Thursday, October 21, 2010

AIT and the Law in Australia

In downloading entertainment documents and other formal documents from the internet, it is important to make sure that we follow the Copyright laws of the place/country that we reside in. Australia is a country where internet is accessed by an extremely large population therefore illegal downloading of material and plagiarism have a higher chance of occuring.

I believe that people should only download music or movies and other documents that are clearly mentioned by the owner as available for downloads. The public can also access documents that are present in the public domain. According to Copyright, public domain is when a certain piece of work has expired and can be freely reproduced or used without the permission from the Copyright owner.

Otherwise I believe that people should first obtain permission from the owner of a certain document because according to Copyright, illegal downloading and plagiarism are a breach of intellectual property making it a punishable offence.

In schools there is also the mistrust that some students might try to earn someone's work through mischiveous ways therefore it is important that the work done by a student on a computer is protected from being stolen by someone else. At our school we have measures that are installed in order to protect students' information and privacy.

As a result every student at our school has a password therefore giving the students an opportunity to save all their documents and noone else can access them. Students have their own computer servers. Our school has McAfee virus software installed for the students to protect the computers from hackers.

At our school there are also group user policies that allow each student to have access to their own year group information. There is the use of ICT user Policy that students can get to use its advantages in their contact with the world of technology. For safety reasons students have to sign the ICT user policy in order to ensure protection. At our school there is also a proxy server which has security measures and information about what the students are permitted to do within the school network. As a result there are so many ways that we can protect our documents from plagiarism and I encourage people to always respect other people's privacy in their property to avoid disobeying the law.

Wednesday, October 20, 2010

Phishing for security 19a and 19b

In the world where we now live in there is the use of Internet which has so many advantages such as allows communication over great distances and therefore saves time and money. However Internet has also provided the society a problem of being victims to online abuse, computer hacking and hackers acquiring sensitive information and these issues all fall under the category of phishing.

As a result I believe that everyone who uses the internet is responsible for their internet security. The ways to protect yourself when on internet are:
Use caution when you click on links.
Never accept to communicate with anonymous people online.
Do not allow social networking services to scan your e-mail address book.
Use personal bookmarks when going on a social site.
Be selective of who you accept friendships with on social sites.
Talk to children about social networking.
Be careful about installing extra software on your site.

These days many online shops have been established such as Ebay and other companies. These online shops save time for clients but they also have their disadvantages. If vendors or the online shop owners do not put measures in order that make sure that information about clients is protected, hackers can try to acquire sensitive information so as to gain credit of the clients resulting in lack of trust between the vendors and their clients. As a result clients can move away and result in lack of business procedures for these vendors and eventually forcing them to close down their businesses and look for other alternatives in life. Therefore the online security of clients from phishing should be something that should be taken seriously to keep online shops alive.

I believe that vendors or online shop owners can protect their online clients from phishing in so many ways. Firstly the vendors could create accounts for all their customers and that the clients have the right to know where these online shops are situated and their contact details. The vendors could give their clients the option to pay through the online shop's account number and all the vendors are allowed to know about the clients is name, address and phone number. The vendors could also provide an alternative for their clients that is based on the issue of cash on delivery. If there is the use of cash on delivery clients do not have to submit any account details but as they receive their product they pay cash and phishing cannot occur because there are no passwords or bank account numbers needed.

Vendors can also improve online security by even having information/tips of how to protect phishing on their websites. Vendors can also improve online security by refusing to advertise some unknown companies or advertisements on their websites made by anonymous people. For example, advertisements that tell you that you are the 100 millionth visitor of a website and that you have won a price are some of those applications that require online users to enter personal information such as an bank account number so as to have the price money put in your account. With the knowledge that there are hackers out there I believe that online vendors should never publish promotions/advertisements on their websites from anonymous people as they might end up the source of crime(phishing) that can ruin business procedures.

Tuesday, October 19, 2010

Blog 18 Digital Divide

Digital divide is the gap between people who have access to all the useful and efficient technology and those who do not have access to any advanced technology at all. A company called Nortel is a good example of an organisation that tries to reduce digital divide by helping underprivileged children cross the digital divide. The acts of Nortel to promote the use of efficient technology in all parts of the world which is the major reason why digital divide should be overcomed. The disadvantages of trying ot overcome digital divide by helping another country is that the transportation of the electronic goods and teaching how to use technology can be time-consuming and expensive. However the use of technology should be improved all over the world so as to improve communication of all continents all over the world therefore it it worth it to try and overcome digital divide no matter the expenses.

