Monday, January 31, 2011

Information Communication Technology

Information and communications technology or information and communication technology
        is often used as an extended synonym for information technology (IT) but is usually a more general term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), intelligent building management systems and audio-visual systems in modern information technology. ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication middleware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions. The expression was first used in 1997 in a report by Dennis Stevenson to the UK government and promoted by the new National Curriculum documents for the UK in 2000.
ICT is often used in the context of "ICT roadmap" to indicate the path that an organization will take with their ICT needs.
        The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. See VOIP and Intelligent Infrastructure Management (IIM). This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.
          a general term referring to the application of Information and Communication Technologies (ICTs) within the fields of socioeconomic development, international development and human rights.
The dominant term used in this field is "ICT4Dev". Alternatives include ICTD and development informatics.
The concept of ICT4Dev can be interpreted as dealing with disadvantaged populations anywhere in the world, but is more typically associated with applications in developing countries. It concerns itself with directly applying information technology approaches to poverty reduction. ICTs can be applied either in the direct sense, wherein their use directly benefits the disadvantaged population, or in an indirect sense, wherein the ICTs assist aid organisations or non-governmental organizations or governments or businesses in order to improve general socio-economic conditions.
           The field is becoming recognized as an interdisciplinary research area as can be noted by the growing number of conferences, workshops and publications. Such research has been spurred on in part by the need for scientifically validated benchmarks and results, which can be used to measure the efficacy of current projects.

Wednesday, January 12, 2011

latest gadgets in 2011

New Mobile Phones 2011.

BlackBerry Playbook 300x271 9 Latest Gadgets 2011
                   Jan 11,2011 - As the new year has already started, the major brands like Nokia, Samsung, BlackBerry, Motorola, Apple and HTC are ready to welcome you with more feature rich new mobile phones 2011. These gadgets would be far better in terms of technology, features and design. You will be having some improved versions of previous models with some more added features and applications. The latest mobile phones 2011 will carry your communication to a level you might have not imagined of. So, the year is going to be very profitable for both handset lovers as well as the manunfacturers.

BLACKBERRY PLAYBOOK

 Market nowadays is flooded with different kind of laptops as it offers convenience because of it's portability and durability. Weighing between 3 and 8 lbs it proves to be a useful and a portable gadget as you can go mobile with it, unlike other desktop systems.With the rising demand companies keep on releasing their new versions of the laptops regularly by adding some state of art features to enhance it's performance. Some basic features that you can find in a typical laptop are that it is comparatively thin, display quality is impressive, has a unique touch pad and is compatible with most devices. It comes with a built in USB port that allows you to connect it with series of devices like mobile phones, audio systems, DVD players.

sony psp phone by t3 300x270 9 Latest Gadgets 2011

Playstation phone seems really to be released by Sony to see the various leaks that have been circulating. PlayStation enthusiasts seem to be satisfied by it presence.

Monday, December 6, 2010

Firewall

Firewall
         -is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
        -can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.        
                             File:Firewall.png

source:google.com

IT104:Cyril Beloy

1. Why has there been a dramatic increase in the number of computer related security incidents in recent years?
 *In today's generation gadgets and computers are found everywhere whether you are in the markets, terminals, houses, commercial building, schools, etc... Every year the number of computer related incidents is increasing because of computers are spreading in entire globe. Computer criminals are also increasing and they make Computer and Internet crimes like Viruses, Worms, Trojan horse, and etc... In this crimes they can create their own business or they can find financial money in a wrong way.

2. What are some characteristic of Common Computer Criminals including their objectives?
  *Perpetrators
      -}is a computer criminals have the same motives of seekers one thing a challenge propagators looking for financial game industrial files.
  *Some types of Perpetrators:
     []Hacker=>test limit of the system and gain publicity.
     []Cracker=>cost problem,steal data and curapt system.
     []Insider=>make money, distract companies information system.
     []Cybe Criminals=>making a fake money.
     []Cyber Terrorist=>destroy key infrastracture component.


3. What actions must be taken in Response to a Security Incidents?
  *Security Incidents in Computers today can damage your daily life or in your business specially when it is talking about computers. The actions must be taken in responce to this incidents for me as an I.T. student is to make a special or secret program code that can damage, destruct and control the viruses, worms, trojan horse, and etc... to damage the unit.