There are the posts which will increase your knowledge.Thanks for Visiting us. Regards
Ads
Saturday, 18 February 2012
Jobs in Public sector Organization
Jobs in Public sector Organization.
Deputy Director Information Technology is required.
Qualification: Master in Information Technology/Bachelors in Computer Science/Bachelors in Software Engineering
Experience:5 Years experience after study.
Age:25 to 40
Pay Scale: BS-18
Posting: Can be posted anywhere in Pakistan.
Only short-listed candidates will be called for test/interviews.
Government Employees should apply through proper channel.
If you meet the above criteria Send your documents/Testimonials with attested photocopy of CNIC on P.O Box 1653 Islamabad Before 6 March 2012.
Friday, 10 February 2012
Career Opportunities
Joomla Developer Required for Joomla (PHP) Development.(Very Urgent Requirement).
If you have following Skills/Experience apply as soon as possible as it is Very Urgent requirement.
Candidates must have one of the following degree, BSCS,BSSE,MCS,BSIT,BBA (ITM).
1+ Year Experience in Joomla Development.
Candidate can work at home (as a Freelancer).
If you are good then Chances to getting more work..
Exceptional Fresh Candidates have good skill in Joomla Development will also be considered.
Must be very good learner.
Both Genders are encourage to apply at
Good opportunity for especially for females who want to work at home as a freelancer.
sir.jees@yahoo.com
Please send you CV/ Portfolio as soon as possible if you are eligible.
Wish you Best of Luck
Regards
If you have following Skills/Experience apply as soon as possible as it is Very Urgent requirement.
Candidates must have one of the following degree, BSCS,BSSE,MCS,BSIT,BBA (ITM).
1+ Year Experience in Joomla Development.
Candidate can work at home (as a Freelancer).
If you are good then Chances to getting more work..
Exceptional Fresh Candidates have good skill in Joomla Development will also be considered.
Must be very good learner.
Both Genders are encourage to apply at
Good opportunity for especially for females who want to work at home as a freelancer.
sir.jees@yahoo.com
Please send you CV/ Portfolio as soon as possible if you are eligible.
Wish you Best of Luck
Regards
Thursday, 9 February 2012
Nadra Technologies jobs (HR Advisor for HR Policies)
Nadra technologies recently announce jobs.
HR advisor is required. The applicant must have relevant experience in organizational designing and management, Conduct of job analysis , Development and implementation of HR policies and procedures.
If you fullfill the criteria,Feel free to contact at:
GM HR& Admin NADRA Technologies limited Provisional Headquarter NADRA, Plot No. 30 Mauve Area,Sector G-10/4 Islamabad.
tahir.maqsood@nadra.gov.pk(0519108146).
Stay connected for more jobs....
Regards
HR advisor is required. The applicant must have relevant experience in organizational designing and management, Conduct of job analysis , Development and implementation of HR policies and procedures.
If you fullfill the criteria,Feel free to contact at:
GM HR& Admin NADRA Technologies limited Provisional Headquarter NADRA, Plot No. 30 Mauve Area,Sector G-10/4 Islamabad.
tahir.maqsood@nadra.gov.pk(0519108146).
Stay connected for more jobs....
Regards
Career Opportunities in FAST NU Islamabad Pakistan
Latest jobs (Send CV with one Photograph to the address provided below)
Terms and Conditions :
Proficiency in Computer Applications like Word, Excel is mandatory for all Positions.
Applications along with CV and a passport size colour photograph should reach on the following address before 15 February 2012.
Address:
Directtor
National University of Computer and Emerging Sciences A.K Brohi Road
H-11 Islamababad
Phone No.111-128-128
or
visit
allpaperjobs.com for reference
Tuesday, 7 February 2012
Bank of America’s Master Net System
Introduction:
The Bank of America is one of the highly reputed banks
in America in 1970’s. There was a time for Bank of America that it has a
business that served about two and a half million customers. The Bank was going upwards day by
day. Due to some change in higher management and some wrong decisions the bank
has a huge loss. To continue to the way of success the bank started a new
system called Master Net system also called as Trust Plus .The system is for
automation and having online system for customers. After having a huge loss in this
system a rick assement is made to analyze the problems our mail focus is on the
after failure matters and risk factors that are neglected during development of
system.
History Of Master Net
Master
Net system is developed for taking the lead in market after huge losses in the
decade of 70’s these losses are named to the president of Bank Tom Clausen. The policies of Tom are far
different from his preccders. He emphasizes on the big loans that are not for
common man. The other mistake by him is that he orders his staff to make a
progress of 10% every year. To fulfill his commands his staff make cheap loans
plan that are not feasible in business point of view.
1981,
Sam Armacost took over as president of Bank of America he wants to make his
bank in the state of earning of good profit so he Armacost decided to make
technological involment in bank sytem.In early step Armacost called Clyde
R.Claus executive vice president in charge of the trust department to make a
software system or close the trust business. So the internal staff tries to
develop a system but they failed badly having wastage of both money and time
they bare the loss of about 6 Million Dollars and One year. After such failure
Claus do not depend on his staff and go for some vendor of software
At
that time Claus know about Stephen Katz of. Premier Systems He is a very famous
and young man and recently leaved the SEI corp. after developing software on
its own MBA thesis to many banks. At some party Katz’s meet some bank of
America officials. Katz’s got settlement for developing system for Bank of
America
Development of Master Net:
After
having the project Katz and Premiere started working on project .The proposed
name as Master Net or Trust Plus. The system consist of one large system and 8
small systems .The main purpose of system after developing system is to provide
services to small banks . The initial budget set for the system is of 420
Million Dollars and the end date is 31 December 1984.
The
development of system started with rapidly and in well organized method. The
meetings of stake holders are arranged at the start of each month to gather
requirements and to know about the
development of system. This system is well appreciated from all other banks and
got a donation of 1.5 Million Dollars from California state.
When
the initial date of 31 December passed the management and Katz are relaxed and
confident about the development of system and they are not worried.
At
the same time Armcost hired Ichak Adizes
as a consultant. In the result of that a department is formed called
BASE (Bank of America System Engineering) BASE was headed by Max Hopper from
American Airlines.
From
the formation of BASE Katz has lost his authority at the bank’s technological
progress. Despite of that he keeps working and in May he thinks that the system
is ready for the public and the transformation to the system
So
the two day party is organized to demonstrate the system to the clients. The
cost on that party exceeds 75 Thousand Dollars.
Transformation to Master Net
Katz’s and his workers
think that it is the time for the transformation to Master Net and to make it
functional. So the first step called for the movement of the $38 billion worth
of. Institutional trust customers first. The department made several attempts
to insert data but failed due to poor response time and very long system
crashes. The system is so large that every single client asset had to be
classified into128 asset types. At the same time the president Armocast was
removed by his post
Failure Of Master Net:
After having the failure in data
transformation Bank of America sold trust to Wells Fargo for 100 million
Dollars the staff of the system is working continuously to restore the system
in working condition. About half of
the customer’s data are transferred to Master Net and problems are occurred
about 21 of 25 prime disks are replaced to continue to system. T the result of
that many key employees of bank quit their jobs . In result of that Bank was on
Hold for three months. To gain the lost reputation the consultants are hired.
The
master Net is having big problems with account status report to solve that Bank
of America publicly announced that the problems would be solved. In October of
1987, both Claus and Mertes resigned due to problems. After that bank
immediately formed a seven member committee to handle the Master Net problem.
Michael Simmons, formerly in charge of computers and telecommunications was
hired in July of 1988 to work as a head of BASE.
Risk Assesment of Master Net
This part of report will assess the risks that
Bank of America was gets by MasterNet
project in first part the work of
Kemerer and Sosa's work will be reviewed then the MasterNet project will
be analyzed using Clemons' five-point risk.
