Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Wednesday, October 14, 2015

Is the Internet bad for you?

            Is the Internet bad for you?
             The Internet is very useful. We use it for research, banking, shopping, and social networking. I also use it to gather and store information, but mostly to stay in touch with people all around the world. Social Media is the number one activity on the web. And since I can access the Internet very easily from my mobile devices, I rely on it for almost everything. I can’t remember the last time my smart phone wasn’t next to me. The Internet is established as a very important medium in our lives. I am a big user of computers and I am a huge fan of technology. And luckily, technology is no longer for a small minority. Various social networks appeal to different parts of the population. Almost every member of my family has a Facebook account, from the youngest of them to the oldest. It is a great way for all of us to stay in touch, especially that we live on different continents. I choose to keep my profile private even though I sense that privacy is lost in social networking. I tend to refuse requests from strangers and I don’t request friends I do not know. Nevertheless, I enjoy participating in family affairs, even if it is virtually.

            Lately, I began to realize that I am having a lot of trouble concentrating. I noticed it particularly when I’d sit down to study. Throughout my life, reading a book came naturally to me, but now I notice that after a couple of paragraphs or pages, I begin to have this overwhelming urge to get up and check the net. I start checking my email and clicking on links to all kinds of things. There is a correspondence between my increasing use of the web and the use of digital media. Over the last few years, the Internet expanded with the introduction of all these powerful networking applications. I have accounts on Facebook, Twitter, Instagram, YouTube, Snapchat and so on (Follow me). And there are hundreds of million other active users on a global basis. My inability to focus on one thing for more than a few minutes concerns me the most. Apparently, there is too much of an attachment to surf the web and it has become addictive. Our intellectual technologies influence the way that we think. For example, years ago, we needed a map to travel, and now we a have a Global Positioning System that provides “location and time information in all weather conditions, anywhere on or near the Earth.” 
Nowadays, looking for a map is an endless process; bookstores have scaled back in their selection in recent years. Some stores have stopped selling maps altogether. They claim that maps are pointless today. I consider printed maps a fun experience when travelling because it requires the travelers to work together and become a team. It tests our ability to get along and solve problems while the GPS removes that entire interpersonal dynamic. Driving by map engages us actively in our surroundings while the GPS encourages a passive form of journeying.  Up until the map was invented, the only way to perceive location was through direct sensory, and that’s how people got around. Suddenly, we replaced our direct sensory apprehension of the world with an abstract representation of the world. On one hand, it allowed us to do a whole lot more of practical things like going to places we’ve never gone to before with certainty. On the other hand, more broadly, it gave us a more abstract way of thinking in general, and there are some deep cognitive and intellectual consequences. We are hooked up to every form of communication, but we’re not actually engaging and interacting with people. We have the social skills of a microwave dinner and the more time we are spending online the more we are getting incompetent at the area of sociability and social dynamics. How we receive and deal with people is a skill that we are losing. Real world social interactions diminished drastically.
            Because the majority of our time is spent online, it definitely has some effect on the way we think and act. We have become too dependent on it that we can’t go a day without disconnecting from reality to check the Internet. We live in incredibly information-rich environment and we want to know everything that is going on around us; therefore, it is promoting a compulsive behavior in which we constantly check our smart phones. Moreover, we’re living in this perpetual state of distraction and interruptions that is blocking our abilities to learn properly. Thus, we are not building knowledge. Nicholas Carr wrote that the Internet is making us “superficial thinkers,” in his book The Shallows: What the Internet is Doing to Our Brains. Our humanity is at stake because we lack the ability to pay attention and control our mind.


            There is no doubt that the Internet offers a variety of benefits to anyone who is willing to effectively use it. There is more to it than social networking and watching silly videos. It undoubtedly offers a powerful educational source through the enormous amount of information available. It has been my electronic library.  However, the fact remains that too much of anything is never good for you and the best thing we can do for our mind is to find time everyday to unplug, calm down and focus on one thing at a time, especially that all the information will still be there when we get back. The solution is to have more purpose in our communication. We have to set ourselves the challenge of not having the Internet in the palms of our hands all-day and everyday.

Tuesday, October 13, 2015

Phishing Scams: What is phishing?

Phishing Scams:
            What is phishing?

