Do you think you would ever walk into a bar, stand on a table and start shouting out all the details of your life?

What about walking up to a complete stranger in the mall and asking if that person would like to be your friend or build a relationship with you?

Well, those who use the internet and social media often do things online that they would never do face-to-face or in public.

The problem is that when you post things that you think are only for the eyes of friends or family, you forget that there are thousands of other people who can also view them. Some might be innocent bystanders whereas others might not have noble intentions. And don’t try to tell me that you have an antivirus program to protect you. If there are people smart enough to hack into the Pentagon’s computer, there are people who can get around your program.

This week, researchers have warned that no matter how secure your site is, those who play FarmVille can easily become victims of identity theft. The terms of agreement that you likely didn’t read when you made a Facebook account state that all information and photos you post become the property of Facebook. That means that you might see your photo plastered on an advertisement for Viagra or in another place that you would not otherwise approve in the future.

Teenagers who grew up with the internet tend to use it as their major form of communication but they don’t seem to have gotten the message that what you put on the internet stays there forever – even if you think you have erased it. Imagine how embarrassed one might be in the years to come if or when others access information you wrote as a youth just when you are applying for an important job, running for a political office or trying to be an example for others to follow.

And the problems are not just occurring because of the actions of children and teenagers. Adults who think it is cute to post pictures of their children or grandchildren risk having them be seen by perpetrators – and some of them might not just be interested in looking. When you add personal information, it sets the child up for a kidnapping – or worse.

I have heard people state that they are not worried about identity fraud because they don’t have any money anyway. Well, consider this. Have you ever lost your wallet? Think of all the problems you had in trying to replace ID and notify credit card companies about the loss. Now add to this the fact that someone is out there ruining your reputation as they try to impersonate you in any number of ways.

Someone told my daughter that you should never post anything you wouldn’t want your mother to see. Well, that doesn’t even take it far enough. You can trust your mother – but you can’t trust everyone else who has access to a computer.

It’s time to stop playing innocent or pretending that it won’t happen to you. When you put information on the internet, you risk your financial security, your reputation and may even set up the ones you love the most for serious harm.

Read the rest of this entry »

In the early 1900s no one would believe that with a few short years, the kerosene man (I say man in this case because the prevalence of women in this type of field during this time period was simply non-existent) was who filled their night lamps would become obsolete. These men and this entire industry suddenly disappeared with the advent of electricity as a service provided by centralized utilities. In the early 1990s this same sort of shift happened with online services, while CompuServe, AOL, and Prodigy all had their loyal fan base, things quickly changed, and soon the age of Internet Service Providers (ISPs) was born. What we are witnessing today is tantamount to the same change – people are switching off their servers, trading in their workstations, and getting rid of their clunky desktops, all in response to new offerings online that allow them to do exactly the same things, only cheaper, faster, and without having to install complicated software packages. The three major technologies which are moving this forward are virtualization, cloud computing and software as a service (SaaS).

While most consumers may have heard of virtualization and cloud computing, the terminology and obscure nature of these technologies leads one to wonder what they mean. For the average consumer, virtualization and cloud computing are appear to be exactly the same thing.

Imagine for a moment, you are a manager of a large company and have some property to use. You could build a single office on it, but this would mean that, you could only have a very small company using that space. On the other hand, you could build a large building that has the potential to contain many “offices” simultaneously and room for expansion. You can use the building in whatever manner you choose; however, if you only have five employees, most of the space in the building is being wasted. If I was the manager in this company and saw that I was only using one floor of the building, I could either let the other floors sit vacant until I did need to use them, or, if I were enterprising, I could rent out those floors to other sublets. By renting out my time to other sublets, I get the most of my building space. Virtualization is just like this. I have a single piece of computer hardware on which I run several different “virtualized computers” at the same time. Each of these virtualized computers gives me the same benefit of a regular computer, the only difference is that I do not need multiple pieces of hardware to rent out the space.

