Thursday, June 4, 2015

Personal network

Personal network


personal network is a set of human contacts known to an individual, with whom that individual would expect to interact at intervals to support a given set of activities. In other words a Personal Network is a group of caring, dedicated people who are committed to maintain a relationship with a person in order to support a given set of activities. Having a strong personal network requires being connected to a network of resources for mutual development and growth.
Personal Network can be understood by: • who knows you • what you know about them • what they know about you • what are you learning together • how you work at that[1]

Personal networks are intended to be mutually beneficial–extending the concept of teamwork beyond the immediate peer group. The term is usually encountered in the work place, though it could apply equally to other pursuits outside work.
Personal networking is the practice of developing and maintaining a personal network, which is usually undertaken over an extended period.
Personal networking is often encouraged by large organizations, in the hope of improving productivity, and so a number of tools exist to support the maintenance of networks. Many of these tools are IT-based, and use Web 2.0 technologies.
Care should be taken not to confuse a personal network with a Personal area network

Personal Network Management

Personal Network Management (PNM) is a crucial aspect of Personal Information Management and can be understood as the practice of managing the links and connections for social and professional benefits. Some ways to do this would be: • being authentic and consistent • paying attention to status updates • following wisely • contributing • seeking to be worth knowing • appropriate tagging.

Internet

Internet

The Internet is a large group of computers that are connected to each other. The Internet is used to send information quickly between computers around the world. It has millions of smaller domesticacademicbusiness, and government networks and websites, which together carry many different kinds of information (facts and details) and services. So in other words, the Internet is a network of networks.

Services on the Internet

The Internet is used for many things, such as electronic mailonline chatfile transfer, and the interlinked web pages and other documents of the World Wide Web.
The most used service on the Internet is the World Wide Web (which is also called the "Web"). The Web contains websitesblogs, and also wikis like WikipediaWebpages on the internet can be seen and read by anyone (unless the page needs a password, or it is blocked).
The second major use of the Internet is to send and receive e-mail. E-mail is private and goes from one user to another. Instant messaging (such as AIM or ICQ) is similar to email, but allows two or more people to chat to each other much faster.
Some governments think the Internet is a bad thing, and block all or part of it. For example, the Chinese government thinks that Wikipedia is bad. Many times no one in China can read it or add to it.[2] Some parents block parts of the Internet they think are bad for children to see. Well-known examples of the whole Internet being blocked are in North Korea and Myanmar.

Dangers on the Internet

The Internet can also respect it self be a dangerous place. Information that people put on the Internet is not always checked, and some may not be true. Some may even be harmful. Also, if someone sends information through the internet, sometimes other people can read it even when they are not supposed to. For example, Facebook has had some problems with privacy settings. A person can post information on a website, but this is often a bad idea unless the person is very sure of what they are doing. A good way to check for a secure website is to make sure the URL starts with https:// instead of http://, this means it is a secure site. (This only stops other people from reading what a user types. It does not mean the website is safe)
  • Some websites may trick people into downloading viruses that can harm a computer or spyware that spies on its users (looks at what they are doing and tells someone else). E-mails can also have harmful files with them as "attachments".
  • In Internet chatrooms, people might be preying on others or trying to stalk or abuse them.
  • The Internet contains content that many people find offensive such as pornography, as well as content intended to be offensive.

