Friday, December 25, 2009

IMPLICATION OF IT IN OUR DAILY LIFE

Next comes the information (not technology) revolution.

"In the 1980s information technology (IT) took off. Computing went from an occasional activity for specialists to routine in the lives of most technical professionals.

Then it did likewise for white collar workers and students. Then, for many blue collar workers and on into our homes. In the 1990s, we've gotten networked first the technical community, then business and school, then home via modems, Ethernet, some broadband and wireless.

That's an 'IT Revolution.'

"Now we're poised for the Information Revolution. Newly accessible digitally formatted information is weaved into our daily lives. Technical professionals first, then white collar workers and students, then most of us will rebuild our work and home lives around this resource ubiquitous electronic information."


Interpersonal aspects of commerce and education will remain.

"Just as the photocopier and the desktop computer did not eliminate paper, secretaries and offices (as many had forecast), the devices of the Information Revolution, will not eliminate the interpersonal aspects of commerce and education. For those with access, the pace and volume of human interactions on the network will increase enormously, and for many this change will be enriching.

"But the important social aspects of commerce and education gathering, sharing, learning about behavior, spontaneously connecting with others that require face to face contact will not decrease significantly. People will continue to congregate in classrooms, offices, churches, bars and shopping malls.

"The cumulative impact will be a continuing increase in the speed and number of total 'information events,' and people 50 years from now will wonder why so many in our era thought that the Information Revolution would increase our leisure."


Most lives will remain untouched.

"In the years ahead, the vast majority of people of the world will go about their daily lives largely untouched by the Information Revolution. The requisite massive expenditures on technology infrastructure, operations and personal equipment will not be justified in developing countries until more fundamental needs of adequate food, clothing, shelter, medical care and basic education are widely satisfied.

"Satisfying those needs will absorb most of the income of the increasingly populous Third World for the foreseeable future. To be sure, there will be many juxtapositions of the old and the new — for example, when a peasant walks half a day over dirt trails to visit a village doctor in a hut equipped with a satellite link to a distant medical center. But those instances will be the exceptions, not the rule, in people's daily lives."


Who will win the new power struggle?

"The ongoing computer revolution, the Internet and other new information technologies have resulted in a remarkable array of new applications.

Technology-driven socioeconomic change is occurring. However, there will be many struggles between forces for central control (as has been encouraged in the Industrial Age and existing power bases) and those for individuality (as is encouraged by the two-way communications of the Internet and similar technologies).

"Already the power of technology for free exchange of information has been seen in the breakup of the Soviet Union. While there will be considerable pressure by many governments and commercial and social interests to 'regain control,' the fact is and will remain that technology-aided information exchange will remain 'free.'


What is beyond the human-machine interface?

"Two revolutions have occurred in information technology: We use electronic machines instead of paper to store information, and we have successfully connected these machines together. As a consequence, computer users suffer a lot of 'red eye' as they interface with their information machines.

"The next revolution will move beyond today's human-machine interface and liberate all those 'red-eyed' users. Machines interfacing with machines 'knowledge-based systems,' 'automatic search systems,' 'preprogrammed abstracting systems' and much more will become commonplace. Look for the coming of the automatic 'information finding, classifying and processing' machine."


Decentralization is the future.

"The Industrial Age was based upon the centralized coordination of large numbers of manual laborers and service workers. The 'Knowledge Age,' in contrast, is based upon the decentralized coordination of large numbers of knowledge workers. One should therefore expect that decentralized mechanisms of all sorts (e.g., products, services, business processes, business strategies, markets, government agencies) will flourish at the expense of centralized ones in the future.

"Predictions: The network computer will not be a successful product; governments will lose control of their currencies and the ability to control interest rates; communications industries that developed as monopolies, oligopolies or because of sheer size will wither."


An ethical dilemma exists.

"Ethical issues and concerns have always underscored the utilization, management and control of information. In the Age of Information, political and societal tensions will increasingly surface and coalesce, creating significant differences among groups within nations, as well as among nations. The quality of information content will be deliberated by the perceived haves and the have-nots. Who controls information will be a major issue for 21st century scholars and politicians."


Management of knowledge capital will take off.

"Because knowledge is becoming the key wealth-creating asset, and because high-value knowledge is hard to accumulate in organizations and even harder to organize and effectively deploy managers in both the private and public sectors will want to learn how to master the process of knowledge management. And, they will want to become innovators in creating knowledge capital in order to achieve competitive advantage. As a consequence, leading schools of business and public administration will make major curriculum changes early in the 21st century."


Mere access to information will not be enough.

