In the day of mobile devices, increasing your personal safety is easier
than ever before. What creates situations of danger for anyone traveling
alone is being cut off from other people that can help you. So, if you
have a mobile smartphone, then you can make sure that you are connected
with others at all time. Additionally, devices like smartphones and
tablets offer important tools that can further improve your personal
safety – like apps that make loud noises or very bright flashes of light
(or both).
http://www.makeuseof.com/tag/dont-be-a-victim-your-smartphone-as-a-personal-safety-device/?utm_campaign=newsletter&utm_source=2012-03-01

This blog has been created to complement the web site www.aitwa.com Both the blog and the web site exist to help students taking the Applied Information Technology WACE course at stage 2 & 3. If you are a teacher, or a student, involved in this course, please use this blog to add comments, ask questions or share insights.
Monday, March 4, 2013
Thursday, February 28, 2013
Tuesday, February 19, 2013
Watch Harvard Lectures
Follow this link to watch lectures from Harvard University;
http://freevideolectures.com/Course/2648/Understanding-Computers-and-the-Internet
http://freevideolectures.com/Course/2648/Understanding-Computers-and-the-Internet
Tuesday, October 9, 2012
5 Common Security Mistakes That Can Put Your Privacy & Money At Risk

How vulnerable are you? Ask any person who’s been robbed if it came as a surprise – I guarantee you it did. As the saying goes, the thief always comes in the night when you’re sleeping, when you’re least prepared. But even when you’re awake, you might be passively committing security mistakes, thus inviting hackers and crackers to fiddle with your things.
Privacy and money are arguably the two most important things when it comes to the whole concept of security. We all want to protect our identities, our privacies, and definitely our financials. No one looks forward to the day when they check their bank statements and sees nothing but zeroes – or even worse, negatives.
Here are some of the most common security mistakes that are committed by computer users all over the world. Neglecting any of these will open you up to a world of vulnerability and put you only one or two steps away from identity theft, malware infections, or worse.
Mistake #1: Not Updating Anti-Malware
This is one of the most prevalent security tips out there: install anti-malware software and keep it updated! Yet as widespread as it is, people still ignore it. If you’re reading this and you don’t have an anti-virus or anti-malware program setup, go and do it now! There are plenty of top-quality FREE anti-malware programs out there. I personally use Advanced SystemCare and MalwareBytes.But just having one isn’t enough. You have to keep it updated – not just the program itself, but also the database of potential threats. Most programs have the option for automatically updating on a schedule or whenever you open the program. Keep them up-to-date or else they won’t keep you protected against the latest and greatest threats.
Mistake #2: Not Using A Firewall

Few are the people who use anti-malware software. Fewer are the people who use both anti-malware and a firewall. “Do I need to use both?” you might ask, and the answer is a resounding, “YES!” Anti-malware and firewalls are not the same things. They fulfill two different purposes, thus you will need both to keep yourself as secure as possible.
Think of a firewall as like a fence whereas anti-malware software is more like a shotgun. The fence is a general-purpose protective barrier that keeps out most unwanted intruders. However, your fence will occasionally have holes that allow entry by certain thieves. The fence does a lot of the work, but the shotgun comes in handy when the fence is breached.
In the same way, a firewall will keep out most malicious intentions. However, when a particular virus or Trojan makes it through and onto your computer, that’s when the anti-malware program comes in to clean up the mess.
Mistake #3: Unsafe Email Habits
After so many years, after the introduction of blogs, instant messaging, social networking, and everything else, email is still one of the most popular ways to communicate over the Internet. It’s also one of the most frequent ways in which users fall into the hands of scammers. Losing your identity because of a sneaky email can be devastating.Beware of phishing scams. Learn how to identify them and learn to avoid them like an angry swarm of wasps. If you receive an unsolicited email that seems sketchy, do not open it. Do not respond to it. Send it straight to the trash bin. But how will you identify a phishing scam? Look for fake phone numbers and addresses. Multiple spelling or grammar issues are often a dead giveaway, too. And if you don’t recognize the sender, always assume it’s spam.
There are lots of other email procedures you should observe to maximize your security. Here are 7 important email security tips you should know. Otherwise, just stay alert and keep an eye out for fishy emails (no pun intended).
Mistake #4: Universal & Stagnant Passwords

Password security can be tricky. Not because it’s difficult to find a strong password – which can be generated for free using any number of online password generators – but because password security is inconvenient. When I type in my password to log onto Facebook, I’m not thinking about how secure my password is. I’m thinking about what I’m going to say to my friend.
And in the interest of convenience, we tend to use the same password over and over again. My Gmail password becomes my Facebook password, which also becomes my forum password, and so on. But the problem here is that if anyone discovers your singular password, they can use it to unlock the rest of your accounts. Bad idea.
The solution, then, is to use different passwords for different accounts. But don’t stop there! Once a year, you should also change your passwords to something new.
Mistake #5: Giving Away Personal Information

