Friday, December 25, 2009

IMPLICATION OF IT IN OUR DAILY LIFE

Next comes the information (not technology) revolution.

"In the 1980s information technology (IT) took off. Computing went from an occasional activity for specialists to routine in the lives of most technical professionals.

Then it did likewise for white collar workers and students. Then, for many blue collar workers and on into our homes. In the 1990s, we've gotten networked first the technical community, then business and school, then home via modems, Ethernet, some broadband and wireless.

That's an 'IT Revolution.'

"Now we're poised for the Information Revolution. Newly accessible digitally formatted information is weaved into our daily lives. Technical professionals first, then white collar workers and students, then most of us will rebuild our work and home lives around this resource ubiquitous electronic information."


Interpersonal aspects of commerce and education will remain.

"Just as the photocopier and the desktop computer did not eliminate paper, secretaries and offices (as many had forecast), the devices of the Information Revolution, will not eliminate the interpersonal aspects of commerce and education. For those with access, the pace and volume of human interactions on the network will increase enormously, and for many this change will be enriching.

"But the important social aspects of commerce and education gathering, sharing, learning about behavior, spontaneously connecting with others that require face to face contact will not decrease significantly. People will continue to congregate in classrooms, offices, churches, bars and shopping malls.

"The cumulative impact will be a continuing increase in the speed and number of total 'information events,' and people 50 years from now will wonder why so many in our era thought that the Information Revolution would increase our leisure."


Most lives will remain untouched.

"In the years ahead, the vast majority of people of the world will go about their daily lives largely untouched by the Information Revolution. The requisite massive expenditures on technology infrastructure, operations and personal equipment will not be justified in developing countries until more fundamental needs of adequate food, clothing, shelter, medical care and basic education are widely satisfied.

"Satisfying those needs will absorb most of the income of the increasingly populous Third World for the foreseeable future. To be sure, there will be many juxtapositions of the old and the new — for example, when a peasant walks half a day over dirt trails to visit a village doctor in a hut equipped with a satellite link to a distant medical center. But those instances will be the exceptions, not the rule, in people's daily lives."


Who will win the new power struggle?

"The ongoing computer revolution, the Internet and other new information technologies have resulted in a remarkable array of new applications.

Technology-driven socioeconomic change is occurring. However, there will be many struggles between forces for central control (as has been encouraged in the Industrial Age and existing power bases) and those for individuality (as is encouraged by the two-way communications of the Internet and similar technologies).

"Already the power of technology for free exchange of information has been seen in the breakup of the Soviet Union. While there will be considerable pressure by many governments and commercial and social interests to 'regain control,' the fact is and will remain that technology-aided information exchange will remain 'free.'


What is beyond the human-machine interface?

"Two revolutions have occurred in information technology: We use electronic machines instead of paper to store information, and we have successfully connected these machines together. As a consequence, computer users suffer a lot of 'red eye' as they interface with their information machines.

"The next revolution will move beyond today's human-machine interface and liberate all those 'red-eyed' users. Machines interfacing with machines 'knowledge-based systems,' 'automatic search systems,' 'preprogrammed abstracting systems' and much more will become commonplace. Look for the coming of the automatic 'information finding, classifying and processing' machine."


Decentralization is the future.

"The Industrial Age was based upon the centralized coordination of large numbers of manual laborers and service workers. The 'Knowledge Age,' in contrast, is based upon the decentralized coordination of large numbers of knowledge workers. One should therefore expect that decentralized mechanisms of all sorts (e.g., products, services, business processes, business strategies, markets, government agencies) will flourish at the expense of centralized ones in the future.

"Predictions: The network computer will not be a successful product; governments will lose control of their currencies and the ability to control interest rates; communications industries that developed as monopolies, oligopolies or because of sheer size will wither."


An ethical dilemma exists.

"Ethical issues and concerns have always underscored the utilization, management and control of information. In the Age of Information, political and societal tensions will increasingly surface and coalesce, creating significant differences among groups within nations, as well as among nations. The quality of information content will be deliberated by the perceived haves and the have-nots. Who controls information will be a major issue for 21st century scholars and politicians."


Management of knowledge capital will take off.

"Because knowledge is becoming the key wealth-creating asset, and because high-value knowledge is hard to accumulate in organizations and even harder to organize and effectively deploy managers in both the private and public sectors will want to learn how to master the process of knowledge management. And, they will want to become innovators in creating knowledge capital in order to achieve competitive advantage. As a consequence, leading schools of business and public administration will make major curriculum changes early in the 21st century."


