Virtus Walkthrough VRML -- cspace model The cyberspace model concentrates on taking a new, unfamiliar view of data. Data is represented by gray geometric blocks, accessed by visiting nodes of different functions and purposes. The first node, the Logon Node, would be type of registration area. The clear circle represents data encryption, an impassable barrier that must be interfaced with to pass. A user 'walks' towards this ice and clicks on one of the gray boxes, representing a logon interface. This object might link to a form that requests the user's name and password, or just a name for registration purposes. After entering this information, the user is either rejected or accepted into the system. Travel between nodes is accomplished by utilizing the clear green tubes - clicking on one would take the user to the next node. Past the Logon Node is the Routing Node, a kind of co-processor that takes incoming data and routes it towards its proper destination. Here users can interface with the terminal and maybe access a system directory that tells them that a link to the site's FTP area is on a node to the left, while a text repository node is to the right. Ahead would be the administrative node, strictly off-limits to non-authorized access. The user could also take time to investigate the random pieces of data "floating" around the top of the Routing Node, where the tubes meet. Clicking on these might bring up short messages or act as links to other sites. To the right of the Routing Node is the Datastore Node, a node representing a massive store of information, such as an FTP site. Accessing the terminal here might link the user to a dialog box with a request line. The user could enter the filename, hit return, and download the file to his or her computer. The clear box around the data represents more encryption, enforcing the idea that the user must "request" a file and have it given to them, through the terminal interface. To the left of the Routing Node is the Library Node, populated by a small bunch of data blocks and two large access terminals. Here the user might choose to view text files or images. Ahead of the Routing Node is the Firewall, an Internet security measure that is impassable without the proper password. Here the user would approach the interface and enter a system password. If the password valid, the link to the next node through the green tube would be available. The CPU Node might be a link to the remote administrative functions for the web site manager. The user would enter the CPU through the clear walls and access the large terminal on the interior. Floating around the CPU are blocks of data that might link to usage charts or logs. Kevin Teich -- Virtus Corporation