home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
VRML Tools for 3D Cyberspace
/
VRML_Tools_For_3D_Cyberspace.iso
/
virtus
/
cpreadme.txt
< prev
next >
Wrap
Text File
|
1996-07-01
|
3KB
|
53 lines
Virtus Walkthrough VRML -- cspace model
The cyberspace model concentrates on taking a new, unfamiliar view
of data. Data is represented by gray geometric blocks, accessed by
visiting nodes of different functions and purposes.
The first node, the Logon Node, would be type of registration area.
The clear circle represents data encryption, an impassable barrier that
must be interfaced with to pass. A user 'walks' towards this ice and
clicks on one of the gray boxes, representing a logon interface. This
object might link to a form that requests the user's name and password,
or just a name for registration purposes. After entering this
information, the user is either rejected or accepted into the system.
Travel between nodes is accomplished by utilizing the clear green tubes
- clicking on one would take the user to the next node.
Past the Logon Node is the Routing Node, a kind of co-processor that
takes incoming data and routes it towards its proper destination. Here
users can interface with the terminal and maybe access a system
directory that tells them that a link to the site's FTP area is on a
node to the left, while a text repository node is to the right. Ahead
would be the administrative node, strictly off-limits to non-authorized
access. The user could also take time to investigate the random pieces
of data "floating" around the top of the Routing Node, where the tubes
meet. Clicking on these might bring up short messages or act as links
to other sites.
To the right of the Routing Node is the Datastore Node, a node
representing a massive store of information, such as an FTP site.
Accessing the terminal here might link the user to a dialog box with a
request line. The user could enter the filename, hit return, and
download the file to his or her computer. The clear box around the data
represents more encryption, enforcing the idea that the user must
"request" a file and have it given to them, through the terminal
interface.
To the left of the Routing Node is the Library Node, populated by a
small bunch of data blocks and two large access terminals. Here the
user might choose to view text files or images.
Ahead of the Routing Node is the Firewall, an Internet security
measure that is impassable without the proper password. Here the user
would approach the interface and enter a system password. If the
password valid, the link to the next node through the green tube would
be available.
The CPU Node might be a link to the remote administrative functions
for the web site manager. The user would enter the CPU through the
clear walls and access the large terminal on the interior. Floating
around the CPU are blocks of data that might link to usage charts or
logs.
Kevin Teich -- Virtus Corporation