Thursday 3 December 2009

ICT bridging the digital divide

The e-Learning Foundation, the only national charity dedicated to erasing the digital divide in the UK by ensuring disadvantaged children have access to technology for their studies at home as well as at school, has launched its latest grants round to schools.
http://www.digitalbirmingham.co.uk/news/national-charity-works-on-the-digital-divide
Lloyd’s Charities Trust has donated £50,000 to the e-Learning Foundation, to provide access to computing at home for children in low-income families

October 30 2008: The e-Learning Foundation, a national charity working to close the
digital divide in the UK, welcomes the Government’s cash injection of £300 million over the
next two years for a home access and believes that, if executed correctly, the programme
could potentially eliminate the digital divide for the country’s current generation of learners.The £300 million programme, which was announced by the Prime Minister Gordon Brownlast month, is scheduled to go nationwide next autumn, providing home access to everyfive-to-19 year old by 2011.

AOL The world's largest online information service with access to the Internet, e-mail, chat rooms and a variety of databases and services. The world's leading interactive services company, together with the AOL Foundation, announced today at the G-8 summit in Tokyo new initiatives to expand digital opportunity internationally. The initiatives are based on some of the most successful models operating in the United States United States, officially United States of America, republic (2005 est. pop. 295,734,000), 3,539,227 sq mi (9,166,598 sq km), North America. The United States is the world's third largest country in population and the fourth largest country in area. to bridge the digital divide. They are part of AOL's overall strategy to ensure that the interactive medium offers the maximum benefits to society and empowers as many people as quickly as possible. AOL is committed to making the Internet a truly global medium in which citizens and businesses can interconnect while preserving local traditions and cultural differences. Working with other global private sector companies, governments, international and local nonprofit organizations Nonprofit OrganizationAn association that is given tax-free status. Donations to a non-profit organization are often tax deductible as well.Notes:Examples of non-profit organizations are charities, hospitals and schools. , and local businesses, we can create a more connected world."

Digital Divide in Britain

Age- Silver surfers http://www.silversurfers.net/silversurfers-sitesof.html
http://www.statistics.gov.uk/pdfdir/iahi0809.pdf
http://www.statistics.gov.uk/pdfdir/inta0806.pdf

Wednesday 2 December 2009

Why should we bridge the digital divide

The new information and communications technologies are among the driving forces of globalization. They are bringing people together, and bringing decision makers unprecedented new tools for development. At the same time, however, the gap between information "haves" and "have-nots" is widening, and there is a real danger that the world's poor will be excluded from the emerging knowledge-based global economy.
Information technology is extremely cost-effective compared with other forms of capital. Modest yet key investments in basic education and access can achieve remarkable results. Estonia and Costa Rica are well-known examples of how successful IT strategies can help accelerate growth and raise income levels. But even some of the least-developed countries, such as Mali and Bangladesh, have shown how determined leadership and innovative approaches can, with international support, connect remote and rural areas to the Internet and mobile telephony.
Public tele-centers have been established in places as diverse as Egypt, Kazakhstan and Peru. Indeed, information technologies can give developing countries the chance to leapfrog some of the long and painful stages of development that other countries had to go through.
But bridging the digital divide is not going to be easy. Too often, state monopolies charge exorbitant prices for the use of bandwidth. Governments need to do much more to create effective institutions and supportive regulatory frameworks that will attract foreign investment; more generally, they must also review their policies and arrangements to make sure they are not denying their people the opportunities offered by the digital revolution.
We need to think of ways to bring wireless fidelity (Wi-Fi) applications to the developing world, so as to make use of unlicensed radio spectrum to deliver cheap and fast Internet access. We also need to explore the possibility of creating an open international university. Surely, experts can think of many more ideas along these lines.
The United Nations is working hard to enlist this power in the cause of economic and social development. A Health InterNetwork, spearheaded by the World Health Organization, is creating Web sites for hospitals, clinics and public health facilities in the developing world to bring high-quality information within reach and to facilitate communication in the public health community. The United Nations Information Technology Service, a global consortium of volunteer corps coordinated by the U.N. Volunteers program, is training people in developing countries in the uses and opportunities of information technology.
http://news.cnet.com/2010-1069-964507.html