Review
of the work of kemerer and Sosa Their thesis states that “Tthere
exist significant systems development challenger, that present risks or even
barriers to some org4nizations'attempts to use IT strategically, and that
executives and systems developers who are considering an SIS development must
plan carefully to avoid these. Pitfalls and increase the likelihood of a
successful SIS”.
The
Five-Risk Analysis
The following
explains the Master Net Project by Clemons’
five-risk framework
1. Financial Risk
2. Technical Risk
3. Project Risk
4. Functional
Risk
5. Systemic
Risk
Now
we will discuss each of them in detail
1.
Financial Risk:
During the
MasterNet project period, BofA’s finances can best be described as weak the
main financial risk features of system are the following
Completion
of Work
The system
failure of Master Net pressurizes the bank to perform the intended services
very fatly, usually via manual labor. For example, in 1983, BofA’s investment
Securities Division (BISD) installed a new computer system to handle the volume
of transactions flooding the operation. The new system was started up while the
old system was shut down. Unfortunately, the new system worked improperly,
misreporting thousands of transactions. Teams of auditors were brought in to
sort through every transaction by hand. In this case, a $20 million reserve was
set up to cover losses and audit expenses.
Inaccurate
Transaction Recording
When bank cannot accurately record transactions, it must resort to
"blind settling"-the practice of accepting-the transaction terms that
the counter-party recorded. If the comparison of Banks record and the customer is changed then automatically paid and the-
exception is verified manually.
Inaccurate
Asset Tracking
The Master Net system was designed to track the asset of its accounts.
Since-Bank of America managed $38 billion institutional dollars. The personal
trust business was never transferred to the system, so it was not at risk.
Loss of
Managed Assets
Before the selling of institutional trust the total managed assets had
fallen down from $38 billion to $34 billion. This represents a 10% decrease and
an approximate revenue loss of 10%.
Loss of
Peripheral Business
The above things of the MasterNet
project damaged Bank of America reputation. This event certainly had a negative
effect.
2. Technical Risk
According to Clemons analysis
the Master Net System is not feasible due to lack of technology unavailability.
Most of this functionality was directed at the master trust and custodial trust
business, both of which are significantly more complicated than the corporate
trust business. In fact, six of the eight subsystems were successfully
implemented and used within the bank. Initial designs called for the use of a
single eight megabyte, one MIP Prime processor. As database and functionality
requirements, grew through the development, the system grew to three sixteen
megabyte, eight MIP Prime processors on the conversion date. This shows that
the technical risk is not considered at development phase. The end result of
the project was a system with 3.5 million lines of code, a Large amount by any
standard.
3. Project Risk
According to
Clemons, project risk is the possibility that the firm cannot execute the task.
He cites such possibilities. as the project is too large or complex or the
skills and expertise of the staff do not match the needs of the project.
Project risk has the broadest reach and thus demands detail along many
different dimensions. There- fore, this section will be broken into five
subsections.
a. Management
Philosophy and Vision
As Armacost was the president of Master Net he Makes the steps to hire
the best staff but the staff hired is not of the field of banking and have no
experience in banking so that step was wrong . The people hire should have the
good knowledge of banking.
b. Consultants
Bank of America
made significant use of consultants throughout the MasterNet project. In fact,
the basic design of the system was given to Steven Katz of Premier Systems.
The
selection of Katz was based mostly on his past accomplishments. As a partner
with Alfred West, he successfully sold software systems to small banks through
the 1970s. Premier was a young company that needed to establish some credible business.
A contract with one of the largest banks in the country would give prestige to
the Premier name as well as provide it with an infusion of money.
c. Management
Capability and Continuity
In April of
1981, Sam Armacost became, at age forty-one, the youngest man to run the bank
since A.P Giannini's early days. Armacost was considered charming and
personable. Armacost had moved quickly through the bank's management hierarchy,
never staying at a job for more than two years. He led a charmed career, having
never been affected by an economic downturn, and was pushed to the top. Even he
admitted in early 1981 that it might be too early for him to become president.
Throughout the 1982-1988 periods, Armacost had faced some controversial events.
d. Organizational
Factors
Bank
of America’s staff thinks that it would be difficult to change a system that
had been in place for twenty years. First, there are the problems associated
with any move to a new system. Second, there are the problems related to the
use of such drastically modern technology. The movement of the BASE employees
also put stress on the employees working on MasterNet
e.
Other System Projects
As a large bank, Bank of America participated in many systems
development projects. Directly related to the trust business and previously
mentioned, the bank attempted to develop a new trust System in 1981 only to
lose $6 million and a year's time.
4. Functional
Risk
Clemons defines functional risk as the possibility that the completed
project either does not do what the user wants or users needs have changed
enough to make the system useless. The administration and accounting of a trust
business is a difficult business due to the wide variety of assets, client
needs, and government regulations.
This competition has sliced into profits and made the margin
of comfort slimmer. MasterNet's functionality was additionally complex because
it had to satisfy so many different groups the trust accounting business is a
complex, technology. . In an attempt to satisfy everyone, the project became
bogged down in massive amounts of code that contributed to its downfall.
5. Systemic Risk
Systemic -risk is different in that it implies successful
implementation. Clemons says that systemic risk is the possibility that the
system has such a large impact that it alters the environment and all Assumptions
about costs and benefits. By definition, this type of risk is entirely
unpredictable. Therefore, very little can be done to com- bat it. As for Master
Net's grand functionality, clients stress that accuracy and timeliness of
reports are the most important factor
Secularism VS Islamic Society
1-What Is Secularism?
Secularism means that Religion is personal affair of
everyone and Government can not bound anyone to change religion. Government
should make policies not related to the religion. Political point of view
Secularism is Separation of Religion and government. It is also said that
secularism is separation of church and state. The world largest Electronic encyclopedia
(en.wikipedia.org) Defined secularism as
“Secularism is the assertion that governmental practice or
institutions should exist separately from religion from/or religious beliefs”.
It means that governmental institutions are separate from
religion and there is no religion announced by the government as state
religion. All the Modern European counties are secular states. America is also
a secular state.
In
Europe it is considered that secularism is movement toward
modernism. All the secular
states of world have different opinion that why they are secular.
Secularists tend to prefer
politicians to make decisions for secular rather than religious prospective. In
this respect, policy decisions pertaining to topics like abortion, embryonic stem cell research, same-sex
marriage and sex
education are prominently focused upon by the American secularist
organizations.Some of the states that are "constitutionally secular" are , France, South Korea, India, and the United States,Turkey.
2-History of
Secularism:
The
term “Secularism” was first time introduced by a British writer George
Holyoake in 1846.
Holyoake used
this term to describe his views about promoting social values different from
religion.
George
Holyoake's 1896 publication defines secularism as:“Secularism is a code of duty pertaining to this life, founded on considerations purely human, and intended mainly for those who find theology indefinite or inadequate, unreliable or unbelievable. Its essential principles are three:
1- The improvement of this life by material means.
2- That science is the available
3- That it is good to do well. Whether there is other good or not, the good of the present life is good, and it is good to seek that good.
Secularism is
often associated with the Age of Enlightenment in Europe ,
and plays a major role in society of west.
The principles, but not necessarily practices, of separation of
church and state in the United States and in France draw heavily
on secularism. The idea of separation of religion and government has also
existed in India. The modern Indian society is
based on these values and to a certain extent; this attempt has been successful
as well. Secular states also existed in the Islamic world .
A lot of religions accept the
primacy of the rules of secular, democratic society but may still seek to
influence political decisions or achieve specific privileges or influence
through church-state agreements .So many Christians support a secular state,
and may acknowledge that the conception has support in biblical teachings,
particularly Jesus' statement. However, some Christian fundamentalists (notably in the Some people think that in this century of mass politics, it is wiser to view our politics in terms of Democracy/Dictatorship rather than Islam/Secularism.
Historically,
non-religious groups and activists have promoted secularism and separation in World.