Nortel is a company that is not aimed at market dominance in reducing digital divide. They are a company that have taken interest in reducing digital divide in one country and would love to have other people join them in their journey to reduce digital divide in other countries so as to reduce this problem all over the world. Nortel is a company that knows that it cannot financially provide enough materials for all less privileged countries all over the world therefore they would love to have other companies be published by different people who embark on helping overcome digital divide in other parts of the world.

If more companies are setup to reduce digital divide in different countries, this will save time as many people can be taught to use technology in a short space of time. As a result Nortel is a company that is aimed at improving communication all over the world and is not there to create rivalry with other companies but to engage with other companies in a positive manner that will create good technology for other companies all over the world.

Monday, October 18, 2010

Dreamweaver/CSS Tutorials

A local folder in Dreamweaver is where you write down all your ideas that you are using to create your website. The advantages of a local folder in Dreamweaver are that it allows website management through link checking and site-cache building.

Therefore the advantages of a local folder in Dreamweaver can help the adminstrator of the website save time on website maintaining tasks , managing and synchronizing files, keeping track of extra information about the files and creating site reports. As a result, a local folder in Dreamweaver plays a vital role in the designing and maintanance of a website.

Dreamweaver has always used tables because when HTML was young, pages were set up as plain text with headings and hyperlinks. As a result the use of tables makes it easy to read information on a website because there would be information presented as descending down the page.

However the use of tables in Dreamweaver is now out of fashion because it does not allow any other standard markup therefore the lack of style in designing a website creates boredom. As time has moved on the layout mode has been introduced but its disadvantages in web developing are that it promotes improper table design if not used correctly and therefore everything goes wrong.

In Dreamweaver the tables should only be used when there is the presentation of statistical information about business, financial information and many other things though I still believe that information should be presented in a different way to reduce boredom and create excitement.

A Dreamweaver image placeholder allows you to define the size and location of images in your design without worrying about what the images will be. An image placeholder will enable you to find out which file format suits the images you have and how you want them to be represented. Some of the web-friendly graphic files that are used as image placeholders include GIF or JPEG. Therefore by the time you decide to do your final artwork of images, all the technical requirements would have been fulfilled by the image placeholder.

In HTML, colours are expressed either by name or by using a hexadecimal number. In the hexadecimal number format, the colours are represented in a six digit format, #RRGGBB. This means that RR is the amount of red, between 00(none) and FF (all), GG is the amount of green and BB is the amount of blue.

A websafe colour is a colour that is used by the common web application companies such as Netscape and Internet Explorer Palette Compatible. A websafe colour can be enabled for use and give all the colours possible and in different sizes that are possible and the best format for that would be JPEG. JPEG can have colours from high resolution to a lower resolution and as a result all colours can fit in which is why a websafe colour is expected to be presented in such a file format.

An FMA file is a common type of Flash application that displays an informational message to the audience. The information/message represented can be changed for the needs of the business procedures that are taking place. e.g If a school website wants to change information about sporting events coming up, they can just change the sports section information without affecting other sections of the website . These changes can all be made using an FMA file.

An FLA file is the source containing all the materials you are going to show in a flash movie. A SWF (small web format) is the document or movie that will be shown on the web. As a result FLA is always bigger than the SWF as it is the source of everything to be shown and SWF is made out of the FLA.

A link is a selectable connection from one word, picture or information objct to another. When someone is searching for a certain piece of information , they can be connected to different links that include videos, statistical and factual information about that subject. Links can also be found in different forms as sometimes you can be reading a certain document and then there is a highlighted word on a website that might even give the user more information. These highlighted words can be referred to as anchors.

CSS (Cascading Style Sheets) is a style sheet language used to describe the presentation semantics (the look and formatting) of a document written in a markup language. CSS is used because it is more accurate and sophisticated in its presentation semantics of a document written in markup language. The other reasons to use CSS are that:

It controls the layout of many documents from one single style sheet.
It has more precise control of layout.
CSS applies different layout to different media types.
CSS has numerous advanced and sophisticated techniques.

Thursday, September 16, 2010

Blog 17 Website Colour scheme

The websites I looked at had different types of colours that represent something that is associated to the products and events they are advertising. The Live Clothing website uses a black colour as its background colour. It also uses a white colour that is presented as smoke polluting the surface area. The use of white smoke polluting the air is to present the sense of something new and elegant that everyone desires.