Monday 9 November 2009

Electronic Communications Timeline

Electronic Communication Timeline

Morse code 1810
Telecommunications Lines1839
Transatlantic Line 1866
Prototype Telephone 1876
Conventional Telephone 1878
Fax Machine 1861
Radio Communication 1893
Television 1925
Teletype 1940
Walkie Talkie 1940
Cellular Communication 1960
E-Mail 1965
Instant Messaging Mid 1960s
SMS messaging 1980
Bluetooth 1998
Skype 2003

Wednesday 4 November 2009

Computer misuse act 1990

(1) A person is guilty of an offence if:
a) he causes a computer to perform any function with intent to secure access to any program or data held in a computer;
b) the access he intends to secure is unauthorized; and
c) he knows at the time when he causes the computer to perform the function that this is the case. 1(2) the intent a person has to commit an offence under this section need not be directed at
a) any particular program or data
b) a program or data of any particular kind; or
c) a program or data held in any particular computer. 1(3) a person guilty of an offence under this section shall be liable on summary conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5, on the standard scale or both.
2(1) a person is guilty of an offence under this section if he commits an offence under section 1 above ("the unauthorized access offence") With intent
a) to commit an offence to which this section applies; or
b) to facilitate the commission of such an offence (whether by himself or by any other person) and the offence he intends to commit or facilitate is referred to below in this section as the further offence. 2(2) this section applies to offences
a) for which the sentence is fixed by law; or
b) for which a person of twenty one years of age or over (not previously convicted) may be sentenced to imprisonment for a term of five years (or in England and Wales might be so sentenced but for the restrictions imposed by section 33 of the Magistrates Courts Act 1980). 2(5) a person guilty of an offence under this section shall be liable
a) on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or both; and
b) on conviction on indictment, to imprisonment for a term not exceeding five years, or to a fine, or both.
3(1) A person is guilty of an offence if
a) he does any act in a way which causes the unauthorized modification of the contents of any computer; and
b) at the time when he does so the act he has the requisite intent and the requisite knowledge. 3(2) for the purposes of subsection 3(1)b above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing
a) to impair the operation of any computer;
b) to prevent or hinder access to any program or data held in any computer; or
c) to impair the operation of any such program or the reliability of any such data. 3(3) the intent need not be directed at
a) any particular computer;
b) any particular program or data or a program or data of any particular kind; or
c) any particular modification or a modification of any particular kind. 3(4) For the purpose of subsection 1b above, the requisite knowledge is knowledge that any modification he intends to cause is unauthorized. 3(5) it is immaterial for the purposes of this section whether an unauthorized modification or any intended effect of it of a kind mentioned in subsection (2) above is, or is intended to be, permanent or merely temporary



The Act was created to criminalise unauthorized access to computer systems (the s1 offence) and to deter the more serious criminals from using a computer to assist in the commission of a criminal offence or from impairing or hindering access to data stored in a computer (the ss2 and 3 offences). The basic offence is to attempt or achieve access to a computer or the data it stores, by inducing a computer to perform any function with intent to secure access. Hackers that program their computers to search through password permutations are therefore liable, even though all their attempts to log on are rejected by the target computer. The only precondition to liability is that the hacker should be aware that the access attempted is unauthorized. Thus, using another person's username or identifier (ID) and password without proper authority to access data or a program, or to alter, delete, copy or move a program or data, or simply to output a program or data to a screen or printer, or to impersonate that other person using e-mail, online chat, web or other services, constitute the offence. Even if the initial access is authorized, subsequent exploration if there is a hierarchy of privileges in the system, may lead to entry to parts of the system for which the requisite privileges are lacking and the offence will be committed. But looking over a user's shoulder or using sophisticated electronic equipment to monitor the electromagnetic radiation emitted by VDUs ("electronic eavesdropping") is outside the scope of this offence.
The ss2 and 3 offences are aggravated offences, requiring a specific intent to commit another offence (for these purposes, the other offences are to be arrestable, and so include all the major common law and statutory offences of fraud and dishonesty). So a hacker who obtains access to a system intending to transfer money or shares, intends to commit theft, or to obtain confidential information for blackmail or extortion. Thus, the s1 offence is committed as soon as the unauthorized access is attempted, and the s2 offence overtakes liability as soon as specific access is made for the criminal purpose. The s3 offence is specifically aimed at those who write and circulate a computer virus or worm, whether on a LAN or across networks. Similarly, using phishing techniques or a Trojan to obtain identity data or to acquire any other data from an unauthorized source, or modifying the operating system files or some aspect of the computer's functions to interfere with its operation or prevent access to any data, including the destruction of files, or deliberately generating code to cause a complete system malfunction, are all criminal "modifications".