             
            Most of us have gotten used to doing business online: we buy and sell things and we have accounts with sensitive information. The risk of doing business online is low as long as you deal directly with organizations you trust.          
            Problems occur when criminals impersonate these organizations and fool you into handing over sensitive information like account numbers, passwords and PIN numbers.
            Through the Internet and electronic communication like email, instant messaging, text messaging and social media, these criminals cast a wide net to catch as many unsuspecting victims as possible.
            For example, you receive an email that looks like a trustworthy message from a bank. It asks you to click a link to verify information and you assume it is legit. So you click the link and log in to what appears to be you bank’s website. At this point, the scam is complete. You have handed over your bank’s password to the criminals who can use it to take your money.  They were able to fool you by impersonating the bank’s website.
            It looks real, but it is designed to fool you into handing over important information. This is a scam called phishing and you need to avoid it. Remember, phishing emails may use the same exact logos, phone numbers and addresses that appear on your statements or bills. Always be suspicious of an email that asks for your information. No exceptions.

            They key to avoiding this scam is awareness. Avoid being a phisher’s “catch of the day.” There are few keys to detecting phishing emails: they often try to scare you, by saying your account has been accessed or security has been compromised. They also insist that you click a link to verify information or fill out a form. Do not click links or fill out forms in suspicious emails. The email may also have misspellings and call you something like “valued customer:” the crooks don’t know your name.


            Email phishing is one of the most common forms of phishing attacks used today. Cyber criminals disguise themselves as your trusted banks, employer, Phone Company, email provider, social medial provider or other company to lure you into giving them your personal information so they can use it to their advantage. Though these attacks are well disguised and sophisticated, they can generally be detected with four quick steps:
1-    Spelling and grammatical errors in the subject line and body of the email.
2-    Urgent calls to action requesting login credentials or personal information for verification.
3-    Foreign email addresses, or email addresses that aren’t assigned to the “trusted” company.
4-    Links that when hovered over show a domain that is not the same as the “company” sending the email.
            You’ve probably already seen this attack, whether you realized it or not. Never click on the links, and never provide log in credentials or other personal information. Do not open unknown attachments. Don’t fall for “too good to be true” promises.
If you feel the email is legitimate, manually enter the trusted website in a separate window, then contact your trusted representative through their traditional channel of communication.
            If you receive a phishing email, stay calm: there is no risk to receiving it, just delete it. You can also safely report it by forwarding it to reportphishing@antiphishing.org or spam@uce.gov. If an email does lead you to a suspicious website, remember to look at the web address. The address in your browser should look familiar. If you suspect that criminals have your information, immediately contact organizations where you have accounts.
            Phishing scams are a growing threat on the Internet. By being aware of the scam, you can feel confident in working with companies online. To protect yourself in the long run, you might also want to consider anti-phishing software. Further, check your online accounts and credit reports regularly and quickly report anything that is out of place.

           


Monday, October 12, 2015

Data Management

Data Management

There is a mind-boggling amount of data floating around our society. Big data is an elusive concept that represents an amount of digital information, which is uncomfortable to store, transport, or analyze. Big data isn’t new. Fifty years ago, data was stored in a single mainframe computer that filled an entire building. To analyze the data, physicists from around the world traveled to connect to the enormous machine. In 1989, the Internet took off and physicists could then access the terabytes of big data remotely from around the world, generate results, and write papers in their home institutes. Then, they wanted to share their findings with all their colleagues. To make this information sharing easy, the web was created in the early 1990s, and physicists no longer needed to know where the information was stored in order to find it and access it on the web. This idea caught on across the world and has transformed the way we communicate in our daily lives. During the early 2000s, the continued growth of big data outstripped the capability to analyze it, despite having buildings full of computers. They started distributing the petabytes to collaborating partners in order to employ local computing and storage at hundreds of different institutes. 
Big data is so voluminous that it overwhelms the technologies of the day and challenges us to create the next generation of data storage tools and techniques. An alternative, more business-like approach for accessing on-demand resources has been flourishing recently, called cloud computing, which other communities are now exploiting to analyze their big data. It might seem paradoxical for a lab focused on the study of the unimaginably small building blocks of matter, to be the source of something as big as big data. As the old metaphor explains, “the whole is greater than the sum of its parts,” and this is no longer just science that is exploiting this. The fact that we can derive more knowledge by joining related information together, and spotting correlations, can inform and enrich numerous aspects of everyday life, either in real time, such as traffic or financial conditions, in short-term evolutions, such as medical or meteorological, or in predictive situations, such as business, crime, or disease trends.
We can have a lot of data and that causes information chaos. Organizations are struggling to manage the growing volume, velocity and variety of enterprise data. In today’s information-driven economy, data centric initiatives such as data governance and business intelligence are the forefront of many organizations’ strategic priorities. Traditionally, we would be talking about databases, but we are seeing lots of variety of data: image files, audio files, videos, and the speed at which this information is coming through as well. We are now sampling data down to the millisecond, from different sites, from different systems, and as we move into the future, from individual meters in homes as well. This explosion of information within the organization is preventing people from being able to find the right information at the right time. We know the data is out there somewhere, but how do we get the right bit within an acceptable time window? Once we have that data in this organization, what do we do with it? How long do we keep it for? Does regulation say we have to keep it for a certain amount of time? Can we let go of it at certain times, and if we can, why shouldn’t we? It is costing us in terms of storage and space. All those thing roll up into increasing costs, less confidence in the data that we hold, which is all adding risk to the organization.