Mere access to information will not be enough.

"The development of information networks has not followed a purely technological imperative. They have been shaped by social networks. New social networks will interact in their own way with the current information infrastructure to lead the next stages in its implementation. The Internet, for instance, serves to keep track of the dynamics of various socio-economic phenomena.

"Networks not only bring about change, but are the ideal means to monitor change. Because of the importance that this has for both business and government, it is foreseeable that the automatic feeding of transaction information to control and decision centers of various kinds will become ubiquitous.

"The key strategic issue in this environment will be the ability to bring processing power, broadly construed, to bear on any point in time and space that circumstances may demand. Mere access to information will not be sufficient. Making something happen with information, from attribution of meaning to rapid incorporation into ongoing decision processes, is what will make a difference."


Science will move online.

"By 2010, scientific publication will be a fully electronic medium. Journals will no longer be the major means of organizing scientific information; browsers will help scientific readers select new papers from across a variety of disciplines and sources. Scientific 'papers' will contain digital information of all sorts, including, but not limited to, text, graphics, movies, audio, simulations and visualizations. The life cycle of scientific publication will be considerably shortened by electronic media. Collaboration, authorship, submission and review will become more intertwined as science moves online. Quality assurance will be provided by electronic labeling services — entities neither fully academic, corporate, nor governmental in nature."


Electronic learning is the future.

"The evidence is clear that there are many problems with the current academic system. The fact of the matter is that college instructional methods have not changed much over the last 50 years. Those institutions that properly assess the changes coming and respond in the appropriate manner will grow and prosper, while many others will decline and close up shop.

"The present educational process can be likened to an ancient cottage-shop industry that is neither efficient (costs are growing relative to income), nor effective (does not do a very good job of increasing learning). Clearly college education is ripe for major technological change that makes education both more efficient and effective.

"There is no question that electronic learning is going to grow rapidly in importance and dramatically change the college educational process."


Authentication will be more important than copyright.

"The creative human process of authoring is in part based upon the collection, interpretation and analysis of existing information. In the future the source, ownership and authentication of information become significant issues as intelligent processors duplicate these human processes to become both primary and secondary publishers.

"Authentication of information sources becomes more important than copyright to ensure these processors do not reuse data that is out of context, thus resulting in false conclusions. As this prediction matures, changes will occur in the publishing business, in educational use of information, and in the purpose and use of libraries."


Winners will apply and use technology.

"Our physical ability to send, process and display data will increase enormously with cost-effective developments in bandwidth, computing, optical storage, imaging and display technologies.

"But the real challenge of the Information Revolution isn't the development of technology, but how to apply and use it. The technology is developing faster than our ability to adopt it. The greatest difficulty is getting people to change. Companies spent huge sums on information technology in the 1980s, with limited improvements in productivity.

"The winners in the Information Revolution will be the people and organizations that can adopt change to the way they work and live."


Software dependency will become a problem.

"Traditional approaches to use of information systems has lead to a naive dependence on these systems. In the future, information systems will continue to support more complex and critical functions, resulting in even more dependence on these systems. It is my prediction that such dependence will result in an IS-based crisis with national and/or global implications.

"Further, use of these systems will have a negative impact on quality of life. Whether or not continued integration of information systems into organizational processes leads to the optimization of these processes, information technologies will not decrease the length of the workday. Rather, they will allow organizations to claim more hours of the worker's day as these technologies continue to become accessible and mobile. Work will permeate more and more aspects of our lives."

HOW TO FIND YOUR IP ADDRESS

Instructions

Things You'll Need:

  • Basic computing knowledge
  1. Step 1

    Go to the Start menu, go to Run, and type "CMD" in the dialog box (without the quotes.)

  2. Step 2

    Now you should see a dark (DOS) window that looks just like the picture on the left of this article step.

    Without the quotes, type "IPCONFIG" and press ENTER.

  3. Step 3

    Now you should see some network information, along with the IP ADDRESS of your computer listed.

  4. Step 4

    The following steps are OPTIONAL:

    If more information is needed, other than the IP address, type the following from the same DOS box described in step two: IPCONFIG /ALL

    This will provide you with more network information on your computer. Its purposes may vary.

