Wireless sensor networks (WSNs) are an emerging technology consisting of small, low-power devices that integrate limited computation, sensing and radio communication capabilities. The technology has the potential to provide flexible infrastructures for numerous applications, including healthcare, industry automation, surveillance and defense. Wireless sensor networks promise an unprecedented fine-grained interface between the virtual and physical worlds. They are one of the most rapidly developing new information technologies, with applications in a wide range of fields including industrial process control, security and surveillance, environmental sensing, and structural health monitoring.
A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. However, wireless sensor networks are now used in many civilian application areas, including environment and habitat monitoring, healthcare applications, home automation, and traffic control.
In addition to one or more sensors, each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small micro controller, and an energy source, usually a battery. The envisaged size of a single sensor node can vary from shoebox-sized nodes down to devices the size of grain of dust, although functioning 'motes' of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few cents, depending on the size of the sensor network and the complexity required of individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and bandwidth. A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm (several nodes may forward data packets to the base station). In computer science and telecommunications, wireless sensor networks are an active research area with numerous workshops and conferences arranged each year.
The applications for WSNs are many and varied. They are used in commercial and industrial applications to monitor data that would be difficult or expensive to monitor using wired sensors. They could be deployed in wilderness areas, where they would remain for many years (monitoring some environmental variables) without the need to recharge/replace their power supplies. They could form a perimeter about a property and monitor the progression of intruders (passing information from one node to the next). There are many uses for WSNs. Typical applications of WSNs include monitoring, tracking, and controlling. Some of the specific applications are habitat monitoring, object tracking, nuclear reactor controlling, fire detection, traffic monitoring, etc. In a typical application, a WSN is scattered in a region where it is meant to collect data through its sensor nodes. Another class of application is the so-called smart space.
Information Technology Jobs are Everywhere - Even Where You Don't Expect Them
If you are looking for that great career, or if you are looking for a career change then you should really consider looking at information technology jobs. The world of computers is continually growing, the field is becoming bigger and businesses need more and more experts within a certain field in the realm of computers.
Information technology jobs are increasing daily, and these jobs are permeating all areas and all career fields. The following are traditional information technology jobs, which will give you a basic understanding of the types of jobs available, but there are also many other IT jobs within other career fields.
The Computer Programmer
Career options for computer programmers are continually changing, because software and hardware requirements are also constantly changing. This career field requires you to keep up to date with new programs and to gain experience in them every year. A computer programmer's salary will also vary depending on the experience he has.
Web Designer
This is another Information Technology job, but the web designer is not necessarily a programmer, but may have programming knowledge in some cases. Most web designers work making web pages. Web sales pages, web data bases, etc. The web designer often works hand in hand with a web programmer, but can also work with the creative artist, and graphic artist.
The Computer Animation Expert
This is the specialist that works with moving animations, training videos, games, etc. The person that works in this field needs to be knowledgeable about information technology, but also creative and artistic. This person loves computer games and anything related to animation.
The Web Editor and SEO Specialist
These information technology jobs involve the writing of content in a practical way especially for the internet. It involves the correct placing of a site within Google. Usually the people that enter into this field have had some kind of writing background in college and computer background too.
The Computer Network Engineer
This information technology job involves working with the computer itself, the hardware, software and the company's networking capabilities. He repairs, diagnoses, changes out computers, and re-establishes the servers working when something happens.
Other Information Technology Jobs
The above are the traditional information technology jobs, but now more and more career fields are requiring extensive computer knowledge. For example if you plan on entering an engineering field, there will be many different computer applications you will need to be able to manage.
The same holds true for accounting and science fields. If for instance you decide to work in geology you will need to work with spatial technology computer applications and GPS technology.
Internet technology skills will be vital in the future in almost all career fields. The more computer skills you have the better your job skills will be and the better job you will land.
So, if you are choosing your career and are worried about future job security, then a job in information technology is what you are looking for. To advance your career and improve your pay as an IT professional you should read more in detail at Online IT Degree . Computer technology is not going anywhere. They will never be obsolete, although you will always have to keep your skills up to date because of the fast changes that occur within these fields.
Ryan Baba writes about career prospects for IT professionals at Online IT Degree.
[http://www.onlineitdegree.org]
For students working toward technology degrees, the future employment outlook seems bright. The Bureau of Labor Statistics anticipates fast employment growth within the industry. Some technology jobs might offer more opportunities than others.
The Bureau of Labor Statistics (BLS) includes 12 wide-ranging categories for technology occupations, the Association for Computing Machinery notes. Within these categories can be several different careers for which students working toward technology degrees might train. Some of the greatest employment growth might be enjoyed by computer software engineers, network systems and data communications analysts, computer systems administrators and those involved with computer systems software and applications, information from the Bureau shows.
A student's choice of technology degrees at the bachelor's level might include anything from computer science to game art and design. Mt. Sierra College in Monrovia, Calif., alone offers bachelor degree programs in media arts & design with a choice of concentrations in graphic design, game art and design, visual effects and digital video, or multimedia arts and design. Mt. Sierra also offers information technology degrees with concentrations in telecommunications technology, information security, and computer information technology.
Westwood College, which has locations in California, Colorado, Georgia, Illinois, Texas and Virginia, offers bachelor's degrees in game software development, major network management and more. Because the institution is considered a Cisco Networking Academy, students might gain skills that can ready them for becoming certified Cisco professionals.
An article in the March 2009 edition of Network World reported on the debate as to whether business or computer science skills were more important as far as the country's competitiveness. Students at some institutions might get the best of both worlds. At the Newport Business Institute in Lower Burrell, Pa., for example, students can work toward a bachelor's degree in business administration that emphasizes microcomputer applications or accounting and computer application. The Newport Business Institute also offers a degree in business information and technology software application and programming. Where the microcomputer applications program is designed to prepare students for careers as information and software specialists, systems operators, software consultants, data entry, computer sales and more, the accounting and computer application offering can prepare students for careers that include account managers, internal auditors, accounting payroll specialists, public, cost and tax accountants, according to the Newport Business Institute website.
Students at other institutions might instead opt for technology minors rather than technology degrees. Institutions such as West Virginia Wesleyan College in Buckhannon, W. Va., offer opportunities to major in computer science or computer information science, as well as to choose a computer science minor. Northwestern College in St. Paul, Minn., offers computer information systems and management information systems minors.
Nova Southeastern University in Fort Lauderdale, Fla., also offers technology minors. Nova Southeastern's information technology minor according to the institution, can be combined with almost any major except for those such as computer information systems, computer science. With majors in these areas, students might find work in in-demand fields such as network and system administrators, computer engineers and more, information from the Nova Southeastern University web site shows.