On the website of Paintball we have the use of white colour for the background. The colours presented create a sense of adventure in their own ways to attract the clients. E.g the colour red is used to represent a hot deal/ the latest exclusive products that Paintball is offering.

On the website of UWA there is a variation in the use of colour. The website contains black and white colours as the customary colours of the website whilst there are sparkling blue and dark orange colours to represent the latest exciting news that is coming to UWA.

The website of white pages has mild green and dark blue colours. These colours represent that the company white pages means serious business and would love to do business with you. There is also the use of red, white and light blue colours to welcome the online users to the website. The friendliness of these colours shows that everyone is welcome to use the website.

The website of The Jane Goodall Institute has a dark red colour that represents the terror that some animals experience in the wildlife. The colour light gold is to represent that some people really care about the well being of these animals and want to help these animals enjoy themselves in the wildlife.

The website of Bobjane T mart uses blue as its background colour. The yellow colour on the website is to show serious business of the deals that are present at Bobjane T mart. There is also the use of sparkling red, yellow and white colours that show the best products that are on offer at Bobjane T mart.

On the website of myer there is the use of a light blue colour to encourage people to take a break from their workplaces and just relax. Myer is a website that is all about wearing good clothes that make you feel good about yourself therefore the colours just remain white and light blue throughout the website.

Validating a website is the process of ensuring that the pages on the website conform to the norms or standards defined by various organisations. Validating a website can be achieved by ensuring that your website complies with the standards accepted by most web designers. As a result Validators can be able to detect problems in your web page and style sheet and therefore you can improve the things that your website lacks.

Tuesday, September 14, 2010

Website Design Techniques Blog 16

To ensure someone with a sight disability can use a website a narrator to explain the information for the visually disabled person. The narrator on a website should explain the information in a deep manner that makes the visually disabled person understand what they are hearing. Thus the narrator should have a clear sophistication of expression.

To ensure that a person who has a hearing disability can use a website there are so many ways to help them use a website. The first way is by presenting th visual site of all the products and information. The other way is that if there is a video advertisement on a website, everything that is said by the actors should appear in written form for the person with a hearing ability to read it through.

If someone has a physical disability they can use the website if there is a touch screen. If there is a touch screen, a physically person can use anything to click on what they want on a website without having to worry about using a mouse to click or type on anything. For people with learning disabilities, it is recommended that websites should be designed with the ease of use.

The ease of use in a website is by having the simplicity of language on a website and provide information in a way that provides users with enough time to read and use content. Therefore websites that target every age group and every class of people as their target audience should have the ease of use and good technology designs that allow people to with disabilities to use the website.

Inclusivity

A web should be designed in an inclusive manner so as to create a user frienldy environment for everyone despite their disabilities. These disabilities might include visual, auditory, physical, speech, cognitive, language, learning and neurological disabilities. The other reason to be inclusive in web design is it is not always about how the disablities that arte visual or neurological but the disabilities might also be aging or sometimes there is not ease of use in the design of the website.

Therefore for the web content to cater for everyone no matter their disabilities should be designed in a way that has ease of use. The other ways to make a website user friendly is to have a narrator for the visually disabled, a touch screen website for the physically disabled and a the simplicity of language in the web content. The other technique to designing a website is that designers should avoid posting extremely bright coloured pictures on a website so as to cater for people who are colour blind. If we really look at it many people have disabilities that can be sensitive to the use of technology therefore a website should be inclusive to cater for everyone's needs.

Thursday, August 26, 2010

Podcasting

In my podcasting activity, I used the audacity file and some logitech recording headphones to record my talk on operating systems. Audacity is a free software, cross-platform digital audio editor and recording application. Audacity allows users to import and export WAV, AIFF and MP3 files. Audacity allows to record and play sounds, multitrack mixing and it also has support for multichannel modes with sampling rates up to 96 kHz with 32 bits per sample. The other functions of Audacity include:

Audacity can do some editing via cut, copy, paste (with unlimited undo).
Noise removal.
Amplitude envelope editing.
Audio spectrum analysis using the Fourier transformation algorithm.
The ability to change the audio's pitch without changing the speed.
It has a multiplatform that allows it to work on Windows, Mac OS X, Unix-like systems and among others.
Converting cassette tapes or records into digital tracks by automatically splitting one track into multiple tracks based on silences in the track and the export multiple option.
It also uses the wxWidgets software library to provide a similar graphical user interface on several different operating systems.