"The development of information networks has not followed a purely technological imperative. They have been shaped by social networks. New social networks will interact in their own way with the current information infrastructure to lead the next stages in its implementation. The Internet, for instance, serves to keep track of the dynamics of various socio-economic phenomena.

"Networks not only bring about change, but are the ideal means to monitor change. Because of the importance that this has for both business and government, it is foreseeable that the automatic feeding of transaction information to control and decision centers of various kinds will become ubiquitous.

"The key strategic issue in this environment will be the ability to bring processing power, broadly construed, to bear on any point in time and space that circumstances may demand. Mere access to information will not be sufficient. Making something happen with information, from attribution of meaning to rapid incorporation into ongoing decision processes, is what will make a difference."


Science will move online.

"By 2010, scientific publication will be a fully electronic medium. Journals will no longer be the major means of organizing scientific information; browsers will help scientific readers select new papers from across a variety of disciplines and sources. Scientific 'papers' will contain digital information of all sorts, including, but not limited to, text, graphics, movies, audio, simulations and visualizations. The life cycle of scientific publication will be considerably shortened by electronic media. Collaboration, authorship, submission and review will become more intertwined as science moves online. Quality assurance will be provided by electronic labeling services — entities neither fully academic, corporate, nor governmental in nature."


Electronic learning is the future.

"The evidence is clear that there are many problems with the current academic system. The fact of the matter is that college instructional methods have not changed much over the last 50 years. Those institutions that properly assess the changes coming and respond in the appropriate manner will grow and prosper, while many others will decline and close up shop.

"The present educational process can be likened to an ancient cottage-shop industry that is neither efficient (costs are growing relative to income), nor effective (does not do a very good job of increasing learning). Clearly college education is ripe for major technological change that makes education both more efficient and effective.

"There is no question that electronic learning is going to grow rapidly in importance and dramatically change the college educational process."


Authentication will be more important than copyright.

"The creative human process of authoring is in part based upon the collection, interpretation and analysis of existing information. In the future the source, ownership and authentication of information become significant issues as intelligent processors duplicate these human processes to become both primary and secondary publishers.

"Authentication of information sources becomes more important than copyright to ensure these processors do not reuse data that is out of context, thus resulting in false conclusions. As this prediction matures, changes will occur in the publishing business, in educational use of information, and in the purpose and use of libraries."


Winners will apply and use technology.

"Our physical ability to send, process and display data will increase enormously with cost-effective developments in bandwidth, computing, optical storage, imaging and display technologies.

"But the real challenge of the Information Revolution isn't the development of technology, but how to apply and use it. The technology is developing faster than our ability to adopt it. The greatest difficulty is getting people to change. Companies spent huge sums on information technology in the 1980s, with limited improvements in productivity.

"The winners in the Information Revolution will be the people and organizations that can adopt change to the way they work and live."


Software dependency will become a problem.

"Traditional approaches to use of information systems has lead to a naive dependence on these systems. In the future, information systems will continue to support more complex and critical functions, resulting in even more dependence on these systems. It is my prediction that such dependence will result in an IS-based crisis with national and/or global implications.

"Further, use of these systems will have a negative impact on quality of life. Whether or not continued integration of information systems into organizational processes leads to the optimization of these processes, information technologies will not decrease the length of the workday. Rather, they will allow organizations to claim more hours of the worker's day as these technologies continue to become accessible and mobile. Work will permeate more and more aspects of our lives."

HOW TO FIND YOUR IP ADDRESS

Instructions

Things You'll Need:

  • Basic computing knowledge
  1. Step 1

    Go to the Start menu, go to Run, and type "CMD" in the dialog box (without the quotes.)

  2. Step 2

    Now you should see a dark (DOS) window that looks just like the picture on the left of this article step.

    Without the quotes, type "IPCONFIG" and press ENTER.

  3. Step 3

    Now you should see some network information, along with the IP ADDRESS of your computer listed.

  4. Step 4

    The following steps are OPTIONAL:

    If more information is needed, other than the IP address, type the following from the same DOS box described in step two: IPCONFIG /ALL

    This will provide you with more network information on your computer. Its purposes may vary.

  5. Step 5

    There are also websites available that can provide your computer IP, such as www.whatismyip.com.

  6. Step 6

    If you have a router/network set up, please note that the initial steps above will only show you the network's IP from the router. For example, if you have a Linksys router installed, and perform the IPCONFIG command, it will show you something like "192.168.1.x" as opposed to your computer's local/root address. For this reason, following STEP 5 above may be useful.


