This document classifies and discusses different application sharing tools that could be used in a virtual classroom setting. It examines tools based on their architecture (centralized vs replicated), how application sharing is implemented in conferencing systems, thin-client systems, and peer-to-peer networks. It also provides a table comparing several popular application sharing tools based on factors like the protocol used, ability to change presenters, support for multiple users, and whether it allows remote control. The document concludes by noting that centralized application sharing requires high bandwidth and low latency to perform effectively.
A New Approach For Slideshow Presentation At Working MeetingsJackie Taylor
This document presents a new distributed slideshow application called DiS that allows slideshow presentations to be displayed locally and synchronously on the laptop of each meeting participant. DiS is intended to provide an alternative approach to slideshow presentations that does not require a projector or additional hardware. It utilizes existing slideshow software and network protocols to transfer presentation files and commands between participants' laptops. The document describes the requirements, design, and implementation of DiS, and compares its network traffic and visual responsiveness to MSN Messenger.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features included live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time videoconferencing through a web browser.
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features include live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time multimedia communication between multiple users through a standard web browser.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
Report about Software Architecture for Robotics, for class of Introduction to Robotics of Prof. Sukhan Lee, of department of computer engineering of Sungkyunkwan University.
Student: Lorran Pegoretti.
Suwon, South Korea, December 2013
A New Approach For Slideshow Presentation At Working MeetingsJackie Taylor
This document presents a new distributed slideshow application called DiS that allows slideshow presentations to be displayed locally and synchronously on the laptop of each meeting participant. DiS is intended to provide an alternative approach to slideshow presentations that does not require a projector or additional hardware. It utilizes existing slideshow software and network protocols to transfer presentation files and commands between participants' laptops. The document describes the requirements, design, and implementation of DiS, and compares its network traffic and visual responsiveness to MSN Messenger.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features included live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time videoconferencing through a web browser.
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features include live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time multimedia communication between multiple users through a standard web browser.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
Report about Software Architecture for Robotics, for class of Introduction to Robotics of Prof. Sukhan Lee, of department of computer engineering of Sungkyunkwan University.
Student: Lorran Pegoretti.
Suwon, South Korea, December 2013
System Support for Integrated Desktop Video ConferencingVideoguy
This document discusses the system requirements for integrated desktop video conferencing on networked workstations. It identifies key requirements such as:
1) Media-intensive applications need to be able to distribute parts of themselves across multiple devices.
2) Applications need support for locating and referencing people, media devices, and conferences by name on the network.
3) Applications that allow remote access, like video conferencing, require security services to protect live communication streams.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document describes the development of a hybrid architecture called WebCOM that supports group communication over the internet. WebCOM combines client-server and peer-to-peer architectures to address issues of performance, scalability, reliability and accessibility. It integrates a reliable multicast protocol called LRMP to enable direct communication between clients. The hybrid architecture reduces server load and improves response times as the number of users increases by allowing direct peer-to-peer communication when possible.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed polling in the cloud computing environment. GreatFree is a distributed programming environment through which diverse distributed systems can be established through programming rather than configuring or scripting. GreatFree emphasizes the importance of programming since it offers developers the opportunities to leverage their distributed knowledge and programming skills. Additionally, programming is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns,
Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable, rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program requests/responses in the novel programming environment.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed polling in the cloud computing environment. GreatFree is a distributed programming environment through which diverse distributed systems can be established through programming rather than configuring or scripting. GreatFree emphasizes the importance of programming since it offers developers the opportunities to leverage their distributed knowledge and programming skills. Additionally, programming is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns, Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable, rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program requests/responses in the novel programming environment.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed
polling in the cloud computing environment. GreatFree is a distributed programming environment through
which diverse distributed systems can be established through programming rather than configuring or
scripting. GreatFree emphasizes the importance of programming since it offers developers the
opportunities to leverage their distributed knowledge and programming skills. Additionally, programming
is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed
computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns,
Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable,
rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable
operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to
construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program
requests/responses in the novel programming environment.
Application sharing enables two or more users to access a shared application or document from their respective computers simultaneously in real time. Data conferencing refers to a communication session among participants sharing computer data in real time, such as screens, documents, graphics, or applications that can be seen, annotated, or manipulated by participants. An ideal application sharing solution should easily integrate with existing technologies, operate in real-time with low bandwidth usage, and work across different platforms and network conditions.
This document summarizes distributed computing. It discusses the history and origins of distributed computing in the 1960s with concurrent processes communicating through message passing. It describes how distributed computing works by splitting a program into parts that run simultaneously on multiple networked computers. Examples of distributed systems include telecommunication networks, network applications, real-time process control systems, and parallel scientific computing. The advantages of distributed computing include economics, speed, reliability, and scalability while the disadvantages include complexity and network problems.