Tuesday 3 November 2009

Civil rights in the information age

The Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can control information about themselves. Most of the Act does not apply to domestic use,[1] for example keeping a personal address book. Anyone holding personal data for other purposes is legally obliged to comply with this Act, subject to some exemptions. The Act defines eight data protection principles.
http://en.wikipedia.org/wiki/Data_Protection_Act_1998
The Key points of the Data Protection Act are:
Data may only be used for the specific purposes for which it was collected.
Data must not be disclosed to other parties without the consent of the individual whom it is about, unless there is legislation or other overriding legitimate reason to share the information (for example, the prevention or detection of crime). It is an offence for Other Parties to obtain this personal data without authorisation.
Individuals have a right of access to the information held about them, subject to certain exceptions (for example, information held for the prevention or detection of crime).
Personal information may be kept for no longer than is necessary and must be kept up to date.
Personal information may not be sent outside the European Economic Area unless the individual whom it is about has consented or adequate protection is in place, for example by the use of a prescribed form of contract to govern the transmission of the data.
Subject to some exceptions for organisations that only do very simple processing, and for domestic use, all entities that process personal information must register with the Information Commissioner's Office.
Entities holding personal information are required to have adequate security measures in place. Those include technical measures (such as firewalls) and organisational measures (such as staff training).
Subjects have the right to have factually incorrect information corrected (note: this does not extend to matters of opinion)

It is there to protect the privacy of people who submit information online so it is not missused or abused. It also means that sites cannot share the information unless you give tem permission to.

Tuesday 20 October 2009

ebook readers

Amazon.com sells the Kindle ebook reader for $279. It can store up to 1500 books, it is thin as most magazines, it uses 3G technology which means you do not need a computer to download books to your kindle. It has no glare technology, a battery which lasts days with no recharging. It fetures an experimental text to speach software which can read the book to you. Books range for $9.99 for a new book and $1.99 for an older one. Gadgets such as smart phones can read many file types and be used as a book reader along with many other aplications.

Thursday 15 October 2009

Entertainment in the Digital Age

Movies: Millions of movies are downloaded or streamed to computers every year.
"Roughly 18 percent of the U.S. online population has illegally downloaded a full-length movie at some point in the past, according to a telephone and online study of 2,600 Americans. A typical movie downloader is 29 years of age, while 63 percent of all downloaders are male, and 37 percent are female. Kaan Yigit, director of the study, observes, 'There is a Robin Hood effect — most people perceive celebrities and studios to be rich already and as a result don't think of movie downloading as a big deal. The current crop of 'download to own' movie services and the new ones coming into the market will need to offer greater flexibility of use, selection and low prices to convert the current users to their services — otherwise file-sharing will continue to thrive.'" http://news.slashdot.org/article.pl?sid=07/01/25/236224
Ken Fisher of Ars Technica explains:
“…the study matched an extensive sample of music downloads to American music sales data in order to search for causality between illicit downloading and album sales. Analyzing data from the final four months of 2002, the researchers estimated that P2P affected no more than 0.7% of sales in that timeframe.”
http://richohanian.wordpress.com/2007/03/06/stats-on-illegal-file-sharing-and-legal-music-sales/
an examination of the RIAA’s marketing and sales charts shows that the real decrease in CD sales actually began in earnest after Napster ceased operating. In fact, during the 2 1/2 years that Napster was operating, CD sales increased by over $500 million dollars from what they were in 1998. Since 2001, CD sales have continued to decrease steadily.
http://www.besttechie.net/2008/04/14/illegal-music-dowloading-look-at-the-facts/