HOW TO FIND THE ADDRESS OF AN EMAIL SENDER

Things You'll Need:

  • You will need to have access to an email that has full headers activated. This usually an option somewhere on the open email received. Full headers include time of arrival, who it is to, and who it
  1. Step 1

    After you open the email, open the "Full headers" option if you haven't already done so.
    In Outlook Express the process for IP address is different: go to File then select Properties and then look at the bottom "Received From" message and the IP address is located in parenthesis.

  2. Step 2

    look at the top few lines and you should see more than the usual from xxx@yahoo.com and the subject. Look for something that says X originating IP:

  3. Step 3

    The next step is to look at the number next to the originating IP: in my confirmation email from ehow the nuber is [72.5.232.39]. This is the IP address of the computer that was used to send that email.

NET ETHICS AND 5 NOT TO DO WITH E-MAIL

Internet etiquette, the etiquette guidelines for posting messages to online service, and particularly internet newsgroups. Netiquette covers not only rules to maintain civility in discussion example avoiding flames, but also special guidlines unique to the electronic nature of forum messages. For example, netiquette advises users to use simple format because complex formating may not appear correctly for all readers. In most cases, netiquette is enforced by fellow users who will vociferously object if you break a rule of netiquette.


The rules of email netiquette are not rules in the sense that i will come after you don't follow them. they are guidelines that help avoid mistakes (like offending someone when you don't mean to) and misunderstandings like being offended when you're not meant to. these core rules of email netiquette helps us communicate better via email.


Do You Make These Mistakes in Your Emails?

A subject like the headline above can irresistibly pull readers into opening your message and reading its every hypnotic word. Often, it will not — and what if you don't have anything to sell?

Your email's subject line is, next to your name, the first thing the recipient sees. It is important.

In your email subject, do not:

  • Arouse interest and curiosity.
  • Say "Hi".
  • Be wordy.
  • Respond without giving context.
  • Be vague or general.

Write a Good Email Subject

To compose the perfect email subject:

  • Give the message's bottom line.
    • If your email comprises multiple topics, consider breaking it into multiple messages.
  • Summarize the message — why you are writing and what you want to be different after the recipient has read your email — instead of describing it.
    • If you invite somebody to a conference, use "Invitation: Email Efficiency Conference, Bangalore Aug 14-16" instead of a plain "Email Efficiency Conference".
  • Be precise.
    • Include detail that allows the recipient to identify what you are talking about quickly and unambiguously.
  • If your message requires the recipient's action, say so; preferably with the first word.
  • Leave out unnecessary words.
    • Email subjects need to be concise. Skip articles, adjectives and adverbs.

Clean Up Emails Before Forwarding Them

Cleaning up such a mess can be cumbersome, but keeping an email clean that you forward initially is easy.

  • First, make sure you're sharing the email, not the addresses in it by removing all addresses from the forwarded message.
    • Of course, there are exceptions. In particular, when the list of who participated in a discussion is an important part of the information you are forwarding, it makes no sense to remove the addresses.
  • Then, clean up the message itself if it contains unnecessary '>' characters or messed up line breaks. Email cleanup utilities can do this nasty work for you.
  • Place any comments you have after or (preferably) before the forwarded message, but try to avoid mixing forwarded text and comments.

Another Clean Forwarding Option: Attaching Emails

Alternatively, forwarding emails as attachments is an easy and clean way to share them.

Don't Forward Hoaxes

This is why you should

  • not forward such a story unless you have investigated it yourself.

You will

  • irritate those that do not spot the hoax and
  • they will probably pass it on, causing more irritation.

Those that identify the hoax will likely send you a message notifying you that you passed on an urban legend.

If you know a message is a hoax but have a specific reason to forward it nevertheless (for scientific purposes, for example), you might want to include your reason with the message.



five not to do with e-mail

  • Don't use capilital letter when send email for anyone

  • don't make crime in email

  • don't send virus

  • don't publish true information

  • don't share file with anybody







Thursday, November 26, 2009

Database

DATABASE


A database is an integrated collection of logically related records or files consolidated into a common pool that provides data for one or more multiple uses.

One way of classifying databases involves the type of content, for example: bibliographic, full-text, numeric, image. Other classification methods start from examining database models or database architectures.

Software organizes the data in a database according to a database model. As of 2009[update] the relational model occurs most commonly. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.

Types

Operational database

These databases store detailed data needed to support the operations of an entire organization. They are also called subject-area databases (SADB), transaction databases, and production databases.

For example:
1) customer databases
2) personal databases
3) inventory databases


Analytical database
These databases store data and information extracted from selected operational and external databases. They consist of summarized data and information most needed by an organization's management and other end-users. Some people refer to analytical databases as multidimensional databases, management databases, or information databases.