Distributed computing involves a collection of independent computers that appear as a single coherent system to users. It allows for pooling of resources and increased reliability through replication. Key aspects of distributed systems include hiding the distribution from users, providing a consistent interface, scalability, and fault tolerance. Common examples are web search, online games, and financial trading systems. Distributed computing is used for tasks like high-performance computing through cluster and grid computing.
The document introduces distributed systems, defining them as collections of independent computers that appear as a single system to users, discusses the goals of transparency, openness, and scalability in distributed systems, and describes three main types - distributed computing systems for tasks like clustering and grids, distributed information systems for integrating applications, and distributed pervasive systems for mobile and embedded devices.
This document describes a web-based tool that allows semantic browsing of video collections using multimedia ontologies. The tool allows users to browse video collections based on concepts, concept relations, and concept clouds. It uses a rich internet application interface for fast responsiveness. The tool accesses videos and related content from sources like YouTube, Flickr, and Twitter through the ontologies. It provides a graphical interface to explore concept relationships and directly access related video clips.
This document summarizes an approach for preserving JavaScript state when migrating web applications across multiple devices. The key challenges addressed are maintaining the JavaScript state, including values of variables, function references, timers and dates. The solution uses a migration server to capture the current page state, including the DOM and JavaScript variables, and generate a new version of the page optimized for the target device while maintaining the same interactive state. Special techniques are required to handle JavaScript object references and circular references during state serialization and restoration.
Subject: Software Architecture Design
Topic: Distributed Architecture
In this presentation, you will learn about design pattern, softawre architecture, distributed architecture, basis of distributed architecture, why distributed architecture, need of distributed architecture, advantages and disadvantages of DA and much more.
Rate my presentation, It's designed graphically.
The document discusses a system that provides tools to facilitate collaborative activities over the internet (e-activities). The system architecture has three levels with increasing interactivity and requirements. The basic level allows asynchronous collaboration via web browsing. The collaborative level enables synchronous collaboration and application sharing. The multimedia level integrates audio/video to improve communication. The system was tested for research meetings, e-learning activities, and managing virtual teams. Evaluation methods include analyzing usage logs, learning outcomes, and participant surveys/discussions.
The document discusses distributed systems and provides examples. It covers three key points:
1) Characteristics of distributed systems include concurrency, lack of a global clock, and independent failures. The Internet, intranets, and mobile/ubiquitous computing are examples.
2) Resource sharing is common, with the web enabling sharing of files, documents, and services. Services control access to resources through defined operations.
3) Challenges include heterogeneity across networks, hardware, software etc., openness to extension, and security of confidential/integral resources and identification of remote users.
The document provides an introduction to distributed systems, including definitions, goals, types, and challenges. It defines a distributed system as a collection of independent computers that appear as a single system to users. Distributed systems aim to share resources and data across multiple computers for availability, reliability, scalability, and performance. There are three main types: distributed computing systems, distributed information systems, and distributed pervasive systems. Developing distributed systems faces challenges around concurrency, security, partial failures, and heterogeneity.
Developing And Writing A Diversity Statement CentAudrey Britton
The document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5 step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a refund option for plagiarism. The service utilizes a bidding system and promises original, high-quality content.
This document provides instructions for getting writing assistance from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then pay a deposit to start.
4. Review the completed paper and authorize full payment if pleased, or request free revisions.
5. You can request multiple revisions to ensure satisfaction, and HelpWriting.net guarantees original, high-quality work or a full refund.
Weitere ähnliche Inhalte
Ähnlich wie A Classification Of Application Sharing Tools For Use In A Virtual Classroom
System Support for Integrated Desktop Video ConferencingVideoguy
This document discusses the system requirements for integrated desktop video conferencing on networked workstations. It identifies key requirements such as:
1) Media-intensive applications need to be able to distribute parts of themselves across multiple devices.
2) Applications need support for locating and referencing people, media devices, and conferences by name on the network.
3) Applications that allow remote access, like video conferencing, require security services to protect live communication streams.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document describes the development of a hybrid architecture called WebCOM that supports group communication over the internet. WebCOM combines client-server and peer-to-peer architectures to address issues of performance, scalability, reliability and accessibility. It integrates a reliable multicast protocol called LRMP to enable direct communication between clients. The hybrid architecture reduces server load and improves response times as the number of users increases by allowing direct peer-to-peer communication when possible.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed polling in the cloud computing environment. GreatFree is a distributed programming environment through which diverse distributed systems can be established through programming rather than configuring or scripting. GreatFree emphasizes the importance of programming since it offers developers the opportunities to leverage their distributed knowledge and programming skills. Additionally, programming is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns,
Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable, rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program requests/responses in the novel programming environment.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed polling in the cloud computing environment. GreatFree is a distributed programming environment through which diverse distributed systems can be established through programming rather than configuring or scripting. GreatFree emphasizes the importance of programming since it offers developers the opportunities to leverage their distributed knowledge and programming skills. Additionally, programming is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns, Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable, rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program requests/responses in the novel programming environment.