Technology is considered one of the STEM (science, technology, engineering and math) areas of study, which educators and government officials have been encouraging. Students working toward technology degrees are likely to find an array of scholarships and grants that can help offset the cost of their college and university studies and reduce the amount of debt that they take on.
Like technology, computer science degree jobs are moving to the forefront of desirable options for career paths. The likelihood of tech students gravitating to online course programs is high as this is indeed their forte. Graduates will appreciate the convenience as these are fields where updating information via online education is lifelong.
The technology behind computers has evolved to the point that almost every business and organization utilizes it. Students that complete information technology training are able to step into a wide range of careers. Online colleges offer students several programs and concentrations that will prepare them for the industry.
Education is available at every level including the option to complete a certificate program. Students are taught to work with a businesses technological component to ensure accessibility and security. With the high level of information stored within a businesses computer system professionals are used to manage the entire network on multiple levels. Online education provides students with a variety of opportunities to enter careers in information technology. Possible areas of study may include:Computer Information ScienceComputer Information SystemsInformation SecurityTo understand what these educational opportunities teach students should research the field of information technology. Concentrated programs are usually available at the undergraduate degree level. Many students that seek graduate training complete information technology degree programs. Exploring the field will give students an idea of what professionals do within different careers.
Certificate and associate's degree programs in information technology give students the basic skill set to enter careers as technician specialists. A broad understanding is gained inside certificate programs. Computer operation, programming, and system manipulation are some areas of study that may be included inside a program. Some colleges offer students the chance to use certificate and associates degree programs to gain a wide knowledge base that can be used inside a specialization. Website design, technical writing, and information architecture are some areas available to students.
The ability to help computer users solve problems and examine technological needs can be gained inside a bachelor's degree program. The availability and security of data within a framework of IT services is the goal of understanding the different components that make up the industry. Networking, application development, and digital media publishing are some subjects integrated into a four-year bachelor's degree program. Students should be ready to complete around 130 credit hours that involve general business, English, and math courses. Specific topics prepare students to work as hardware analysts, programmers, database managers, and more. Students learn how the structure of data is created and how to efficiently manage an entire information system.
Pursuing education at the graduate degree level has students studying advanced technological components and allows them enter careers as managers. Distance learning master's degree programs have students developing projects where they learn how to set up networks that are usable and controlled. Systems development, risk assessment, technology management, and multimedia configuration are some program topics that help student's transition into careers. Empirical research and leadership skills are highly stressed within a PhD program. Complicated technology systems are studied such as supply chains, information processing systems, and manufacturing systems. Students explore the deep connection between technologies and the businesses economic endurance. Upper-level positions exist for students that complete graduate training.
Students have many accredited educational choices to choose from to begin careers in information technology. Full accreditation provides proof of a quality training program. Agencies like the Accrediting Commission of Career Schools and Colleges of Technology ( http://www.accsc.org/ ) are approved to accredit qualifying programs. Once an area is selected students can study the necessary skills to become working professionals.
DISCLAIMER: Above is a GENERIC OUTLINE and may or may not depict precise methods, courses and/or focuses related to ANY ONE specific school(s) that may or may not be advertised at PETAP.org.
Copyright 2010 - All rights reserved by PETAP.org.
Renata McGee is a staff writer for PETAP.org. Locate Online Information Technology Schools as well as Campus Based Information Technology Schools and Colleges at PETAP.org, your Partners in Education and Tuition Assistance Programs.
This paper is offered to provide an extended overview of the variety of consulting work completed by IT consultants and the concerns they can address. This will allow you to discover IT difficulties your company might experience and help you identify a consultant who can achieve real technical solutions.
Information Technology Consultants help corporations and clients achieve their business goals by designing custom software, creating network solutions, and testing systems to ensure that these new business systems are properly implemented. Information Technology Consultants (or Systems Consultants) work with clients to understand how they can best leverage technology to achieve the ultimate strategic goals of the firm. IT consultants have highly developed technical skills to enable them to implement effective business solutions.
IT is the study, design, development, implementation and management of computer-based information systems, particularly software applications and computer hardware. IT deals with the use of computers and software to convert, store, protect, process, transmit, and securely retrieve vital business process information.
Today's IT issues need to resolve more than just general functionality problems. There are numerous other potential challenges that need to be factored into the equation. Expandability, accessibility, network design, data protection and system efficiency are some of the fundamental pieces that will come into play in the initial planning of an IT project. You will need to engage a highly qualified team of System Engineers that can take on your unique functional issues. They will be able to offer solutions from the original RFI (Request for Information) all the way through to the ultimate software systems execution.
It's possible you may be able to identify a single consultant who would be able to undertake your entire network systems re-engineering, but more frequently you will need to hire an experienced team from a quality consulting firm to fully undertake expansive IT solutions. For many mid-sized and probably most small companies, the option of taking on full-time employees with the required experience and skill sets is not a valid cost-effective option. For this reason the most prudent solution is to take on a qualified consulting team to undertake the job, thus avoiding the burden and expense of hiring full time personnel.
You will need to find consultants with the right background that exactly match your requirements. For example, boutique consulting firms will have the required breadth of skills and abilities to help small businesses in all areas of IT. They will have consultants who specialize in network installation, support, help desk, information security and more. Whether you need help with strategy, project management or implementation, the right IT consultants will be able to give you expert guidance.
IT Consultants perform a variety of duties from installing applications to designing computer networks and information databases. Some of the most common functions IT professionals perform include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire complex software systems. Today, the term information technology has expanded to include many different aspects of computing and technology, for example, communications technologies are frequently combined to further manipulate, store, communicate, and disseminate information.
IT consulting includes a significant number of major sub-categories such as hardware, software, web design etc. Software covers a wide choice of products and technologies developed using different techniques like programming languages, scripting languages or microcode. Different types of software include web pages developed by technologies like HTML, Perl, PHP and XML. Desktop applications like Microsoft Word or OpenOffice are developed by technologies like C, C++, and Java. Software development can be used to enhance numerous different applications. For example, one of the most commonly used query languages for relational databases is SQL. SQL (Structured Query Language) is one of the most frequently used database computer languages designed for managing data in relational database management systems.
It's not easy to know the best way to get expert help with your IT headaches, and to be sure, you should turn to an authority to help find well qualified consultants. Your best solution will be in using an online service which will be an ideal resource for connecting you with experts in IT consulting who will be able to help with your own unique situation. A reputable online service will assign a personal account manager who will work with you directly to make sure you have defined the problem correctly and from there, they will be able to make sure you engage the right consultant to get you the right results and the best value.
