Wednesday, February 9, 2011

5 GADGETS IN YEAR 2011

ACTIVITY #1

 Playstation Phone: This phone will revolutionize mobile gaming as it is a fully featured smartphone. The code name of this phone is “Zeus Z1”. Either it will have Android 2.2 or 2.3. It has 1GHz CPU and a 512 MB RAM.
Apple iPhone5: It will be an evolutionary iPhone not revolutionary. This iPhone will have a new antenna as there was a problem with the antenna of iPhone 4. It will have 1.2 GHz processor and a larger screen 3.7 inches in place of 3.5 inches. And it is expected that the iPhone 5 will be made from a new kind of alloy.
First 3D Handled Console-Nintendo’s 3Ds: Nintendo’s introduced next generation DS and it has a 3D screen. The graphics of 3DS are as good as today’s consoles. It has three cameras i-e one on front side and two on back side; back side cameras are for 3D photos. It will goes on sale in March and costs about $300.
Blackberry-Play book Tablet PC: Blackberry introduces the fastest tablet ever, featuring true multi tasking along with face to face conservations. It looks astoundingly nice beyond everyone expectations. It has a dual-core 1GHz processor and IGB RAM. Dual cameras for video conferencing and many more features. Verizon LTE Phones: Yet this phone is not properly named. This phone will have an HD camera while the mega-pixels count is not known yet. The phone will have a huge screen and its look will be very stylish and fascinating.

Verizon LTE Phones: Yet this phone is not properly named. This phone will have an HD camera while the mega-pixels count is not known yet. The phone will have a huge screen and its look will be very stylish and fascinating.

Information Communication Technology

ACTIVITY #2

information and communications technology or information and communication technology,[1] usually called ICT, is often used as an extended synonym for information technology (IT) but is usually a more general term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), intelligent building management systems and audio-visual systems in modern information technology. ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication middleware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions.[2] The expression was first used in 1997[3] in a report by Dennis Stevenson to the UK government[4] and promoted by the new National Curriculum documents for the UK in 2000.
ICT is often used in the context of “ICT road map” to indicate the path that an organization will take with their ICT needs.[5][6]
The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. See VOIP and Intelligent Infrastructure Management (IIM). This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.
Information and Communication Technologies for Development (ICT4Dev) is a general term referring to the application of Information and Communication Technologies (ICTs) within the fields of socioeconomic development, international development and human rights.
The dominant term used in this field is “ICT4Dev”. Alternatives include ICTD and development informatics.
The concept of ICT4Dev can be interpreted as dealing with disadvantaged populations anywhere in the world, but is more typically associated with applications in developing countries. It concerns itself with directly applying information technology approaches to poverty reduction. ICTs can be applied either in the direct sense, wherein their use directly benefits the disadvantaged population, or in an indirect sense, wherein the ICTs assist aid organisations or non-governmental organizations or governments or businesses in order to improve general socio-economic conditions.
The field is becoming recognized as an interdisciplinary research area as can be noted by the growing number of conferences, workshops and publications.[1][2][3] Such research has been spurred on in part by the need for scientifically validated benchmarks and results, which can be used to measure the efficacy of current projects.[4]
Information technology (IT) is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications.[1] The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review, in which authors Leavitt and Whisler commented that “the new technology does not yet have a single established name. We shall call it information technology.”[2]
IT spans wide variety of areas that include but are not limited to things such as processes, computer software, computer hardware, programming languages, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the domain space known as Information Technology (IT).
IT professionals perform a variety of functions (IT Disciplines/Competencies) that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as management and administration of entire systems. Information technology is starting to spread farther than the conventional personal computer and network technology, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs.
In the recent past, the Accreditation Board for Engineering and Technology and the Association for Computing Machinery have collaborated to form accreditation and curriculum standards[3] for degrees in Information Technology as a distinct field of study as compared[4] to Computer Science and Information Systems today. SIGITE[5] is the ACM working group for defining these standards. The Worldwide IT services revenue totaled $763 billion in 2009.[6

Monday, December 6, 2010

What screened subnet Architecture?

Let’s take a look at how a typical Screened Subnet Architecture is setup:
Screened Subnet Architecture
From this diagram, note that there are two, not one, firewalls in the network structure.The exterior firewall is configured to allow external traffic to access the subnet section (Perimeter Network) where you have put the public service hosts (Bastion Hosts) such as your e-mail server, web server, and/or DNS server, for example. The Screened Subnet is  also called “DM Zone”  (demilitarized zone) or simply “DMZ”.The internal firewall acts a second gatekeeper to keep external visitors from directly coming into your internal corporate network.The subnet section where you have put the service hosts is called “Screened Subnet” or “Perimeter Network,” hence the name “Screened Subnet Architecture” has become used for this type of network architecture.

IT-104Rozalde Sayago

1.Why was there been a dramatic increase in the number of computer related security incidents in resent years?
Answer:In previous issues of this column, we have written about the importance of considering security from product design or procurement through deployment and use. Being proactive about security is critical to mitigating your security risk.
2.What are some characteristic of common computer criminals including their objectives.
Answer:Computer crime and those individuals who engage in this
deviant behavior have become a part of our digital society.While the
exactdamagecaused by computer criminals is open for debate,
their existence and increase in numbers is unquestioned.

3.What action must be taken in response to a security incidents.
Answer:Computers and computer networks have been part of the corporate landscape for
decades. But it’s only in the last five years that companies have started to connect these
systems and networks to the outside world – suppliers, business partners, and the
Internet.