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENTijdpsjournal
Programming request with GreatFree is an efficient programming technique to implement distributed
polling in the cloud computing environment. GreatFree is a distributed programming environment through
which diverse distributed systems can be established through programming rather than configuring or
scripting. GreatFree emphasizes the importance of programming since it offers developers the
opportunities to leverage their distributed knowledge and programming skills. Additionally, programming
is the unique way to construct creative, adaptive and flexible systems to accommodate various distributed
computing environments. With the support of GreatFree code-level Distributed Infrastructure Patterns,
Distributed Operation Patterns and APIs, the difficult procedure is accomplished in a programmable,
rapid and highly-patterned manner, i.e., the programming behaviors are simplified as the repeatable
operation of Copy-Paste-Replace. Since distributed polling is one of the fundamental techniques to
construct distributed systems, GreatFree provides developers with relevant APIs and patterns to program
requests/responses in the novel programming environment.
Application sharing enables two or more users to access a shared application or document from their respective computers simultaneously in real time. Data conferencing refers to a communication session among participants sharing computer data in real time, such as screens, documents, graphics, or applications that can be seen, annotated, or manipulated by participants. An ideal application sharing solution should easily integrate with existing technologies, operate in real-time with low bandwidth usage, and work across different platforms and network conditions.
This document summarizes distributed computing. It discusses the history and origins of distributed computing in the 1960s with concurrent processes communicating through message passing. It describes how distributed computing works by splitting a program into parts that run simultaneously on multiple networked computers. Examples of distributed systems include telecommunication networks, network applications, real-time process control systems, and parallel scientific computing. The advantages of distributed computing include economics, speed, reliability, and scalability while the disadvantages include complexity and network problems.
Distributed computing involves a collection of independent computers that appear as a single coherent system to users. It allows for pooling of resources and increased reliability through replication. Key aspects of distributed systems include hiding the distribution from users, providing a consistent interface, scalability, and fault tolerance. Common examples are web search, online games, and financial trading systems. Distributed computing is used for tasks like high-performance computing through cluster and grid computing.
The document introduces distributed systems, defining them as collections of independent computers that appear as a single system to users, discusses the goals of transparency, openness, and scalability in distributed systems, and describes three main types - distributed computing systems for tasks like clustering and grids, distributed information systems for integrating applications, and distributed pervasive systems for mobile and embedded devices.
This document describes a web-based tool that allows semantic browsing of video collections using multimedia ontologies. The tool allows users to browse video collections based on concepts, concept relations, and concept clouds. It uses a rich internet application interface for fast responsiveness. The tool accesses videos and related content from sources like YouTube, Flickr, and Twitter through the ontologies. It provides a graphical interface to explore concept relationships and directly access related video clips.
This document summarizes an approach for preserving JavaScript state when migrating web applications across multiple devices. The key challenges addressed are maintaining the JavaScript state, including values of variables, function references, timers and dates. The solution uses a migration server to capture the current page state, including the DOM and JavaScript variables, and generate a new version of the page optimized for the target device while maintaining the same interactive state. Special techniques are required to handle JavaScript object references and circular references during state serialization and restoration.
Subject: Software Architecture Design
Topic: Distributed Architecture
In this presentation, you will learn about design pattern, softawre architecture, distributed architecture, basis of distributed architecture, why distributed architecture, need of distributed architecture, advantages and disadvantages of DA and much more.
Rate my presentation, It's designed graphically.
The document discusses a system that provides tools to facilitate collaborative activities over the internet (e-activities). The system architecture has three levels with increasing interactivity and requirements. The basic level allows asynchronous collaboration via web browsing. The collaborative level enables synchronous collaboration and application sharing. The multimedia level integrates audio/video to improve communication. The system was tested for research meetings, e-learning activities, and managing virtual teams. Evaluation methods include analyzing usage logs, learning outcomes, and participant surveys/discussions.
The document discusses distributed systems and provides examples. It covers three key points:
1) Characteristics of distributed systems include concurrency, lack of a global clock, and independent failures. The Internet, intranets, and mobile/ubiquitous computing are examples.
2) Resource sharing is common, with the web enabling sharing of files, documents, and services. Services control access to resources through defined operations.