The limitations of Audacity are that a plug-in is required for VST (Virtual Studio Technology) plug-ins in Audacity 1.2.x. The other limitations include the fact that Audacity lacks dynamic equalizer controls, real time effects and support for scrubbling. The other limitations of Audacity are that MIDI (Musical Instrument Digital Interface) files can only be loaded visually.

Therefore the file Audacity both has its advantages and disadvantages but I believe that the functions and advantages are good enough to overshadow Audacity's disadvantages. The other good thing about Audacity is that it can be used in different languages therefore enables many people in the world to use it. Therefore the file Audacity can be used to introduce podcasting to people who are not yet familiar with it and increase the use of technology all over the world.

Monday, August 23, 2010

Converging Technologies 2B

Technological convergence is the tendency for different technological systems to evolve towards performing similar tasks. The examples of converged mobile technology include the internet. The internet has the advantages that it can allow employers and employees to have communication,and easier, faster information for their business procedures. Therefore these employees and employers will be able to reach their target audience easily around the world for business matters.

In converged mobile technologies, there is also the use of messaging convergence which can help employers/employees to send and receive SMS. This system of SMS is provided by several operators who have launched services that combine SMS with Mobile Instant Messaging and presence. The other advantage of messaging convergeed technologies are text-to-landline services where subscribers can send text messages to any landline phone and are charged at standard rates. Therefore certain clients can be enabled to use text-to-landline services to the business companies they want by using their mobile phones to send a message to the business company's landline.

In converged mobile technologies there is also a technology called Multiplay. Multiplay is a marketing term describing the provision of different telecommunication services such as Broadband Internet access, television, telephone and mobile phone service by organisations that traditionally only offered one or two of these services. In Multiplay, the use of dual play service offers a high speed internet which is very fast and efficient to find information.

The advantages of converged mobile technology are that many business people who travel frequently, have given up a desk phone to rely solely on their mobile number. Before employers insist that employees use fewer devices, manufacturers need to address battery life and ergonomics issues for portable devices. Surveys have shown that many people decide to carry around redundant devices than having a single telephone number and a single computing device until the issues of battery life and ergonomics have been resolved in portable devices.

The disadvantages of these mobile converged technologies can also limit business people to carry out all their activities independently using converged mobile technologies. The first disadvantage is that small screens of most devices still limit types of file and data transfer. The other disadvantage is that there are standards that guide applications and technology development and connection. The other disadvantages of converged mobile technologies include:

WAP and SMS are limited to a small number of characters and text.
The use of graphics is limited.
There is less functionality for mobile internet over mobile phones and existing generation of handhelds than for mobile computers (laptops and next generation handhelds).
User interface is often difficult to learn how to use.
There is limited bandwidth.
There is limited roll out of higher bandwidth mobile networks (e.g. 3g networks and wireless broadband networks are predominantly located in cities).
There is the cost of establishing mobile and wireless broadband infrastructure.
Technology constraints of mobile devices (memory, processing power, display capabilities and input methods).
There is the risk of security of data moved across some mobile and wireless networks.
Business investment in hardware and infrastructure is seen as riskier as rapid evolution of mobile and wireless technologies continues.

Therefore converged mobile technologies have many advantages and disadvantages and as a result it is up to business people to whether believe that no matter the disadvantages of converged mobile technologies, the advantages are good enough for them to carry out their business procedures.

Sunday, July 18, 2010

Converging Technologies 2A

My phone contains the software called WAP 2.0 which uses a cut-down version of XTML (Extensible Markup Language) with end to end HTTP (Hypertext Transfer Protocol). WAP 2.0 would be configured by the operator and could include telephone numbers, location, billing information and handset information. My phone also includes an MP3 player, Bluetooth messenger, mobile tracker, organizer and voicememo.

The MP3 player is a consumer electronic device that has the primary function of storing, organizing and playing audio files. The MP3 players are portable and have image viewing and/or video-playing support. Therefore my phone (Samsung C3050 Stratus) has an advantage of being provided with a lot of music even if I do not have an MP3 player.The other advantage that my phone has is the voice memo (a audio message usually left for oneself to remind you of something). Therefore if I regularly make voice memos of my activities for everyday according to time everything I do will be presented in an organised manner.