Cloud computing takes virtualization to an entirely new level. Think about the manager of the building, and now assume that he has 3 buildings for rent. Since they have a lot of space available, they decide to rent out chunks of space for conventions and to karate instructors to operate their businesses. Since conventions and lessons do not take place all the time, they can schedule the building usage based on capacity. Now imagine that a very large convention comes into town. The manager can schedule space for this convention in one entire building (since it is very large) or spread the convention out across multiple buildings (because of other events going on). The 3 building analogy is the same as cloud computing – where your computing resource is available across multiple pieces of hardware. To the end user (the renter) they are getting their own private “virtualized computer” (space to hold the event); to the servers (the buildings), they are distributing their workload across several pieces of hardware at the same time (the events).

For most end users, the main technology impact will come in the form of Web 2.0, thin clients, and Software as a Service. The vast majority of users are currently using some form of thin client even as we speak. Many people have email accounts with Google and check their email through their web browser. Interactive websites such as Facebook allow them to maintain their connections to their social network. Online file sharing services (such as Dropbox) allow them to access their files anywhere. Finally, online applications such as Picsa and Google Docs allow users to perform most of their tasks normally done on their desktop computer, online from anywhere in the world. The concept of the thin client is a very small, low powered computer (such as a net book) which connects to a much more powerful computer through the network (such as a web browser accessing Google Docs).

Thin clients and software as a service will free users from being tied to their computers, and allow them to access their information anywhere they can find an internet connection. Just as electricity and the internet became centralized utilities and services everyone takes for granted, soon software programs will become the same. No longer will people spend thousands of dollars on computers which are rarely used and complicated software programs they barely touch – software as a service will become their new “telephone bill” and allow everyone the same access and ability as large organizations without all the upfront costs.

Read the rest of this entry »

Computer and Technology Today

Computer plays an essential role people’s day to day life especially at work place, schools and even in home. Twenty first century has been the age of so many technological advancements aimed for making the lives of people better. Computer helps them become more efficient in their work.

Computer technology in banking:

Technology has made our living easy and comfortable, for instance our banking needs. Previously people need to maintain the important data of their customers manually. But right now, in just one click, they would be able to find all the customers’ data instantly. The customers are able to know about the transactions of their account by logging in to the bank website. Moreover, it is possible to apply for loans through online.

Improvements of computer technology:

Computer technology has improved our life style far better than before. Due to the emergence of internet and technology, the world has shrunk to a global village. Even though the advancement in internet creates new challenges like computer problems and virus threats, the computer technology like antivirus software made easy to overcome these problems.

Computer in food industry:

The automation and computerization in food processing units is facing lots of challenges if they are used nearby water catastrophic effects on any computer system. Most food processing units prefer waterproof computers to protect their computer systems from drenching in the production area.

Computer in medical field:

Hospital is an important organization and computers are used for the management of a hospital. The accounting, payroll and stock system of the hospital have been computerized in recent days. We can maintain the record of different medicines, their distribution and use in different wards etc. using computer. Even the disease can be diagnosed by entering the symptoms of a patient. Moreover, various computerized devices are used in laboratories for different tests of blood etc.

Computer in agriculture:

Nowadays agricultural industry is also making use of the computers. The analysis that was taken some few years before shows that 44% of the farmers in Ohio are using computers for various purposes. In 1991, only 32% of the farmers were making use of it. This shows that there is considerable increase in the farmers who are using computers. As internet becomes the means of communication, most farmers use this technological advancement for transaction processing or for retrieving information. The analysis shows that out of the total farmers who were surveyed, 80% of them are making use of the internet.

Computer in education:

Due to the globalization of education, so many challenges are posed by the new trends. In order to face all these challenges, information technology in the education sector is very important. It is essential that the students become familiar with the concept and use of information technology in order to equip them for future job market. Similarly, the faculty can achieve better quality in teaching methodology. The computer technology has developed in many fields. Its drastic development has created an immense impact in almost all the fields and thus leading to a new era.

Read the rest of this entry »

In today’s world, computers have become a familiar fixture in the daily lives of children and adolescents, offering a wide range of learning and entertainment tools.

While surveys have indicated that boys are heavier users of computer games and visit websites more often than girls, no gender differences have emerged for chatting, using e-mail, or doing schoolwork on the computer. Additionally, both teenage boys and girls have expressed equal confidence in their computer skills.

On average, parents estimate that their school-age children and adolescents use the computer approximately 1.5 hours per day. Computers, electronic games and toys, and technology in general largely influence and affect the lives of children. Technology has thus proven to be largely capable of enriching the lives of children, especially in the areas of academic and social learning and development.

