tag:blogger.com,1999:blog-79551399104449766942024-02-07T04:20:19.329-08:00security researchermarwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-7955139910444976694.post-50321720615899363962012-11-24T13:30:00.002-08:002012-11-24T13:30:40.807-08:00Web-based software<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">Web-based software.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">According to Technology’s promise,
web-based software is going to dominate the IT side of Enterprises due to the
fact that business organization are increasingly moving towards a web-based
operating environment. Many companies like Google, Amazon, and HP are leading
efforts to encourage the development of web-base applications especially in the
open source style. The major benefit of
adopting and using web-based applications is that it eliminates the need for
traditional installation and maintenance issues; with web based software, users
do not have to worry about installing, configuring, or maintaining any software
as everything is centrally managed by a company’s IT department or an a third
party business partner. According to the
text book, Microsoft is launching an online version of its popular MS office
suite products and will be available for users online. If this trend continues,
we should expect to see and interact with virtually any application from the
comfort of a web browser ; In other words, our operating system will be transformed
to a web browser that provides the same performance and functionality as an
operating system does. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">Two forces that may impact the
evolution of this technology forecast:<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">Force #1: Globalization: as we
continue to live in a high-tech and highly global business market, corporations
and institutions around the world need their employees, customers, and business
partners to have access to applications in a timely manner without the need to
manually install and configure software. This force will further help this
technology to move fast and mature.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">Force #2: Financial: the cost of
purchasing software, maintaining and
supporting it will lead corporations to move away from this traditional
approach and shift towards a web-based environment that provides cost effective
web-based solutions and help boost employees’ productivity and performance.<o:p></o:p></span></div>
marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com0tag:blogger.com,1999:blog-7955139910444976694.post-33834261614557644592012-11-17T13:18:00.002-08:002012-11-17T13:19:19.634-08:00Smartphone Security<a href="http://animoto.com/play/NWq1c55hk0Htqbbz17sQSg">http://animoto.com/play/NWq1c55hk0Htqbbz17sQSg</a><br />
<br />
This is an excerpt from my dissertation about the importance of protecting our smartphones from emerging cyber attacks.<br />
<br />
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ascii-theme-font: major-bidi; mso-bidi-theme-font: major-bidi; mso-hansi-theme-font: major-bidi;">Smartphones
are becoming enriched with confidential information due to their powerful
computational capabilities and attractive communications features. The Android
smartphone is one of the most widely used platforms by businesses and users
alike. This is partially because Android smartphones use the free, open-source
Linux as the underlying operating system, which allows development of
applications by any software developer. This research study aims to explore
security risks associated with the use of Android smartphones and the sensitive
information they contain; the researcher devised a survey questionnaire to
investigate and further understand security threats targeting Android
smartphones. The survey also intended to study the scope of malware attacks
targeting Android phones and the effectiveness of existing defense measures. The
study surveyed the average Android users as the target population to understand
how they perceive security and what security controls they use to protect their
smartphones. Research findings indicated that Android smartphones lack
proactive security measures to provide adequate protection against emerging
malware attacks; they also showed that Android apps impose the most imminent
security risks, especially because Google Android does not deploy security
policies to recognize legitimate apps from malicious ones. Hackers, in turn,
have exploited this security flaw and have passed harmful apps into the Android
Market. As a result, personal and
financial information residing in Android smartphones is exposed to malware
attacks. Therefore, it is essential to
develop effective protection mechanisms. The researcher proposes to build a
proactive security framework that can detect and deter malware attacks
targeting Android smartphones. <o:p></o:p></span></div>
<br />
<br />
<br />
Two forces that may impact the smartphone security are:<br />