3) Challenges include heterogeneity across networks, hardware, software etc., openness to extension, and security of confidential/integral resources and identification of remote users.
The document provides an introduction to distributed systems, including definitions, goals, types, and challenges. It defines a distributed system as a collection of independent computers that appear as a single system to users. Distributed systems aim to share resources and data across multiple computers for availability, reliability, scalability, and performance. There are three main types: distributed computing systems, distributed information systems, and distributed pervasive systems. Developing distributed systems faces challenges around concurrency, security, partial failures, and heterogeneity.
Ähnlich wie A Classification Of Application Sharing Tools For Use In A Virtual Classroom (20)
Developing And Writing A Diversity Statement CentAudrey Britton
The document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5 step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a refund option for plagiarism. The service utilizes a bidding system and promises original, high-quality content.
This document provides instructions for getting writing assistance from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then pay a deposit to start.
4. Review the completed paper and authorize full payment if pleased, or request free revisions.
5. You can request multiple revisions to ensure satisfaction, and HelpWriting.net guarantees original, high-quality work or a full refund.
How To Plan And Write An Essay Fast. A Teacher Tells All. Writers BureauAudrey Britton
The document provides instructions for requesting essay writing assistance from HelpWriting.net in 5 steps:
1. Create an account with a password and valid email.
2. Complete a 10-minute order form providing instructions, sources, and deadline. Attach a sample if wanting the writer to mimic your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then pay a deposit to start.
4. Ensure the paper meets expectations and authorize full payment if pleased, or request revisions for free.
5. Multiple revisions can be requested to ensure satisfaction, and plagiarized work results in a full refund.
Disney Stationary Tinkerbell And Friends, Disney ScrapbAudrey Britton
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied with the work.
Websites That Write Essays For You Top 10 ServicesAudrey Britton
This document discusses techniques that advertisers use to target specific audiences for their products. It notes that advertisers aim advertisements at audiences like children, teenagers, ambitious men, adult women, couples, and prosperous older women. It also explains that advertisers strategically choose when to air commercials based on the expected viewership of their target demographic. For example, children's products are usually advertised in the morning and early afternoon when children are watching, while products aimed at adults are shown later.
Digital Elephant Writing Paper Printable Elephant PAudrey Britton
The document provides instructions for students to analyze the novel "Tale of Genji" and discuss key characters. It includes a table for students to list characters from the first four chapters, identify their type, and describe traits. It also prompts students to discuss major ambitions of nobles in the Heian court and the Emperor's relationships with women. The document discusses analyzing literature systematically to better understand and appreciate the works.
Top Experts To Write Paper For Money In All DisciplinesAudrey Britton
Veblen examines the leisure class and their consumption habits in his book The Theory of the Leisure Class. He looks at how the leisure class engages in conspicuous consumption and leisure activities to demonstrate their wealth and social status. Specifically, Veblen analyzes the origins of the leisure class and how their standards of living and habits of conspicuous waste and workmanship developed over time and through history. A key aspect of conspicuous consumption discussed is how the leisure class uses consumption of goods to demonstrate their wealth and distance themselves from the working class through wasteful displays.
This May Be The Worst College Paper Ever WrittenBut A Whistleblower ...Audrey Britton
This document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Receive the paper and authorize payment if pleased. 5) Request revisions until satisfied. The service aims to provide original, high-quality content and offers refunds for plagiarized work.
What Cause Climate Change Essay. The Causes Of CliAudrey Britton
The document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. It emphasizes that the service aims to provide original, high-quality content and offers refunds for plagiarized work.
Essay Writing Service Write My Essay Essay Writing HelpAudrey Britton
This document discusses an essay writing service that allows users to request papers written for them. The process involves 5 steps: 1) Creating an account, 2) Completing an order form with instructions, 3) Reviewing bids from writers and selecting one, 4) Authorizing payment if the paper meets expectations, and 5) Requesting revisions until satisfied. The service promises original, high-quality content and refunds for plagiarized work.
Thesis Vs. Dissertation Vs. Research Paper - Basic DifAudrey Britton
The document provides instructions for how to request and receive writing assistance from the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied with the work. The document emphasizes that original, high-quality work is guaranteed, with refunds offered for plagiarized content.
013 Good Persuasive Essay Topics Example ThatsnoAudrey Britton
This document provides instructions for creating an account and requesting writing assistance from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. The website promises original, high-quality content and refunds for plagiarized work.
The document discusses the formation and purpose of the Star Alliance, the first global airline alliance. It was formed in 1997 with five founding members: United Airlines, Air Canada, Lufthansa, Thai Airways International, and SAS Scandinavian Airlines. The alliance was created to enhance the experience of frequent international travelers by providing more destination options and seamless travel across member airlines. It uses a nonequity horizontal alliance model, allowing member airlines to cooperate without taking equity stakes in each other.