Computers for instance, can have rich cognitive and social benefits. Children as young as 3 years of age like computer activities and are capable of typing in simple commands on a standard keyboard. Additionally, in today’s classrooms, small groups often gather around the machine, and children more often collaborate while working with the computer instead of using traditional paper and pencil methods.

As soon as children start to become literate (being able to read and write), they can make use of the computer for word processing. This lets them write without struggling with handwriting, and they can revise text meanings and style, and check their spelling. As a result, children tend to worry less about making mistakes, and their written products end up longer and of higher quality.

Specially designed computer languages introduce children to programming skills. With the support of adults, children’s efforts with computer programming can lead to improved concept formation, problem solving and creativity. Furthermore, as children must detect errors in their programs to make them work, programming will assist them in reflecting on their though processes. This will inevitably lead to gains in meta-cognitive knowledge and self-regulation. Also, while programming, children are particularly likely to collaborate, persist in the face of challenge, and demonstrate positive attitudes toward learning. This is consistent with Vygotsky’s theory in showing that social interaction supporting children’s mastery of challenging computer tasks is capable of fostering a wide range of higher cognitive processes.

Children and adolescents spend much time using home computers purely for entertainment purposes. Many computer games emphasize speed and action in sometimes violent plots where children advance by shooting at and evading enemies. Children additionally play more complex exploratory and adventure games with themes of conquest and aggression and sports games. These include football and soccer. Children likewise enjoy simulation games, for example creating and caring for virtual pets (which require attention to “stay alive”), entering virtual realities (such as an ecosystem where the player mutates plants and animals into new species), and role-playing characters.

Speed-and-action computer games cultivate attentional and spatial skills in both boys and girls. However, while offering opportunities for learning, extensive playing of simulation games might risk blurring the distinction between virtual and real life.

Many youths use the computer to communicate. While using the internet causes some potential for causing disengagement from real life, it does hold much value in letting users acquire computer skills, information, and enabling communication.

Read the rest of this entry »

The computer and information security is the backbone for ensuring efficiency of information security checks over information resources. This will help in ensuring authenticity, integrity, confidentiality, refutation and accessibility of information. Most organizations need to have a systematic approach for managing their computer and network security issues that address protection constantly at every stage. Unfortunately, most organizations take the initiative only when need arises, rather than setting up a systematic and planned approach and not an imprudent approach. There are various security detection systems like anti virus software, firewalls, encryption, virtual security networks, and several biometrics that prove as effective technologies for proving security to computer and network industry. You may come across several systems and devices that can generate reports on various technical and software problems. These devices may be available in different forms with diverse reporting and managing capabilities and on various update schedules.

Most of the times, one may however, find that these security technologies lack proper integration and each new technology provides data in its own meaning and format. Furthermore, these systems in different versions and product lines may provide inconsistent description of actions that represent similar symptoms. In most cases, the technologies used in the systems are not efficient and measurable as they depend on expertise to mange and analyze the data periodically within computers. Often, network administrators need to regularly verify different databases for new susceptibilities and execute several applications in their systems to prevent unwanted virus attacks. Usually, expert and skilled network security staff are responsible for monitoring and analyzing data provided by these devices. Though in reality, the security staffs often seem reluctant to follow periodical data analysis and there is often a communication gap between the staff. The technologies employed are unable to create an effective impact on security hindrance as the systems are not capable in generalizing, implementing and maintain security protection in time.

Now as the network administrator, you can deploy various security technologies such as anti virus software, firewalls, and various other types of systems that can protect your computer and networking assets. Technologies that include biometrics and virtual networking sites which offer help to protect computers and information systems are high on popularity and there are several which are emerging in the market. The latest versions of interference detection systems support multi-level search engines with anti denial to spam websites. Other security solutions include information security with self secured gadgets, external security devices and sensor networks. Self secured gadgets offer new potentialities for handling with different intrusions like preventing deletion and untraceable tampering. With sensor networks you can deal with privacy and protection issues which entrench in work or home environments. The sensor networks are sensible detectors that represent a rich ground for research problems. You can also opt for Security Management System which includes the procedures that your organization may use to collect, analyze and secure various security events and also receive notification that helps in responding to security proceedings.

Read the rest of this entry »