Four men behind a file-sharing website that has hundreds of thousands of British users were sentenced to a year in jail and ordered to pay £2.5 million in damages yesterday for helping internet users to download music, films and computer games.
In a big victory for the entertainment industries, Fredrik Neij, 30, Gottfrid Svartholm Warg, 24, Peter Sunde Kolmisoppi, 30, and Carl Lundström, 49, were found guilty of breaching copyright law in Sweden, where The Pirate Bay site was founded.
The court ordered a payment of £900,000 in compensation for 21st Century Fox and £500,000 each for MGM and Columbia Pictures.
Despite the verdicts, the four announced that The Pirate Bay, which is used by 25 million people, would continue to operate from computers based in various countries around the world. The men, who plan to appeal, will not begin their sentences or have to pay compensation until the end of the legal process.
http://technology.timesonline.co.uk/tol/news/tech_and_web/article6111777.ece
Daniel Petric, 17, was found guilty by Lorain County Common Pleas Judge James Burge in the aggravated murder of his mother and the attempted aggravated murder of his father. Petric’s defense was his addiction to the video game Halo. He shot his parents after they took the game from him. http://videos.cleveland.com/plain-dealer/2009/01/halo_video_game_murder_suspect.html
The 28-year-old man collapsed after playing the game Starcraft at an internet cafe in the city of Taegu, according to South Korean authorities.
The man had not slept properly, and had eaten very little during his marathon session, said police.
Multi-player gaming in South Korea is extremely popular thanks to its fast and widespread broadband network.
Games are televised and professional players are treated, as well as paid, like sports stars.
Professional gamers there attract huge sums in sponsorship and can make more than $100,000 a year.
They are the types of games that completely engross the player. They are not games that you can play for 20 minutes and stop
Professor Mark GriffithsThe man, identified by his family name, Lee, started playing Starcraft on 3 August. He only paused playing to go to the toilet and for short periods of sleep, said the police.
"We presume the cause of death was heart failure stemming from exhaustion," a Taegu provincial police official told the Reuters news agency. He was taken to hospital following his collapse, but died shortly after, according to the police. It is not known whether he suffered from any previous health conditions.
They added that he had recently been fired from his job because he kept missing work to play computer games.
Small minority
Online computer games are some of the most popular and largest growth areas in interactive entertainment.
Players can easily get immersed and feel compelled to play for hours at a stretch, particuarly in massively multiplayer online role playing games - MMORPGs - in which thousands of gamers play and interact in shared fantasy or science fiction worlds.
Reports of gamers spending 10 to 15 hours a day in front of video games, such as the highly popular World of Warcraft and EverQuest, are becoming more frequent. Experts say gamers should take regular screen breaks.
Psychologist Professor Mark Griffiths, author of several in-depth studies into online gaming and gambling addiction, told the BBC News website that, according to his research, playing excessively was not problematic in any shape or form for the majority of gamers.
He said: "It does seem to be the case that online gaming addiction for a small minority is a real phenomenon and people suffer the same symptoms as traditional addictions. http://news.bbc.co.uk/1/hi/technology/4137782.stm

Wednesday 14 October 2009

LITIA: education

Has education been improved with the use of ICT and the internet? I beliveve that it has due to the way the learning has changed from coppying out of a book to being able to vary your work with your own reaserch and personalised settings. Writing skills have also, it can be aurgued, become better due to auto check on the computers. Also the variaty and volume of information has been widely increased as the number of sites can be accesed. You can also go on courses online so you can get qualifications online.

Tuesday 13 October 2009

Life in the information age: working styles

Teachers now have alot of work based in IT, and so do have less paper work. People can now work form home which will increase productivity when people wtake time off work, for things such as broken bones. It has created lots of new job types which did not exist 20 years ago, however more jobs have been lost such as typists.