Brown Paper Texture Background Stock Photos Creative MarketAudrey Britton
The document provides instructions for preventing mold growth in a kitchen in 4 steps: 1) Use the exhaust fan when cooking to remove humidity; 2) Empty the garbage daily to prevent moisture buildup; 3) Clean any spills immediately to avoid moisture; 4) Check for existing mold and remove sources of excess moisture if found. Following these steps can help protect health by avoiding mold growth.
Critique Paper Example How To Write An Article CrAudrey Britton
The document discusses the benefits of establishing a dog park in the community of Glenwood. It argues that a dog park would provide a safe, enclosed space for dogs to exercise and socialize off-leash. This benefits both dogs and owners by allowing dogs to burn energy and get much-needed exercise in a controlled environment. While some concerns over dog fights and cleanliness exist, the document contends that a dog park could be a positive addition if proper rules and safety restrictions are established. It suggests Barsness Park as a suitable location that is accessible but not too close to homes.
Write My Paper Hub - Your Reliable Academic Writing AssiAudrey Britton
The document provides instructions for using a writing assistance service called HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a refund option for plagiarized work. The service aims to provide original, high-quality content to meet customer needs.
ITALIAN LESSON Italian Writing 1 By DrakeCroft OnAudrey Britton
This summary provides the key details about the process for getting assignment writing help from HelpWriting.net in 3 sentences:
There is a 5 step process - create an account, complete an order form providing instructions and deadline, review writer bids and qualifications and choose a writer, receive the paper and authorize payment if pleased with the work, and have the option to request revisions until satisfied. The company promises original, high-quality content and a full refund if work is plagiarized.
Manuscript Paper Japanese Writing Paper Stock IllustraAudrey Britton
1. The document provides instructions for creating an account and submitting a request for writing assistance on the HelpWriting.net site. It outlines a 5-step process for account creation, submitting a request, reviewing bids from writers, revising the paper, and requesting revisions if needed.
2. The site uses a bidding system where writers submit bids to complete writing requests, and clients can choose a writer based on qualifications, history, and feedback.
3. The site promises original, high-quality content and refunds if papers are plagiarized, aiming to fully meet customer needs.
Star Writing Template Freebie By Cupcakes AAudrey Britton
The document provides instructions for creating an account on the HelpWriting.net site in order to request writing assistance. It outlines a 5-step process: 1) Create an account with a password and email, 2) Complete a form with assignment details and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions if needed and know plagiarized work will be refunded. The document promotes the writing assistance services available on HelpWriting.net.
Short Paragraph On Water Pollution. Paragraph On Water Pollution ...Audrey Britton
This document discusses unfair dismissal from both a civil law and statutory perspective. At common law, damages for wrongful dismissal are limited as employers can generally dismiss with proper notice. Statutory unfair dismissal provides employees greater protection by considering whether dismissal was reasonable given the employer's size and resources, and whether proper grievance/disciplinary procedures were followed. The standards of fairness and reasonableness aim to balance employer and employee interests in dismissal cases.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
SWOT analysis in the project Keeping the Memory @live.pptx
A Classification Of Application Sharing Tools For Use In A Virtual Classroom
1. A Classification of Application Sharing Tools for Use
in a Virtual Classroom
Gerhold B. Kooper1
, Prof. Alfredo Terzoli2
Computer Science Department, Rhodes University, South Africa
Tel: +27 46 6038247, Fax: +27 46 6361915
email: gbkooper@gmail.com1;
A.Terzoli@mail.ru.ac.za2
Abstract – In this paper we classify different
application sharing tools according to factors that
would affect their use in a virtual classroom. We
exemplify this classification with a subset of
different types of application sharing tools, such
as conferencing systems, thin-client systems and
peer-to-peer systems. We also discuss
performance issues relating to application sharing
tools.
Index Terms - Application Sharing, Desktop
Sharing, Virtual Classroom, Collaboration
I. INTRODUCTION
The Computer Science department at Rhodes
University provides distance courses to the Computer
Science department of the University of Namibia, to
help with staff and research capacity building there.
The teaching takes place over the Internet in a virtual
classroom.
A. The Virtual Classroom
As stated in [10], “A virtual classroom should not
be much different from a real classroom”. In a virtual
classroom one would like to have the teaching and
learning experience as close as it would be in the real
classroom as possible. The difference from a real
classroom should be only that a “virtual place” is
created, which allows teachers and students to
connect over any distance and from any geographical
location.
Such a virtual classroom would be a very efficient
and practical way of utilizing human resources in a
university environment. Lecturers would then not
need to prepare and present different lectures for the
physical and the virtual classroom.
