Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Software Requirements for Cybercafés

View through CrossRef
This chapter discusses basic software that should be found in a typical cybercafé setup. ‘Software requirements’ are broadly divided into requirements for the server side and client side of the network. As a commercial venture, it is of great importance that only necessary software be found installed in a cybercafé, to meet the café user’s need. Starting with an introduction, a general overview of the café user’s needs are set forth, thereby leading to the division into two broad areas: server and client side. An outline of the chapter is given. The background section gives some details on some basic terminologies (server, client, operating system, etc.) that a cybercafé user/prospective operator might want to get acquainted with. Software requirements for the server side of the café network are discussed first; general features of timing softwares, notes on Internet security, viruses, and spyware. As the café server is a very important element in café management, it is necessary that the server is not overwhelmed by unnecessary tasks thereby leading to a generally slow network. Software for the client side of the café network is discussed next with emphasis on basic software applications often used/requested by café users. Examples of such are word processing applications and graphics viewing software. Since a lot of computer literate people are familiar with the Windows operating system, all software discussed for client use derives from such a perspective. Some security issues necessary for maintaining crisp client computers are also discussed. Due to lack of in-depth knowledge about information security among internet users, the future trends section discusses the applicability of the personal Internet communicator in the Nigerian environment, because of its portability and built in security. Other possible trends in security and cyber-crime are also discussed. The chapter ends with a note that café users will continue to demand faster Internet speeds, and therefore operators must be on the search for latest software to meet their needs, latest security software to keep their café network always clean and secure. Future research directions include software development research to allow café users modify or design their desktops to their own taste while in the café. Complete café solution software is also proposed to cater for everything from operating systems to end-user applications which can be installed once, and from a single source.Literature used for this chapter is sourced mainly from the Internet, and from personal experience of the author, as there are not literatures dealing with ‘cybercafé software’ on a specific note. A whole lot of software are been used, and could be used in a café. This depends actually on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments.
Title: Software Requirements for Cybercafés
Description:
This chapter discusses basic software that should be found in a typical cybercafé setup.
‘Software requirements’ are broadly divided into requirements for the server side and client side of the network.
As a commercial venture, it is of great importance that only necessary software be found installed in a cybercafé, to meet the café user’s need.
Starting with an introduction, a general overview of the café user’s needs are set forth, thereby leading to the division into two broad areas: server and client side.
An outline of the chapter is given.
The background section gives some details on some basic terminologies (server, client, operating system, etc.
) that a cybercafé user/prospective operator might want to get acquainted with.
Software requirements for the server side of the café network are discussed first; general features of timing softwares, notes on Internet security, viruses, and spyware.
As the café server is a very important element in café management, it is necessary that the server is not overwhelmed by unnecessary tasks thereby leading to a generally slow network.
Software for the client side of the café network is discussed next with emphasis on basic software applications often used/requested by café users.
Examples of such are word processing applications and graphics viewing software.
Since a lot of computer literate people are familiar with the Windows operating system, all software discussed for client use derives from such a perspective.
Some security issues necessary for maintaining crisp client computers are also discussed.
Due to lack of in-depth knowledge about information security among internet users, the future trends section discusses the applicability of the personal Internet communicator in the Nigerian environment, because of its portability and built in security.
Other possible trends in security and cyber-crime are also discussed.
The chapter ends with a note that café users will continue to demand faster Internet speeds, and therefore operators must be on the search for latest software to meet their needs, latest security software to keep their café network always clean and secure.
Future research directions include software development research to allow café users modify or design their desktops to their own taste while in the café.
Complete café solution software is also proposed to cater for everything from operating systems to end-user applications which can be installed once, and from a single source.
Literature used for this chapter is sourced mainly from the Internet, and from personal experience of the author, as there are not literatures dealing with ‘cybercafé software’ on a specific note.
A whole lot of software are been used, and could be used in a café.
This depends actually on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments.

Related Results

The use of cybercafes in Ilorin, Nigeria
The use of cybercafes in Ilorin, Nigeria
PurposeThe purpose of this paper is to investigate the use of cybercafés in Ilorin, Nigeria. The main objectives of the survey were to determine the characteristics of the users, h...
Cybercafés and Cyber Crime in Nigeria
Cybercafés and Cyber Crime in Nigeria
This chapter discusses cybercafés and cyber crime in Nigeria. It also identifies the various cyber criminals in Nigeria. The working groups set up by the government to redeem the i...
Advancements and innovations in requirements elicitation: Developing a comprehensive conceptual model
Advancements and innovations in requirements elicitation: Developing a comprehensive conceptual model
Requirements elicitation is a crucial phase in the software development lifecycle, ensuring that stakeholders' needs are understood and translated into system specifications. Tradi...
An ontology-based approach to engineering ethicality requirements
An ontology-based approach to engineering ethicality requirements
AbstractIn a world where Artificial Intelligence (AI) is pervasive, humans may feel threatened or at risk by giving up control to machines. In this context, ethicality becomes a ma...
Problem-Frame-Oriented Requirements Traceability to Enhance Requirements Management
Problem-Frame-Oriented Requirements Traceability to Enhance Requirements Management
Managing software requirements is a challenge in software development and maintenance. Requirements changes are inevitable, particularly in a rapid iterative development approach t...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...
Exploring the use of gamification in human-centered agile-based requirements engineering
Exploring the use of gamification in human-centered agile-based requirements engineering
Gamification has become prevalent in educational settings, particularly in human-centered software engineering. Using gamified learning environments for comprehending software engi...

Back to Top