dream community can grow and develop in ways they never thought possible.Moreover, a dream community is a place where individuals can seek guidance and advice from others who have already achieved success in their own pursuits. By learning from the experiences of others, individuals in a dream community can avoid common pitfalls and obstacles, and increase their chances of success.In conclusion, a dream community is a powerful and transformative force that can help individuals achieve their goals and aspirations. By coming together to support each other, share knowledge and resources, and celebrate each other's successes, people in a dream community can create a positive and inspiring environment that empowers them to pursue their dreams and make a lasting impact on the world.篇2Dream CommunityIntroduction:In today's globalized world, the importance of being proficient in English cannot be overstated. English is not only the language of international communication but also the language of business, technology, and academia. In order for individuals to succeed in an increasingly competitive and interconnected world, it is essential for them to master the English language. This is where the concept of a "Dream Community" comes into play.What is a Dream Community?A Dream Community is a designated space or platform where individuals come together to learn and improve their English language skills. It is a place where people of all ages and backgrounds can engage in activities, workshops, and discussions aimed at enhancing their English proficiency. The Dream Community is not just a physical space, but a supportive and encouraging environment that fosters growth and development in the language.Why is a Dream Community important?1. Promotes inclusivity: A Dream Community welcomes individuals from all walks of life, regardless of their socioeconomic status or educational background. It provides a level playing field for everyone to learn and improve their English skills.2. Encourages collaboration: In a Dream Community, individuals have the opportunity to collaborate with each other, share ideas, and work together towards a common goal of mastering the English language. This collaborative spirit fosters a sense of community and belonging among members.3. Provides access to resources: A Dream Community offers access to a wide range of resources such as books, online courses, language exchange programs, and workshops. These resources help individuals improve their English proficiency in a structured and supportive environment.4. Builds confidence: By participating in activities and workshops in a Dream Community, individuals gain confidence in their English language skills. This newfound confidence empowers them to communicate effectively in various social and professional settings.How to create a Dream Community?1. Establish a physical space: A Dream Community can be set up in a physical space such as a community center, library, school, or online platform. The space should be conducive to learning and collaboration, with resources readily available for members to use.2. Recruit passionate volunteers: Volunteers play a crucial role in running a Dream Community. Recruit individuals who are passionate about teaching and mentoring others in English. These volunteers can lead workshops, organize activities, and provide guidance to members.3. Offer diverse programs: To cater to the needs of a diverse group of individuals, offer a wide range of programs and activities in the Dream Community. These can include English language classes, conversation clubs, storytelling sessions, movie screenings, and language exchange programs.4. Create a supportive environment: Foster a supportive and inclusive environment in the Dream Community where members feel valued, encouraged, and motivated to learn. Celebrate achievements, provide constructive feedback, and create opportunities for members to showcase their language skills.Conclusion:In conclusion, a Dream Community is a space where individuals come together to learn, collaborate, and grow in their English language skills. By creating a supportive and inclusive environment, offering diverse programs, and harnessing the power of passionate volunteers, a Dream Community can empower individuals to achieve their language learning goals. Ina world where English proficiency is increasingly important, a Dream Community provides a valuable resource for individuals to realize their dreams and aspirations.