Within a virtual classroom there is a need for
computer application sharing, for example to allow
lecturers to run experiments with software.
In an African context, the choice of application
sharing technique must take into account low
bandwidth and unstable network connections.
B. Application Sharing
From the point of view of a virtual classroom,
application sharing can be described as the sharing of
the graphical user interface of an application amongst
multiple users simultaneously in real-time. All
participants have the same view of the application.
The whole desktop might be shared rather than a
single application, in which case one speaks of
desktop or screen sharing. Application sharing and
desktop sharing will be considered equivalent in this
paper except where the difference is explicitly made.
In this paper “application sharing software” is the
software that handles and connects the different
participating computers to enable the sharing.
II. DESIGN ARCHITECTURE
An application sharing system can be categorized
in terms of how it handles the shared application,
namely centralized or replicated [6].
In the centralized architecture there is only one
instance of the shared application, whereas the
replicated architecture requires each participant to run
locally his/her own copy of the shared application.
The replicated architecture, by its design, may be
very bandwidth efficient and faster than the
centralized architecture as only input streams are sent
among participating computers. It was even stated by
C. Ming and his team at the HP Software Technology
Laboratories that they could share a 3D application
over just 56kbps network connection [2].
2. The replicated architecture has however not
survived in application sharing software over the
years and we could not find usable software solutions
using this architecture. It suffered greatly from the
problem of keeping all shared application instances
synchronized [5].
Replication architectures seem to be successfully
applied in networked gaming. A gaming session may
sometimes have more than tens of thousands of
concurrent players. In these games, only the actions
of the players would be distributed amongst players
rather than the graphics updates [11].
III. TYPE OF APPLICATION SHARING SYSTEMS
We can further classify application sharing
software in respect to the systems in which they are
used. In the subset of application sharing tools
presented in Table 1, all the tools use the centralized
architecture, but they are different along other
dimensions.
C. Application Sharing within Conferencing
Systems
In many instances, application sharing would be
part of a video or voice conferencing system. The
sharing of applications in such systems would be
referred to as data conferencing or desktop
conferencing. Examples in Table 1 are Citrix
GoToTraining, Cisco WebeX, Microsoft Live
Meeting and Adobe Acrobat CONNETNOW.
These systems generally have a good mechanism
of floor control to handle changes to the application
being shared [3].
D. Application Sharing within Thin-Client
Computing Systems
A thin-client computing system consists of a server
and a client that communicate over a network using a
remote display protocol. Thin client systems are
increasing becoming popular over the internet with
the increasing presence of technologies such as cloud
computing.
Application sharing can be done with thin-client
systems although these systems are not primarily
designed for desktop conferencing. With appropriate
configuration, however, they can form a desktop
conference session. Examples from Table 1 are
FreeNX and TightVNC.
A desktop sharing conference was done with the
FreeNX server on Ubuntu Linux by allowing
participants to attach to an existing desktop display.
Three participants shared one screen in this instance.
Sharing of the same display when using TightVNC
can be achieved, for example, with the use of
software called VNC Reflector that allows
broadcasting of a display.
The limitation of these systems would typically be
the lack of a built in mechanism for floor control.
Floor control would have to be done through voice
communication or another communication channel
active amongst participants.
E. Application Sharing within Peer-to-Peer
Systems
In its pure sense, peer-to-peer (P2P) networks or
computing is a distributed system without any
centralized control. Nodes act as both servers and
clients. Hybrid P2P systems on the other hand have a
central server that maintains; for example,
information about registered users on the network, in
the form of meta-data [1]. Many of the modern P2P
systems are designed as hybrid P2P systems.
In the sample software in Table 1 we can regard
Skype and MSN Messenger as Hybrid P2P software
and they allow application or desktop sharing.
IV. SOFTWARE SOLUTIONS
A list of application sharing solutions was
compiled by gathering as much information about
these software solutions through the web and specific
trials.
In table 1 we present a subset of 10 application
sharing solutions from more than 50 solutions that
were investigated. We have selected this subset
because of the popularity and availability of these
solutions, together with their diversity.
3. Notes:
* These solutions would attempt to use a direct connection. If it fails due to network restrictions, data would be relayed through
an intermediate entity.
~ It could not be determined.
The columns in this table are described below.
A. Protocol
The “protocol” column indicates application level
protocol used by the solution.
The ITU-T T.120 family of protocols is the only
standard for application sharing protocols. Some of
the other applications sharing protocols, even the
proprietary ones, were developed by adding their
own adjustments to the T.120family.
It is popular for newer solutions to use the HTTP
protocol to tunnel their proprietary protocols, as is
shown in the subset of solutions presented in Table 1.
