<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d2008464429550904405\x26blogName\x3dWonders+of+the+Internet\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://preeyaaa.blogspot.com/search\x26blogLocale\x3den_GB\x26v\x3d2\x26homepageUrl\x3dhttp://preeyaaa.blogspot.com/\x26vt\x3d6057795880905744001', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Preeya Bajaj

Saturday 28 March 2015
Multimedia

Multimedia is indeed a very powerful tool as it can spread the word and build brand awareness for any company in a unique and fast way.


How to use multimedia for marketing? 

1) Hosting Videos and Webcasting
  • great for establishing a social media presence 
  • effective promotional tools
  • Free to upload (youtube)

Webcasting refers to broadcasting a video or media file over the Internet using streaming media technology which can be distributed to many viewers at once. (similar to video podcasts) 

Why should you go through the trouble of creating a video just for your business?
- able to show how to use your product
- able to extend client base
- able to entertain customers
- able to provide a unique service 

2) Mobile Marketing 

With the prevalence of smartphones, the idea of browsing Web from a mobile phone has become common. 
- advertise on mobile phones by displaying advertisements on a Web page. 
- work with mobile ad networks and bring together advertisers and websites tat are frequently viewed by phone.


Virtual Reality

It is defined as it being a computer generated simulation of a three-dimensional image or environment that can be interacted within a seemingly real or physical way by a person using a special electronic equipment. 


Virtual reality in Medicine

- able to use virtual environments to train in everything- from surgical procedures to diagnosing a patient

Surgery
- able to perform surgery remotely by using robotic devices
- first robotic surgery was performed in 1998 at a hospital in Paris
Challenge for performing robotic surgery: Systems need to provide finely tuned sensory feedback to the surgeon.



Psychological Therapy
- use of virtual environments in treating people with phobias and other psychological conditions.
- exposure therapy: patient is exposed under controlled conditions to the stimuli that causes distress.
Advantages:  More convenient and patients are willing to try because they know it isn't the real world.

Augmented Reality

It is defined as a technology that superimposes a computer-generated on a user's view of the real world, thus providing a composite view. 


Augmented Reality Growing Platform Infographic



Popular Augmented Reality Apps
Credits: Sarvesh Chandra

1) AcrossAir (IOS)

Acrossair ar app

It is a 3D navigator to help reach the desired location easily. 
How it works: Hold smartphone upright and look around with your camera to view restaurants, hotls, landmarks, cinemas and other buildings. 
- able to show your own position by switching to Google Maps. 

2) Wikitude World Browser (Android, IOS, Windows, Blackberry)

Wikitude World Browser

It is a smartphone encyclopedia. 
How it works: use camera to browse surroundings and get information on landmarks. restaurants and other places. 

3) SpotCrime (IOS)


It shows and keeps track of all the crimes near you or anywhere on the streets of your map. With GPS, it tells you whether you are taking a safe route or not. 
How it works: Point your camera towards a street. It will show you criminal records with different colored icons for different types. 

4) Lookator (Android)


How it works: Use your smartphone to look through wifi hotspots in front of you with their relative strengths and directions. The directions may or may not take you to the hotspot areas, but Lookator certainly helps you look for a better signal. 

5) TagWhat (Android, IOS)



It helps find details of new places or landmarks which you intend to explore and get details about. 
How it works: Launch Tagwhat app with the camera and GPS. It pulls out details from the web and social networks about any landmark you encounter. 

Conclusion

Multimedia indeed has advanced over the years as we can see not only many companies. but even individuals relying on them heavily. With such advancement in technology, it is amazing how multimedia platforms like virtual reality and augmented reality can help anyone easily. From surgeons to tourists, there is something useful and beneficial for anyone. In my opinion, it is just a matter of time where everyone will become over reliant on such multimedia platforms. 

Saturday 21 March 2015
Internet Security

Cyber Crime



Retrieved from: http://www.exclusive-networks.com/blog/cyber-crime-taking-rich-giving-poor/


Microsoft has launched its Cyber crime Satellite Center on February 16 this year to enhance Cyber security in Asia, including Singapore. 

Microsoft hopes that the center will be a platform for tech giant to better facilitate a safer digital environment for everyone and help organizations make better decisions on vulnerabilities of cyber securities. 

It will be done through a two-pronged approach: 

1) There will be a collaboration with third party partners under Microsoft's cyber threat intelligence program. It will reduce malware-related infections in the region.  It will be facilitated through community based relationships to analyze and assess local and regional cyber security threats. 

2) It will create greater awareness of rising cyber crime threats and develop best practices on prevention for a safer digital world. 

Retrieved from: http://www.channelnewsasia.com/news/singapore/microsoft-steps-up-online/1661468.html 



Top 10 Virus Threats

Credits: Sharon Weinberger



1) Stuxnet
It was the first computer virus designed specifically to cause damage in the real world. Stuxnet was unique as it targeted software that controlled industrial systems. It first infected Iran's uranium enrichment facility in Natanz. It gathered large numbers of confidential data from the facility. Stuxnet was discovered only in 2010. However, it is believed to be that Stuxnet had first infected computers in Iran in 2009. 

