Monday, August 13, 2012

The 16 principles of success which you must absorb are:
1) The Law of the Mastermind
2) A Definite Chief Aim
3) Self-Confidence
4) Habit of Saving
5) Initiative and Leadership
6) Imagination
7) Enthusiasm
8) Self-Control
9) Doing More than Paid For
10) A Pleasing Personality
11) Accurate Thinking
12) Concentration
13) Cooperation
14) Profiting by Failure
15) Tolerance
16) The Golden Rule

Wednesday, May 30, 2012

Need and Importance of Information Technology in Education


Need
  • Education is a life long process therefore anytime anywhere access to it is the need
  • Information explosion is an ever increasing phenomena therefore there is need to get access to this information
  • Education should meet the needs of variety of learners and therefore IT is important in meeting this need
  • It is a requirement of the society that the individuals should posses technological literacy
  • We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer
IMPORTANCE

  • Access to variety of learning resources
  • Immediacy to information
  • Anytime learning
  • Anywhere learning
  • Collaborative learning
  • Multimedia approach to education
  • Authentic and up to date information
  • Access to online libraries
  • Teaching of different subjects made interesting
  • Educational data storage
  • Distance education
  • Access to the source of information
  • Multiple communication channels-e-mail,chat,forum,blogs,etc.
  • Access to open courseware
  • Better accesses to children with disabilities
  • Reduces time on many routine tasks

Monday, May 28, 2012

Internet Governance in an Age of Cyber Insecurity


The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector.
In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes.
Internet Governance in an Age of Cyber Insecurity is a timely contribution on an issue increasingly capturing the attention of policymakers. It presents technical ideas to the nonexpert in accessible and compelling language. The report leaves little doubt about the importance of cybersecurity to the future of both the United States and the Internet itself, and its recommendations provide a strong foundation for future action.

Tuesday, May 15, 2012

REPORT FROM THE INTERNET PRIVACY WORKSHOP


It’s been a long time coming, but last week saw the publication of RFC 6462, the Report from the Internet Privacy Workshop. The workshop, which was jointly hosted by the Internet Architecture Board (IAB) and others in December 2010, brought together experts from industry and the Internet standards community to better understand the role of privacy in Internet standardization work.
The workshop report provides a useful overview of fundamental privacy design challenges that appear again and again: the increasing ease of user/device/application fingerprinting, unforeseen information leakage, difficulties in distinguishing first parties from third parties, complications arising from system dependencies, and the lack of transparency and user awareness of privacy risks and tradeoffs. The report also identifies a number of barriers to successful deployment and analysis of privacy-minded protocols and systems, including the difficulty of using generic protocols and tools to defend against context-specific threats; the tension between privacy protection and usability; and the difficulty of navigating between business, legal, and individual incentives.

What every policy maker needs to know about the internet



The Internet today is a technology of freedom and innovation. In less than two
decades it has become a powerful, global platform for commerce, human
development and democratic participation. This growth did not happen in a legal
vacuum. From the outset, the Internet has been enabled by a policy framework
suited to its unique technical architecture. Misguided policies could just as easily
stifle the Internetʼs continued expansion. Increasingly, despite the Internetʼs
success, the policy principles that supported its growth are being challenged.
The successful policy framework for the Internet emphasized openness, competition,
innovation, consumer choice, and freedom of expression. For example, while ISPs
themselves were relatively unregulated, they benefited from an open platform that
was based on telecommunications policies of interconnection and non‐discrimination.
Early on, the Supreme Court ruled that the Internet was entitled to the strongest form
of First Amendment free speech protection. Congress expressly decided that Web
hosting services and ISPs should not be liable for the content created by others.
Recognizing the importance of privacy, in 1986 Congress updated laws on
government surveillance to require court orders for access to data communications,
just as they had been required for telephone taps.
In recent years, policymakers seem to have forgotten what makes the Internet
special. Increasingly, policy proposals treat the Internet as a problem to be solved
rather than a valuable resource that must be supported. Debates over objectionable
content online, protecting intellectual property, preventing terrorism, or restructuring
telecommunications policy seem to have lost sight of the Internetʼs history and its
architecture. We are seeing an increasing number of heavy‐handed policy proposals
that place the Internetʼs core characteristics at risk. Standing alone or in conjunction
with marketplace and technological changes, these policies could fundamentally alter
the very elements of the Internet that have made it so successful.