Neil Walker has specialized in matching up clients and consultants for over 8 years. ConsultantFORCE is the ultimate "Marketplace for Expertise". Find a Consultant today who will solve your Information Technology headaches.
Information Technology Schools prepare students for computer-related professions with the knowledge, skills, and experience needed for a professional career.
Programs in Information Technology (IT) make it possible to earn Bachelor of Science (BS), Master of Science (MS), and Doctorate in Computer Science (DCS) degrees. Degree programs offer concentrations in various areas of IT to meet demands of the industry and to impart qualifications that contribute to organizational productivity and success.
Students are provided with good basic understanding of business fundamentals, rudiments of Information Technology, and applications of IT to modern business that promote success and build careers in the IT industry. Information Technology Schools offer degrees with concentrations designed to prepare students with high levels of knowledge for careers in IT as computer information systems managers, operations research analysts, and management and data analysts.
Students in Information Technology programs can expect courses in project management theory, information systems, database systems, computer programming, network systems, systems security, and e-business. Some Information Technology Schools offer the benefit of adding professional certifications as the student progresses through IT programs of study. Certificates in these programs build student resumes by enhancing skills in management, accounting, finance, global business, human resources, and project planning, among others.
Some Information Technology Schools offer dual degree programs that enrich career options with minimal additions to coursework. Students can upgrade their IT degrees with concentrations in software systems engineering, security, network management, and others. A business administration degree can be markedly enhanced with concentrations in areas of Information Technology.
If you would like to learn more about Information Technology Schools or Online Information Technology Schools, you can find more in-depth information and resources on our website.
DISCLAIMER: Above is a GENERAL OVERVIEW and may or may not reflect specific practices, courses and/or services associated with ANY ONE particular school(s) that is or is not advertised on SchoolsGalore.com
Copyright 2006 - All Rights Reserved
Michael Bustamante, in association with Media Positive Communications, Inc. for SchoolsGalore.com
Notice to Publishers: Please feel free to use this article in your Ezine or on your Website; however, ALL links must remain intact and active.
Michael Bustamante is a staff writer for Media Positive Communications, Inc. in association with SchoolsGalore.com. Visit our Traditional School Directory and find Colleges, Universities, Vocational Schools, and Online Schools at SchoolsGalore.com, your educational resource to locate schools.
What is pervasive computing? It all started in 1991 when Mark Weiser envisioned the next generation computer that weaves themselves into their environment. The next generation computers make themselves invisible and intuitive to use. Computers disappear into the background. If you're a Star Trek fan, think of the computers in this science fiction series, and you'll get the idea.
The term coined by Weiser, ubiquitous computing, is now synonymous to pervasive computing.
Computers as they exist today do not integrate themselves into our environment. You're aware of the fact that you're using a computer. The PC sits on top of your desk. You carry a laptop or pocket PC around. You need to acquire certain skills in order to use them, e.g. if you want to use a spreadsheet, you have to learn to use it.
Weiser envisioned an environment where computers are integrated into the environment in such a way that users are not even aware of the computers, or that they're using one. The computers disappear and become unobtrusive.
To illustrate the point, Weiser and his colleagues invented 3 types of devices: a tab, a pad and a board. The devices have no individualized association in they way that you associate a PC or laptop to a particular user, e.g. you can grab a tab and use it without having to figure out how you're going to configure or personalize it to your needs. A tab is a handheld device and can be easily carried around. You can use it to access your email, chat, or to pop up a reminder for you to ask a colleague to confirm next week's seminar if you run into him in the hallway. You'd have dozens of this in your environment.
A pad is kind of a digital version of a paper. You can spread it on your desk in the same way you spread papers on your desk.
The digital board replaces today's whiteboard. When a group of people gather in a room, the system detects that they belong to a project group and automatically downloads the previous discussion points on the board. You can write on the board using a digital pen while sitting a few meters away from it - just point and write.
Pervasive computing integrates computers and a smart environment, and blends them into the background. This technology is changing the way we work, live, and interact with each other.
Let's look at a few more examples of applications of this technology.
Cowboys on horsebacks herding cattle might one day become a feature of a bygone era as the introduction of virtual fences allows farmers to herd their cattle from the comfort of their homes. The virtual fence is downloaded to the cows by transmitting GPS coordinates to head-collars worn by the cows. The dynamic virtual fences are moved along desired trajectories. The collars are equipped with a Wi-Fi networking card, a Zaurus PDA, an eTrex GPS unit and a loudspeaker that transmits occurring sounds (for example, roaring tigers, barking dogs) when a cow strays from the intended path. This multi-disciplinary project, the brain child of a biologist, is made possible in collaboration with computer scientists.
Sensor technology can potentially play an important role in search and rescue operations by first responders, i.e. emergency personnel, such as firemen, paramedic, and police, who arrive at the scene immediately after an event (e.g. a fire, an earthquake, a building collapse) occurs.
Firemen wear tags to allow easy tracking of their movement in order to coordinate search and rescue operations more effectively. The firemen can be informed if a particular section of a building is found to be unstable and is about to collapse, and is directed to evacuate it immediately. A wireless vital sign monitor is attached to victims found trapped so that their condition can be monitored in order to ensure that they receive the appropriate medical attention as soon as they are rescued.
This non-invasive sensor monitors vital signs such as heart rate, oxygen saturation and serum chemistry measurements. The vital sign monitor helps the paramedic team determine which victims are in more critical conditions so that they can prioritize medical attention to more severely injured victims. The application and architecture required to support this emergency response application is being developed under the CodeBlue project at Harvard University, USA.
Wireless technology is also used in healthcare. The Arrhythmia Monitoring System (AMS) is a medical telemetry (telemedicine) system that makes use of wireless technology to monitor patients suffering from arrhythmia. Among the complications that arise from arrhythmia are the loss of regular heartbeat and subsequent loss of function, and rapid heartbeats.
AMS provides a means for healthcare professionals to continuously monitor a patient's electrical cardiac rhythms remotely even though the patient is not at the hospital. This technology allows patients to be in the comfort of their homes without jeopardizing their health. It is also useful for monitoring the heart functions of astronauts who are more susceptible to cardiac dysrhythmias when in space.
The examples illustrate the use of the technology in very different areas. There is no limit to the type of applications made possible by this technology. In the not too distant future, we will see this technology providing increased security, convenience, and ease of information access in our home and workplace.