Force #1 : Technology: This could be a double sword thing because new and more innovative technologies for smartphones can make it hard to protect them since users are usually distracted from the core value of these phones and only focus on the entertainment element of them. On the other side, as more innovative technologies come to the scene, we may see some break through technology that could provide ultimate protection for our smartphones without making users worry about the security aspects of this technology.<br />
<br />
Force # 2: Society: our society is becoming increasingly more dependent on these gadgets which motivates hackers to craft more sophisticated attacks to compromise our smartphones and potentially steal our confidential information.<br />
<br />
<br />
<br />
<br />
<br />marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com0tag:blogger.com,1999:blog-7955139910444976694.post-73454009965156614502012-11-11T20:09:00.001-08:002012-11-11T20:09:21.219-08:00Technological progress<br />
The author of the futurist states in page (23) that Technological progress will be one of the future trends that will shape our future. I think this prediction is already trending as we see the power of technology to enable humans to reach their goals faster and achieve their purposes more efficiently.<br />
we can think of the power of the digital technology and look at how it has helped transform our lives in way that could never have imagined in the past. we live in a highly digitized world where our world is at the tip of our fingers and we can achieve virtually any task using the Internet and our computers as digital tools. we are yet to realize even more powerful tools and technologies resulting from the use of digital infrastructure as a daily routine in our lives. we should expect to work completely from home and interact with our society without even leaving our homes. thanks to our digital power.<br />
<br />
Forces that may affect this future trend or forecast:<br />
Force #1: Society: our society seems to be adopting the digital technology at an exponential rate. its completely embracing the digital world and making it an essential element of our daily life. this force will certainly help this technology to further strive and reach new heights.<br />
<br />
Force #2: Economical: we live in a global economy; therefore we should expect the digital technology to see more adoption as business and organizations increasingly rely on the digital power to achieve their goals and meet customer expectations. The digital technology will certainly help achieve economic growth and contribute to making our economy more interconnected and more globalized.<br />
<br />
<br />
Reference<br />
Edward Cornish. Futuring: The Exploration of the Future.<br />
marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com0tag:blogger.com,1999:blog-7955139910444976694.post-3905617081743521942012-11-05T20:12:00.000-08:002012-11-06T13:07:13.115-08:00the power of connecting people and ideas<br />
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
<b><span style="color: black; font-family: "Arial","sans-serif"; font-size: 14pt;">Generative
Dialoge: <o:p></o:p></span></b></div>
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
<b><span style="color: black; font-family: "Arial","sans-serif"; font-size: 14pt;">The authors
state that issues derive the need to generate ideas; indeed as the popular
expression says ‘ Necessity is the Mother of Innovation’. This seems to be a
valid reason why we now enjoy the benefits of communicating and interacting
with people in an inter-connected world. When we provide a facility where
knowledgeable people can engage in productive and disciplined dialogues; we
should expect to reap good results about any particular issue of interest. This
is based on the principle of connecting people and ideas to facilitate
innovation. I think any innovation idea should be based on this principle
because people tend to produce better results when they are engaged with people
who share similar values and interests. Furthermore; with the advent of the
Internet, there is no better way of connecting people and ideas from diverse
cultures and backgrounds and help them find paths to innovate. <span style="mso-spacerun: yes;"> </span>I would use the Generative Dialogue to explore
innovative ideas about securing our digital infrastructure and ensuring the
privacy of people using the cyber space every day. I would invite people from
around the globe to participate and engage in a dialogue where every one’s
ideas are values and considered as an essential element of a strategic
innovation to secure our cyber space. When we invite people to participate and
connect with people from similar fields and backgrounds, they feel more
enthusiastic, motivated, rewarded, and most of all: challenged to produce the
best ideas that will become part of the future innovation. <o:p></o:p></span></b></div>
<br />
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
<b><span style="color: black; font-family: "Arial","sans-serif"; font-size: 14pt;">Forces that
affect this innovative idea:<o:p></o:p></span></b></div>
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
<b><span style="color: black; font-family: "Arial","sans-serif"; font-size: 14pt;">Force # 1:
