Information Technology Reference
In-Depth Information
The tool may be used to browse personal image collections by directory or by
visual similarity in “Browse images.” Users are able to automatically group images
by color, date, time, and key features with the use of an adaptive clustering algo-
rithm. The tool provides all the appropriate meta-information (description, size
of the image, quality, name of the designer or the contributors, etc.). The system
uses this information for the creation of HTML-based albums, storyboards or when
searching for images.
In addition, users are able to search the database using key words, finding at the
same time duplicate images based on user parameters (dimensions, file size, file
name, and similarity). The virtual design environment also includes a tool designed
to remove the Alpha channel from pixel-based images (background of an image),
making it easier to collage images together for storyboard purposes.
4.4.6 Computer-Supported Collaborative Working
Computer-supported collaborative working (CSCW) tools refer to applications that
support the sharing of data between computers as well as communication tools
that support both synchronous and asynchronous working (Dartnall, 1994; Gardner,
1985; Gero, 1993; Gross, 1996). IT-based applications that allow two or more users
to work simultaneously on a design are available. These tools allow users to share
desktops using remote desktop applications. This facility is already part of both Mac
and PC operating systems. This technology transmits keyboard and mouse events
from one computer to another.
A tool that simplifies the operation of setting up a shared desktop was incorpo-
rated into the virtual design environment at Studio Levien. The default settings of
the tool will request only a user password for security purposes. The administrator
or the host of the meeting is able to tune the settings of the server customizing its
performance and quality of service. For example, the administrator is able to choose
whether to disable participants' input by changing their status to “view only.” This
feature is useful when you are presenting a solution to a distributed group as it cre-
ates an interaction protocol. This technology allows designers to access centralized
resources from remote workstations. These workstations may act as clients to more
powerful distributed server machines that are connected to the network and provide
users with appropriate tools, data, and storage. This technology functions under any
network type local area network (LAN), wide area network (WAN), and mobile
networks. Using the VNC protocol (virtual network computing), a server machine
supplies not only applications and data but also an entire desktop environment that
can be accessed from any machine connected to the internet.
In contrast to many recent Web-based or Internet applications VNC uses a ran-
dom challenge-response system to provide the basic authentication when connecting
to a server. Even though this is reasonably secure, once the user is connected the
traffic between the client and the server is unencrypted, and therefore is unsafe for
professional use. However, the VNC may be tunneled over an SSH or VPN con-
nection which adds an extra security layer with stronger encryption. This approach
Search WWH ::




Custom Search