Data runs our business, whether it is making strategic decisions based on quality information or making data management more efficient to save time and cost, data modelers play a critical role at the center of these initiatives, providing a collaborative data modeling environment that helps ensure that data is managed efficiently and with higher quality. With increasing demand for information from a variety of stakeholders, the need for collaboration is greater than ever before, but resources in most organizations are decreasing, with fewer staff to manage this ever-growing array of data sources. Companies have begun to understand that their data has the potential to provide a greater competitive advantage than traditional assets such as inventory, property, equipment and cash. However, without an understanding of where data has come from, how it was delivered and what it contains, the insight that this data can deliver is still limited. Through effective use and management, metadata will become the glue that holds together your organization’s information infrastructure. Metadata supports analytics, reporting, data quality prediction, dash ball integration, and business processes making it a key asset.
Objects that hold value are generally classified as assets. This could include information, software, reputation, people and services, in addition to IT equipment and infrastructure. Ideally, organizations would track every asset, but this generally proves to be too costly. And since they can’t track everything, the institutions usually decide what to track based on how important the asset is, by determining a number of factors like the sensitivity, criticality, value and compliance requirement of that asset. It is clear that business networks demand a robust enterprise management strategy. We start at the core of the enterprise, operational data, financial data, and plant material data. These are the lifeline and lifeblood of our core systems. We look at data as a strategic asset, and most importantly what sits behind that data is the metadata and we can use it to drive out hidden value. Data is pulled from many different sources and it comes into the analytical environment to rationalize key assets that can help explore an array of internal data, such as demographics, sales, revenues and customer behavior.
Traditionally, companies thought of their assets in two ways: one being the people that they’ve got as human capital, and that includes the skills, the experience and the expertise that they have within the organization. The other side of things is assets, where management is concerned with money, people, property, and inventory. But now, people realize that the data that they’ve got within the company is as important as the other two. Moreover, this information capital includes access to data, control of data and the ability to drive insight from that data. A well-designed information management governance collects, manages, analyzes and interprets data, while creating visual tools and technologies using industry tools and technologies. It helps us collect the right data to make the right decisions to respond faster to changes at less cost, leading to better business performance.
Data management is very important to business analytics. Recognizing the importance of information quality as a key business asset, organizations manage their complex enterprise data environment to allow disparate users to work together in an efficient way, saving time and money. A presentation model should be easy to understand and provide all the necessary data points for the business users to complete their analysis. The main focus is to formulate a strategy to outline the company’s key information assets, standards, quality assurance, ownership and governance of assets. “Master data management establishes the capabilities for defining the capabilities for defining and maintaining the company’s critical core data, and big data management captures very large amounts of business data from various sources and refine the data to be used in decision0making, to automate business processes and functions, to control some business assets automatically and provide automated or more adaptive services for the service consumes” (Arja Julin-Nurmi, 2013). Once data is managed, we can communicate this information to the diverse audiences and business units across the organizations in a format that users will understand in order to manage corporate data.
Data classification allows companies to apply appropriate safeguards, higher protection for sensitive data and wider access for general data. Leveraging data as a corporate asset drives greater efficiency and value. Once we have a better understanding of the type of data, we start to build up that confidence again. Moving from an information chaos perspective to information controlled perspective, we see the value of metadata, we reduce the cost, we reduce the risk, and we increase the trust we have in that data. Most importantly, there are a lot of models to understand how customers work and the sort of things they’re doing, and they come up with maturity models around these things to run a business. By understanding the data that we have within the organization, we realize the impact that it has allowing us to use that information as a strategic asset. We manage our data as strategic assets to achieve efficiency, gain insight, maintain flexibility, innovate and grow. Technology and data strategy and analytics, consumer behavior analytics, product marketing, data interchange, information integration, and information governance help companies to integrate and improve, consolidate and rationalize. Data across traditional and alternative asset allows for institutional investment screening, monitoring and peer comparison with advanced query capabilities to search traditional and alternative fields.

Virtually every field is turning to gathering big data, with mobile sensor networks spanning the globe, cameras on the ground and in the air, archives storing information published on the web, and loggers capturing the activities of Internet citizens the world over. The challenge is on to invent new tools and techniques to mine these vast stores, to inform decision making, to improve medical diagnosis, and otherwise to answer needs and desires of tomorrow’s society in ways that are unimagined today.