Technology: the internet has revolutionized the way people live and communicate
and this innovative idea would certainly gain momentum via the use of Internet
as a powerful and efficient way to connect people and their ideas. So the
Internet can significantly facilitate and expedite this innovation.<o:p></o:p></span></b></div>
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
<b><span style="color: black; font-family: "Arial","sans-serif"; font-size: 14pt;">Force # 2:
Culture: I believe that people feel more inclined to collaborate with people
from other cultures and backgrounds who share similar innovative ideas or
particular interests. If we empower people and enable them to engage in
productive dialogues, they will certainly produce quality results in a timely
manner and thereby work towards a common goal or innovation. <span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></b></div>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ_h18AD02fZx3_OR2I9jMN_JqoeFqa5oUZxfnAukYDbpRQZPVh41dmiuNFIuD5nGyh5bEUX9yYf23D3bcFb8R6_uqJyW4IfUUgEjt4vPSpzMajiKPjU1W1kd-cOzIHmN9co2JbCeuSgDw/s1600/stage_of_inquiry.gif" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="249" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ_h18AD02fZx3_OR2I9jMN_JqoeFqa5oUZxfnAukYDbpRQZPVh41dmiuNFIuD5nGyh5bEUX9yYf23D3bcFb8R6_uqJyW4IfUUgEjt4vPSpzMajiKPjU1W1kd-cOzIHmN9co2JbCeuSgDw/s320/stage_of_inquiry.gif" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><strong style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">The SDP Process</strong></td></tr>
</tbody></table>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
</div>
<br />
<h1 align="center" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 1.7em; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-size: small;">References</span></h1>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 16px/normal Arial, Verdana, Helvetica, sans-serif; letter-spacing: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
Christakis, A. (n.d.).<span class="Apple-converted-space"> </span><i>The SDP Process.</i><span class="Apple-converted-space"> </span>Retrieved October 24, 2012, from Harness Collective Wisdom: <a href="http://www.harnessingcollectivewisdom.com/sdp_process.html">http://www.harnessingcollectivewisdom.com/sdp_process.html</a></div>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 16px/normal Arial, Verdana, Helvetica, sans-serif; letter-spacing: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
</div>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 16px/normal Arial, Verdana, Helvetica, sans-serif; letter-spacing: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
Schreibman, V., & Christakis, A. N. (2007). New Agora: New Geometry of Languaging and New<span class="Apple-converted-space"> </span><a href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=150321#" id="_GPLITA_3" in_hdr="" in_rurl="http://i.trkjmp.com/click?v=VVM6MjYwMTk6MTQ5Nzp0ZWNobm9sb2d5OmZiNDdjNWJiYmQxYTNhZWZjNjlhYmRhYzRkNzNkOTE3OnotMTI0Mi05MDkyNDp3d3cuY3R1ZG9jdG9yYWwubmV0OjE2MDA1OjVlMThmYjU5ZTk2MGZhZDIxMDY5NmZkZTliNWU4Yjg2" style="color: blue; text-decoration: underline;" title="Click to Continue > by Giant Savings">Technology</a><span class="Apple-converted-space"> </span>of Democracy: The Structured Design Dialogue Process.<i>International Journal of Applied Systemic<span class="Apple-converted-space"> </span><nobr><a class="FAtxtL" href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=150321#" id="FALINK_1_0_0" style="background-color: transparent !important; border-bottom-color: rgb(28, 125, 255) !important; border-bottom-style: solid !important; border-bottom-width: 1px !important; color: rgb(28, 125, 255) !important; display: inline !important; font-weight: normal !important; padding-bottom: 1px !important; text-decoration: underline !important;">Studies</a></nobr></i><span class="Apple-converted-space"> </span>, 15-31.</div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none;">
</div>
marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com0tag:blogger.com,1999:blog-7955139910444976694.post-60190366208212598332012-10-28T09:40:00.001-07:002012-10-28T09:42:51.002-07:00NGT versus Delphi method<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">The NGT is a research tool that was originally developed by by Delbecq et al in 1971 to gather consensus on planning activities within organizations and help in prioritizing those activities. One of the characteristics of the NGT method is that it’s an iterative process that enables group </span><a href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=149816#" id="_GPLITA_1" in_rurl="http://i.trkjmp.com/click?v=VVM6Mjc1NTI6NDpwYXJ0aWNpcGF0aW9uOmQxYzcxNWU0YTRiNzZmZTBiMmExNDJiNmU0ZjZmZWE4OnotMTI0Mi05MDkyNDp3d3cuY3R1ZG9jdG9yYWwubmV0OjE5OTY2OmM4YWI0M2Q1MzllODg5ODA4ZDFlMjE0NzA5NDg5MGMz" style="background-color: white; color: blue; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" title="Click to Continue > by Giant Savings">participation</a><span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"> and feedback about specific issues. It helps gather feedback from groups of 5 to 10 participants within