Mazliza Othman is the author of "Principles of Mobile Computing & Communications". More information is available at http://PervasiveComputing.MazlizaOthman.com.
A lot of organizations today employ the use of Information Technology (IT) for their own purposes. There are some who use it for organizing their file systems, others use it for their inventory and there are some who use it to offer their services online. These systems used by different organizations worldwide are mostly connected to the internet.
Being connected to the internet provides an organization a lot of benefits. Businesses can offer their services to a wider range of clients over the internet as there need not to be a form of physical contact between them for a transaction to happen. A business may also use the internet to make themselves easier to contact via emails and advertise their products online using a website.
But with the obvious benefits of being connected to such networked IT infrastructure, of course there will be some risks. One of these risks is having valuable and confidential information stored in a computer stolen or the computer system itself be damaged. Because of the mentioned risks, a form of security should be in place to protect such assets.
The best device or software to deploy for information technology security purposes is an Intrusion Detection System (IDS). These IDSes works the same way as a burglar alarm we are familiar with. It monitors the network for malicious traffic, and should it detect one, it has the ability to generate an alert with a report that can aid in damage prevention and mitigation efforts.
IDSes also has the capability to monitor individual computers for harmful activity. This can be greatly used by different organizations to ensure that their internal policies related to IT usage is followed, IDSes can generate an alert should there be any violation of said rules and policies.
With today's trend of increasing reliance on Information Technology, care must be taken so that these new systems will be secure. The network in which the IT infrastructure is connected to and the devices that comprises the whole IT infrastructure should be properly secured. The use of IDSes is highly encourage such that there is some sort of intruder alarm that can alert respective people with the relevant information that can help generate an effective and timely response to mitigate or even prevent damage so the organization as a whole. In addition to that, IDSes can help in enforcing internal rules and policies in an organization and with the information from the reports of the IDS, one can upgrade or patch their hardware and software to make their computing environment secure.
Arnie Crisostomo has been providing helpful information regarding intruder alarms for many years. His expertise is the result of years of hands on experience in the burglar alarms business.
The proliferation of methods to deliver our ideas and with more on the way, the First Amendment has and will continue to be interpreted and reinterpreted to provide protection from freedoms of expression being exercised by others. Many of us grew up hearing or saying 'Sticks and Stones will break my bones, but words will never hurt me'. Today we are beginning to see the fallacy of this responsive taunt and our courts are taking measures to restrict those things that might produce such a reaction. Our freedom to express our ideas and opinions may be in jeopardy in the future as we enter the twenty-first century amid threats and a search for ethnic and cultural equality.
Our founding fathers penned a rather optimistic First Amendment of the Constitution and the Bill of Rights which reads; 'Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances' (US Bill of Rights). While their apparent intent was to protect the freedoms of the people from the tyranny of an all powerful government, it is obvious the creators, wisely, also intended to leave the interpretation of these freedoms to each generation.
It can be noted that, today like never before, the interpretations of these freedoms are contingent upon many social factors such as fear, equality, security of homeland and government, and fairness.
Fear led to Sedition Acts in times of war, a desire for equality opened freedoms of assembly and expression in the fight for that equality. Many felt some were overstepping the bounds of the freedoms of others, as exhibited during equal rights movements across the country for example. The questions evolved. How can we insure our freedoms of speech and the press while also preserving and securing the rights of those who may oppose our views or beliefs?
These are questions we, as a society are being forced to face in ways we never imagined as we merge old ideals with new technologies.
With nearly 75% of our children having access to computers new questions of freedom of speech are being brought forth. In a recent case before the Florida Supreme Court emotional abuse has become an issue. Before legislation can be adopted the term 'emotional abuse' must be addressed and defined; an indication of the complexities facing the courts in the interpretation of the First Amendment. Cyber- bullying has become the new form of name calling. With some states stepping in to lobby for legislation, we have taken the bully off the streets and into the global media. A Recent survey by iSafe, a California nonprofit that works with schools and other organizations to improve internet safety' shows that 42% of children say they have been bullied on line. Rather than encouraging parents to take a more active interest by limiting internet use and access at home while teaching their children the consequences of such behavior, we are now looking at government patrol of our home computers.
Issues concerning access to pornography by minors, via the internet, is another matter of great concern today. Attempts at regulation of internet pornography resulted in the Federal Communications Decency Act of 1996. This Act prohibited the knowing transmission of indecent messages to minors. Challenged, this and other legislation was struck down by the U.S. Supreme Court. The indecent transmission and patently offensive display provisions were ruled to limit the freedom of speech guarantee of the First Amendment. Subsequent attempts at legislation, such as the Child On line Protection Act (COPA) of 1998 was deemed unconstitutional and replaced by the Children's Internet Protection Act (CIPA) of 2000 which was ruled by the Supreme Court to be constitutional. However, attempts will continue to focus on creating legislation to curtail the viewing and use of pornography in the new mass mediated forums.
Educators and school boards have long been the subjects of lawsuits claiming infringement of First Amendment rights. Issues such as length of hair or skirts in the 60's and 70's have given way to issues of logos and other phraseology on clothing. In the recent case, Harper v. Poway Unified School District the, Appellate court upheld a lower court's ruling that upheld the school's prohibition of text on a student's shirt. The premise was that the slogan on the shirt was injurious to some students claiming the right to restriction because it "collides with the rights of other students to be secure and to be let alone" Another First Amendment freedom has also affected the schools as they struggle with implications of teaching Creationism and / or Evolutionism in the classrooms.
A recent ruling against teaching 'intelligent design' in schools is still being argued. Originally the Scopes Monkey Trial dealt with issues of religion, science and education, but today the struggle between creationists and evolutionists continues; each claiming the other's religion be taught in juxtaposition or not at all.
In another real world scenario, many feel that development of computer viruses should be illegal because of the damage these viruses can do. These people claim that there is a clear and present danger in such software. Consider, however, the programmer that creates a virus to test a machine or anti-virus software. It has been argued that if any information is undesirable or potentially dangerous under legislation, than there is a potential for abuse by those in power.
Spam, unsolicited email advertisements, and other annoying software are also being considered in regards to computer and internet safety and security issues. Introduced for consideration several years ago, the Can Spam Act of 2003 was approved and signed into law in December 2003. This act, is an attempt to control unsolicited commercial e-mail messages, and fostered arguments, in the face of continued bombardment by email messages, that legislation must be stronger.