  5. Step 5

    There are also websites available that can provide your computer IP, such as www.whatismyip.com.

  6. Step 6

    If you have a router/network set up, please note that the initial steps above will only show you the network's IP from the router. For example, if you have a Linksys router installed, and perform the IPCONFIG command, it will show you something like "192.168.1.x" as opposed to your computer's local/root address. For this reason, following STEP 5 above may be useful.


HOW TO FIND THE ADDRESS OF AN EMAIL SENDER

Things You'll Need:

  • You will need to have access to an email that has full headers activated. This usually an option somewhere on the open email received. Full headers include time of arrival, who it is to, and who it
  1. Step 1

    After you open the email, open the "Full headers" option if you haven't already done so.
    In Outlook Express the process for IP address is different: go to File then select Properties and then look at the bottom "Received From" message and the IP address is located in parenthesis.

  2. Step 2

    look at the top few lines and you should see more than the usual from xxx@yahoo.com and the subject. Look for something that says X originating IP:

  3. Step 3

    The next step is to look at the number next to the originating IP: in my confirmation email from ehow the nuber is [72.5.232.39]. This is the IP address of the computer that was used to send that email.

NET ETHICS AND 5 NOT TO DO WITH E-MAIL

Internet etiquette, the etiquette guidelines for posting messages to online service, and particularly internet newsgroups. Netiquette covers not only rules to maintain civility in discussion example avoiding flames, but also special guidlines unique to the electronic nature of forum messages. For example, netiquette advises users to use simple format because complex formating may not appear correctly for all readers. In most cases, netiquette is enforced by fellow users who will vociferously object if you break a rule of netiquette.


The rules of email netiquette are not rules in the sense that i will come after you don't follow them. they are guidelines that help avoid mistakes (like offending someone when you don't mean to) and misunderstandings like being offended when you're not meant to. these core rules of email netiquette helps us communicate better via email.


Do You Make These Mistakes in Your Emails?

A subject like the headline above can irresistibly pull readers into opening your message and reading its every hypnotic word. Often, it will not — and what if you don't have anything to sell?

Your email's subject line is, next to your name, the first thing the recipient sees. It is important.

In your email subject, do not:

  • Arouse interest and curiosity.
  • Say "Hi".
  • Be wordy.
  • Respond without giving context.
  • Be vague or general.

Write a Good Email Subject

To compose the perfect email subject:

  • Give the message's bottom line.
    • If your email comprises multiple topics, consider breaking it into multiple messages.
  • Summarize the message — why you are writing and what you want to be different after the recipient has read your email — instead of describing it.
    • If you invite somebody to a conference, use "Invitation: Email Efficiency Conference, Bangalore Aug 14-16" instead of a plain "Email Efficiency Conference".
  • Be precise.
    • Include detail that allows the recipient to identify what you are talking about quickly and unambiguously.
  • If your message requires the recipient's action, say so; preferably with the first word.
  • Leave out unnecessary words.
    • Email subjects need to be concise. Skip articles, adjectives and adverbs.

Clean Up Emails Before Forwarding Them

Cleaning up such a mess can be cumbersome, but keeping an email clean that you forward initially is easy.

  • First, make sure you're sharing the email, not the addresses in it by removing all addresses from the forwarded message.
    • Of course, there are exceptions. In particular, when the list of who participated in a discussion is an important part of the information you are forwarding, it makes no sense to remove the addresses.
  • Then, clean up the message itself if it contains unnecessary '>' characters or messed up line breaks. Email cleanup utilities can do this nasty work for you.
  • Place any comments you have after or (preferably) before the forwarded message, but try to avoid mixing forwarded text and comments.

Another Clean Forwarding Option: Attaching Emails

Alternatively, forwarding emails as attachments is an easy and clean way to share them.

Don't Forward Hoaxes

This is why you should

  • not forward such a story unless you have investigated it yourself.

You will

  • irritate those that do not spot the hoax and
  • they will probably pass it on, causing more irritation.

Those that identify the hoax will likely send you a message notifying you that you passed on an urban legend.

If you know a message is a hoax but have a specific reason to forward it nevertheless (for scientific purposes, for example), you might want to include your reason with the message.



five not to do with e-mail

  • Don't use capilital letter when send email for anyone

  • don't make crime in email

  • don't send virus

  • don't publish true information

  • don't share file with anybody