The subject of the article is the occurrence of dialectal features in Internet nicknames. The analysis was carried out on the basis of about 2500 nicknames that contained dialectal features. The names were obtained within the years 2012–2015. In the analysis, linguistic areas were indicated in which we may notice the influence of local dialects on that layer of the Internet anthroponymy. The influence of local dialects is visible in the fact that the Internet users reach for traditional folk names as well as name models related to the folk manner of identifying a human being, e.g. Jagatka, Jantecek, Janielka od Genowefy, Cesiek z Tuchowa. Apart from references to folk anthroponymy, the Internet nicknames reflect the influence of local dialect lexis (e.g. gzub, graślok, fusyt), phonetics (janioł, Carownica, łokrutny łoptymista), inflection (Śpisok z Łapsóf, ciupaga łod tater) and word-formation, e.g. (rzemyszek, cwaniuk).
In this paper, we describe secure gateway for Internet of Things (IoT) devices with internal AAA mechanism, implemented to connect IoT sensors with Internet users. Secure gateway described in this paper allows to (1) authenticate each connected device, (2) authorise connection or reconguration performed by the device and (3) account each action. The same applies to Internet users who want to connect, download data from or upload data to an IoT device. Secure Gateway with internal AAA mechanism could be used in Smart Cities environments and in other IoT deployments where security is a critical concern. The mechanism presented in this paper is a new concept and has been practically validated in Polish national research network PL-LAB2020.
Previous onomastic research into proper names in the Internet has typically been based on traditional and classic onomastic methodology. As a result, researchers have focused on the classification of names, the analysis of their structure, etymology, or function. In this paper, this traditional approach is compared with the new possibilities afforded by medioonomastics, a fast growing method which is combining the onomastic tradition and mediolinguistics. This paper provides only an outline and is only preliminary, although some analysis is also presented. It reviews onomastic techniques and the medioonomastic analysis of the names that function within the various types of texts in the Internet. Some examples are taken from Internet memes, as well as from Facebook profiles. One of these names is the Polish given name, Janusz, which is a brilliant example of the specific new functions, connotations and general semantic values generated by the Internet. This name has gained a new meaning: ‘a typical Polish man’, ‘unfashionable man’, ‘a redneck’. Another name is the title of the Facebook profile Chujowa Pani Domu, based on the TV-series Perfekcyjna Pani Domu, as a kind of semantic and pragmatic re-construction of the latter name. In the conclusion, the necessity of considering not only the type of object-named, but also the medium and especially the Internet, is emphasized. Such studies may offer a correct procedure for analysis which include the new medioonomastic methodology.
The aim of the present paper is to discuss metaphorical constructions, based on figurative uses of words, in informal Polish in the field of computers and the Internet. The study is based on the author’s own corpus, compiled on the basis of short informal texts (entries, posts) written on 32 selected Internet forums. Altogether, the corpus consists of 1,541,449 words. The paper, as the title suggests, focuses on one metaphorical formula, i.e. COMPUTERS ARE BUILDINGS. The metaphors which can be subsumed under this heading belong to the most frequent in the corpus (alongside a different type, i.e. COMPUTERS ARE HUMANS). They are discussed within the cognitive framework, as introduced by Lakoff and Johnson (1980). Some attention will also be devoted to the possible infl uence of English upon Polish metaphorical constructions used in the area of computers and the Internet.
This article discusses the traffic types typically used in industrial networks. The authors propose a number of methods of generating traffic that can be used in modeling traffic sources in the networks under consideration. The proposed traffic model have been developed on the basis of the ON/OFF model. The proposed solutions can be applied to model typical traffic types that are used in industrial systems, such as Time-Triggered (TT) traffic, Audio-Video Bridging (AVB) traffic or Best Effort traffic. The article discusses four traffic models with modifications and shows how the proposed models can be used in modeling different traffic types used in industrial networks.
The article offers an insight into the Slavonic contemporary etymological research and its new possibilities. Modern etymology has witnessed a seachange that can be referred to as a digital breakthrough. Thanks to the Internet and electronic media the etymologists today have easier access to historicallinguistic, dialectal and onomastic sources as well as to etymological dictionaries. They also better access to many monographs and studies. Moreover, today the etymologist has no problems making use of analogous materials published in foreign languages, the obtaining of which in the past had posed a major problem. This will clearly accelerate progress in etymological research, thereby opening up new vistas for etymology. We can research effectively the origins of dialectal and colloquial words as well as words no longer in use, a task which had earlier been very difficult.
This paper explores how the workplace experience of migrants helps to determine part of the social remittances they can make to their country of origin. The social remittance literature needs to pay more attention to work as an element of the migrant experience. Focus is placed on public internet forums related to newspapers in Poland because these are a very open means of communicating experience to the public sphere. To support the analysis, UK census and other data are used to show both the breadth of work done by Polish migrants in the UK and some of its peculiarities. This is then followed with a more qualitative analysis of selected comments from the gazeta.pl website. The complexities of both the range of migrants’ ideas about their work and also the analysis of internet-based newspaper com-ment sites as a form of public communication are shown.
The paper presents a circuit structure that can be used for powering an IoT (Internet of Things) sensor node and that can use energy just from its surroundings. The main advantage of the presented solution is its very low cost that allows mass applicability e.g. in the IoT smart grids and ubiquitous sensors. It is intended for energy sources that can provide enough voltage but that can provide only low currents such as piezoelectric transducers or small photovoltaic panels (PV) under indoor light conditions. The circuit is able to accumulate energy in a capacitor until a certain level and then to pass it to the load. The presented circuit exhibits similar functionality to a commercially available EH300 energy harvester (EH). The paper compares electrical properties of the presented circuit and the EH300 device, their form factors and costs. The EH circuit’s performance is tested together with an LTC3531 buck-boost DC/DC converter which can provide constant voltage for the following electronics. The paper provides guidelines for selecting an optimal capacity of the storage capacitor. The functionality of the solution presented is demonstrated in a sensor node that periodically transmits measured data to the base station using just the power from the PV panel or the piezoelectric generator. The presented harvester and powering circuit are compact part of the sensor node’s electronics but they can be also realized as an external powering module to be added to existing solutions.
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.