3-Secular
Organizations:
There are some organizations which morally support secularism and tell
people about secularism. Groups such
as the National Secular Society in United Kingdom and Americans United campaign for secularism and are
often supported by Humanists. In 2005, the National Secular
Society held the inaugural "Secularist of the Year" awards ceremony.
Its first winner was Maryam Namazie, of the Worker-Communist Party of Iran.Another secularist organization is the Secular Coalition for America, it is linked to many secular humanistic organizations and many secular humanists support it, as with the Secular Society, some non-humanists support it.
Local organizations such as Free thought Association of West Michigan work to raise the profile of secularism in their communities to include secularists, freethinkers, atheists, agnostics, and humanists under their organizational.
There are some student Organizations, such as the Toronto Secular Alliance, try to popularize secularism on campus. The Secular Student Alliance is an educational nonprofit that organizes and aids such high school and college secular student groups.
In Turkey, most prominent and active secularist organization is Atatürk's Thought Association (ADD), which is credited for organizing demonstrations in four largest cities in Turkey in 2007, where over 2 million people, mostly women, defended their concern in and support of secularist principles.
Leicester Secular Society founded in 1851 is the world's oldest secular society.
4-Secularism VS Islamic Society:
Secularism and Islam are two different
thoughts. Islamism is an idea for restoring the political side of Islam
in modern times. This movement has been identified as a new phenomenon emerging
among Muslim societies as a result of the political and cultural domination of
the West through colonization.Islam provides governance wherein the subjects of an Islamic government can exist in harmony while the Islamic government remains under the obligation to provide protection to develop individual cultures. The Islamic government is, nevertheless, not simply guided by majority votes and individual or group whims and desires, but guidance from the Divine is at the core of its governing principles.
Islam is complete way of life. It provides the necessary guidelines and examples for an exemplary political system that respects human rights, upholds noble and moral social values and establishes justice by removal of injustices. Islam provides that framework within which all sacred imperatives of a healthy relationship between God-man, man-man and man-environment are enshrined. Freedom of speech is key element of Islamic societies that lead to magnificent discoveries, inventions and scientific advancements in the past.
The modern threats of injustice are proven drivers to generate not only the vigilance, but also positive activism for possible ratifications in the context of Islam/Secularism dichotomy. It is an absolute requirement to respond to injustice of any form or nature. The Quran is the testimony for that as well as the Prophet as the ultimate leader of the Ummah.
The challenge is however, and has remained as always: how do we as subscribers to the Islamic way of life ensure continuity and creativity in our response to ever changing current affairs while staying within the prescribed sacred imperatives of the Quran and the Sunnah? The Ummah, unlike ever before, is much larger and increasingly complex than any point of time in Islamic or human history. So how do we, as deputies of the Prophet Muhammad and vicegerents of Allah on Earth, serve the essence of the Ummah in an ever changing social, political and economical environment of our planet, that is Earth?
An alternative sense of Islamism is used, meaning Muslim individual and/or organizational efforts which have as their goal the establishment of Islamic law as background for a Muslim governmental system and to plead for the re-emergence of Ummah.
In Islam, there is no particular political solution. Religion is politics and politics is religion. The term democracy/dictatorship is irrelevant because Islam can flourish under both regimes. Mass injustice comes into being under democratic regimes (
Islam Plays very important role in our life. Secularism says that religion should not interfere in state matters, but Islam offers the complete method of leading life. Islam gives us complete political system, like Ministries, deviation, union council, departments and other political entities.
Thus, the fight between Islamists and secularists has its basis in what Muslims consider as their Caliph system. Opposed to this is the idea of perpetuating the colonial legacy of separating religion from politics, which was introduced after the colonial occupation.
The tendency to limit secularism to the experiences of west
European and North American countries with Christianity since the 18th century.
Whether viewed as "separation of church and state" or
"disestablishment of religion," such definitions are obviously
specific to certain situations and do not address the continuing social and political
role of religion in public life, even in those settings. For instance, efforts
to sever institutional links between religion and the state cannot apply to the
role of religion in politics, since there is no way of knowing the motives of
people’s political action, let alone attempting to control that.
It is also problematic to equate secularism with disregard
for religion, or a diminishing role for it in public life, as some scholars
have argued in relation to Western societies. Since that could not possibly
mean that religion has no influence whatsoever in the public life of any
society, as that is obviously false, the question becomes what sort of
influence, and how is it diminishing? From this perspective, secularism should
be understood in terms of the type of relationship between religion and the
state, rather than a specific way in which that relationship has evolved in one
society or another.
The form that relationship should take in pluralistic
societies has to be the product of organic development over time, and be
accepted as legitimate by the population at large, instead of expecting it to
drastically change immediately by constitutional enactment or political
rhetoric.
As a matter of terminology that is relevant to this deeply
contextual approach, it should be noted that the term "secularism" in
its west European and North American sense has come to Africa and Asia in the suspect company of colonialism. For the
Islamic societies in particular, this term is commonly associated with
militantly anti-religious attitudes of the French Revolution, in relation to
Christianity. Nevertheless, this term can be used in relation to experiences of
African and Asian societies, provided it is understood and applied in the
specific context of each society, rather than as a feature of liberal political
or constitutional transplant. This view of secularism, I believe, will redress
much of the apprehension about the concept as a tool of Western imperialism.
On the substantive side of the issue, the most compelling
argument for an Islamic rationale for secularism is its necessity for
pluralistic nation states that are able to safeguard the freedom of religion
and belief of believers and non-believers alike. That is, the freedom of
religion and belief of Muslims as well as non-Muslims is more likely to be
violated by a state that seeks to promote a particular religious doctrine than
one that is neutral on the matter.
Secularism may be accepted in a Christian society but it can never
enjoy a general acceptance in an Islamic society. Christianity is devoid of a
shari`ah or a comprehensive system of life to which its adherents should be
committed. As such, a Christian could accept secularism without
any qualms of conscience. Furthermore, Westerners, especially Christians, have
good reasons to prefer a secular regime to a religious one. Their experience
with "religious regimes" - as they knew them - meant the rule of the
clergy, the despotic authority of the Church, and the resulting decrees of
excommunication and the deeds of forgiveness, i.e. letters of indulgence.
Muslim societies, the acceptance of secularism means something
totally different; i.e. as Islam is a comprehensive system of worship (`ibadah
of ALLAH(s.w.t)) and legislation (Shari`ah), the acceptance of secularism means
abandonment of Shari`ah, a denial of the divine guidance and a rejection of
Allah’s injunctions; It is indeed a false claim that Shariah is not proper to
the requirements of the present age. The acceptance of a legislation formulated
by humans means a preference of the humans’ limited knowledge and experiences
to the divine guidance: "Say! Do you know better than Allah?"
(2:140).
For this reason, the call for secularism among Muslims is rejected
by Islam. Its acceptance as a basis for rule in place of Shari `ah
is downright riddah. The silence of the masses in the Muslim world about this
deviation has been a major transgression and a clear-cut instance of
disobedience which have produces a sense of guilt, remorse, and inward
resentment, Secularism is compatible with the Western concept of God which
maintains that after ALLAH had created the world, He left it to look after
itself. In this sense, ALLAH’s relationship with the world is like that of a
watchmaker with a watch, he makes it then leaves it to function without any
need for him. This concept is inherited from Greek philosophy, especially that
of Aristotle who argued that God neither controls nor knows anything about this
world. This is a helpless God as described by Will Durant. There is no wonder
that such a God leaves people to look after their own affairs. This concept is
totally different from that of Muslims. We Muslims believe that Allah (SWT) is
the sole Creator and Sustainer of the Worlds. One (Who takes account of every
single thing)(72:28); that He is omnipotent and omniscient; that His mercy and
bounties encompasses everyone and suffice for all. In that capacity, Allah
(SWT) revealed His divine guidance to humanity, made certain things permissible
and others prohibited, commanded people observe His injunctions and to judge
according to them. If they do not do so, then they commit kufr, aggression, and
transgression."
