EMPOWERMENT TECHNOLOGIES
THE CURRENT STATE OF ICT TECHNOLOGIES
Technology - The application of scientific knowledge for practical purposes, especially in industry. A machinery and equipment developed from the application of
scientific knowledge.
ICT – Information and Communications Technology.
It is an extended term of Information Technology (IT).
It stresses the role of unified communications and the integration of telecommunications, computers, as well as necessary enterprise software, middleware,
storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information.
WEB 1.0
Read Only web - Because there was no user interaction available. You can only read text and look at the pictures.
It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison with the present stage of the internet technology.
At the beginning, there were few web content creators.
Webpages were static and were called read only web.
The only available feedback mechanism was through private emails.
WEB 2.0
The term Web 2.0 was first used around 2004.
Internet technology became more and more interactive.
The internet became more available for everyone.
The users can now interact, contribute, and create their own internet space and content (Explosion of Information & Social Media).
WEB 3.0
It is described by Time Berners-Lee (Father of the WWW) as the read-write-execute web.
It is referred to as the semantic web or data driven web content and response.
The context of the search of the user is processed by a programming language to help the user by presenting options of what the person is interested in.
It will not make Web 2.0 obsolete.
Technology Convergence
It is an evolution of technological developments that merge into a new system bringing together different types of applications and media.
SOCIAL MEDIA
It is a collection of internet-based communication tools and computer assisted channels dedicated to allow users to interact, communicate, and share
information in a virtual community and network.
MOBILE MEDIA
A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, primarily used as personal, interactive, Internet-enabled and
user-controlled portable platforms that allow interconnected users to exchange personal and nonpersonal information ( Wei, 2013 ).
ASSISTIVE MEDIA
It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H. Harvey.
The organization was the first internet-based reading service for persons with visual and reading impairments.
The produce and publish voice-recorded written materials on cassettes, cds, and in the internet.
ONLINE SAFETY
Internet
defined as the information superhighway.
This means that anyone has access to this highway, can place info, and can grab that info.
Some Tips to Stay Safe Online:
Be mindful on what you share online.
Do not just accept terms and conditions, read it.
Do not share your password with anyone.
Avoid visiting untrusted websites.
If you have WiFi at home, make it private by adding a password.
Install and update an antivirus software on your computer.
INTERNET THREATS
1.Malware
stands for “malicious software”.
software that is intended to damage or disable computers and computer systems.
5 Types of Malware
a. Computer Virus
It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
It can be transferred by the use of removable storage media devices.
Damages may be mild to severe.
b. Computer Worm
It is a dangerous computer program that replicates itself through a network.
It spreads by exploiting weaknesses in operating systems
c. Trojan Horse
A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s
consent.
It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer, and
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. Spam
an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing
It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes
from a trustworthy source.
It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions.
EMPOWERMENT TECHNOLOGIES
4. Pharming
This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
The main objective is to obtain username and passwords, as well as credit cards and financial information
5. Botnet – group of compromised computer connected to a network ("zombie")
6. Denial of Service Attack - disrupts computer access to internet services
Online Systems, Functions, and Platforms
Online Platform Categories
Social Media
Search Engines
Communication Services
Payment Systems
Advertising Platforms
Creative Content Outlets
Web Search Engines
It is a software system that is designed to search for information on the World Wide Web (WWW). The search results are generally presented in a line of results
referred to as Search Engine Results Page (SERPs).
The information may be a mix of webpages, images, and other types of files.
Top 10 Search Engines (2016)
1. Google
2. Bing (Microsoft)
3. Yahoo (No. 1 email provider)
4. Ask.com (Ask Jeeves)
5. AOL.com (America Online)
6. Baidu (China)
7. Wolframalpha (Computational Knowledge Engine)
8. DuckDuckGo (simple)
9. Internet Archive (histories of a domain)
10. ChaCha.com (similar to Ask.com)
Communication Services
These are outsourced enterprise communications solutions that can be leased from a single vendor or provider.
A Communications Service Provider (CSP) is a provider that transports information electronically and can encompass public and private companies in telecom,
internet, cable, satellite, and managed services business. See examples below
Payment System
It is any system used to settle financial transactions through transfer of monetary value, and includes the institutions, instruments, people, rules,
procedures, standards, and technologies. See examples below
Advertising Platforms
It allows users to create and manage advertising campaigns, generate reports, and retrieve information about the ads, campaigns, and organizations that
are associated with an account.
Creative Content Outlets
It is content that needs to be translated creatively.
Topic/concept Creative presentation it
ONLINE PLATFORMS
1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.
2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix
3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP
4. Video Editing Tools – Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro
5. Photo uploading and hosting Tools – Dropbox, Flickr
6. Online Collaborative Tools – Google Drive, Viber, Facebook
7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive
8. Blog Tools – Blogger, WordPress, LiveJournal
9. Mapping Tools – Google Maps, Waze, Wikimapia
10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ
11. Survey and Forms – Google Forms
12. ICT Projects and Content Publishing and Uploading Platforms – WordPress, MS Office Project Server, File Manager
13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver
14. Web Management Platforms – Drupal, WordPress, Joomla