Thursday, February 28, 2008

Storing data online

One of the innovative set of tools to arrive in the last couple of years is online data storage and online applications. One of the major players in this movement is Google. Google started as a simple search engine (only a few years ago) and now has a enormous presence on the web. Google now offers a variety of online applications that can be accessed from anywhere with nearly any device that is connected to the web. For instance, you can go to Google, setup a user and get a Gmail account (email), and use Google docs to created and edit documents, spreadsheets and digital presentations. Also Google also offers a online calendar, Google reader and the ability to personalize the Google.com page to your wishes. Google has other offerings on top of those for the web surfer.

Google
http://www.google.com

To try iGoogle
http://www.google.com/ig?hl=en&source=iglk

The bigger picture with all of this is that many different groups, companies and websites are beginning to offer services in this manner. The idea is simple, if your data and applications to access that data is online, then it doesn't matter where you are or what device that you use to access it. With the Internet becoming ever more ubiquitous the ability to access data from everywhere is going to come to the forefront.

When you tie this into the proliferation of cell phones, the possibilities to have your office with you where ever you go is very achievable.

James

Monday, February 25, 2008

University of New Hampshire Study on Online Predators

The University of New Hampshire release a study that calls into question many of the perceptions of how online predators behave while using sites like MySpace or FaceBook.

The study can be found at:

http://www.apa.org/journals/releases/amp632111.pdf

A couple of notes from the study are:
  • Internet offenders pretended to be teenagers in only 5 percent of the crimes studied by researchers.
  • Nearly 75 percent of victims who met offenders face-to-face did so more than once.
  • Online sex offenders are seldom violent, and cases involving stalking or abduction are very rare.
The study does not dismiss the concerns that we all have about these types of sites, but works to help us better understand the risks.

James

NSBA on Social Networking Sites

The National School Board Association recently released a study that calls into question how dangerous that social networking sites really are.

http://www.nsba.org/SecondaryMenu/TLN/CreatingandConnecting.aspx

The study found that there are only a very few reported incidents of cyberstalking or cyberbullying. Furthermore, the NSBA goes on to encourage school districts to use Social Network sites as another tool in for teaching a learning.

James

Tuesday, February 12, 2008

New Language -- TEXTING

We are constantly bombarded by commercials for cell phones that offer nearly free and unlimited texting. Many commercials show kids and young adults busy punching the keys on their phones to communicate.....I can remember when you used a phone to just talk to someone....I guess I'm just getting obsolete. :)

What exactly are those kids in the commercials doing anyway... They are "texting" their friends, family, etc. To understand what texting is, you need to first know that texting is a new language in and of itself and our kids are fluent in this language.

Texting simply is a method to communicate where common phrases and words are replaced with a ever complex and growing list of acronyms and abbreviations. Now that I have you COMPLETELY lost, here's an example:

Instead of writing something like "That was funny," the text language might be LOL (short for Laughing Out Loud). Another common one is IMHO or "In My Humble Opinion."

Generally, this developed as a way to send a quick note and now is a robust language that most kids and young adults are VERY adept at using. To see some of the common phrases in texting, visit:

Webopedia
Texting Quick Reference Guide

As a side note, in texting:

POS means Parents Over Shoulder
P911 means Parents Coming into Room alert
PAW means Parents Are Watching


Regardless of its use, texting is here to stay for now. It's a good idea to become familiar with it and gain a basic understanding of some of the language.

James

Friday, February 8, 2008

Web 2.0

One of the new terms in the Internet world is Web 2.0. So what is Web 2.o? The easiest way to think of Web 2.0 is to look at it as the next step in the Internet's/Websites' evolution. In the past, websites were fairly one dimensional in the sense that the content was controlled by the person in charge of the site. With Web 2.o, websites are much more interactive and collaborative. The idea being that the owner can post information to webpage and others can come in and contribute to it.

As examples of Web 2.o sites/applications, one only has to look at this site itself. A blog is considered a Web 2.0 site. Wikispaces, mashups, blogs, etc. are all considered a Web 2.0 application/site because Internet users can contribute to it and help add value to the site. Sites like MySpace, Facebook, Blogger, Youtube, and Linkedin are all major players as Web 2.o sites.

To read more about Web 2.o (including some of the really geeky stuff), try the following links:

Wikipedia
http://en.wikipedia.org/wiki/Web_2

O'Reilly
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

James

Wednesday, February 6, 2008

Setting up a wireless network

One of the common questions that I get is how can someone install a wireless network at their home and keep it secure. The concept of securing a home wireless network is an excellent one. It is common for someone to purchase a Wireless Access Point (WAP) or wireless router and plug it in, place it on a shelf and never think about it again. The problem is that the access point (typically) comes with NO security enabled. This makes it easy to install and access....for anyone who can pick up the signal.

The problem is not only can someone potentially monkey around with your network and computers (by accessing your unsecured wireless network), they can also use your network to commit less than legal acts (downloading and uploading copyrighted materials, hacking, etc.). The solution is to secure your network.

If you go to any search engine (like www.google.com), you can run a search for "Secure a Home Wireless Network" and you will get a lot of great articles about how to do this in a general sense. You will also need to consult the manual that came with your wireless router or WAP, each unit is a little different and needs to be configured differently (but, I find that they are fairly easy to configure).

The general tips that I have are:

1. Change the default admin password used to access and configure the WAP (your documentation will tell you what the password is). If you don't do this, anyone can access your WAP and change whatever settings they want and potentially lock you out of your own network.

2. Change the SSID (broadcast name)

3. Enable WPA (or at least WEP, but WPA is much better), this will add a password (that you will set) to your network so people won't be able to access the network without it.

4. Change the channel that WAP will use (if possible). A larger number of WAPs will use channel 6 by default. I usually try to change this to 1 or 11 depending on the number of access points around me (this is more of a geeky thing).

Should you run into a problem where you secure your WAP and down the road forget the password or you can't access it, your documentation will have instructions on how to reset it to the original configuration when you first got it. From there you can reconfigure it, plus most companies that manufacture these have a tech help line that you can call to get help setting a WAP up.

James