a short period of time. It also allows individual participants to voice their opinions and ideas about issues thus preventing the discussion to be dominated by a single participant. The other characteristic or benefit of this research tool is that it allows individual group members to present their own judgments and make group members feel the value of their viewpoints and input. This in turn, can also encourage even the shyest members to provide input and feedback without being constrained with a prescribed thought from the researcher or moderator. Another characteristic of this technique is that it can produce a large number of thoughts or answers in a very timely manner which could ultimately help meet the research objective or purpose. </span><br />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">The Delphi method was developed in the 1950’s with the aim of gathering opinions and feedback to reach consensus on a research topic. This research technique best fits research topics where future predictions or forecasting is required. It aims at collecting expert knowledge and thoughts from subject matter experts in a </span><nobr style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"><a class="FAtxtL" href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=149816#" id="FALINK_1_0_0" style="background-color: transparent !important; border-bottom-color: rgb(28, 125, 255) !important; border-bottom-style: solid !important; border-bottom-width: 1px !important; color: rgb(28, 125, 255) !important; display: inline !important; padding-bottom: 1px !important;">domain</a></nobr><span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"> and uses that knowledge to reach a consensus on the underlying research topic. The other characteristic of this </span><nobr style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"><a class="FAtxtL" href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=149816#" id="FALINK_2_0_1" style="background-color: transparent !important; border-bottom-color: rgb(28, 125, 255) !important; border-bottom-style: solid !important; border-bottom-width: 1px !important; color: rgb(28, 125, 255) !important; display: inline !important; padding-bottom: 1px !important;">research method</a></nobr><span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"> is that it attempts to answer questions about what could or should happen in a field within a time frame so that a future prediction or forecast can be made. </span><br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">The main different between the two research methods is that the NGT can generate </span><a href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=149816#" id="_GPLITA_2" in_rurl="http://i.trkjmp.com/click?v=VVM6Mjc1MzQ6NDpyZXN1bHRzOmMwODFlNWI4YzE0ZWQzOTg1ZGQ0MGNjNTU2NjBlMTNjOnotMTI0Mi05MDkyNDp3d3cuY3R1ZG9jdG9yYWwubmV0OjE5OTI5OjU5Y2VkM2M1NjhkOGIxMzE4YWY4NTE1NzI2MWJjM2Iw" style="background-color: white; color: blue; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" title="Click to Continue > by Giant Savings">results</a><span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"> and consensus with a short time period such as an hour or two hours whereas the Delphi technique can take days to solicit input and ideas of participants. And because of this time frame difference, the NGT can be used as an effective real time research tool to determine a future trend or prediction within a short time frame whereas the Delphi technique needs much more time to gather the opinions and feedback of experts of pressing research issues and use that knowledge to make decisions about future trends and forecasts. </span><br />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">One force that could affect the success of those methods is the ethical aspect of group participation. How sincere are the participants when they provide input and feedback can impact the quality of the results obtained from either technique. The other force is the technology force; which technology do we use to gather expert opinion of research topics. Are we using </span><a href="http://www.ctudoctoral.net/mod/forum/discuss.php?d=149816#" id="_GPLITA_0" in_rurl="http://i.trkjmp.com/click?v=VVM6MjMwMzk6MTIyMDpzdXJ2ZXlzOmUzOWI4MWNmYzBiNjAxNDdiOWU0MWQxNDZkNjk4ZWQwOnotMTI0Mi05MDkyNDp3d3cuY3R1ZG9jdG9yYWwubmV0OjEwNDkxOjE1ODYxYjhjMTQ5OTM3MmM0NzI4MmYwZGFlYTM3MDcw" style="background-color: white; color: blue; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" title="Click to Continue > by Giant Savings">surveys</a><span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">, face-to-face interviews of e-mail communication to communicate with participants? If we use face to face interviews, then we may get more candid answers and solutions of the underlying research issues. </span><br />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">references</span><br />