Data warehouse
A data warehouse stores data from current and previous years — data extracted from the various operational databases of an organization. It becomes the central source of data that has been screened, edited, standardized and integrated so that it can be used by managers and other end-user professionals throughout an organization


Distributed database
These are databases of local work-groups and departments at regional offices, branch offices, manufacturing plants and other work sites. These databases can include segments of both common operational and common user databases, as well as data generated and used only at a user’s own site.


End-user database
These databases consist of a variety of data files developed by end-users at their workstations. Examples of these are collections of documents in spreadsheets, word processing and even downloaded files.


External database
These databases provide access to external, privately-owned data online — available for a fee to end-users and organizations from commercial services. Access to a wealth of information from external database is available for a fee from commercial online services and with or without charge from many sources in the Internet.


Hypermedia databases on the web
These are a set of interconnected multimedia pages at a web-site. They consist of a home page and other hyperlinked pages of multimedia or mixed media such as text, graphic, photographic images, video clips, audio etc.


Navigational database
In navigational databases, queries find objects primarily by following references from other objects. Traditionally navigational interfaces are procedural, though one could characterize some modern systems like XPath as being simultaneously navigational and declarative.

In-memory databases
In-memory databases primarily rely on main memory for computer data storage. This contrasts with database management systems which employ a disk-based storage mechanism. Main memory databases are faster than disk-optimized databases since the internal optimization algorithms are simpler and execute fewer CPU instructions. Accessing data in memory provides faster and more predictable performance than disk. In applications where response time is critical, such as telecommunications network equipment that operates emergency systems, main memory databases are often used.

Document-oriented databases
Document-oriented databases are computer programs designed for document-oriented applications. These systems may be implemented as a layer above a relational database or an object database. As opposed to relational databases, document-based databases do not store data in tables with uniform sized fields for each record. Instead, they store each record as a document that has certain characteristics. Any number of fields of any length can be added to a document. Fields can also contain multiple pieces of data.


Real-time databases
A real-time database is a processing system designed to handle workloads whose state may change constantly. This differs from traditional databases containing persistent data, mostly unaffected by time. For example, a stock market changes rapidly and dynamically. Real-time processing means that a transaction is processed fast enough for the result to come back and be acted on right away. Real-time databases are useful for accounting, banking, law, medical records, multi-media, process control, reservation systems, and scientific data analysis. As computers increase in power and can store more data, real-time databases become integrated into society and are employed in many applications.


Relational Database
The standard of , relational databases are the most commonly used database today. It uses the table to structure information so that it can be readily and easily searched through.

Tuesday, November 24, 2009

Role of IT in education

THE ROLE OF ICT IN EDUCATION SECTOR
By: NURUL SAKINAH BINTI AZMAN

Nowadays the role of Information and Communication Technology (ICT), especially internet in the education sector plays an important role, especially in the process of empowering the technology into the educational activities. Education sector can be the most effective sector to anticipate and eliminate the negative impact of ICT. Technology (internet) in another side can be the most effective way to increase the student’s knowledge.

Being aware of the significant role of ICT (internet) in our life, especially in the educational activities, education authorities should be wise enough in implementing the strategies to empower ICT in supporting the teaching and learning process in the classroom. ICT is not just the bloom of the educational activities, but also it will be the secondary option to improve the effective and meaningful educational process.

The main purpose of the Strategy for Information and Communication Technology Implementation in Education is to provide the prospects and trends of integrating information and communication technology (ICT) into the general educational activities.

There are some unavoidable facts in the modern education;

First, the ICT has been developing very rapidly nowadays. Therefore, in order to balance it, the whole educational system should be reformed and ICT should be integrated into educational activities.

Second, the influence of ICT, especially internet (open source tool) cannot be ignored in our student’s lives. So, the learning activities should be reoriented and reformulated, from the manual source centered to the open source ones. In this case the widely use of internet access has been an unavoidable policy that should be anticipated by schools authorities.

Third, the presence of multimedia games and online games by internet has been another serious problem that should be wisely handled by the educational institutions. The students cannot be exterminated from this case. They can have and do with it wherever and whenever they want. Schools, as a matter of fact, do not have enough power and time to prevent or stop it after school times. Meanwhile, most parents do not have enough times to accompany and control their children. So, the students have large opportunities to do with multimedia games or online games or browsing the negative and porn sites. Having been addicted, the students will have too little time to study, and even do not want to attend classes.