It is commonly claimed that Islam mandates the establishment
of an "Islamic state" which will implement and enforce Shari’a (the
normative system of Islam) as the law of the land. But in my view, the notion
of an Islamic state is a contradiction in terms because whatever principles of
Shari’a are enacted by the state as positive law cease to be the normative
system of Islam by the very act of enacting it as the law to be enforced by the
state. Since there is so much diversity of opinion among Islamic schools of
thought and scholars, any enactment of Shari’a principles as law would have to
select some opinions over others, thereby denying believers their freedom of
choice among equally legitimate competing opinions.
Moreover, there is neither a historical precedent of an
Islamic state to be followed, nor is such a state practically viable today. As
the most avowed advocate of an Islamic state today would concede, there has
never been such a state throughout Muslim history, since that of the Prophet in
Medina , which
was so exceptional as to be useful as a model to be applied today. Recent
experience has also shown that the implementation of Shari’a as the official
law of the state is untenable in economic and political terms in the modern
nation state in its present global economic and political context because it
conflicts with international law.
Many Middle Eastern nations have tried hard over the past few
decades to secularize, but without much success. The backlash from Muslim
traditionalists has been strong because Islam doesn’t have a
tradition of separating church and state.
The cult of Mustfa Kamal Ataturk
arose from his determination to make Turkey , a majority Muslim country, a
secular state, one whose citizens would regard themselves primarily as Turks,
not Muslims, and who would look toward Europe for cultural and political
guidance.
To achieve this goal, Kamal abolished the Caliphate, which made the Ottoman sultan, as Caliph, not just the ruler of an empire but the protector of the entire Islamic community, or umma. He then exiled the last Caliph and replaced theocracy with his own charismatic brand of nationalism, telling the ethnically diverse groups of his fledgling country that only a modern, secular, democratic society could give them a viable state.
To achieve this goal, Kamal abolished the Caliphate, which made the Ottoman sultan, as Caliph, not just the ruler of an empire but the protector of the entire Islamic community, or umma. He then exiled the last Caliph and replaced theocracy with his own charismatic brand of nationalism, telling the ethnically diverse groups of his fledgling country that only a modern, secular, democratic society could give them a viable state.
It is against the law, for instance,
to wear a head- scarf in a government building or a public university.
Provisions that have been used to shut down Islamist political parties.
Turkey still regards Europe,
not the Middle East , as its natural ally,
though it has never quite been accepted into that club. Oddly enough, its
candidacy for membership in the European Union has been stalled by criticism
over its restrictions on religion. And in the paradox that is Turkey , some of
its Islamists have come to regard the West as the protector of their religious
liberties, with one Islamist party supporting joining the European Union.
Naturally, many Turkish officials bristle at the European criticism of religious restriction. Howard Eisenstat, an instructor atKoc
University in Istanbul ,
who is writing his doctoral dissertation on Turkish nationalism at the University of California
at Los Angeles , describes Turkey 's anxiety this way: "If
you want us to democratize by giving rights to people who aren't truly
democratic, what is the guarantee that these people are going to play by the
rules? "
Turkey is politically and strategically a
European nation. But, geographically it's both a European and Asian nation.
Some of its region falls into the Asian continent.
Naturally, many Turkish officials bristle at the European criticism of religious restriction. Howard Eisenstat, an instructor at
In America ,
too, there are large institutions which for the backbone of secular, civil
society. The Christian
Right is working hard to co-opt them for their religious agenda. It’s not
that the institutions have failed in their goals, but rather that they have
done too well because they have made society safe for the irreligious.
Opponents argue that secular
government creates more problems than it solves, and that a government with a
religious is good. Some Christian opponents contend that a Christian state can
give more freedom of religion than a secular one. For evidence, they give Norway, Iceland, Finland. All with
constitutional links between church and state and yet also recognized as more
progressive and liberal than some countries without such a link. For example, Some modern commentators have criticized secularism by conflicting it with religious, atheistic belief systems. The word secularism itself is commonly used as a pejorative by religious conservatives in the United States.
The funny thing about this “secularism” is that the majority of the people who make up society aren’t secular. According to the CIA World Fact Book , 84% of the country is religious, and of that 84%, 78.5% is Christian.
Our neibour country
In the present political circumstances the future of secularism does not seem to be bright. However, one should not take short-term view based only on given context. Human brings, have always struggled to transcend their given situation; A purely contextual view tends to be realistic but is also a restricted one.
World has very big challenges to meet due to its economic backwardness and unemployment, which sharpen communal struggle. Unemployed and frustrated youth can easily be induce to think and act communally as he thinks his unemployment is due more to his caste or community than economic backwardness. Secularism is not solution.
Monday, 6 February 2012
Reality Of Valentine Day
(It is not an islamic Event,It is for christians)
Saint Valentine's Day, commonly shortened to Valentine's Day,is a
holiday observed on February 14 honoring one or more early Christian
martyrs named Saint Valentine. It is traditionally a day on which
lovers express their love for each other by presenting flowers,
offering confectionery, and sending greeting cards (known as
"valentines").
The day first became associated with romantic love in the circle of Geoffrey Chaucer in the High Middle Ages, when the tradition of courtly love flourished. It was first established by Pope Gelasius I in 496 AD, and was later deleted from the General Roman Calendar of saints in 1969 by Pope Paul VI. Modern Valentine's Day symbols include the heart-shaped outline, doves, and the figure of the winged Cupid. Since the 19th century, handwritten valentines have given way to mass-produced greeting cards.
History of Valantine Day Numerous early Christian martyrs were named Valentine. The Valentines honored on February 14 are Valentine of Rome (Valentinus presb. m. Romae) and Valentine of Terni (Valentinus ep. Interamnensis m. Romae).
Valentine of Rome was a priest in Rome who was martyred about AD 269 and was buried on the Via Flaminia. His relics are at the Church of Saint Praxed in Rome,and at Whitefriar Street Carmelite Church in Dublin, Ireland. Valentine of Terni became bishop of Interamna (modern Terni) about AD 197 and is said to have been martyred during the persecution under Emperor Aurelian.
He is also buried on the Via Flaminia, but in a different location than Valentine of Rome. His relics are at the Basilica of Saint Valentine in Terni (Basilica di San Valentino). The Catholic Encyclopedia also speaks of a third saint named Valentine who was mentioned in early martyrologies under date of February 14. He was martyred in Africa with a number of companions, but nothing more is known about him.
No romantic elements are present in the original early medieval biographies of either of these martyrs. By the time a Saint Valentine became linked to romance in the 14th century, distinctions between Valentine of Rome and Valentine of Terni were utterly lost. In the 1969 revision of the Roman Catholic Calendar of Saints, the feast day of Saint Valentine on February 14 was removed from the General Roman Calendar and relegated to particular (local or even national) calendars for the following reason:
"Though the memorial of Saint Valentine is ancient, it is left to particular calendars, since, apart from his name, nothing is known of Saint Valentine except that he was buried on the Via Flaminia on February 14.
" The feast day is still celebrated in Balzan (Malta) where relics of the saint are claimed to be found, and also throughout the world by Traditionalist Catholics who follow the older, pre-Second Vatican Council calendar. February 14 is also celebrated as St Valentine's Day in other Christian denominations; it has, for example, the rank of 'commemoration' in the calendar of the Church of England and other parts of the Anglican Communion.
The day first became associated with romantic love in the circle of Geoffrey Chaucer in the High Middle Ages, when the tradition of courtly love flourished. It was first established by Pope Gelasius I in 496 AD, and was later deleted from the General Roman Calendar of saints in 1969 by Pope Paul VI. Modern Valentine's Day symbols include the heart-shaped outline, doves, and the figure of the winged Cupid. Since the 19th century, handwritten valentines have given way to mass-produced greeting cards.
