Thursday 30 October 2014

Terminal Services and Remote Administration

By Raul Bernardino


The Overview
By using a terminal service, a client can appear to run Windows Server 2003 locally. All the processing power is done by the server. Windows XP and Windows Server 2003 have a feature called “Remote Desktop” which will allow you to connect remotely to the computer and logon as if you are sat at the machine.  Although Windows Server 2003 can be administered remotely by using an MMC or a Web Administration Interface it is still handy and necessary to be able to physically logon to the server to perform specific tasks.

Windows XP and Windows Server 2003 have a feature called “Remote Desktop” which will allow you to connect remotely to the computer and logon as if you are sat at the machine.
Once connected you will see the desktop as it is on the server and you will be able to work as if you were physically located at the machine.
You can disconnect from the session at any time and reconnect to the same session, continuing where you left of.
Using Windows XP’s fast user switching you can easily transfer your desktop to another machine, e.g. to ask for assistance or to show a file on your desktop.
Remote Desktop on Windows Server 2003 will allow two concurrent connections and doesn’t require any special licenses.
Remote desktop can be further extended by enabling terminal services.
By using terminal services, a client can appear to run Windows Server 2003 locally. All the processing power is done by the server.  The server receives keyboard and mouse requests from the clients (terminals) and transmits the display back. Only one copy of Windows Server 2003 is required.
Rather than installing a full version of Windows on every client, a Windows terminal server can be deployed instead.  Clients whose hardware might not be supported by Windows can still take advantage of the Windows Server 2003 features.
Clients can continue to use their old operating system and benefit from the features and applications from Windows Server 2003.  Many different devices can act as terminal clients (called thin clients). E.g. a Windows 3.11 machine can run terminal services client and appear to be running Windows Server 2003.  Although the client terminals can be very low-end machines with no hard-drive and no operating system, the clients will still need client software to run terminal services.  Terminal Services is also a good way to run applications such as Microsoft Office on incompatible clients.  N.B. Once a server is installed with Terminal Services, applications MUST be installed by using Add/Remove Programs from the Control Panel.
Remote Administration

Unlike Remote Desktop, Terminal Services requires licenses. However Terminal Services allows a lot more clients to connect and enables the use of application sharing. Terminal Services can only be enabled on a machine running Windows Server 2003.
Terminal Services Overview
Using Terminal Services, users can log in multiple times to the same server using different sessions. This allows users to perform many tasks at once.  Users can easily cut and paste between applications running locally and applications running on the Terminal Server.
Using Remote Control, two users can use the same terminal session, in other words one user can control and view another user’s session. This can be used to train users or diagnose problems.  Printers that are connected locally to the client will continue to work from a terminal session. Terminal Services and Remote Desktop use the RDP (Remote Desktop Protocol) v5.2.
A terminal session can be disconnected and reconnected at a later time from another client. The session will effectively remain active until logged off or closed by the server.
The logon process is also encrypted and such things as the number of logon attempts can be controlled through security policies. Data transmitted between the client and server can also be encrypted at four different levels (low, compatible, FIPS compliant or high).
User Accounts created locally on the terminal server or in Active Directory can be used with terminal services.
Terminal Services Requirements
The hardware requirements for a Terminal Server depend upon on how many clients will be connecting and what the clients will be doing once connected.  A Terminal Server requires at least the recommended Windows Server 2003 requirements plus an additional 10Mb RAM for each client connecting.  All though not a requirement, using SCSI disk drives can greatly improve performance. You could also use high-performance bus architecture such as EISA or PCI.  Since many clients will be connecting simultaneously, using a high performance network card will help. You could also install two adapters and dedicate one adapter solely to the RDP protocol.  When running Terminal Services, ensure that only 32-bit applications are used.  In order to run 16-bit applications, Windows uses an emulation service called Windows-on-Windows (WOW), which consumes a lot of system resources. Because 16-bit applications will take up more system resources than 32-bit applications it’s better to use solely 32-bit applications. Terminal Services client runs on a variety of machines. They must support VGA and have at least 4MB of memory. Terminal Services client is available to Windows-based terminals and Intel & Alpha based computers running Windows for Workgroups 3.11, 95, 98, NT 3.51, NT 4.0 2000, XP and 2003. There is also third-party support for Macintosh and UNIX-based computers.
Terminal Services Licenses
Terminal Services has its own licensing method. A Terminal Client must have a valid license when connecting to a Terminal Server.  Either a Windows 2003 Terminal Services Client Access License or a Windows Server 2003 license is required as well as a Client Access License (CAL). Windows 2003 machines that are used as clients already have a Terminal Services Client Access License.  You can use Terminal Services for 90 days before you need to install Terminal Services Licensing and activate them.  N.B. Even after 90 days you will still be able to use Remote Desktop and Remote Assistance connections.
Reference list:

TechNet (N:N) How Terminal Services Works [Online]. Available from:  http://technet.microsoft.com/en-us/library/cc755399(v=ws.10).aspx#w2k3tr_ts_how_kqhp(Accessed: 31 October 2014)


Wiki (N:N) Remote Desktop Services [Online]. Available from:http://en.wikipedia.org/wiki/Remote_Desktop_Services (Accessed: 31 October 2014)

Transmission Control Protocol/Internet Protocol (TCP/IP)

By Raul Bernardino


Introduction:
All communication occurs on any type of networks and all involved parties must use a common language. In the Information Technology (IT) networks, this is known as a protocol.  There are many different protocols that are available for computer networks. The most common and widely used being TCP/IP.
TCP/IP is the standard protocol that is being used on the internet whereas allows any network to access the internet and therefore you must use the TCP/IP protocol suite. In other hand an Active Directory required CP/IP. For that reason, TCP/IP is developed and as a default protocol starting from Windows XP and server 2003.
Protocols
This protocols reference is often made to the TCP/IP stack. This consists of layers of mini applications which are performing the discrete job of sorting and filtering the data packets picked up by the Network Information Center (NIC) and then passing the packet on to the next layer for further processing. Eventually a coherent message pops out of the top of the stack into the operating system for the user to read. The reverse is also true i.e. converting of the reply into data packets that can be sent over the network media.
The layers in a TCP/IP stack write headers for network messages as well as decoding them.  Each level in the stack adds a portion to the network packet which its counterpart in the receiving computer will understand.  Strictly speaking, the NIC isn’t part of TCP/IP, but protocols are bound to a particular adapter.
At the receiving computer, the headers are stripped off as they pass up through the TCP/IP stack until only the bare payload is presented to the user.
The DOD Four Layer Model

TCP/IP is often referred to as the TCP/IP protocol suite. TCP/IP is in fact a group of protocols/applications working together to provide network communication. TCP/IP was invented by the US Department of Defense (DOD) to allow machines to communicate over a network. It is a simpler model than the 7 layer OSI model.  The different components of TCP/IP all function at different layers. These layers group the different components into four different categories.
The Application Layer
The application layer contains the applications that use TCP/IP such as Internet Explorer, chrome, safari, Netscape, and Outlook.  The application layer also contains Application Programming Interfaces (API) such as Winsock, which enables applications to use TCP/IP.
The Transport Layer
The transport layer is responsible for the transfer of data on the network.  There are two different transport protocols TCP and UDP. Both protocols provide transport but it works in different ways.
Transmission Control Protocol (TCP)
TCP is a connection-orientated protocol. Both sides (end to end) confirm that the data is being sent and received.
User Datagram Protocol (UDP)
UDP is a connectionless-orientated Protocol. Both computers presume the other side has received the data.  As an example, name resolution uses UDP. If the query fails then a TCP name query is made.
The Internet Layer
To send data the sender must have a method of distinguishing the recipient. This is called an IP address and they take the form of a unique number on the network. The Internet Protocol is responsible for these addresses.  The Internet Control Messaging Protocol (ICMP) is used to test connectivity between machines by sending ICMP messages using the PING command.  The Internet Group Messaging Protocol (IGMP) is used to send data to groups of machines, e.g. Streaming Video. This is known as Multicast.  The Address Resolution Protocol (ARP) is responsible for changing an IP address into the network card’s physical address. Every network card has a unique physical address hardwired into the card itself which is needed for communication on a network.
The Physical Layer
The physical layer is responsible for the actual physical media and how the data is sent to another machine, e.g. Fibre Optic, ATM.  There are many ways to send data down the cable, the most common technologies for LANs are Token Ring and Ethernet. In order for two machines to communicate they must be using the same technology or be connected via a bridge.
Reference list:
Wiki, (n:n) Network Interface Controller, [On-line]. Available from:http://en.wikipedia.org/wiki/Network_interface_controller(Accessed: 20 October 2014)