While these are only a few of the issues we face today in regards to protection of our freedoms under the First Amendment while eliminating sources of concern and discomfort, we would be remiss if we neglected to look at other media and the problems we face. For example the Junk Fax Prevention Act was passed in 2005 and this act made it legal for unsolicited materials to be sent to a fax machine without express permission, and only provided that an 'opt out' notice appeared on the fax and that the sender had at some time spoken with the receiver. This is essentially legislation that infringes upon the property rights of fax machine owners in that they must pay the costs for paper and ink for each fax that is sent to them. Is this fair and does it really protect the freedoms of the receivers?
Other such matters may be on the horizon as we in turn embrace cellular phone technology. If the subscriber, who must in most cases pay for both incoming and outgoing calls, suddenly starts receiving solicitation calls, what recourse has he or she, and what rights of the solicitor will need to be addressed? Additionally, we see story after story in the news about disagreements on the rights of photographers versus their subjects and suits attempting to force journalists to release their source information.
As we embark on a new era of mass mediated communications in a global community, we will no doubt be forced to reexamine our ideas of the rights outlined in the First Amendment, as our forefathers intended. Their vision gave us a document and Amendments that has enabled us to interpret its intentions to suit the needs of our times.
While we may disagree on points of law, or the moral or ethical implementation of the rights and our respective responsibilities under our Constitution and the Bill of Rights, particularly the First Amendment, we must, if we are to continue as a free democratic nation, be willing to defend each other's rights to express their ideas, even if we don't agree with those ideas.
With the expansion of society to a truly global community with talk of a New World Order and the passage of the Homeland Security Acts, which where drawn and passed under a cloud of fear, we must be ever diligent in our pursuit of fair and equitable legislation in our desire to implement protection for our children and ourselves, and to insure the stability of the freedoms granted us under the Constitution.
I am a teacher and internet guru who has been online since about 1989. A wealth of information and expertise is mine to share and I does so FREELY and without reservation.
If you need help, [http://www.LifeWithBarbara.com] is the place to go to access FREE ebooks, articles, and information to help you make a success of your business. No Opt-in. No payment required. Just help when you need it.
If you are looking to create a website to express your views or market a product, check out this informational FREE video at http://barbaracagle.ws. Just click on the video to view.
Titanium strength technology is a must for combating malware, malicious software that is hostile, intrusive, or annoying program code designed to infiltrate your computer system without your consent. It includes computer viruses, spyware, Trojan horses, worms, adware, rootkits, botnets, crimeware, and other unwanted software.
The US Federal Deposit Insurance Corporation says that malware involves organized Internet crime. In 2009, businesses lost $120 million in the third quarter to phishing and Trojan-based online banking scams. $25 million was lost by small businesses. Basically a cyber-criminal's objective is to make money from invading computers. There are less computer viruses or worms but we are seeing more phishing attacks and spam numbers are exploding with organized crime and more pieces of malware.
Although tracking browsing habits and advertising are part of the crimes, primarily these are targeted attacks that use computer systems for criminal activities. Anti-virus software has been retired in lieu of more savvy in-the-cloud technology geared to automatically stop viruses and spyware for complete Internet security.
In an annual report of the FBI-backed Internet Crime Complaint Center, Internet crime loss complaints in the United States have almost doubled in value from $265 million in 2008 to $560 million in 2009. The total dollar loss from all referred cases was $559.7 million with a median dollar loss of $575. At 65.4 percent, the U.S ranked highest for the number of perpetrators. These statistics are why Internet security and safety is critical today. The Center also reported that the unit handled 336,655 complaints in 2009.
The challenge is that malware works fast in stealth mode, and data-stealing malware can cause damage via one click which can compromise a company's reputation or personal confidential data.
Here are some basic guidelines for safe computing online:
1.) Always install Microsoft's critical updates - the monthly software updates designed to patch security vulnerabilities and threats. It is critical to install monthly updates from Microsoft.
2.) Make sure you have installed anti-virus/spyware/malware protection. Watch for cloud technology to automatically stop viruses and spyware before they reach your computer.
3.) Add a Firewall to block a hacker's attempts to access your computer. Windows XP, Windows Vista and Windows 7 all have firewalls which block and filter Internet traffic so harmful programs like viruses and spyware don't have access.
4.) Install Opera,Firefox, or Chrome as a second browser because most spyware and viruses target Internet Explorer. Often a virus is designed to keep Internet Explorer from accessing the Internet when a computer becomes infected with spyware.
5.) Always disable Java Script - viruses and spyware are using Java script to launch attacks so you should disable or at least change the browser setting to ask before running Java script.
6.) Do not ever open email attachments from someone you don't know - as it is a fact that most all viruses infect computers through email attachments. One should click on the attachment and delete the email immediately whenever you get an email from someone you do not know.
7.) Do not install programs off the Internet. The Internet is full of websites designed to trick you into downloading spyware and viruses. When you see random pop-ups from an Internet site asking you to install something, especially a ".exe" file - just say no.
8.) Don't forget to back up all your critical data - bills, banking or tax information, school work, email or other critical information on your computer. Create a weekly backup by using an external hard drive, a flash drive or subscribe to one of the many online backup services.
Traditional content security solutions are simply not fast enough to keep pace with the thousands of new attacks being created on an hourly, basis. But there are exciting new technologies that can assist consumers and enterprises alike in fighting the war against cybercrime.
Kristin Gabriel is a marketing professional working with Trend Micro Titanium Internet Security for Netbooks which uses cloud technology to automatically stop viruses and spyware before they reach your computer. Real-time updates keep PCs protected from the latest online threats. Using less than half the disk space and memory of traditional security products, Titanium is light on system resources so computers run faster. Visit: http:/www.trendmicro.com.
Let me explain. When the personal information of hundreds of thousands of individuals is compromised at companies such as ChoicePoint, LexisNexis or the DSW Shoe Warehouse, many people leap to the conclusion that lax computer or network security is to blame or that someone should develop a new technology or application that protects the data better.
At the heart of many “technical” attacks are poorly designed security practices or simple human error. In some cases, an attacker may gain access to a corporate database through the Internet, but that does not necessarily mean that the database or the Internet are to blame. They are just a medium or a tool. If the database was configured more securely or the network architecture built so that the database server was not reachable from the public Internet, there would not be a problem.
A recent trend for attackers gathering information they can use to breach potential targets is to use Google. Dubbed “Google hacking”, some are quick to blame the search engine technologies. If only the search engine didn’t catalog and index that data, or if only their search engine algorithm could somehow filter out the sensitive information. But, the true issue in most cases is that poor security practices or human error led to confidential or sensitive information being available on the Web where it shouldn’t be. The fault is with the company for leaving the data exposed, not with Google for indexing it.