History of Valantine Day Numerous early Christian martyrs were named Valentine. The Valentines honored on February 14 are Valentine of Rome (Valentinus presb. m. Romae) and Valentine of Terni (Valentinus ep. Interamnensis m. Romae).
Valentine of Rome was a priest in Rome who was martyred about AD 269 and was buried on the Via Flaminia. His relics are at the Church of Saint Praxed in Rome,and at Whitefriar Street Carmelite Church in Dublin, Ireland. Valentine of Terni became bishop of Interamna (modern Terni) about AD 197 and is said to have been martyred during the persecution under Emperor Aurelian.
He is also buried on the Via Flaminia, but in a different location than Valentine of Rome. His relics are at the Basilica of Saint Valentine in Terni (Basilica di San Valentino). The Catholic Encyclopedia also speaks of a third saint named Valentine who was mentioned in early martyrologies under date of February 14. He was martyred in Africa with a number of companions, but nothing more is known about him.
No romantic elements are present in the original early medieval biographies of either of these martyrs. By the time a Saint Valentine became linked to romance in the 14th century, distinctions between Valentine of Rome and Valentine of Terni were utterly lost. In the 1969 revision of the Roman Catholic Calendar of Saints, the feast day of Saint Valentine on February 14 was removed from the General Roman Calendar and relegated to particular (local or even national) calendars for the following reason:
"Though the memorial of Saint Valentine is ancient, it is left to particular calendars, since, apart from his name, nothing is known of Saint Valentine except that he was buried on the Via Flaminia on February 14.
" The feast day is still celebrated in Balzan (Malta) where relics of the saint are claimed to be found, and also throughout the world by Traditionalist Catholics who follow the older, pre-Second Vatican Council calendar. February 14 is also celebrated as St Valentine's Day in other Christian denominations; it has, for example, the rank of 'commemoration' in the calendar of the Church of England and other parts of the Anglican Communion.
Funny Computer Poetry
Pyar Ka Computer
Abhi abhi to pyaar ka computer kiya hai chaaloo
Aab main dil ki hard disk pe aur kitni files daaloo
...Apne chehare se ruswaai ka error to hatao
Ai jaaneman apne dil ka password to batao
Woh to hum hain jo aap ki chahat dil main rakhte hain
Warna aap jaise kitney hi softwares bazaar main bikte hain
Roz raat ko aap mere sapne main aate ho
Mere pyar ko mouse bana ke ungaliyon pe nachaate ho
Tere pyar ka email mere dil ko Lubhataa hai
Par beech main tere baap ka virus aataa hai
Aur karvaaoge humse kitnaa intezaar
Hamaare dil ki site pe kabhi enter to maro yaar
Apni insult ka badalaa dekhna main kaise loonga
Jaaneman tere baap ko Shift Delete kar doonga
Aap jaiso ke liye dil ko cut ker diya karte hai
Warna baaki cases main to copy paste kiya karte hai
Aapka hasnaa aap ka chalnaa aap ki woh style
Aapke adaaon ki hamne save hai kar li file
Saturday, 4 February 2012
IT Articles: Social and Ethical Impacts of chatting
IT Articles: Social and Ethical Impacts of chatting: Chatting: Background of Chatting: [1]In 1988 people first time chat on internet. The first chat server was tolsun.oulo.fi, which was ...
Interesting Facts
WITHOUT A Salad
American Airlines saved $40,000 in 1987 by eliminating one olive from each
salad served in first-class.
Turtles
can breathe through their butts.
Venus is
the only planet that rotates clockwise.
The three
most valuable brand names on earth: Marlboro, Coca Cola, and Budweiser, in that order.
It is
possible to lead a cow upstairs... but, not downstairs. A duck's quack doesn't echo, and no one knows why.
Dentists
have recommended that a toothbrush be kept at least six feet away from a toilet
to avoid airborne particles resulting from the flush.
Friday, 3 February 2012
Social and Ethical Impacts of chatting
Chatting:
Background of Chatting:
[1]In 1988
people first time chat on internet. The first chat server was tolsun.oulo.fi,
which was developed in University of Oulu, Information Processing Science
Department (Finland).
At that time
people can only chat via text, people cannot share images and videos during
chatting.
Social Implications of Chatting:
What are the
social impacts of chatting on human life?
Can every
one chat whether he/she is child, young, and old?
What to do
when you are chatting online?
People are socially
connected to their fellows and family member on internet whether they are
anywhere in the world through chatting. If my friend goes to Australia after
degree, then I can stay connected with him via chatting. There are different
chat rooms on internet and we can get information and can also share our views
on those topics. If I have a problem, then I can ask it from my friend which is
online on internet.
There are some
issues which are not good socially. Different people create dummy accounts for
blackmailing people and they give wrong information. Some people create girl
account and try to be friends of girls.
Some people
say that people from any age can chat because if you are child then you can get
different information with chat rooms and young people can also groom socially
while chatting. Old people when they are alone can also chat for passing their
time. One the other hand some people says
that internet is not good for children’s and adults. There is pornographic
material on chat rooms which is not good for children and adults as well. They say
that only mature people should chat on intenet.
Some Precautionary measures:
1-For the first time children begin to
chat, it's important for parents to be in very close with their children to see
what their children’s are doing while chatting.
2-We should not respond to any messages while chatting that are
mean or in any way make us feel uncomfortable. If we do, we will Log off and should not respond.
Ethical Implications of Chatting:
Hacking is
Ethical?
Using others
account after stealing password is ethical?
Privacy is
the major feature which should be maintained by chatting software and sites.
People send
you a link during chat and if you will open it, then your password will be sending
to the person which sends you link. It is unethical approach.
Some people
steal account information on internet and misuse your account. If someone steal
my password and come online and send vulgar message to my colleague, then it
will affect my relationship with my colleague. It is ethically wrong. (It is my
personal experience that someone steals my password and send vulgar message to
my friend.)
Some people
develop virus, spywares, Trojan horse and spread it via chatting, New user
cannot judge what is it and it will harm his/her computer.
Some Precautionary measures:
1-We should not give out our account
password to anyone even they are our best friends (For avoiding password
theft).
2-We will be a good online citizen and
not do anything that hurts other people (Ethical Responsibility).
3- We should not give out personal information
such as our address, telephone number, or the name and location of our Institute.
Advantages and Disadvantages of Internet for Childrens
Advantages and Disadvantages of Using
Internet
What is Internet?
The Term internet is Acronym of International Network. It is a network of thousands of
computer Networks around the world. Computers are connected using different
environments (etc. Cables, Wireless).Internet is a big source of information’s.
It can be used educational as well as research purposes. It is growing rapidly
and is a fast spreading technology.
History of Internet:
The Internet
was established in the early 1960s that saw great potential value in allowing
computers to share information on research and development in scientific as
well as military fields. J.C.R. Licklider of MIT, first established a global
network of computers in 1962, and moved over to the Defense Advanced Research
Projects Agency (DARPA). Leonard Klein rock of MIT and later UCLA developed the
theory of packet switching, which was to form the basis of Internet
connections. Lawrence Roberts of MIT connected a Massachusetts computer with a
California computer in 1965 over dial-up telephone lines. It showed the
feasibility of wide area networking through out, but also showed that the
telephone line's circuit switching was inadequate. Klein rock’s packet
switching theory was confirmed. Roberts moved over to DARPA in 1966 and developed
his plan for ARPANET.
A network later
developed in American Defense institute PANTAGON.
Negative Effects of Internet:
Negative effects of Computers and the Internet on Society
Nowadays, computer is praised as an incredible intellectual tool in our
society. People get addicted when they use internet. Most of the people come
online and waste their precious time. Internet usage effects youth as well as
children life. Children waste their time by playing online games on internet.
Youth generation waste their time by chatting and searching prohibited (pornographic)
sites.
Why is the Internet so addicting? Two reasons: information and freedom. People go online to get information (music, news, stock prices, etc). Logging onto the Internet is like a kid going to a toy store; there is so much to do and explore that once you get in, you never want to leave it. Time will pass very fast. You cannot realize that time is passing very fastly when someone use internet.