Identity and Access Management (IAM)

By Raul Bernardino

Introduction:

Identity and Access Management (IAM) is a framework which is consisting of the technical, policy, and governance components or a framework for business processes that facilitates the management of the electronic identities. The framework is including technology and to support management of the identities. This framework can allow an organization to:

·     identify individuals
·     link identities with rolesresponsibilities and affiliations
·     assign privilegesaccess, and entitlements based on identity and associations

This IAM is certifying data stewards and service providers to control access to the information and/or services, according to an individual's identity, roles and responsibilities.

IAM is covered of four main areas as follows:
·     Credential (assignment of an unique token to an entity needing access to resources)
·     Authentication (act of validating proof of identity)
·     Authorization (act of affording access to only appropriate resources and functions)
·     Accountability (ensuring against illegitimate utilization of an entity’s authority…flows from the first 3 functions)

Below is IAM diagram:

Mosaic Integration
The inclination of individual project teams to address integration concerns on a case-by-case basis is natural. The effort involved in many “one-off”, or “point-to-point”, integration scenarios may seem trivial at first, especially when compared to the effort involved in defining and managing an integration infrastructure (after all,

I can set-up that FTP transfer in a couple lines of Perl (or PHP, or whatever)). Only when looking at the “big picture” can we truly appreciate what a tangled mess these “point-to-point” integrations engender. The metadata concerning “what's connecting to what”, the inconsistent security models, and the tight-coupling of service interfaces with implementations, all contribute to the sort of “brittle” environments discussed above.

Developing a coherent integration infrastructure must be a collaborative effort. In order for this collaboration to be productive, recognition and respect of roles, expertise and “spheres of influence” must be maintained. The SIA team recognizes that the technical leads of the various Mosaic Project initiatives will be responsible for identifying integration concerns, application and business-driven technical requirements. These may include, but are not limited to:
·        data consistency and periodicity of synchronization
·        specification of integration points
·        definition of service interfaces/business objects
·        definition of technical capabilities/limitations within the application environment (e.g., the ability to expose a service via SOAP)

The value that the SIA team brings to the Mosaic project lies in the definition of the infrastructural framework, integration patterns, governance and best practices which can be applied to the aforementioned concerns and requirements. The recognition and support of this “domain expertise” on the part of the Mosaic project teams will be paramount in developing and maintaining a “cross-initiative” integration perspective—substantially reducing the likelihood of falling into the traditional traps of point-to-point integration while bolstering the potential for standardization, optimization and reuse of integration resources.

References List:
Rouse M. (n:n:), Identity Management (ID management), [On-line]. Available from: http://searchunifiedcommunications.techtarget.com/definition/identity-management (Accessed: 13 October 2014)
AN. (11-12 April 2011), Requirements for a Global Identity Management Service, [On-line]. Available from:  http://www.w3.org/2001/03/WSWS-popa/paper57 (Accessed: 13 October 2014)





Saturday 16 August 2014

The use of an Internet for the Educational Research, Social Business and Government