Have you ever seen a sitcom or a comedy movie where someone accidentally lets slip an important piece of information? On the big screen, it might be funny, but it’s a pain in the butt when it happens in real life–and it doesn’t always happen in idle conversation.
In the world of video games, a vast majority of the perpetrators for hacked accounts are close friends or relatives of the account holder. You give your password to them so they can play on your account, then they stab you in the back and steal it. This could happen with Gmail, Facebook, or any other account that you share.
Or you might accidentally show your credit card number or social security number to someone. You might think it’s okay since that person is your friend, but you can never be too sure.
The best policy is this – if you don’t want the whole world to know about it, it’s best to keep it to yourself. That applies to passwords, PIN numbers, SSN numbers, CC numbers, home addresses, and anything else that could count as personal information. Keep your guard up.
Each and every one of the security mistakes listed in this article has the potential to really screw up your life. Sure, maybe you’ve shared your account with someone before or you’ve been using the same password for ten years and nothing bad has happened to you. Great! I’m glad that you’ve been so fortunate. But there are times when I’ve left my front door unlocked and I haven’t been robbed–that doesn’t mean it was a smart move.
Avoid making these mistakes and your personal security will be much stronger. You owe it to yourself. Stay safe and stay alert.
Original Article: http://www.makeuseof.com/tag/5-common-security-mistakes-put-privacy-money-risk/
Image Credits: Panic Button Via Shutterstock, Firewall Via Shutterstock, Password Via Shutterstock, Credit Card Via Shutterstock
Thursday, August 16, 2012
Sunday, August 12, 2012
45+ Elegant Restaurant Menu Templates
Looking for some ideas for your restaurant web site, try this link;
http://www.tripwiremagazine.com/2012/07/wordpress-restaurant-menu-templates.html
http://www.tripwiremagazine.com/2012/07/wordpress-restaurant-menu-templates.html
Tuesday, May 22, 2012
Interesting Article on Data Mining
Digging for data the new mining boom
Catherine Armitage, Nicky Phillips
May 12, 2012
"Big data is the new business black" ... enterprises will invest more than $US120 billion by 2015 in data capture and analysis across hardware, software and services. Photo: istock
There's another mining boom you may have missed. It too involves paying young people six-figure salaries in their first jobs, and exploring deeper for resources which may have been previously overlooked. But it's not about driving trucks or digging holes. It's about building algorithms and crunching facts and numbers. It's mining for data.
Big data is the new business black. It's a catch-all phrase for the billions of transactions and other bits of information about their customers, suppliers and operations logged by businesses and governments the world over every day. Yesterday's storage problem has become today's strategic asset. Turns out there's gold in them thar files.
''This is the biggest industry that people are only now starting to talk about,'' says Anthony Goldbloom, a 28-year-old former Reserve Bank of Australia statistician who has moved his start-up data analytics business, Kaggle, to Silicon Valley where NASA is among its clients.
Enterprises are using data analysis not just to improve their everyday business processes, but also to build predictive models of consumer behaviour. Retailers, telcos, airlines, hotels, health care and credit card companies are among those with information-rich customer data. In Australia, ''only really leading companies have realised this as an opportunity'', Goldbloom says. To his knowledge, Telstra, Myer, the University of Melbourne and the NSW Roads and Maritime Services are among those known to have applied large-scale data analysis to their operations.
A 2011 report by McKinsey and Company said using big data to drive efficiency and quality in the US health care industry could create $US300 billion value a year, including cost savings. Using personal location data to sell services to individuals could ''capture $US600 billion in consumer surplus'', it said.
Global market intelligence firm IDC has estimated enterprises will invest more than $US120 billion by 2015 in data capture and analysis across hardware, software and services. IBM is investing heavily, now boasting almost 9000 ''business analytics and optimisation consultants'', 400 researchers and a global network of ''analytics solutions centres'', aiming for $16 billion in business analytics revenue by 2015.
''There is no end in sight. I think it is an endless opportunity,'' the company's chief data analytics guru, Jeff Jonas, says. Among other things, he is working on what might best be described as a digital concierge service. Customers who opt to give the service access to their personal information - such as one or more of their social media accounts and their digital personal organiser - would receive timely and, according to Jonas, helpful prompts to guide their actions and purchases.
Imagine, Jonas says. ''It says, 'I can see from your Facebook that you like Metallica, and I can see you will be in New York next week, and Metallica is there on the same night. Would you like to get a ticket?'