It seems like there is always finger-pointing at technology as the crux of various security problems. On the other side of the coin are those who look to technology as the ultimate protector and savior of security and constantly strive to create a tool that will block, detect, filter or otherwise eradicate all of these concerns. But, unless we evolve to some futuristic world like you find in the Terminator or Matrix movies, none of those solutions can fix the single weakest link in the security chain, human beings.
It is certainly possible to create technology bandaids that try to protect us from ourselves, but as long as people are willing to share sensitive, personal information with strangers just because there may be a chance they could win theater tickets, the general state of security will continue pretty much as it is. A little education and an ounce of common sense will go much farther than snappiest of new whiz-bang security technologies could ever dream of.
Here are some technology things that you could do with your students. Not everything may be feasible (i.e. cost factors) or appropriate (i.e. security or privacy issues):
some of the things we're already doing,
some of the things we're thinking of doing, and,
some of the things are simply wishful thinking, but great ideas have to start somewhere...
How do you integrate technology into the curriculum? Do you have any ideas to add to the list?
Class Set of Laptops
Get a company to donate a class set of laptops when they upgrade their equipment. (The company can receive a charitable donation tax-credit.)
Set up a wi-fi hotspot in your classroom so that students can blog online during independent reading and writing workshops.
Purchase digital copies of textbooks to have a paperless classroom. Use text-reading software (i.e. Kurzweil) to highlight and take notes in the textbook.
Non-Traditional Reading and Writing
Teach students the differences between formal, informal, and colloquial language and explore text messaging, chat rooms, and msn-speak as forms of colloquial language.
Evaluate the evolving nature of language and develop word-attack skills by examining how words get accepted into everyday language (or the dictionary). For example, Google is now a commonly used noun and verb.
Use text-reading software (i.e. Kurzweil) to allow students to access difficult texts.
Blogging
Have students set up personal blogs as a medium to publish their writing portfolios.
Explore how Google is a popularity contest. Publish work in an e-zine article directory to understand how to build inbound links. Post comments on other blogs to build inbound links.
Explore copyright issues. Publish work in a blog or an e-zine article directory will inevitably end up with your work scraped onto another blog without proper attribution. Explore how that feels and the ethics of using other people's content without consent.
Computer Safety
Discuss cyber-bullying: ways to protect yourself, how to respond when it happens, and how to avoid accidentally cyber-bullying when blogging.
Explore computer safety: password strength, viruses, trojans, phishing, etc.
Learn about online dangers and ways to protect yourself.
Classroom Website
Make hand-outs and homework assignments accessible on a classroom website.
Use a secure website as a communication tool for marks for both parents and students.
Introduce your students to HTML and web design.
Making Money Online
Introduce students to the business of making money online.
Explore advertising online - how it works.
Fund raise by selling stuff on e-bay.
GPS and Mapping Technology
Geo-cache with your students.
Use GPS technology or mapping software (i.e. Google Earth) in math class to construct larger geometric shapes. (i.e. construct a circle that has a radius of 5 city blocks.)
Apply GPS technology or mapping software in Geography.
The Internet as a Global Village / Community
Find a class to pen-pal with and correspond using blogs, email, or IRC chat rooms.
Use a wiki for students to synthesize and evaluate knowledge gained in a content-subject like History or Geography. They can track how their understanding of concepts grow. Demonstrate how our understanding of a subject-specific topic evolves over time (i.e. a dynamic and digital KWL chart)
Publish student work in English and in their first language online so that relatives overseas can celebrate in their success.
Technology as a Teaching Tool
Use a data-projector in class to do modeled and shared readings.
Use a data-projector in class to do shared writing: the modern equivalent of flip-chart paper
Use dynamic geometry software (i.e. Geometer's Sketchpad) to explore math concepts.
Music and Technology
Buy songs (i.e. itunes) and allow students to DJ their own school dances.
Critically examine popular music to determine whether mainstream music is appropriate at a school dance (i.e. Soulja Boy - Crank that)
Create your own pod-casts. Students can use free sound-editing software (i.e. audacity) to mix in free sound effects (i.e. ljudo.com) with their digital recordings of their voices.
Class Projects
Send an object around the world and invite people who find the object to leave a message online in the classroom blog.
Explore the video making process: scripts, recording, editing, post-production
Explore youtube as a medium to publish content.
If you're ready to start a classroom blog, we're here to help at http://blog.classroomteacher.ca where you'll find this information and more detailed information about how to use technology in the classroom.
There is no doubt that technology affects most people who live anywhere other than third-world countries. It is difficult to go through a day without the need to put some type of technology to work. The most common and powerful piece of technology for most people is the personal computer that they use at home and at work. Because people and businesses are now so dependent on their computers, it is essential that they make sure to have effective antispyware software installed and running on their systems.
Like just every type of advancement made throughout time, there are associated positives and negatives. When it comes to the technological advancements that surround us today and which are so much a part of our lives, there is no difference.
In many ways, technology is a two edged sword, bringing about conveniences and expanding capabilities in ways many people had never dreamed of, yet at the same time bringing with it some alarming and numerous internet threats to every person who uses a computer to access the internet.
One thing that is quite effective at combating those insidious internet threat security trends that are so prevalent today is to use a robust and reliable antispyware software application. Of course, it is not enough just to install this kind of internet security software on your computer; it is also imperative that it is always updated and constantly scanning your system.
Any internet threat that is instigated by cyber criminals of the world is constantly changing in an effort to stay one step ahead of even the best antivirus and antispyware programs on the market. Because of this, it is imperative that you update your antispyware and other computer internet security software frequently.
These days, many of the top-of-the-line internet security suite software packages are designed to automatically check for updates and download them without any intervention from the computer user. This can all happen seamlessly in the background so that other work and important tasks are not interrupted, yet the internet safety software is always functioning at the best possible level.
The only requirement for these automated software updates to happen is for the computer to be running with the application running in the background or on a system level, and making sure that the computer is connected to the internet.
Most antispyware software packages will check for updates at least once a day. If an update is found, then the patch will be downloaded and the program will restart to make the new changes effective. Yet there is a program that offers the highest level of updates available today. The Kaspersky internet security program will update itself on an hourly basis, making it the program that is best able to respond to new threats more quickly, over any other safety application.
369 Niches Rolled Up Into 1 Product
Turn any hobby into a business. Discover
24 totally unique business models.