By Raul Bernardino, MSc ISM

Abstract:
Internet is a public domain and very interactive media whereas enable whole world to connect. Where each individuals, communities, intellectuals, independent personality around the globe are expressed their own opinions, ideas, entertainments, innovations, etc. In other hands, the individuals or group of people are utilizing that information or even collecting that information and interpret them according to their perceptions.  Internet also called a cyberspace or a virtual media.
As it is a public domain and it is intended for public consumption and public sharing. With the internet people are exposing and telling to the listeners or to the readers about their own ideas, histories, cultures, and it is also including the existing of themselves for intervening and to convince others to follow their own paths or ideas or even just spreading an information. The information or the fact of materials such as videos, pictures, and voice records can be also disclosed by someone about some interesting news or histories that are most important according to him or her in which is to let the rest of the world to know.
Since these information are publicly available and these can be accessed worldwide by and millions people at anytime and anywhere. As it is a public domain, there would be a good and bad personalities are involved. Therefore, it will be given a positive an a negative impacts to the society. However, final decisions are totally depends on the recipients or listeners cultures and knowledge’s, either those collection are accepted or rejected.
It is important for the rule governments to have a law and regulation in order to minimize the negative impacts to the society. We also understand that, the governments may have their own limitation with the geographically boundaries of the other nations law enforcement and it is because the nature of the cyberspace itself which has no geographically boundaries.
It’s quite risk for the academicals writers and student whereas uses the internet information as base for their own thesis or dissertation without have deep understanding on the mater.
Moreover, the internet technology can help companies to determine their own customer needs and create new products and brands but it’s also with time compression over technology disruption in the businesses and industries.

Introduction:
Internet is publicly accessible computer network which is connecting many smaller networks, computers or palm devices from around the world.
Internet means connecting a computer to any other computer from anywhere and at anytime in the world through a router and server. When computers are connected over the Internet, they can easily access all kind of information such as graphic, text, voice, and videos but also can be a victim of using the internet.
No one owns the Internet. It is a public domain and every individual, group, organizations or any society can express themselves and also able to collect an intended information. Internet has no boarder. On the internet, information can be traveled from one country to other countries without have any rules and controls.
Although several organizations around the world are collaborating to ensure the development and the functioning of the internet are publically available for public consumption.  They are telecom companies, ISPs, and data centers.
Several organizations are creating an exclusivity of the information that only visible to their staff and it owns branches. This information share over technology is called intranet. Moreover, we can also found that organization A and B agreed to share their information among themselves which is called extranet. The Intranet and Extranet cannot be accessed over public domain internet unless who have register and have access permissions. It’s only available in closed networks.

The Internet History:
The internet is grew out of a U.S. Defense Department program called ARPANET (Advanced Research Projects Agency Network), which is established in 1960s and later in 1969 with connections between computers at the University of California at Los Angeles, Stanford Research Institute, the University of California-Santa Barbara, and the University of Utah.
The purpose of the ARPANET was to conduct research into computer networking in order to provide a secure and survivable communications system in case of war. As the network quickly expanded, academics and researchers in other fields began to use it as well.
Moreover, in 1971 the first program for sending Electronic-Mail over a distributed network was developed
By 1973, the year international connections to ARPANET were made (from Britain and Norway), where e-mail represented most of the traffic on ARPANET. The 1970s also saw the development of mailing lists, newsgroup and bulletin-board system, and the TCP/IP communications Protocols, which were adopted as standard protocols for ARPANET in 1982–1983, leading to the widespread use of the term Internet. In 1984 the Domain name addressing system was introduced.
In 1986 the National Science Foundation established the NSFNET, a distributed network of networks capable of handling far greater traffic, and within a year more than 10,000 hosts were connected to the Internet.
In 1988 real-time conversation over the network became possible with the development of Internet Relay Chat protocols. In 1990 ARPANET ceased to exist, leaving behind the NSFNET, and the first commercial dial-up access to the Internet became available.
In 1991 the World Wide Web was released to the public. The Mosaic browser was released in 1993, and its popularity of the World Wide Web sites and users. Furthermore, in 1995 the NSFNET reverted to the role of a research network, leaving Internet traffic to be routed through network providers rather than NSF supercomputers.
In that year the Web became the most popular part of the Internet, surpassing the FTP protocols in traffic volume. The fact that in 1997 there were more than 10 million hosts on the Internet and more than 1 million registered domain names. Internet access can now be gained via radio signals, cable-television lines, satellites, and fibre-optic connections, though most traffic still uses a part of the public telecommunications (telephone) network. The Internet is widely regarded as a development of vast significance that will affect nearly every aspect of human culture and commerce in ways still only softly visible.
The Use internet for Educational Research:
Since internet is a public domain and no one guaranty and responsible of what are being wrote or spread. It may be an obsolete knowledge or information, or it is partially tested information or it is uncompleted information. Therefore, it is higher risk to consume internet information as base for academicals writing. Especial the information whereas is spread over the anonymous sites.
Although there were anonymous and uncompleted sites, we can found millions of popular journals, economic magazines, and bulletins such as New York Post, Strait times, Washington post, universities libraries etc.
All internet users have a high regard for the internet as a source of information, but the characteristic shows men look for a broader range of information online than women do.
According PewReserach report Internet project (2000), nearly all internet users, 91%, agreed that the internet is a good source of information for everyday interests like news, weather reports, and sports scores.
In Pewresearch shows that about 80% of both men and women also expect to find information online about more specialized topics of government issues and health or medical issues. The same number also say they expect to find information on particular products they want to purchase, although this includes more men, 82%, than women, 77%. About a third of internet users say they expect to find reliable information online about individuals.
Moreover Pewresearch (2000), asked users about the kinds of information they look for online. Men and women are equally likely to get travel information and to look up phone numbers and addresses. They also look for information about the government, about colleges, jobs, and places to live.
 For instance, the student is writing about free speech, “President Barak Obama reacted to the censorship of the government of the Egyptian. He stated “free speech is Human Right”. Furthermore, he stated "the people of Egypt have rights that are universal. That includes the right to peaceful assembly and association, the right to free speech, and the ability to determine their own destiny."  This is an idea of freedom of the speech to give a high value of the democracy. President Barak Obama tried to convince President Hosni Mubarak where protestors or people of Egyptian have absolute right to speak up and tell the truth of their problems that are not resolved by its own country.” This information quoted on January 28, 2011. The news above may be still new for the certain community or society but it is also obsoleted to the other societies. 