Why is the Internet so addicting? Two reasons: information and freedom. People go online to get information (music, news, stock prices, etc). Logging onto the Internet is like a kid going to a toy store; there is so much to do and explore that once you get in, you never want to leave it. Time will pass very fast. You cannot realize that time is passing very fastly when someone use internet.
Mostly
students copy articles on the internet when teacher give them assignment.
Suppose that
a student is given as assignment to write a ten-page research paper on a
particular topic. The student finds numerous articles addressing the topic,
downloads the articles, and cuts and pastes significant portions of several of
these articles for inclusion in his or her research paper. If these "cut
and pasted" portions are not properly referenced by the student, his or her
conduct constitutes plagiarism, and if the plagiarism is discovered, the
student should face some sort of sanctions for his or her inappropriate
behavior in preparing the paper. Survey says that thirty-eight percent of the
students surveyed admitted to performing just this sort of cut-and-paste
plagiarism. Between 75 and 90
percent of teenagers in the United States use the Internet to email, instant
message (IM), visit chat rooms and explore other sites on the World Wide Web.
People also go online because the Internet offers freedom to do whatever they
want, to say whatever they want and to be whoever they want. They use internet
many time a day. Youth generation make friendships during chatting, they don’t
know either boy or girl is talking to them. Some times people get serious about
any one, after that he/she knows that there is no required person talking to
him/her, just making him/her fool. They get confused when some one breaks their
hart or play with their intentions. There is some Web browser (The program in
which you can explore internet etc. Internet Explore, Opera, Mozilla, Flock)
and software’s available that banned the prohibited and unfair sites. You can lock
your computer for opening such a sites so that user can not access these types
of sites. Such types of softwares are available that restrict pornographic
websites on your computer.
This could
have a negative effect since people will act in certain ways and say certain
things that they otherwise wouldn’t do in real life. Furthermore, because the
Internet offers so much freedom, you can find your ideal self much easier, but
it’s not the same as your social self. The difference is due to you talking to
a computer screen and you talking to a real person. Thus, the
experiences we encounter on the Internet are not the same as the ones we
encounter in real life.
There is another bad effect of internet. Cyber crimes are
being increased.
Some people commit crimes and make fool to people.
Hacking is also a big negative effect of internet. Hacking means misuse
someone’s private or sensitive data without his permission. Hacker destroys
very important data of companies.
There are some organizations which are acting against
illegal access of data (Hacking).Hackers must be punished. There is also a
terminology cracking. Cracking is to use software in illegal way. They access
software’s which are not allowed to access publicly. Some companies buy their
products, but some people (Cracker) use that type of software illegally, and
after that the financial condition of company will be destabilized. They also
change or update the software’s so it can not be accessed by the owner of
software. Software engineering facing very serious issues likes hacking,
cracking and piracy. It is a big cyber crime to access the data or programs
illegally.
Virus destroys computer programs (Software’s) as well as
computer hardware. Virus is a destructive program which destroys the data of
computer.
Viruses are produced to back corrupt companies, to
destabilize their economical position. Some companies develop Antivirus to
overcome the situation created by viruses. Anti viruses locate and delete virus
files. Some multinational organizations are working against virus’s production
and spreading of viruses.
There are some sexual websites which are very dangerous
especially for youth generation of this era. This increases bad intention among
the youth people of society. People get infected in their sexual intentions.
They commit different bad crimes (Such as adultery, Rape). It is also against
the Islamic teachings. Many jobs permanently eliminated, millions of people
become unemployed. Health risks increased as the overuse of computers. People
get tired when they use internet.
More than 70% of Chinese children between ages 7 and 15 had
used the Internet at least once, according to a survey Sun's center
carried out last year. That was nearly half as many again as the 2005
figure, and the total rose to 87 percent when only urban youngsters
were polled. More than half of town-dwelling children today live in
homes with an Internet connection.
More than 70% of Chinese children between ages 7 and 15 had
used the Internet at least once, according to a survey Sun's center
carried out last year. That was nearly half as many again as the 2005
figure, and the total rose to 87 percent when only urban youngsters
were polled. More than half of town-dwelling children today live in
homes with an Internet connection.
Employees use
internet on their official time, this is not good for the company in which they
work. It is wastage of their time.
Employees
have been fired from their jobs after spending too much time on the Internet
for non‑job‑related purposes; in at least one case, an employee was fired after
approaching the Employee Assistance Program (EAP) for help with her Internet
addiction.
There is also
a copyright factor involves in that. International copyright policy says that
the information’s can not be accessed without the permission of owner of
information, and violating this rule will result in punishment. So many people
violate copyright act, which is very dangerous for the owner of information.
Illegal download of games, songs, articles are also very common. And now Torrent
is becoming popular in illegal downloads of games, movies etc.
The Internet is
perhaps the most significant creations of the 20th Century, offering
unprecedented communication tool that link friends and families around the
world. It provides users access to an incredible volume of information and is
an invaluable tool of the academic and business world.
However, the Internet can also be dangerous place for people of all ages, especially children and teen aged peoples. Therefore it is vital that parents are aware if how to minimize the dangers to their children, and to be able to inform their children of what measures to take in order to keep their Internet time as secure as possible.
Children are often introduced to the Internet at an early age, at which time the parent has full control over their child's Internet use. As the child develops however, parents naturally have to gradually relinquish this control, whilst at the same time doing all they can to keep their children safe form the dangers that the Internet poses. So compare internet use of people having different ages.
Age 2 to 4
At this age children start interacting with the computer in the presence of their parents. There are numerous sites that are can be suitable for this age group but, in most cases, it makes sense for the parent and child explore together. This is not just because of safety, but also a way to assure that the child has a pleasant experience. It's probably best for parents to choose the Web sites they visit and not let them leave those sites on their own.
Age 4 to 8
For the first time children begin to explore on their own, but it's still important for parents to be in very close touch with their children to see what their children’s are doing on the Net. When your child's at this age it becomes important to restrict his or her access only to sites that you have visited and that you feel are appropriate for use. At this age it's important that kids experience positive results from sites that they come across. The issue here isn't so much about avoiding dangerous sites, but about making sure that they are visiting sites that don't frustrate them.
Age 8 to 11
During this period, for the first time children begin looking outside the family for new information, and peer pressure begins to become an issue for many kids. It's also a time when kids are looking for more independence from parents. During these years, children should be encouraged to explore more their own, but that doesn't mean that the parents shouldn't close by. For this age group, consider putting the computer in a kitchen area, or any other areas where the child has access to parents while using the internet. That way, they can be "independent" but not alone. Also, this is a prime age to start to make use of commercially available Internet filtering and monitoring software such as office monitoring software network version.
When your child is at this stage, you need to be concerned not so much about what he's doing online and with the PC as how long he's spending on the PC. Be sure that his time on the computer and the Internet doesn't take away from all his other activities. Children to need to spend there free time immersed in a variety of different activities,
Age 12 to 14
At this time children often become very social and consequently are most likely to be interested in online chat. Kids should understand basic privacy rules and should be aware that they can never give out information about themselves or to get together with anyone they meet online without first checking with their parents. Also, it should be emphasized that they should never exchange photographs with people they don't know. At this age they need to understand clearly the fact that people on the Internet may not be who they are made out to be.
This is also an age where many children start to become interested in sexual matters. During this early period of exploration, it is especially important for kids to know that their parents are around and know what they are doing. You may not need to be in the same room as your kids the entire time they're on the Net, but they do need to know that you and other family members can come in at any time, and can ask them about what they are doing online. If it is not possible for parents to be around all the time, then commercial Internet monitoring software is a vital tool for parents at this time.
A strong argument of get an Internet filter is thus; If kids search hard enough, they can probably find Web sites and newsgroups that explore sexual fantasies that they -- and even you -- might find disturbing or even frightening.