篇3Dream CommunityA dream is a powerful thing. It can inspire, motivate, and drive individuals to achieve great things. In our modern world, where technology connects people from all corners of the globe, dreams can be shared and cultivated in ways that were never before possible. The emergence of online communities, such as social media platforms and forums, has created a virtual space where individuals can come together to share their dreams, ambitions, and aspirations.One such community that has gained popularity in recent years is the Dream Community. This online platform is dedicated to fostering a supportive and encouraging environment where individuals can share their dreams and receive feedback, advice, and encouragement from like-minded individuals. Whether it's pursuing a career in a particular field, starting a business, or simply living a more fulfilling life, members of the Dream Community are there to help each other achieve their goals.One of the key features of the Dream Community is its emphasis on accountability and support. Members are encouraged to set specific goals and milestones for themselves, and they are held accountable by the community to ensure that they stay on track. Whether it's checking in regularly with a designated accountability partner, posting updates on their progress, or participating in group challenges and activities, members have access to a wealth of resources and support to help them achieve their dreams.In addition to providing support and accountability, the Dream Community also offers a wealth of resources, tools, and expert advice to help members succeed. From webinars and workshops on goal-setting and time management to mentorship programs and networking events, members have access to a wide range of resources to help them turn their dreams into reality.But perhaps the most valuable aspect of the Dream Community is the sense of connection and community that it fosters. In a world where it's easy to feel isolated and alone in our struggles and challenges, the Dream Community offers a place where individuals can come together to share their experiences, offer support and encouragement, and celebrate each other'ssuccesses. It's a place where dreams are nurtured, where aspirations are supported, and where anything is possible.In conclusion, the Dream Community is a beacon of hope and inspiration in a world that can often feel overwhelming and discouraging. By fostering a supportive and encouraging environment where individuals can come together to share their dreams, aspirations, and goals, the Dream Community is helping to create a world where anything is possible. Whether it's starting a business, pursuing a passion, or simply living a more fulfilling life, the Dream Community is there to help individuals achieve their dreams and reach their full potential. Together, we can all dream big and make our dreams a reality.。
Unit11. In a world full of misinformation it is a formidable challenge for the students to learn to identify the true, the beautiful, and the good.2. Any form of mountaineering has its inherent danger. After all, it is an adventure sport.3. The university will permit a degree of individual instruction and the students may receive a curriculum tailored to their needs, learning style and pace.4. It is said that the understanding of the genetic basis of learning will tell us which youngsters are likely to advance quickly and which ones seem doomed to "difficult" school experiences.5. It has been reported that in Canada literally thousands of lakes and rivers are no longer able to support fish or plants.6. In countries with relatively high literacy rates, books play an important part in enriching people's lives.7. The essence of government intervention has been to limit and distort competition rather than to encourage it.8. The great cause of reform being carried out by Chinese people is without precedent in history.9. Practice in simulated examination conditions must not be delayed until close to the examination time.10. People have found that the lions and wolves in the forest often huntdown live animals by cooperative efforts.Unit21. During that battle a large number of men perished from hunger and thirst due to the severe shortage of food.2. This research project bas further proved that fireworks have originated in China.3. He is tempted to go there in person and check out how the accident happened.4. At present, people have not found an effective way to cure this disease, which is still afflicting old people.5. The contractor must adhere to the contract and complete the important project on time.6. With persistent efforts, they finally settled the dispute between the two regions.7. If Party B fails in delivering goods at a given time, Party A is entitled to terminate the contract and claim for any loss.8. It usually takes a week to patent one's invention.9. A clever politician knows well how to manipulate the public opinion and take advantage of his supporters.10. The amount of water in tile rivers and lakes will diminish as the dry season continues.Unit31. As such, the event evoked curiosity and awe in most of us.2. The techniques of sales promotion, to work well must gain the trust of middlemen in business as well as consumers. At the same time, they should be consistent with the local preferences and customs.3. TO launch this new product into the European market, the company gave away 10,000 free samples for the local consumers to try.4. As their life has been bettered, going on tours/trips out in the holidays has becomea fashionable/stylish pastime for quite a few people.5. The purpose of waging the war is, in nature, to control the oil resources in the area.6. Sales promotion is effective in helping consumers become acquainted with a new product when it is first