Social business Over Internet Technology:
Again the characteristic online transactions shows man do more than women, including some with less predictable or controlled outcomes.
It is about 75% of internet users believe that the internet offers them a good way to conduct their everyday business like banking or buying tickets etc.
The PewResearch  Internet Project has been tracking users’ participation in more than a dozen kinds of online transactions found that Men and women are about equally likely to go online to do many of these: to buy products, as well as everyday items like groceries, food, and household items and prescriptions; to make travel arrangements or to purchase tickets; to do their banking; and to donate to charities.
For online shopping, both men and women cite convenience and time savings as major reasons to like shopping online. Further, more men than women value cost savings, and more women than men appreciate the chance to find unusual gifts.

Government over Internet Technology:
The digital information enables you and your community to discuss and prioritize issues, then challenges our member of the government and parliament to respond. The positive aspects of using this digital technology are bringing global communities to your own desk and start to share and help one another with knowledge and best practices. It brings an effective and efficiency solution to the problems that you normally experience.
The digital technology also brings us some negatives aspect of it. It is a free place to express and interact. Technology helps to bring multi culture to interact and it might create a culture shock. Whereas, the use of social media for free expressing, - not use a common sense or constructive critiques anymore but use of threatening, negative arguments, offensive words, etc.

Conclusion:
Internet is public domain and unsecure. The academicals researchers use universities library, journal, and accredited sites as base for their research. Nowadays businesses are change the way of doing business; they become technology evangelist. The government needs to collaborate with the society and regulate information flows.
 
Reference list:
An Encyclopedia Britannica Company-Merriam Webster (n:n) First Known of Internet [On-line].Available from: http://www.merriam-webster.com/dictionary/internet  (Accessed: 13 August 2014)
Eugene Volokh(n:n) Freedom of Speech in Cyberspace from the Listener's Perspective: Private Speech Restrictions, Libel, State Action, Harassment, and Sex  [On-line].Available from:   http://www2.law.ucla.edu/volokh/listener.htm (Accessed Date: February12, 2011) 

Fallows, D. (2005) HOW WOMEN AND MEN USE THE INTERNET[On-line]. Available from: http://www.pewinternet.org/2005/12/28/part-5-functions-of-the-internet-how-men-and-women-use-it-as-a-tool-to-communicate-transact-get-information-and-entertain-themselves/ (Accessed: 14 August 2014)