The Bluetooth on my phone is an open wireless technology standard for exchanging data over short distances (using short length radiowaves) from fixed and mobile devices, creating Personal Area Networks (PAN's) with high levels of security. As a result of Bluetooth I can receive and/or send my friends the latest music and games that we enjoy. Instead of exchanging CD's for the music/games that my friends and I enjoy, I just take my phone and activate the Bluetooth so as to receive/send the music/games to and from my friends.

My mobile phone also has a mobile phone tracker. Therefore if I happen to lose my phone or maybe it gets stolen. I can be able to track the current position of my phone even if the positions might keep on changing. The other advantage of mobile phone tracking is that telecommunications companies are aware of where their customers are temporarily residing. Therefore if the service provider or telecommunications companies know where their customers are they will be able to ensure that these places have good network for communication.

E.g. Some people have occupations that require them to travel away from their homes/families for a period of time to remote areas (Surveyors). Most people who travel to these remote areas leaving their families for a period of time have experienced telecommunication problems in a bid to keep in touch with their families back at home. Therefore the mobile tracker can influence the service providers to install antenna towers in these remote areas (tall structures/aerials designed to support antennas for telecommunications and broadcasting including television) so as to improve communication in all places.

My phone has a digital camera that enables me to take pictures of my friends and family. It also has a camcorder to record video clips. It also includes an alarm clock, calendar and organiser to help me with updates on certain tasks that Iwant to complete at a certain time and place. My phone's organiser also has a memo calculator. My phone's organiser also has a convertor which I can use to convert currencies, length, weights, volumes, areas and temperatures into my desired option. E.g. Euros to Great Britain Pounds.

My phone also has internet and therefore enables me to access information on weather conditions, horoscopes, latest music, latest games and latest news. This internet subscription (which accounted for on my regular recharges of my mobile phone) allows me to also send and receive emails and I can also access social sites such as Facebook or Myspace. My phone enables me to send/receive through SMS (Short Message Service), MMS (Multimedia Messaging Service) and E-mail (Electronic mail).

Though I am not involved in the business society my phone provides me with the functions of a PDA (Personal Digital Assistant-a mobile device which functions as a personal information manager and has the ability to connect to the internet). Therefore my phone can be used to remind me when my school assignments are due, my work timetable and sports activities timetable.

My mobile phone also has FM radio and a stopwatch to help me record the time can a certain distance (athletics) or how long it takes me to read a chapter from a novel (English). I mostly did not use all these features that are on my phone but the research I have done on this task regarding the information about my mobile phone has widened my knowledge on how much I can be well-organised due to my mobile phone's accessiblity to certain applications.

After completing this task (Converging Technologies) and having widened my knowledge about my mobile phone, I have come to realise how I can remember to meet my work requirements, school requirements and other activities (sporting or social) easily. Therefore from now onwards I am going to use the efficiency of my mobile phone to help me be organised.

Tuesday, June 22, 2010

Blog death threats spark debate

This article is about how blogger Kathy Sierra received death threats. Kathy did not take these threats seriously until these people provided her with pictures of her whereabouts at a certain time. A fter having being provided with such information she decided that she was not going to appear in the public functions until she knew she was safe. Many bloggers who were in support of Kathy Sierrra suspended their blogs for a period of time until this issue was resolved. Some people have decided to support Kathy Sierra because even though some men would criticise her she stood up for what she believed in. Though Kathy Sierra has been criticised for standing up for what she believes in (equality and to stop violence on blogging sites) she has created a need for blog sites to have better security.

For these blogs to be secure, they have to be created in a manner that only exposes things that the blogger has posted and does not expose personal information. Personal information about bloggers should only be known by the creators of the blog so as to ensure that wherever the blogger is they are secured from all violent threats. In order to ensure the safety of bloggers, the blog creators should keep in touch (contact) with the bloggers (it might be weekly or monthly) to ensure that the bloggers feel comfortable and are not being threatened by anyone. Blog creators could create a website that bloggers can send emails or posts on any problems they are having with their blogs. The other security measure that can be taken is that the locations of people on the profile should not appear at all on the blog.

I would not want my potential employer to visit my Myspace or Facebook account so as to divide between my personal life at home and my life at work. I would not want my potential employer to visit my account because away from work you need to relax, do things you that you enjoy (sometimes your potential employer might not share the same interests or beliefs as you about a certain subject) therefore should not visit my account. If my potential employer visited my Myspace or Facebook account he or she would like the way I present myself but certainly not like the way that some of my Fcaebook friends present themselves in terms of language and activities.

Tuesday, June 15, 2010

making a new blog

I made first blog , ready to start my work and it feels awesome