This allows their solutions to work on different
platforms and networks. Most universities and other
corporations have network restrictions to protect their
networks and may only allow HTTP internet traffic
through their networks.
B. Relay
The “relay” column indicates whether the solution
uses a central server to relay its screen update data.
C. Remote Control
The “remote control” column indicates whether the
solution would allow for remote participants to
control the hosted application.
D. Share Specific Application
This column indicates if the solution allows only
selected applications to be visible to others in the
application sharing session.
E. Change Presenter
The “change presenter” column indicates whether
the solution allows the “presenter” role to be handed
over to another participant. (A “presenter” in this
context is the person in control of the application.)
F. Live Cursor
The “live cursor” column indicates whether every
movement of the cursors would be visible on all
participating computers in real-time.
G. Multiple Users
The “multiple users” column indicates whether the
solution allows more than two participants to access
the same shared application at the same time.
H. TYPE
The “type” column indicates in which type of
system the application sharing is used as discussed
earlier.
Application Protocol Relay Remote
Control
Share
Specific
Application
Change
Presenter
Live
Cursor
Multiple
Users
Type
Citrix GoToTraining Proprietary over HTTP Yes Yes Yes Yes Yes Yes Conferencing
Cisco WebeX Proprietary over HTTP Yes Yes No No No Yes Conferencing
Microsoft Live Meeting Proprietary over HTTP Yes Yes ~ ~ Yes Yes Conferencing
Adobe Acrobat
CONNETNOW
Proprietary over HTTP Yes Yes No No Yes Yes Conferencing
TeamViewer Proprietary over HTTP No* Yes Yes No Yes ~ Conferencing
Mikogo Proprietary over HTTP Yes Yes No Yes Yes Yes Conferencing
Skype Proprietary over HTTP No* Yes Yes No Yes ~ P2P - Hybrid
MSN Messenger MSN Messenger Protocol Yes Yes No No Yes ~ P2P - Hybrid
FreeNX NX No Yes No ~ Yes Yes Thin-Client
TightVNC VNC/RFB No Yes No ~ Yes Yes Thin-Client
TABLE 1: APPLICATION SHARING SOLUTIONS
4. V. PERFORMANCE ISSUES
Centralized application sharing needs both high
bandwidth and low network latency to perform
effectively. The display area on the screen needs to
be typically bigger than one would see for example in
a Skype video call in order to read the text on the
screen. This would generate large amounts of data to
be transmitted over the network.
In terms of the end points, there are settings and
configurations of the application sharing software
that directly affect the performance. Important ones
are the screen resolution, the colour depth, the
display encoding, the compression algorithms used,
and the cache settings.
The following factors measure the performance of
the application sharing software in terms of the
experience by the participants when using application
sharing software.
A. Latency
Latency is the delay between the moment in which
the presenter initiates an activity, such as mouse
clicks or cursors move on the screen, and the moment
in which the other participants observe the same
action on their computers [8].
B. Smoothness
A smooth experience is one that flows easily with
a minimum of “choppiness” and fuzziness of images
[8]. Smoothness may improve focus of participants
and reduce distraction.
C. Fidelity
Fidelity denotes how accurate a copy is to its source.
When doing application sharing, presentations with
perfect fidelity looks identical to the presenter and
the other participants. With a good fidelity, the
classroom session experience is improved, reducing
the risk of participants to misread and misinterpret.
VI. DISCUSSION
In our virtual classroom it would be preferable to
use a solution with the following characteristics:
Support of multiple users as the
classroom might have students in
different locations.
It would not be good for the solution to
use relays. The servers used for relay by
most tools are very often on other
continents such as Europe or North
America and they introduce high network
latency.
A solution within a conferencing system
would be advantageous as these systems
have built in floor control.
In terms of the performance of the application
sharing solution chosen, the latency seems most
important. Fidelity and smoothness may not affect
the activity in the virtual classroom significantly, at
least until the transmitted session degrades
substantially.
VII. CONCLUSION
In this paper we have presented an initial
application sharing classification, with a view of
providing the right tool for use in virtual classroom
activity. The classification was along dimensions
such as the type of systems, the use of relay servers,
the type of protocol and others.
We have also classified a subset of application
sharing solutions currently in use according to the
criteria listed.
Finally we have also discussed the application
sharing solutions in terms of usability and experience
by users.
VIII. REFERENCES
[1] Pourebrahimi B., Bertels K, Vassiliadis S.
2005. A Survey of Peer to Peer Networks,
Proceedings of the 16th
Annual Workshop on
Circuits. Systems and Signal Processing, Veldhoven.
Netherlands.