introduced to a market.7. The new administration has realized that economic reforms must be deepened in conjunction with effective measures taken to ensure the basic conditions of employment and daily life for those poor people.8. Towards its sales objective this year, the company offered a training course to enlighten consumers about its latest products.9. To effectively raise our productivity, we should bring in advanced management experience from other countries.10. Professor Wu's lecture helped the students become acquainted withthe use of this software product. It also gave them an idea of software development.Unit4I. Those who lead a miserable life often fail to recognize the inherent virtue of work in earning and sustaining their dignity.2. With the life bettered and levels of education higher, the work ethic is diluted now.3. The young generation has much difficulty understanding why their ancestors had to focus their minds upon work as the central concern of existence.4. According to Maslow, different classes and ethnic groups are positioned at different stages in the work hierarchy.5. In developing countries, many talented young intellectuals flock in droves to America, which forms the so-called "brain drain".6. If a country is prone to high inflation, then its currency will have to be dued to maintain the price competitiveness of its exports.7. One expert in sociology believes that work is a means for people to build relationships. In that sense, the workplace performs the function ofa community.8. The desire to "fulfill themselves", a harmless and even worthy enterprise, may sometimes degenerate into a selfish discontent.9. To most Americans today, the blow of being laid off seldom carries the life-and-death implications it once had.10. Modem workers may have a lot of complaints. But they will feel better when they know that their predecessors did work under a far more brutal condition during the early stage of the Industrial Revolution.Unit51. The firm will slash its employees from 5,000 to 3,000 because its business is slack.2. We should treasure and maintain the cordial relationship established with them in 1990.3. The patient died after he was infected as a result of a hospital blunder.4. To do simuRaneous interpretation of speeches needs special training and sldlls.5. Ifyou don't follow the objective law, you will be destined to fail.6. It was clear that the government failed to revive the economy or reform the social institutions last year.7. The miners' strike in July showed how quickly workers' anger erupted.8. Whenever you visit the city, on a rainy day or on a sunny one, it gives a scene of an industrial flavor as cheerful and busy as ever.9. He realized that it was difficult to inhabit this barren island any longer.10. Overweight people are often lured by modern food products which claim to be able to help them lose weight.i America was once troubled by employment crisis. Unit6 1. The crime was exposed, and the chief criminal was prosecuted and convicted. 2. His international contacts could contribute greatly to their hitherto isolated effort. 3. Medical service would be free to the patients, and the financial transaction would take place between the two departments. 4. Police are hunting two youths who snatched a handbag from a woman in broad daylight. 5. During the ensuing twenty years, his far-sighted management brought great prosperity and turned the company into the largest clothing business in the country. 6. His strong belief that she was withholding things from him did not have any basis in fact. 7. Over the past few weeks, his every waking moment has been spent poring over his medical books. 8. We were given advance warning, so we were able to minimize the effects of the storm.9. Such organizations have had only limited success in averting conflicts between states. lO. She was hounded out of public life by the persistent aaacks of the popular newspapers. Unit7 1. Cyberspace communication is expanding by leaps and bounds, with millions of people browsing websites daily. 2. The Chinese media are formulating new plans in order to increase their presence on the Intemet to meet the challenges of the virtual era. 3. The new system now allows faxes to be sent round the world with minimum effort and maximum security. 4. Because of its interactivity and accessibility, the Intemet has activated new interest in homestudy programs. 5. The invention of the electronic word processor was as startling an information revolution as the invention of the printing press. 6. Digital cameras aren't available for everybody -- at least, not yet. While cheaper than before, they are by no means cheap. 7. Aworkaholic is a person who works too much. Aworkaholic lives to work, rather than works to live. 8. It is not cheapto raise pets in the city. In the case of a dog, registration may be obtained from the city's Dogs Supervision Office fora fee of about 2,000 yuan a year. 9. Recently, we have witnessed a number of young people who, for a variety of sociological and psychological reasons, have become attached to their computers, and are exploiting their potential in a criminal manner. 