Monday, December 8, 2014

Web 3.0



Research information is from URL  en.m.wikipedia.org/wiki/semantic web


Semantic web often referred to as Web 3.0 is a web of data, the concept behind semantic web can be categorized in two distinctive ways, these includes the use of common formats for integration, combination of data drawn from diverse sources, and language of recording on how data relates to the real world. The original form of information is concentrated on the documents to eventually produce all intended information needed combined in one database. This allows a user to start off with one database and then moving to another set of database that are connected by being the same thing, this means many connective issues can be sorted out online producing the exact desired piece of information as informative as possible.
Semantic web is a collaborated movement, organized by international standard body of the World Wide Web. It also provides a common framework that allows data to be shared, and reuse within applications, enterprise, and community boundaries. Semantic Web enables machines to understand and respond to complex human request based on meaning. Its vision deals with information that can be easily interpreted by machines, so they can perform combining, finding, and acting upon information found on the web. Web 3.0 enables computer to generate raw data on their own, making devices able to exchange data between each other, including generating new information.
Currently being used by Google, amazon.com, EBay, WebEx, WebSideStory, NetSuite, Jamcracker, and Salesforce. It should be noted that Web and its factors isn’t just for shopping, entertainment, and search facilitating, but is fast growing as business computing converting on the same fundamentals as the other applications used. Web and its factor is a convenient application that helps the user eliminate a lot of steps involved, and gets the information needed in the fraction of time needed for more conventional style of browsing.

Monday, November 24, 2014

Devices


               For this homework assignment and for my technology blog I choose wireless mouse and USB made by logic-tech, Ipad2, iphone5, and external hard drive since this devices makes my daily transactions much easier when it comes to saving files, searching homework material, and maneuvering through my browser.Ipad2 made by apple is thinner, also a lot more powerful. A new chip A8x delivers substantially better CPU and graphics performance than its predecessor. IPad2 is as powerful as many personal computer and power efficient with a 10-hour battery life that lets you work, play, and surf the net easily.Iphone5 touchscreen smartphone developed by Apple Inc. features major design changes includes an aluminum-based body which was thinner and lighter than the previous models. A taller screen with 16:9 aspect ratio, the apple A6-sytem-on-chip LTE support, and lighting, a new compact dock connector which replace the 30-pin design used by previous IPhone models.

External hard drive is one answer to my storage dilemma, though it has a few issues, it offers superior USB performance saving documents, pics, music, files, and other things that you value the most. Desktop wireless mouse made for everyday use. Have the standard right and left buttons, a scroll wheel, and forward and back buttons for navigating in your web browser. Designed for use on the road and made easy to fit into your laptop bags or backpack, and connect quickly without a tangle wires. USB flash drive is a data storage device that includes flash memory with an integrated universal serial bus interface. USB flash drive are typically removable and rewritable media physically smaller than an optical disc. https://www.flickr.com/photos/89928223@N04/                                                         

Monday, November 3, 2014

RSS FEEDS




Companies benefit with the use of RSS by Keeping customers and potential customer informed about their companies product, services and promotions, suppliers updated with the companies, policy, procedure, and standard procedure. Keeping employees and associates informed about the companies matter that affect as incentives schemes, organizational change and new details. Support distributed Salesforce and resellers, Provide system changes and automated updates routine driven by RSS. In addition, it promotes globalization by providing channels in multiple languages allowing recipients to choose their preferred language and ensure secure communication using password protected and encrypted channels.

Information is from www.seita .com/rssa/uses.shtml

Sunday, October 26, 2014

Information Security





            In a general sense, security can be considered as a state of freedom from a danger or risk. For instance, a nation experiences security when it’s military has full strength to protect its citizens from a hostile force. This condition of freedom exists because protective measures are established and maintained. However, the presence of the military does not guarantee that a nation will never be attacked. Attacks from powerful outsides forces might attack at any time. The goal of national security is to be able to defend against attacks and ensure that the nation will survive in the event of an attack.


The term Information Security is often used to describe the tasks of guarding information that is in a digital format. The information is typically manipulated by a micro-processor stored on a magnetic or optical storage device, and transmitted over a network. Information security can be understood by examining its goals and how it is accomplished. First information security ensures that protective measures are properly implemented. Information security cannot completely prevent attacks or guarantee that a system is totally secure. Rather, information security creates a defense that attempts to ward off attacks and prevents the collapse of the system when an attack occurs, instead information security is protection. Second, information security is intended to protect information that has value to people and organizations, and that value comes from the characteristics of the information. The three characteristics of information that must be protected by information security are:  Confidentially ensures that only authorized parties can view the information. Integrity ensures that the information is correct and no unauthorized person or malicious software has altered that data. Availability = ensures that data is accessible to authorized users. Information security attempts to safeguard these three characteristics of information.