[http://businessmodels.netbizint.com.au/index.php]
There is no doubt that technology affects most people who live anywhere other than third-world countries. It is difficult to go through a day without the need to put some type of technology to work. The most common and powerful piece of technology for most people is the personal computer that they use at home and at work. Because people and businesses are now so dependent on their computers, it is essential that they make sure to have effective antispyware software installed and running on their systems.
Like just every type of advancement made throughout time, there are associated positives and negatives. When it comes to the technological advancements that surround us today and which are so much a part of our lives, there is no difference.
In many ways, technology is a two edged sword, bringing about conveniences and expanding capabilities in ways many people had never dreamed of, yet at the same time bringing with it some alarming and numerous internet threats to every person who uses a computer to access the internet.
One thing that is quite effective at combating those insidious internet threat security trends that are so prevalent today is to use a robust and reliable antispyware software application. Of course, it is not enough just to install this kind of internet security software on your computer; it is also imperative that it is always updated and constantly scanning your system.
Any internet threat that is instigated by cyber criminals of the world is constantly changing in an effort to stay one step ahead of even the best antivirus and antispyware programs on the market. Because of this, it is imperative that you update your antispyware and other computer internet security software frequently.
These days, many of the top-of-the-line internet security suite software packages are designed to automatically check for updates and download them without any intervention from the computer user. This can all happen seamlessly in the background so that other work and important tasks are not interrupted, yet the internet safety software is always functioning at the best possible level.
The only requirement for these automated software updates to happen is for the computer to be running with the application running in the background or on a system level, and making sure that the computer is connected to the internet.
Most antispyware software packages will check for updates at least once a day. If an update is found, then the patch will be downloaded and the program will restart to make the new changes effective. Yet there is a program that offers the highest level of updates available today. The Kaspersky internet security program will update itself on an hourly basis, making it the program that is best able to respond to new threats more quickly, over any other safety application.
369 Niches Rolled Up Into 1 Product
Turn any hobby into a business. Discover
24 totally unique business models.
[http://businessmodels.netbizint.com.au/index.php]
Titanium strength technology is a must for combating malware, malicious software that is hostile, intrusive, or annoying program code designed to infiltrate your computer system without your consent. It includes computer viruses, spyware, Trojan horses, worms, adware, rootkits, botnets, crimeware, and other unwanted software.
The US Federal Deposit Insurance Corporation says that malware involves organized Internet crime. In 2009, businesses lost $120 million in the third quarter to phishing and Trojan-based online banking scams. $25 million was lost by small businesses. Basically a cyber-criminal's objective is to make money from invading computers. There are less computer viruses or worms but we are seeing more phishing attacks and spam numbers are exploding with organized crime and more pieces of malware.
Although tracking browsing habits and advertising are part of the crimes, primarily these are targeted attacks that use computer systems for criminal activities. Anti-virus software has been retired in lieu of more savvy in-the-cloud technology geared to automatically stop viruses and spyware for complete Internet security.
In an annual report of the FBI-backed Internet Crime Complaint Center, Internet crime loss complaints in the United States have almost doubled in value from $265 million in 2008 to $560 million in 2009. The total dollar loss from all referred cases was $559.7 million with a median dollar loss of $575. At 65.4 percent, the U.S ranked highest for the number of perpetrators. These statistics are why Internet security and safety is critical today. The Center also reported that the unit handled 336,655 complaints in 2009.
The challenge is that malware works fast in stealth mode, and data-stealing malware can cause damage via one click which can compromise a company's reputation or personal confidential data.
Here are some basic guidelines for safe computing online:
1.) Always install Microsoft's critical updates - the monthly software updates designed to patch security vulnerabilities and threats. It is critical to install monthly updates from Microsoft.
2.) Make sure you have installed anti-virus/spyware/malware protection. Watch for cloud technology to automatically stop viruses and spyware before they reach your computer.
3.) Add a Firewall to block a hacker's attempts to access your computer. Windows XP, Windows Vista and Windows 7 all have firewalls which block and filter Internet traffic so harmful programs like viruses and spyware don't have access.
4.) Install Opera,Firefox, or Chrome as a second browser because most spyware and viruses target Internet Explorer. Often a virus is designed to keep Internet Explorer from accessing the Internet when a computer becomes infected with spyware.
5.) Always disable Java Script - viruses and spyware are using Java script to launch attacks so you should disable or at least change the browser setting to ask before running Java script.
6.) Do not ever open email attachments from someone you don't know - as it is a fact that most all viruses infect computers through email attachments. One should click on the attachment and delete the email immediately whenever you get an email from someone you do not know.
7.) Do not install programs off the Internet. The Internet is full of websites designed to trick you into downloading spyware and viruses. When you see random pop-ups from an Internet site asking you to install something, especially a ".exe" file - just say no.
8.) Don't forget to back up all your critical data - bills, banking or tax information, school work, email or other critical information on your computer. Create a weekly backup by using an external hard drive, a flash drive or subscribe to one of the many online backup services.
Traditional content security solutions are simply not fast enough to keep pace with the thousands of new attacks being created on an hourly, basis. But there are exciting new technologies that can assist consumers and enterprises alike in fighting the war against cybercrime.
Kristin Gabriel is a marketing professional working with Trend Micro Titanium Internet Security for Netbooks which uses cloud technology to automatically stop viruses and spyware before they reach your computer. Real-time updates keep PCs protected from the latest online threats. Using less than half the disk space and memory of traditional security products, Titanium is light on system resources so computers run faster. Visit: http:/www.trendmicro.com.
Here are some technology things that you could do with your students. Not everything may be feasible (i.e. cost factors) or appropriate (i.e. security or privacy issues):
some of the things we're already doing,
some of the things we're thinking of doing, and,
some of the things are simply wishful thinking, but great ideas have to start somewhere...
How do you integrate technology into the curriculum? Do you have any ideas to add to the list?
Class Set of Laptops
Get a company to donate a class set of laptops when they upgrade their equipment. (The company can receive a charitable donation tax-credit.)
Set up a wi-fi hotspot in your classroom so that students can blog online during independent reading and writing workshops.
Purchase digital copies of textbooks to have a paperless classroom. Use text-reading software (i.e. Kurzweil) to highlight and take notes in the textbook.
Non-Traditional Reading and Writing
Teach students the differences between formal, informal, and colloquial language and explore text messaging, chat rooms, and msn-speak as forms of colloquial language.
Evaluate the evolving nature of language and develop word-attack skills by examining how words get accepted into everyday language (or the dictionary). For example, Google is now a commonly used noun and verb.