Terrorism

Terrorism


Terrorism is commonly defined as violent acts (or the threat of violent acts) intended to create fear (terror), perpetrated for an economic, religious, political, or ideological goal, and which deliberately target or disregard the safety of non-combatants(e.g., neutral military personnel or civilians). Another common definition sees terrorism as political, ideological or religious violence by non-state actors. Some definitions now include acts of unlawful violence and war. The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism, though these same actions may be labeled terrorism when done by a politically motivated group. Usage of the term has also been criticized for its frequent undue equating with Islamism or jihadism, while ignoring non-Islamic organizations or individuals.In theinternational community, terrorism has no legally binding, criminal-law definition.
The word "terrorism" is politically loaded and emotionally charged, and this greatly compounds the difficulty of providing a precise definition. A study on political terrorism examining over 100 definitions of "terrorism" found 22 separate definitional elements (e.g. Violence, force, fear, threat, victim-target differentiation). In some cases, the same group may be described as "freedom fighters" by its supporters and as "terrorists" by its opponents, a phenomenon giving rise to the cliché, "one man's freedom fighter is another man's terrorist." The concept of terrorism may be controversial as it is often used by state authorities (and individuals with access to state support) to delegitimize political or other opponents, and potentially legitimize the state's own use of armed force against opponents (such use of force may be described as "terror" by opponents of the state). At the same time, the reverse may also take place when states perpetrate or are accused of perpetrating state terrorism. The usage of the term has a controversial history, with individuals such as ANC leader Nelson Mandela at one point also branded a terrorist.
A broad array of political organizations has practiced terrorism to further their objectives. It has been practiced by both right-wing and left-wing political parties, nationalistic groups, religious groups, revolutionaries, and ruling governments. The symbolism of terrorism can exploit human fear to help achieve these goals.

Mobile banking

Mobile banking


Mobile banking is a term used to refer to systems that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or tablet.
Mobile banking differs from mobile payments, which involve the use of a mobile device to pay for goods or services either at thepoint of sale or remotely, analogously to the use of a debit or credit card to effect an EFTPOS payment.
The earliest mobile banking services were offered over SMS, a service known as SMS banking. With the introduction of smart phones with WAP support enabling the use of the mobile web in 1999, the first European banks started to offer mobile banking on this platform to their customers.
Mobile banking has until recently (2010) most often been performed via SMS or the mobile webApple's initial success with iPhoneand the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device. With that said, advancements in web technologies such as HTML5CSS3 andJavaScript have seen more banks launching mobile web based services to complement native applications. A recent study (May 2012) by Mapa Research suggests that over a third of banks have mobile device detection upon visiting the banks' main website. 

Mobile banking services

Typical mobile banking services may include:

Account information

  1. Mini-statements and checking of account history
  2. Alerts on account activity or passing of set thresholds
  3. Monitoring of term deposits
  4. Access to loan statements
  5. Access to card statements
  6. Mutual funds / equity statements
  7. Insurance policy management

Transaction

  1. Funds transfers between the customer's linked accounts
  2. Paying third parties, including bill payments and third party fund transfers(see, e.g., FAST)
  3. Check Remote Deposit

Investments


  1. Portfolio management services
  2. Real-time stock quotes
  3. Personalized alerts and notifications on security prices

Support

  1. Status of requests for credit, including mortgage approval, and insurance coverage
  2. Check (cheque) book and card requests
  3. Exchange of data messages and email, including complaint submission and tracking
  4. ATM Location

Content services

  1. General information such as weather updates, news
  2. Loyalty-related offers
  3. Location-based services

Computer-aided design

Computer-aided design




Computer-aided design (CAD) is the use of computer systems to assist in the creation, modification, analysis, or optimization of adesign. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining, or other manufacturing operations.
Computer-aided design is used in many fields. Its use in designing electronic systems is known as electronic design automation, or EDA. In mechanical design it is known as mechanical design automation (MDA) or computer-aided drafting (CAD), which includes the process of creating a technical drawing with the use of computer software.
CAD software for mechanical design uses either vector-based graphics to depict the objects of traditional drafting, or may also produceraster graphics showing the overall appearance of designed objects. However, it involves more than just shapes. As in the manual draftingof technical and engineering drawings, the output of CAD must convey information, such as materials, processes, dimensions, andtolerances, according to application-specific conventions.
CAD may be used to design curves and figures in two-dimensional (2D) space; or curves, surfaces, and solids in three-dimensional (3D) space.
CAD is an important industrial art extensively used in many applications, including automotive, shipbuilding, and aerospace industries, industrial and architectural design, prosthetics, and many more. CAD is also widely used to produce computer animation for special effectsin movies, advertising and technical manuals, often called DCC digital content creation. The modern ubiquity and power of computers means that even perfume bottles and shampoo dispensers are designed using techniques unheard of by engineers of the 1960s. Because of its enormous economic importance, CAD has been a major driving force for research in computational geometrycomputer graphics (both hardware and software), and discrete differential geometry.