''You could subscribe to a service that would be so precise in its prescriptions that you could feel like it saves you time and money,'' says Jonas, IBM Fellow and chief scientist, IBM Entity Analytics. He acknowledges people's possible discomfort at the idea of unsolicited advertisements, but insists users of the service would come to see it as ''friendly'' and ''genius''.
Another company capitalising on the growing expanse of data, and one of IBM's rivals, is the Silicon Valley data-sorting firm Tibco.
The company's chief technology officer, Matt Quinn, says Tibco's products aim to give clients the right information, at the right time, in the right place and in the right context.
One of its more unusual client groups, casino operators, use the company's software to gauge gambler satisfaction. The system collects data each time a gambler uses their casino loyalty card - be it for gambling, purchasing food in the restaurant or paying for snacks from their room minibar - to create a pattern of their behaviour.
The system can see, for example, that the last few times Gambler X visited the casino, they stayed for two days and lost between $200 and $300, then promptly left the gaming floor, spent no more money and went home the next day.
''As a casino operator you don't want that, you want to make people happy and spend more money,'' Quinn says.
Enter Tibco's event processing software. When the system detects the customer is falling into a particular pattern, such as the consistent losing streak that caused them to leave during their last visit, it sends an automatic note to a gaming floor attendant to offer the person a free meal, or ticket to a show.
The idea is to distract the gambler long enough that they'll come back later and continue to play and lose money, albeit in more palatable amounts. While no Australian casinos use Tibco's products, they are beginning to show interest, Quinn says.
Department stores, whose loyalty programs amass gigabytes of data on their shoppers' every purchase, have also begun using Tibco's event processing software to model their customer's spending patterns and predict their next buy.
Quinn says the software would pick up that every year Customer A spent a fair bit of money around the beginning of October, which could suggest they had a few birthdays around that time.
This would be a perfect time for the store to offer this customer a discount or voucher, a more effective and targeted marketing strategy than TV advertising and catalogues, he says.
''The systems we're building are helping [companies] better understand who their customers are.''
Tibco products also analyse data to keep customers loyal.
In late 2010, Tibco bought the technology startup Loyalty Lab, whose software platform specifies the best time for a company to engage customers in their loyalty program based on data it has collected on previous customer interactions.
''It's technology and psychology rolled into one,'' Quinn says.
Trained loyalty scientists build systems that trawl through a company's customer behaviour data to predict certain events, such as what might prompt them to leave.
Loyalty Lab's director of global solutions strategy, Michael Greenberg, says for telcos, for example, there are several events, such as phone calls dropping out, the end of a contract, or more than two complaints, that suggest a customer may be getting ready to take their business elsewhere.
That is when Tibco advises companies make contact with these customers with an offer, he says.
While big businesses make up the bulk of Tibco's clients, Nasdaq, the US Major League Baseball, the Department of Homeland Security and major hospitals also use the company's data-sorting software.
In 2010, scientists at the Walter and Eliza Hall Institute of Medical Research in Melbourne began using Tibco's visualisation software, Spotfire, to help find new drug therapies for diseases like cancer and malaria.
To locate potential drug candidates, the researchers run tests on tens of thousands of compounds each day, generating hundreds of thousands of data points for each potential therapy.
The co-ordinator of the the institute's high-throughput laboratory, biochemist Kurt Lackovic, says the unit is capable of running 80,000 reactions a day.
Spotfire takes the results of each reaction and presents them in diagrams, making it easier for researchers to spot trends, outliers and errors rather than searching for a needle in a rapidly expanding digital haystack.
Hype notwithstanding, big data will turn out to be a useful value adding tool rather than a ''panacea to solve everything'', says Robert Hillard, Deloitte Consulting technology lead partner.
The privacy issues raised by its use have yet to be resolved, he says. It is crucial people are given the choice between opting in and opting out of the use of their identifiable personal data, he says. Companies approaching customers need to be ''utterly transparent'' about how they know what they know about a customer.
IBM's Jonas, whose personal motto on privacy issues is ''don't surprise the customer'', says it's important for people to realise how commercially powerful the data which locates them in time and space is, such as that communicated by GPS devices in cars and mobile phones. People are putting more data online about themselves than ever before, yet when signing up for the latest ''irresistible'' service, few bother to read the terms of use, he says.
Read more: http://www.theage.com.au/technology/technology-news/digging-for-data-the-new-mining-boom-20120511-1yhu5.html#ixzz1veNJOIcj
Subscribe to:
Posts (Atom)