Children at this age are likely to be interested in games that they can download from the Internet to play either online or offline. Some of these games may have content that is highly violent, so it's important to be aware of what your kids are doing on the internet, even when they're not connected to the Internet.
When using filtering software, you may need to explain to them that you are doing it to protect them from material that you consider to be harmful. Just as you might not let them go to certain places in your home town, you have the right to keep them from surfing to certain types of places in cyberspace.
Age14 to 17
At this age a person is beginning to mature physically, emotionally, and intellectually. Consequently he or she desires to experience increasing independence from parents.
Youths are also more likely to risks both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is relatively low, there is always they are made out to be online. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them.
the possibility that he or she will meet someone who will want to have a personal relationship, and teens must be aware that these people might be very different of how
However, the Internet can also be dangerous place for people of all ages, especially children and teen aged peoples. Therefore it is vital that parents are aware if how to minimize the dangers to their children, and to be able to inform their children of what measures to take in order to keep their Internet time as secure as possible.
Children are often introduced to the Internet at an early age, at which time the parent has full control over their child's Internet use. As the child develops however, parents naturally have to gradually relinquish this control, whilst at the same time doing all they can to keep their children safe form the dangers that the Internet poses. So compare internet use of people having different ages.
Age 2 to 4
At this age children start interacting with the computer in the presence of their parents. There are numerous sites that are can be suitable for this age group but, in most cases, it makes sense for the parent and child explore together. This is not just because of safety, but also a way to assure that the child has a pleasant experience. It's probably best for parents to choose the Web sites they visit and not let them leave those sites on their own.
Age 4 to 8
For the first time children begin to explore on their own, but it's still important for parents to be in very close touch with their children to see what their children’s are doing on the Net. When your child's at this age it becomes important to restrict his or her access only to sites that you have visited and that you feel are appropriate for use. At this age it's important that kids experience positive results from sites that they come across. The issue here isn't so much about avoiding dangerous sites, but about making sure that they are visiting sites that don't frustrate them.
Age 8 to 11
During this period, for the first time children begin looking outside the family for new information, and peer pressure begins to become an issue for many kids. It's also a time when kids are looking for more independence from parents. During these years, children should be encouraged to explore more their own, but that doesn't mean that the parents shouldn't close by. For this age group, consider putting the computer in a kitchen area, or any other areas where the child has access to parents while using the internet. That way, they can be "independent" but not alone. Also, this is a prime age to start to make use of commercially available Internet filtering and monitoring software such as office monitoring software network version.
When your child is at this stage, you need to be concerned not so much about what he's doing online and with the PC as how long he's spending on the PC. Be sure that his time on the computer and the Internet doesn't take away from all his other activities. Children to need to spend there free time immersed in a variety of different activities,
Age 12 to 14
At this time children often become very social and consequently are most likely to be interested in online chat. Kids should understand basic privacy rules and should be aware that they can never give out information about themselves or to get together with anyone they meet online without first checking with their parents. Also, it should be emphasized that they should never exchange photographs with people they don't know. At this age they need to understand clearly the fact that people on the Internet may not be who they are made out to be.
This is also an age where many children start to become interested in sexual matters. During this early period of exploration, it is especially important for kids to know that their parents are around and know what they are doing. You may not need to be in the same room as your kids the entire time they're on the Net, but they do need to know that you and other family members can come in at any time, and can ask them about what they are doing online. If it is not possible for parents to be around all the time, then commercial Internet monitoring software is a vital tool for parents at this time.
A strong argument of get an Internet filter is thus; If kids search hard enough, they can probably find Web sites and newsgroups that explore sexual fantasies that they -- and even you -- might find disturbing or even frightening.
Children at this age are likely to be interested in games that they can download from the Internet to play either online or offline. Some of these games may have content that is highly violent, so it's important to be aware of what your kids are doing on the internet, even when they're not connected to the Internet.
When using filtering software, you may need to explain to them that you are doing it to protect them from material that you consider to be harmful. Just as you might not let them go to certain places in your home town, you have the right to keep them from surfing to certain types of places in cyberspace.
Age14 to 17
At this age a person is beginning to mature physically, emotionally, and intellectually. Consequently he or she desires to experience increasing independence from parents.
Youths are also more likely to risks both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is relatively low, there is always they are made out to be online. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them.
the possibility that he or she will meet someone who will want to have a personal relationship, and teens must be aware that these people might be very different of how
If a teen
does want to meet someone he or she met online, it's important that the teen
does not go alone and that the meeting takes place somewhere in public.
A teen should be given Internet privileges, that are subject to been taken away if the Internet is misused. However, remember that your teen will soon be an adult and needs
A teen should be given Internet privileges, that are subject to been taken away if the Internet is misused. However, remember that your teen will soon be an adult and needs
to know not
just how to behave but how to make his or her own judgment, and so finding his
or her own conclusions on how to explore the Net and life in general in a safe
and productive manner.
The following list should be given to your children and referred back to often. They are standard rules that children should keep to in order to keep their online activity as safe as possible.
People should know that:
1) I will not give out personal information such as my address, telephone number, parents' work address/telephone number, or the name and location of my school without my parents' permission. I will not fill out questionnaires or any forms online. This includes chat rooms, instant messages, email, surfing the Net and event entering contests or registering for clubs online.
2) I will tell my parents right away if I come across any information that makes me feel uncomfortable.
3) I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
4) I will never send a person my picture or anything else without first checking with my parents.
5) I will not respond to any messages that are mean or in any way make me feel uncomfortable. If I do, I will Log off and tell my parents. If I get such a message, I will not respond. Instead, I will show it to my parents and let them deal with it.
6) I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
7) I will not give out my Internet password to anyone (even my best friends) other than my parents.
8) I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family's privacy
9) I will be a good online citizen and not do anything that hurts other people or is against the law.
10) I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
11) I will not enter a chat room without Mum and/or Dad's presence or supervision. Some "kids" in chat rooms may not really be kids; they may be adults with bad intentions.
12) I will never respond to or send an e-mail or instant message to a stranger, or accept e-mails, enclosures, links, URLs or other things online from people you I know. I will talk to my parents first so they can check it out.
13) I will not keep an online profile as this serves as a lightening rod for predators. If I do keep such a profile I am much more likely to be approached in chat rooms by dangerous people.
The first point referred to keeping information private. This is a vitally important point that children need to be reminded of again and again.
Children should know that if people get hold of private information through the Internet; they might want to use it so they can try to sell them things. They might send them unwanted and highly inappropriate e-mail (spam). They might actually sell or trade their information with another company. Or, they might have much more sinister and dangerous intentions, and use this information to try to make personal contact with the child, at first through the Internet, and then maybe face to face.
office monitoring software a filtering and monitoring software company, whose products were highly rated by PC Magazine, Tech TV, Lockergnome, Kim Komando Show and by others, is designed to enable children to use the Internet, whilst been shielded from its harmful and potentially dangerous effects. It is an essential tool for any parent who cannot be around to physically watch over their child's use of the Internet. In relation to the tips for children listed above, office monitoring software can help in the following ways;
You can use it to block any personal information from being sent over the Internet; from your credit card numbers to your address. It offers an advanced monitoring system that enables you to check on the activity of your child at a later time that is convenient to you. You can limit the times that your child can use the Internet (and the computer as a whole,) and the web sites that he or she has access to. You can block your child from entering chat rooms and instant messaging programs (MSN, ICQ, Yahoo, AOL messengers), and so lessening the dangers of predators being able to communicate with your child. You can restrict access to programs and sites that enable children to keep an on-line profile on the net.
These are just a few of the many benefits that office monitoring software network version can bring to you and your family. For more information please refer to the site at office monitoring software
The following list should be given to your children and referred back to often. They are standard rules that children should keep to in order to keep their online activity as safe as possible.