In such situation, education institutions play an important role to eradicate these problems. One of which is by facilitating the students to do edutainment or educational games. Schools can let their students be familiar with educational games adjusted by their teachers. Besides, they can also support and facilitate their students to have their own blogs in the internet. A lot of WebBlog providers are free to the users, such as WordPress. In their blogs, the students can create and write something, like an article, poem, news, short stories, features, or they can also express their opinion by an online forum provided in the internet. They are able to share experiences throughout their blogs to others from all over the world. I think it will be an interesting activity for them, and it will lessen their time to visit the negative or porn sites existed.

By doing so, I think our young generation will get more and more information and knowledge by browsing in the internet. They can also create innovation in web design that it may be out of the formal curriculum content, but it will be useful for their future.

Fourth, the implementation of ICT in education has not been a priority trend of educational reform and the state paid little attention to it. Therefore, there should be an active participation, initiative and good will of the schools and the government institutions to enhance ICT implementation at school.

Fifth, the teachers should be the main motivator and initiator of the ICT implementation at schools. The teachers should be aware of the social change in their teaching activities. They should be the agent of change from the classical method into the modern one. They must also be the part of the global change in learning and teaching modification.

The followings are the aim and objectives of ICT implementation in education:

  • To implement the principle of life-long learning / education.
  • to increase a variety of educational services and medium / method.
  • to promote equal opportunities to obtain education and information.
  • to develop a system of collecting and disseminating educational information.
  • to promote technology literacy of all citizens, especially for students.
  • to develop distance education with national contents.
  • to promote the culture of learning at school (development of learning skills, expansion of optional education, open source of education, etc.)
  • to support schools in sharing experience and information with others

Friday, September 11, 2009

USE ICT OF FIELD IN PHARMARCY

This course is aimed at exposing the students to the development in ICT and how this related to the field of pharmacy practice particularly in this country.


Defining ICT. The historical development. Its Impact on the present as well as future health care delivery system as a whole and Pharmacy in particular.


The development of ICT capabilities (hardware, software and infrastructure) as well as shift from medical informatics to health informatics.


The internet and the www as a source of drug and Health information.
The evaluation and use of Search engines (in particular medical search engines) and techniques in evaluating medical and Pharmacy related websites.


Computerized drug and health information Database covering primary, secondary and tertiary Database both in CD-form as well as those available as subscription in the websites.
Introduction to the concept of evidence-based medicine.


Malaysia’s Health vision and the MSC Telehealth Initiatives.


The four flagship areas i.e. Lifetime health plan, Continuing medical education, Mass Customized Personalized Health Information and Education.


Malaysian Pharmacy related website and services such as bpfk website, national poison centre website,Virtual network for drug information service, and the Pharmaceutical care system.

Tuesday, August 18, 2009

SOCIAL AND ETHICAL ISSUES




The threat to personal privacy posed by large database and computer network are quit a serious issue nowdays. Practices and policies of those who control the technology and the databases that collect information about individuals. Ease with which erroneous information can multiply, and the difficulty of expunging such information. Lack of well-crafted laws and regulations to protect the privacy of individuals so that the likelihood of harm is greatly reduced. Lack of procedures that would make it easy for people to protect information about themselves from being shared without their permission, and the lack of procedures that would make it difficult for people to obtain information about others without getting their permission.

Thought policy, and lack of protective law has brought serious harm such as mental, financial, and physical to individuals. Sometimes this harm is premeditated, as when a thief assumes a person's identity through stolen credit card numbers and Social Security numbers. Sometimes the harm is unintentional although no less serious as when erroneous information gets propagated through credit or medical bureaus and other databases of personal information.



It won the praise of many people in the computer and Internet industries for its candid portrayal of how advances in computer and Internet technologies, satellite surveillance technology, abuse of database information, computer hacking, human error, fraud, lax security, security and law enforcement technologies, Federal agency policies, and legislation can affect our lives. Consequences are far from flattering.

More benefit in uses computer and information technology have changed the world rapidly and irreversibly. Emerging technologies, such as artificial intelligence, offer promise for future application,computer also threaten our privacy, our privacy, our security and perhaps our way of life.


The conclusion in social and ethical issues for threat to personal privacy posed by large databases and computer network. Computers and information technology have changed the world rapidly and irreversibly. Our civilization is in a transition from an industrial economy to what we might call the information age, and this paradigm shift is having an impact on the way we live and work. Computers and information technology are central to this change, and we can easily list dozens of ways in which computers now make our lives easier and more productive Personal computer applications, such as word processing, spreadsheets, graphics, multimedia, and databases, continue to grow in popularity. Emerging technologies, such as artificial intelligence, offer promise for future applications. At the same time, computers threaten our privacy, our security, and perhaps our way of life. As we rush into the information age, our future depends on computers and on our ability to understand and use them in productive, positive ways.

Thank you.