Use text-reading software (i.e. Kurzweil) to allow students to access difficult texts.
Blogging
Have students set up personal blogs as a medium to publish their writing portfolios.
Explore how Google is a popularity contest. Publish work in an e-zine article directory to understand how to build inbound links. Post comments on other blogs to build inbound links.
Explore copyright issues. Publish work in a blog or an e-zine article directory will inevitably end up with your work scraped onto another blog without proper attribution. Explore how that feels and the ethics of using other people's content without consent.
Computer Safety
Discuss cyber-bullying: ways to protect yourself, how to respond when it happens, and how to avoid accidentally cyber-bullying when blogging.
Explore computer safety: password strength, viruses, trojans, phishing, etc.
Learn about online dangers and ways to protect yourself.
Classroom Website
Make hand-outs and homework assignments accessible on a classroom website.
Use a secure website as a communication tool for marks for both parents and students.
Introduce your students to HTML and web design.
Making Money Online
Introduce students to the business of making money online.
Explore advertising online - how it works.
Fund raise by selling stuff on e-bay.
GPS and Mapping Technology
Geo-cache with your students.
Use GPS technology or mapping software (i.e. Google Earth) in math class to construct larger geometric shapes. (i.e. construct a circle that has a radius of 5 city blocks.)
Apply GPS technology or mapping software in Geography.
The Internet as a Global Village / Community
Find a class to pen-pal with and correspond using blogs, email, or IRC chat rooms.
Use a wiki for students to synthesize and evaluate knowledge gained in a content-subject like History or Geography. They can track how their understanding of concepts grow. Demonstrate how our understanding of a subject-specific topic evolves over time (i.e. a dynamic and digital KWL chart)
Publish student work in English and in their first language online so that relatives overseas can celebrate in their success.
Technology as a Teaching Tool
Use a data-projector in class to do modeled and shared readings.
Use a data-projector in class to do shared writing: the modern equivalent of flip-chart paper
Use dynamic geometry software (i.e. Geometer's Sketchpad) to explore math concepts.
Music and Technology
Buy songs (i.e. itunes) and allow students to DJ their own school dances.
Critically examine popular music to determine whether mainstream music is appropriate at a school dance (i.e. Soulja Boy - Crank that)
Create your own pod-casts. Students can use free sound-editing software (i.e. audacity) to mix in free sound effects (i.e. ljudo.com) with their digital recordings of their voices.
Class Projects
Send an object around the world and invite people who find the object to leave a message online in the classroom blog.
Explore the video making process: scripts, recording, editing, post-production
Explore youtube as a medium to publish content.
If you're ready to start a classroom blog, we're here to help at http://blog.classroomteacher.ca where you'll find this information and more detailed information about how to use technology in the classroom.
Scientist Flemming is working in the field of atomic physics trying to understand elementary particle radiation. He has to measure data in nearly 200 thousand channels. Dr Galvin is working on atmospheric turbulence modeling trying to understand the phenomenon of global warming. Both these scientists generate more than 10 million gigabytes of data each year - which is equivalent to the storage capacity of about 20 million CDs and would require more than 70000 of today's fastest PC processors to analyze it all. Computing power as they have to handle will be several peta bytes of data! That is to say they need additional computing power for their research work at affordable cost. How to get additional computing power? Is there a way out? The answer is computer power grid (CPG) in analogy with electricity power grid.
The way out:
There are nearly 750 million PCs in the world. On average each PC is used for 10% of the time. Remaining time all the PCs are idling. This is a fact of under utilization of available computer power. Suppose we create an environment where we can cluster all the computers in the world and create wide area parallel and a distributed computing with necessary networking protocols. Such an infrastructure called 'Computer Power Grid'(CPG) will enable sharing, selection and aggregation of a wide variety of geographically distributed computational resources including storage systems, data sources etc. owned by different organizations for solving large scale resource intensive problems by researchers in science, engineering and commerce.
What exactly is Computer Power Grid?
Grid computing is a large scale networking methodology of distributed computing and virtualization of data resources such as processing, network band width and storage capacity. CPG grants its users seamless access to vast IT capabilities as though he is working with a single large virtual computer. Suppose we net work one lakh PCs, it will yield computing power of 200 CPU years/day. Such technology will be influencing the way we do research and transforming scientific, engineering, commerce and many more disciplines.
Brief History:
In 80's, one could link two computers through 'internet working protocol'. In 90's, hyper text protocol came into existence. WWW (World Wide Web) exploded. In 1995, concept of grid computing was introduced by Foster and Kesselman & Stevan Tuecke widely regarded as the fathers of the grid computing. They continued to develop this concept and for the first time, instrumental in integrating peer to peer computing and web-services to provide seamless access to remote mammoth computer power. Virtually, their protocols provide any computer the ability to peep into cyber space irrespective of location and avail resources from any nook and corner and use them for any power hungry application. With realization of CPG, organizations can optimize computing and data resources and pool them and share them judiciously with due regard to commercial viability.
What is challenge in CPG?
We know the resources which are to be put into Grid are geographically distributed across multiple administrative domains with varying availability, heterogeneity, diversity of use, varying cost, varying adaptability, etc. Managing such vast and variable resources and scheduling of purpose at viable cost constitute a complex task. Basically CPG involves three collaborative parties namely the Resources Owners, Resource customers and Resource distributors and who can join hands based on viable economic frame work with certain trade-offs. Each party has to work within certain demand-supply working model for best win-win results.
The future:
This 21st Century technology is going to alter the way we live. Already several excellent CPG's are in operation in the world. One such example is the teragrid of US National Foundation established at a cost of US $ 88 m has a computing power of 21 tfo/s. Several such computing grids will change the way the hospitals work, the way knowledge resources utilized, the way the educational institutions and so on combined with availability of access from anywhere to every where. The application of CPGs is limitless. Even situations like Bhopal Chemical spill can be handled much better way through CPG by instant exchange of vital information like traffic of vehicles, direction of wind, availability of hospitals, security and safety etc. which is beyond the scope of present day internet.
Future research in any branch of science, engineering or commerce will be done in virtual laboratories in which researchers will work in collaboration without regard to their physical location as well as resources location at much lower research cost. Already heavy weights like IBM, Sun Micro, Microsoft are in fray to establish CPG's for various applications. So with CPG evolving into multi billion industry World is going to be transformed for better, impacting every aspect of human living.
Additional details on this topic can be seen at http://www.2100science.com/Videos/Grid_Computing.aspx. Author is Director, Naval Science and Technological Laboratory, DRDO, Visakhapatnam, 530027, India