Internet (n:n) [On-line].Available from:  http://www.businessdictionary.com/definition/internet.html (Accessed: 13 August 2014)
Negative effect of the internet [On-line]. Available from:   http://www.helium.com/items/790966-negative-effects-of-the-internet (Accessed Date: February12, 2011)

WEISER, E.B. (2000) THE FUNCTIONS OF INTERNET USE AND THEIR SOCIAL, PSYCHOLOGICAL, AND INTERPERSONAL CONSEQUENCES, [On-line]. Available from: http://www.ncbi.nlm.nih.gov/pubmed/11800180 (Accessed: 14 August 2014)



Wednesday 16 July 2014

Computing Capability and Connectivity’s

By Raul Bernardino
Introduction:
Nowadays computing technology perspectives are to help and fulfill human society needs. Either, they are from professional’s institution of the computing or from software developers industries, they should understand the grass root problems or issues that society that current faced, the society’s trends of using the technologies, the organizations business operations, and other entities needs. These all will enable industries to develop applications and design proper technologies as an interface for helping society.
The application system has to be effective, efficient, reliable, given the accuracy of the measurements, and easy to use or operate in the daily operation. It is also including the safety of the system configurations, friendly environment system, and in line with the norms, society cultures, and the ethicals.
Some of the computing capabilities are able to track down human movement by using data communication over mobile phones, and currency of uses, and it’s including an immigration data. The researchers are tracking at list hundred thousand of people over last six months, etc.
The storage data capability:
In the early computing technology, the capacities of the computing data storages are from 20 Mb to 40 Mb of the IBM personal computer (PC) hard disks and the floppy disks are from 512 Kb to 1.4 Mb. The evolution of the technology and the demands of have the big storages to archive data on disks become a priority to develop furthermore. Therefore, today storage capacity becomes Giga byte, Terra bytes, and Peta bytes.
The purpose of having storage data is to enable retrieving the data whenever it is needed, such to modify the current data, to print for hard copy signed, to manipulate the data, to have the data for decision making process, for the meeting purposes, for sharing data, and etc. Further development of the data storage in globalization era is a data center and the cloud computing. Another relevant question of the data storage as follows:
How much data to be archive? How much data are relevant to the inclusive decision making processes? What data is relevant for the meeting? And so on so for.

The Memory capability:
The term "memory" is often associated with addressable semiconductor memory, i.e. integrated circuits consisting of silicon-based transistors, used for example as primary memory but also other purposes in computers and other digital electronic devices. There are two main types of semiconductor memory: volatile and non-volatile. Examples of non-volatile memory are flash memory (sometimes used as secondary, sometimes primary computer memory) and ROM/PROM/EPROM/EEPROM memory (used for firmware such as boot programs). Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU cache memory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower memory capacity per area unit than DRAM).
The speed capability:
The speed in the computing technology is an essential part of the system configuration. The processors of the computing have to be fastest. For instance all Integrated Circuit(IC) of processors are on the nanosecond (10-9). This will allow processing multiple applications over the computing system faster. For instance: to process the documents over Microsoft word, Excels and power points.  The Microsoft has template to speed up the power design, made auto calculation on excel sheet, modified existing documents, printing existing document for the meeting , and etc. Here the efficient and effective, including the reliable are the measurement for the speed. If we compare to the old function of type write, we will find difficult in preparing the document. It will be time consuming and not effective.     
The capability of connection:
Today globalization needs lot of communication infrastructures in order to make a link from very isolate societies or communities or remote area to communicate with the cities and metropolitans communities or urban areas. The internet network has made lot of contributions to the world society or communities. The connectivity’s has shared the valuable information and knowledge across the countries without a limitation. People can easily interact with the partners around the world. The digital enable people to learn faster than the day before. People have to go to the class, people have to travel far or across to the country to get the information, and etc. Nowadays, it is not an issue anymore. We can have virtual classes, as on-line study, deliver courses and meeting via videoconferencing and audio conferences and etc.    