<a href="http://www.stfm.org/fmhub/fm2004/June/Alison402.pdf" style="background-color: white; color: blue; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px; text-decoration: none;" target="_blank">http://www.stfm.org/fmhub/fm2004/June/Alison402.pdf</a><br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">VargaAtkins,T;withBunyan,N.;McIsaac,J;Fewtrell,R(2011)Usingthenominalgrouptechniquewithclickerstoresearchstudentexperiencesofe learning:aprojectreport.WrittenfortheELESIGSmallGrantsScheme.Liverpool:UniversityofLiverpoo</span>marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com0tag:blogger.com,1999:blog-7955139910444976694.post-40208057117955552892012-10-16T09:44:00.001-07:002012-10-30T11:29:01.809-07:00Collaborative and active learning will dominate the educational world<br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">Innovation #1: Collaborative and active learning will dominate the educational world</span><br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">educational institutions around the world are realizing the importance of teaching students projects that are based on collaborative learning styles and involve active learning. this is because many business organizations are demanding workers who can collaborate and participate to achieve business projects. to further support and enforce this idea of active and collaborative learning methodology; schools have started utilizing open source software tools that students and their respective teachers can use to implement the theories and practices. open source tools are becoming an integral part of many schools curricula because they have proven to be useful in preparing students for jobs that require practical knowledge and experience. for example, in Pen. State University, they offer a software engineering degree that uses open source software tools to teach project management, software development, and other software engineering practices. other Universities are teaching web development technologies using free open source software such as word press. </span><br />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">Innovation #2: People expect to be able to work, learn, and study whenever and wherever they want to: I do believe that this key trend will become a reality in the next five to ten years due to the fact that we live in an increasingly interconnected world that removes all the geographical barriers to both work and school. access to higher education is no longer a challenge to busy working professionals as they can do their homework assignments from the convenience of their finger tips. furthermore; the asynchronous nature of the online education allows people from around the globe to participate in online forums and contribute to teaching and learning in an unprecedented manner. by the same token, people can work from home or anywhere with an internet connection thus eliminating the transportation barriers and enabling the workforce to become more productive and more efficient in the way the conduct daily business operations.</span><br />
<br style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;" />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">One force that could enhance or further define the two key trends is the Technological one which is the Internet. with this revolutionary technology, people can communicate and share information instantly and stay up to date with the latest news that concern their business or education. </span><br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;">The other force is the economical force, as we continue to live in a global economy, business increasingly require their units to be geographically dispersed and yet still be able to communicate with other units in a timely manner. with the new networking technologies such as VPN, employees can stay connected to their business resources using the Internet as a tool to keep them productive no matter where they are. </span><br />
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 16px;"><br /></span>
<span style="background-color: white; font-family: Arial, Verdana, Helvetica, sans-serif;">I think the effect was that they were able to ensure that they obtain a fresh and realistic perspective from educators and teachers around the globe. Those participants came from diverse backgrounds and held particular interests and expertise in the focus areas of the Horizon report. I think their goal was to produce a very inclusive and realistic report that can serve as an authoritative educational resource for educational community. </span><br />
.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx9dZJSHeEK0QKIh1E59C56-etlv7VGZe6lNMdHjQld9htp1qmAQSYtDOJup49s44o3I_fL-LDp6HtjMupKV5n8jhsCT_txH494IIhkFr711DWEmx9-ECrZ8jIqdEmLu9qVWU2mvelZlsB/s1600/WP.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx9dZJSHeEK0QKIh1E59C56-etlv7VGZe6lNMdHjQld9htp1qmAQSYtDOJup49s44o3I_fL-LDp6HtjMupKV5n8jhsCT_txH494IIhkFr711DWEmx9-ECrZ8jIqdEmLu9qVWU2mvelZlsB/s320/WP.jpg" width="313" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Word Press. the world's best blogging platform. (<a href="http://www.socialbrite.org/2010/07/16/12-open-source-tools-you-should-be-using/">http://www.socialbrite.org/2010/07/16/12-open-source-tools-you-should-be-using/</a>)</td></tr>
</tbody></table>
<br />marwansmartphonesecurityhttp://www.blogger.com/profile/08609329102953007194noreply@blogger.com1