People should know that:
1) I will not give out personal information such as my address, telephone number, parents' work address/telephone number, or the name and location of my school without my parents' permission. I will not fill out questionnaires or any forms online. This includes chat rooms, instant messages, email, surfing the Net and event entering contests or registering for clubs online.
2) I will tell my parents right away if I come across any information that makes me feel uncomfortable.
3) I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
4) I will never send a person my picture or anything else without first checking with my parents.
5) I will not respond to any messages that are mean or in any way make me feel uncomfortable. If I do, I will Log off and tell my parents. If I get such a message, I will not respond. Instead, I will show it to my parents and let them deal with it.
6) I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
7) I will not give out my Internet password to anyone (even my best friends) other than my parents.
8) I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family's privacy
9) I will be a good online citizen and not do anything that hurts other people or is against the law.
10) I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
11) I will not enter a chat room without Mum and/or Dad's presence or supervision. Some "kids" in chat rooms may not really be kids; they may be adults with bad intentions.
12) I will never respond to or send an e-mail or instant message to a stranger, or accept e-mails, enclosures, links, URLs or other things online from people you I know. I will talk to my parents first so they can check it out.
13) I will not keep an online profile as this serves as a lightening rod for predators. If I do keep such a profile I am much more likely to be approached in chat rooms by dangerous people.
The first point referred to keeping information private. This is a vitally important point that children need to be reminded of again and again.
Children should know that if people get hold of private information through the Internet; they might want to use it so they can try to sell them things. They might send them unwanted and highly inappropriate e-mail (spam). They might actually sell or trade their information with another company. Or, they might have much more sinister and dangerous intentions, and use this information to try to make personal contact with the child, at first through the Internet, and then maybe face to face.
office monitoring software a filtering and monitoring software company, whose products were highly rated by PC Magazine, Tech TV, Lockergnome, Kim Komando Show and by others, is designed to enable children to use the Internet, whilst been shielded from its harmful and potentially dangerous effects. It is an essential tool for any parent who cannot be around to physically watch over their child's use of the Internet. In relation to the tips for children listed above, office monitoring software can help in the following ways;
You can use it to block any personal information from being sent over the Internet; from your credit card numbers to your address. It offers an advanced monitoring system that enables you to check on the activity of your child at a later time that is convenient to you. You can limit the times that your child can use the Internet (and the computer as a whole,) and the web sites that he or she has access to. You can block your child from entering chat rooms and instant messaging programs (MSN, ICQ, Yahoo, AOL messengers), and so lessening the dangers of predators being able to communicate with your child. You can restrict access to programs and sites that enable children to keep an on-line profile on the net.
These are just a few of the many benefits that office monitoring software network version can bring to you and your family. For more information please refer to the site at office monitoring software
Advantages of Internet:
There are some advantages of Internet. Students can get a
lot of information to internet. Student can search information from any field
on internet in just few minutes. Many multinational companies are doing their business
by internet. They upload prices of products on the website. People open website
and buy products through Credit Card. Companies deliver products via Courier
Service.
This is very efficient and quick way of doing business. People
get their required product in home on sitting internet. People can talk to
their relatives and also can see video or hear sound of person by home he/she
is talking. People can get online access of gaming and increase their IQ level.
You can download your required software, songs, documentaries, video and news
by just clicking on it. You can email your collogues to deliver very precious
information by just clicking, and he/she will receive it just in a minute. By
using internet you can share a lot of information anywhere in the world.
Business mans calls a meeting in all the regional offices, their manager
sitting at different places (Countries) can share their views as they are
sitting in a room (But actually they are sitting at different places). People
can research on internet. Research can be either for military purpose or
educational research. Peoples can read daily newspapers, newels; articles make
discussion to others by using internet.
Search engines make it convenient to search anything on
internet.
You just enter
your subject or pares in which information’s are required, Search engine will
search it. There are so many internet search engines (etc.google.com, altavista.org,
search.com, yahoo.com).
There is cost comes along with all these advantages.
Although internet potential to enhance the equality of human life.
Internet has influenced every aspect of people's lives
Excited and emboldened by the wealth of information they
find on the
Internet, China’s current high school generation is plugging itself directly into international culture.
Internet, China’s current high school generation is plugging itself directly into international culture.
And it's giving the kids ideas. Ideas that could one day
transform the
way this country is governed. Many are using those wings to fly in the face of received wisdom about how and what they should learn, and about how much respect they owe to authority.
The reason is that they have the Internet as a way to learn
things, and because a lot more of them travel. They have more ways of
acquiring knowledge.
->137 Million Online in China
Internet use in world has exploded in recent years, and at the
forefront of that revolution have been young people, hungry for a
taste of life outside their country's borders.
way this country is governed. Many are using those wings to fly in the face of received wisdom about how and what they should learn, and about how much respect they owe to authority.
The reason is that they have the Internet as a way to learn
things, and because a lot more of them travel. They have more ways of
acquiring knowledge.
->137 Million Online in China
Internet use in world has exploded in recent years, and at the
forefront of that revolution have been young people, hungry for a
taste of life outside their country's borders.
In 1999, there
were just four million Internet connections in China; by the end of last year
there were 137 million.
That gives them opportunities to broaden their minds that
teachers
often cannot match.
A lot of teachers over 40 feel uneasy and uncomfortable with the new
knowledge their students have, and their lack of control. A series of reforms since 1997 have edged the Chinese education system away from rote learning and towards a more Western emphasis on independent thought.
often cannot match.
A lot of teachers over 40 feel uneasy and uncomfortable with the new
knowledge their students have, and their lack of control. A series of reforms since 1997 have edged the Chinese education system away from rote learning and towards a more Western emphasis on independent thought.
We are moving from a teacher-centered to a
student-centered
approach, if we want to produce top talent we need millions of
inquisitive and critical-minded innovative talents. The new generation
will develop the ability to explore things.
Students are allowed to write history essays that disagree with the textbook's conclusion about the political significance, for example, of the Boxer Rebellion against colonial powers.
approach, if we want to produce top talent we need millions of
inquisitive and critical-minded innovative talents. The new generation
will develop the ability to explore things.
Students are allowed to write history essays that disagree with the textbook's conclusion about the political significance, for example, of the Boxer Rebellion against colonial powers.
That exam is so critical for ambitious students desperate
to get into World's top universities that fear acts as a brake on change. Which
prides itself on the high proportion of its graduates who get into the best
colleges?
Students that they are still scared to challenge their
teachers or to spend much time exploring topics outside the prescribed
curriculum. At more ordinary schools, too, teachers do not always encourage student-initiated
digressions.
The Internet
encompasses the World Wide Web (Web), file transfer protocol sites (FTPs),
newsgroups (electronic bulletin boards) and gopher sites (often used for
government sites and one of the first widely used ways of accessing the
Internet). Taken as a whole, the "Internet" connotes the
interconnectivity of computers, information services and electronic mail
services. From a single computer terminal or personal computer, individuals on
the information superhighway are able to connect to a variety of other
electronic resources for entertainment, information or to conduct business;
most of these connections take place over telephone lines. Today, most users do
not consider connectivity costs which once prohibited heavy use of the
Internet; such costs are typically borne by companies or subsidized by the
government through educational institutions. Even in those situations where
individuals pay for connecting to the Internet, there may be a flat-rate
subsidized by advertising paid to the company providing the connection.
Blogging is a way in which people earn money. People post
the host issues(Economical, Political, Environmental) on blogging site. Other
people access this blog and pass their comments. The owner of blog will be paid
as much as blog is accessed.
Conclusion:
The conclusion is that internet has its advantages and disadvantages.
It depends upon user in which way he/she use the internet. Computer is a
electronic device, and internet is its fastest growing technology. Computer or
internet will not insist you to use it badly. Computer is not creative as human
brain. So it depends upon person that he/she use it positively and get
information or use it negatively.
If you use internet in positive way it is a very good
approach for getting knowledge.
Subscribe to:
Posts (Atom)