Friday 18 September 2009

Digital Downloads/ digital entertainment

Itunes: Video downloads: http://www.apple.com/uk/itunes/overview/ Itunes can be used to download music and videos over the internet. It can also be used to play music.
Amazon.co.uk: music downloads: http://www.amazon.co.uk/MP3-Music-Download/b/ref=sa_menu_dm1?ie=UTF8&node=77197031&pf_rd_p=218610391&pf_rd_s=left-nav-1&pf_rd_t=101&pf_rd_i=468294&pf_rd_m=A3P5ROKL5A1OLE&pf_rd_r=0YA7FMF1GXPKYNT0WACB Amazon is expanding onto the digital downloads and can be used to download music and ebooks.
Steam: game downloads: http://store.steampowered.com/ Steam is a revolutionary way to play games over the internet as it is streamed directly onto your computer.
Ebooks:: virtual books: http://www.ebooks.com/ Can be used to download books and read them on a portable device.
Microsoft: software downloads: http://www.microsoft.com/en/us/default.aspx

Other digital entertainment includes sites like youtube where you can stream videos to your computer. The downsides to digital entertainment include if you have a slow connection it will take a long time to stream and download. Not all music can be listened to online because of coppyright issues.

Thursday 17 September 2009

Online Commerce

Online Commerce

Online service
Car insurance
Elephant.co.uk is an online web service that is used to get an insurance quote and cover. It is good as it is only based on the web so it is specialised. It is good because it has an easy to use set up and get insured. It gives you legal information so that the the consumer can tell what they are doing is not illiagal and many different types of information. It is bad as you cannot speak to somebody directly and get a customised quote for your needs.

Online goods

O2 shop
This site sells phones, sim cards and rental plans. It is good because it can be used as a shop or to browse what you wish to buy. It can also show honest reviews from customers insted of sales people selling you all the good points. Online services

Tuesday 15 September 2009

Augmented reality

This is a summary of different points on the new technology "augmented reality"

Academics at a US university are laying the foundations of a new form of digital marketing that involves augmenting Google Earth with dynamic information to create a living city. Academics at the Georgia Institute of Technology have created an 'as live' version of Google Earth in which cars travel on motorways, people play in parks and shops and offices are open for business.
The technology (displayed in this video which manages to make something exciting seem rather dull) could herald a wave of new marketing opportunities for companies looking to promote their range of services.[1]

In contrast, augmented reality - in which computer graphics are layered onto a real world image - was the boring sub-technology confined to sports footage replays and technical engineering.[2]

In a story that got a bunch of reporters and bloggers excited this week, Babak Parviz, a professor at the University of Washington, recently wrote about LED and radio-powered contact lenses that could both monitor health and display information over the user's visual field. The latter functionality -- information display -- was the bigger story this week, exciting the legions of writers who are following each and every advance in "augmented reality."[3]

WIKITUDE World Browser presents the user with data about their surroundings, nearby landmarks, and other points of interest by overlaying information on the real-time camera view of a smart-phone[4]

[1] http://www.revolutionmagazine.com/news/938024/Google-Earth-+-augmented-reality---wow/
[2] http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10597232
[3] http://www.examiner.com/x-22731-SF-Artificial-intelligence-Examiner~y2009m9d13-The-Unbundling-of-Augmented-Reality---Behold-the-Bionic-Eye
[4] http://www.wikitude.org/world_browser

(lol soz Fi)

Friday 11 September 2009

Real time Services

Real Time Services include http://www.trafficengland.com/

Pros include the real time updates for traffic and jams. Cons include the fact that they have no optimised options for phons ect where they may need it on the road

Thursday 10 September 2009

Groups

They suck. There no use as far as i can tell. Any good ones post it.

Wednesday 9 September 2009

Computers

Computers have been around for over 50 years and they still dont work... Come ON!!

Monday 7 September 2009

First postage

hello i like scooters

that is all