5. [2] Hao M. C., Lee D., and Sventek J. S. 1996. A
light-weight application sharing infrastructure for
graphics intensive applications. In Proceedings of the
5th IEEE International Symposium on High
Performance Distributed Computing (HPDC '96).
IEEE Computer Society, Washington, DC, USA
[3] Ahuja S. R., Ensor J. R., Lucco S. E. 1990. A
comparison of application sharing mechanisms in
real-time desktop conferencing systems. SIGOIS
Bull. 11, 2-3 (March 1990), 238-248
[4] Rohall, S. L., Patterson, J. 2004. Another Look
at Replicated-Application Sharing. Position paper for
CSCW 04 workshop on Making Application Sharing
Easy: Architectural Issues for Collaboration
Transparency (Chicago, USA, Nov. 6-10). ACM,
New York, NY.
[5] Rohall Steven L., Patterson John F. 2005. The
Zipper System for Flexible Replicated Application
Sharing, UIST ’05, October 23 – 27, Seattle,
Washington. USA.
[6] Crowley Terrence, Milazzo Paul, Baker Ellie,
Forsdick Harry, Tomlinson Raymond. 1990.
MMConf: an infrastructure for building shared
multimedia applications. In Proceedings of the 1990
ACM conference on Computer-supported
cooperative work (CSCW '90). ACM, New York,
NY, USA, 329-342
[7] Nieh, J., Yang, S. J., and Novik, N. 2000. A
comparison of thin-client computing architectures.
Tech. Rep. CUCS-022-00, Department of Computer
Science, Columbia University, November
[8] Petersen Heather. 2007. Screen Sharing
Performance of Web Conferencing Services:
Competitive Analysis Prepared for Adobe Systems.
White Paper. Handle Consulting. Available at:
http://www.adobe.com/products/acrobatconnectpro/p
roductinfo/features/turbo_screensharing/turbo_screen
sharing_wp.pdf. [Accessed: May 2011]
[9] Lennox J., Schulzrinne H., Nieh J., Barrato R.,
2004. Protocols for Application and Desktop
Sharing, Columbia University. Technical Paper.
Available at: http://
www.cs.columbia.edu/~lennox/draft-lennox-avt-app-
sharing-00.html. [Accessed: April 2011]
[10] Petterson R., Van Limbeek C. A. 2002.
Design of a Virtual Classroom. The 34th Annual
Conference of the International Visual Literacy
Association. October 1 – 5. Breckenridge. Colorado,
USA.
[11] Rhalibi Abdennour El, Merabti Madjid. 2005.
Agents-based modeling for a peer-to-peer MMOG
architecture. Computers in Entertainment (CIE).
Volume 3, Issue 2 (April 2005). New York. USA.
[12] A Brief Look At NoMachine NX [online].
2004. Available at: http://
people.gnome.org/~markmc/a-look-at-nomachine-
nx.html. [Accessed: February 2011]
[13] 30 Amazing Remote Desktop Sharing and
Screen sharing applications [online]. 2010. Available
at: http:// www.developersnippets.com/.../30-
amazing-remote-desktop-sharing-and- screen-
sharing-applications/ [Accessed: April 2011]
[14] Screen Sharing Tools and Technology: A
Mini-Guide [online]. 2006. Available at:
http://www.kolabora.com/news/2006/10/05/screen_s
haring_tools_and_technology.htm. [Accessed May
2011]
[15] Online Training Software & Virtual
Classroom [online]. 2011. Available at:
http://www.gotomeeting.com/fec/training/online_trai
ning. [Accessed: May 2011]
[16] VNC Reflector [online]. 2011. Available at:
http://sourceforge.net/projects/vnc-reflector/.
[Accessed: May 2011]
[17] A SANTED Funded University Collaboration
[online]. 2007. Available at:
http://www.coe.ru.ac.za/VirtualClassroom/Technolog
y/Technology.htm. [Accessed: May 2011]
[18] MSN Messenger Service 1.0 Protocol
[online], 1999,
http://www.hypothetic.org/docs/msn/ietf_draft.txt,
[Accessed: May 2011]
[19] Pallof R. M., Pratt K. 2007. Building online
learning communities: Effective strategies for the
virtual. San-Francisco: Jossey-Bass. John Wiley and
Sons.
6. Gerhold B. Kooper is currently studying towards his
Master of Science Degree in Computer Science at
Rhodes University, Grahamstown. His main area of
interest include application sharing in the virtual
classroom.
Alfredo Terzoli is Professor of Computer Science at
Rhodes University, where he heads the Telkom
Centre of Excellence in Distributed Multimedia. He
is also Research Director of the Telkom Centre of
Excellence in ICT for Development at the University
of Fort Hare. His main areas of academic interest are
converged telecommunication networks and ICT for
development