The access capability:
The accessibility and reliability of the information or data over computing and networks are becoming one of the computing capability measurements. Today’s global computing access becomes a concern to everyone. Therefore computing access has to be managed in order to be able to monitor and manage the performance of the computer itself. The user has to have the accounts and give the privileges to each of them in order to minimized the risk of data confidentiality, protect privacy, allow public share knowledge, and etc.
The fast calculations result capability:
This computing capability makes human been easy to determining decision such as calculating large and complex of issue in Math in excel. For instance: calculating population growth prediction in the statistic models, weather-forecasting, navigating airplane, and etc.
Beside the capability of computing there is relationship with human being activities or issues such as:
The privacy issues:
Nowadays the global communication such internets and social networks communication are publically available even in very remote area that has mobile signal coverage. This is bringing an issue of the privacy.
The right to privacy in Internet activity is a serious issue facing society.” Walton T.J. (2000)
“…yet on other occasions society questions the state of their privacy, becoming insecure and untrusting with respect to technology.” Robinson, P., Vogt, H., and Wagealla,W. (2005, p.2.)

The ownership:
It’s also very difficult today in determining the ownership of the information or data the internet or in the social networks. It is appear to be anonymous. However in the universities and academics are still looking for protecting the copy rights, such as intellectual copy rights. In other end people intend to have a PIN to secure their assets.

The control:
In order to have full control of things that we have, we have to start to control the connection from our own computer or electronic device; it is including controlling the accessibility of the information or data that we have stored into the technology media. Nowadays, the hacker and crackers are very active in looking for the possibilities such back doors, phishing, and etc., in order to control your machines that have attached wide area network.  Some e.g. is DNS poisoning.

The accuracy:
The global connectivity’s has allowed us to reach and gets right information that we needs in matter of the second. Lot of the internet information has not had preapproval examined from the institutions such university or from the producers. For instance:  We had several issues computer driver that we bought. First we have to consult with the support sited from the producer in order to get the right version of the drivers that we are looking for. We can also ‘Google’ it, in order to get the same information; however its most probably to direct us to other sites that may not solve the problems.
The security:
The security topics are hot issue in today business. The organizations that intend to protect their own information or data is busy investigating solutions for their security requirements. It is including the copyrights and privacies. One of the classic examples is your house. The stranger people can’t enter you house unless you are the one open the door for this stranger. Your door key is your “security key”. So don’t share it to the stranger people.
The global communication and connectivity’s has forced the organizations, companies, and other institutions, to have the information technology policies. This policy is to ensure the security, privacy, and operability of the computing technology in their daily business locations. It is also including establishing the IT standards for the organization and the most important is that the policy is in line with the business need.  It is also need to have IT Master Level Agreement and Server Level Agreement in the organization.
 References:
Adams, A.A. & McCrindle, R.J. (2008) Pandora’s box: Social and professional
issues of the information age. West Sussex, England: John Wiley & Sons, Ltd.
Hall, P. A.V. & Fernandez-Ramil, J. (2007) Managing the Software Enterprise:
Software Engineering and Information Systems in Context. London: Thomson Learning.
Maths Fast Calculation Software Freeware, [Online]. Available from:
Robinson,P.  Vogt,H.  and Wagealla,W., (2005), Privacy, Security and
Trust within the Context of Pervasive Computing, Springer Science + Business Media, Inc. , [Online]. Available from: http://books.google.com.sg/books?id=ya6tY8Mz9OYC&pg=PA23&dq=privacy+in+the+computing&hl=en&ei=HlotTeyoKYaycMav4PAH&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDQQ6AEwAg#v=onepage&q&f=true (Accessed:  16 July 2014)
Stensland, D. and Humanitech(d:d): Merging Humanity with Technology,
[Online]. Available from: http://www.cc.gatech.edu/features/merging-humanity-with-technology (Accessed:  16 July 2016)

Technology On Way To Forecasting Humanity's Needs, [Online]. Available from:

Walton,T.J., (2000), Internet Privacy Law, [Online]. Available from:
Wikis (A.N.) Computer Memory, [Online]. Available from:
          http://en.wikipedia.org/wiki/Computer_memory (Accessed:  16 July 2014)