10. Whether it is worth investing in the long term is still in doubt. Let's assume you are a sports fan. Unit8 1. Children were asked to complete many compulsory pieces of work each week. 2. I commended the girl on the excellent job she had done. I later wrote to commend her to her employer. 3. Everyone with a mortgage realized the government's economic strategy was not working. 4. Absurd though it may seem, it is quite likely that Mr. Smith and his companions genuinely believe all this. 5. He aggravated his condition by leaving hospital too soon. 6. By patient questioning we managed to elicit enough information from the witness. 7. During your flight you can relax with a drink from the duty-free bar, and a meal or light refreshments will be served according to the time of day.8. I was in a dreadful plight -- I had lost my money and missed the lastbus home. 9. One of the witnesses was bribed to give false evidence. 10. Despite repeated assurance(s he failed to repay the money he had borrowed.。
A Framework for Virtual Community Business Success: The Case of the Internet Chess Club
Mark Ginsburg and Suzanne Weisband MIS Department, Eller College of Management, University of Arizona {mginsbur,weisband}@eller.arizona.edu
AbstractPrior work has identified, in piecemeal fashion, desirable characteristics of Virtual Community businesses (VCBs) such as inimitable information assets, persistent handles fomenting trust, and an economic infrastructure. The present work develops a framework for the success of a subscription-based VCB by taking into account the above elements and considering as well an interplay of the membership (both regular members and volunteers), technical features of the interface, and an evolutionary business model that supports member subgroups as they form. Our framework is applied by an in-depth survey of use and attitude of regular members and volunteers in the Internet Chess Club (ICC), a popular subscription-based VCB.. The survey results reveal that key features of the model are supported in the ICC case: member subgroups follow customized communication pathways; a corps of volunteers is supported and recognized, and the custom interface presents clear navigation pathways to the ICC’s key large-scale information asset, a multi-million game database contributed by real-world chess Grandmasters who enjoy complimentary ICC membership. We conclude by discussing VCBs in general and how the framework might apply to other domains.
1. Introduction: Virtual Communities as a Business
Advances in Internet bandwidth, software engineering, and general public awareness have greatly lowered the barriers to entry for businesses who wish to offer Virtual Communities (VCs) as a promotion vehicle or as the chief source of revenue. The strategy is clear: to leverage the ubiquitous reach and range of the Internet to locate and gather birds-of-a-feather interest groups, to provide these groups with convenient visual interface tools supporting asynchronous and synchronous group
interaction, and to sit back and watch as the nascent groups commingle in a virtual melting pot and bootstrap themselves to a critical mass. Early strategy papers [1] touted the vast potential of this new face a virtual community business (VCB) can present to its customers. One of the domains enabled by increasing bandwidth and graphics sophistication is online gaming. Numerous prescriptive design papers have been set forth to assist in the planning of a VC offering, with varying degrees of business focus. Kollock [2] stressed the importance of trust via persistent VC identities; this trust can facilitate another recommended feature of a VC business, an economic infrastructure that can carry out transactions. The importance of a recognized ID was supported by a recent empirical study on eBay vendors [3] . Millen [4] and Marshall et al. [5] stressed the importance of designing the VC user base’s software tools with their needs in mind. Williams and Cothrel [6] reiterated that the users should have “a critical mass of functionality” at their disposal and that managers should delegate authority as much as possible down the ranks to the members so that they have discernible power to shape the rules of conduct in the VC. They also mentioned the common sense principles of providing user feedback channels, recruiting actively for new members, and the importance of the equity holders to acknowledge the “discretionary energy” (the volunteerism) of the many participants who spend time and effort to keep the community going with timely help for newcomers, and guidance to help members locate internal and external information assets of interest.
1.1. Volunteerism in a VCB Utilizing volunteers effectively has long been recognized as import in VC-based businesses, since the cadre of owners may be quite small yet the Internet reach and range means the VC offering will be global in scope. Volunteers can, for example, provide timely multi-lingual help or they can assist in more core duties, such as
Proceedings of the 37th Hawaii International Conference on System Sciences - 20040-7695-2056-1/04 $17.00 (C) 2004 IEEE1