2) Conficker Virus
Conficker Virus was believed to be discovered only in 2009. It is a computer worm that crawled its way into millions of Windows-based PCs around the world. It created a botnet army of remotely controlled computers capable to stealing financial data as other information. Conficker virus was complex and that made it difficult to stop. As a result, antivirus researchers gave it  new names,  "super bug" or "super worm". Till today, security experts are unable to identify what the worm is meant to do. 

3) Agent.btz 
Agent.btz spreads through infected thumb drives, installing malware that steals data. It as found on Pentagon computers in 2008. It is suspected to be the work of Foreign spies. Agent.btz created a digital beachhead from which data could be transferred to servers under foreign control. 

4) Zeus
Zeus has become the go-to tool for many cyber criminals today and it is readily available for sale in crime underworld. It can be used to rob passwords and files, helping to create a literal underground economy for compromised identities that can be bought and sold for little as 50 cents.In today's world, a compromised identity doesn't just mean your name, it consists of address, date of birth, mother's maiden name and even the secret security questions. 

5) PoisonIvy
It is known to be a computer security nightmare as it allows attacker to secretly control the infected user's computer. It is known as a remote access trojan because it provides full control to the hacker through a backdoor. Once it is installed in a computer, it can activate controls of the targeted computer to record and manipulate its content. It can even utilize the computer's speaker or webcam to record audio and video. The attacks of PoisonIvy has been traced backed to China. 





6) MyDoom
In 2004, it infected one million computers, launching a huge distributed denial of service attacks which overwhelmed a target by flooding it with information form multiple systems. The virus spreads through email- appearing as a bounced message. When a victim opens the email, the virus gets downloaded itself and robs the victim's outlook address book and spreads it to all the people in the address book. MyDoom spreads faster than another worm ever encountered. 

7) Fizzer
Fizzer is a worm that is all about money. Computers infected with Fizzer don't just take over your address book to spread for the sake of spreading. Instead, it uses the address book to send out familiar porn and pills spam. Fizzer was then followed by a better known spam inducing worm like SoBig which became threatening enough that Microsoft offered a $25,000 reward for information leading to its creator.

8) Slammer
It is an internet worm that can disrupt private and public services, a sign of future trouble. It works by releasing an overflowing amount of network packets, units of data transmitted over the Internet, bring the Internet on many servers to a stop. Victims of Slammer include Bank of America's ATM, 911 emergency response system and a nuclear plant in Ohio. 

9) Code Red
Code red is a gentler version of threat in comparison to modern malware. It has successfully brought down the whitehouse government website and forced other governed agencies to temporarily take down their websites as well. Although there are worms that have overshadowed Code Red, it is remembered as a turning point for malware because of its rapid spread.

10) Love Letter/I LOVE YOU
In 2000, millions of people made the mistake of opening emails labeled " LOVE YOU". The file unleashed a malicious program that overwrote users' image files. The virus emailed itself to first 50 contacts in the address book. It only took hours for Lover Letter to become a global pandemic because it played a fundamental human emotion: the desire to be loved. Moreover, Love Letter could be considered the first socially engineered computer virus. 




Conclusion

Cyber Crime indeed is very real and scary. Although it may not cause physical harm like other crimes there are still consequences that can be detrimental to the victim. With everyone relying more and more on computers, the internet, more and more virus threats are developing. Thus, every user should be vigilant and be aware of anything that seems not right. 




Friday 13 March 2015
Video Blogging

Video Blogging Timeeee!

A short amateur video done by me (or rather low quality)!


P.S. Thank you Martha Soh for allowing me to share our photos!




Thursday 5 March 2015
E- learning



Digital media - media that is encoded in a machine- readable format.


Examples of digital media:
   
Image result for video games


How can digital media enhance the learning experience?

In today's world, what where and how we are learning things are changing. With digital media advancements, we are now able to learn and experience things in new ways that was not possible ten years ago. Digital media has definitely shed a new light in terms how we learn, not solely for academic purposes, but for general purposes as well.

Enhanced learning (E-learning) has now become so important for learning in today's classrooms. Learners are now increasingly dependent on technology to help fit learning into their fast-paced, complex lives. With access to computers, tablets and mobile devices we are able to easily obtain information and learn literally anywhere and anytime. Using their personal devices, learners are able to access such forms of digital media in their institutional environments and also have the option to personalize the technologies provided by institutions.

The main point of E-learning is basically to extend learning beyond the means of the classroom which definitely makes it convenient not only for the learners but the educators too. It enhances one's experience and provides a helping hand when in time of need.

Credits: Effective Practice in a Digital Age - University of Bristol




Future digital classroom

The definition of teaching in a classroom will be redefined.


1) Each student may have a digital device as it is predicted that technological devices will be much cheaper in the future.
- Every activity or test will be conducted solely on a tablet or on a laptop.
- No more writing on pen and paper.

2) No limitation to learning only within the classroom
- Example: virtual field trips using wearable technology devices





3) Designs of classroom will be more informal to encourage interaction between teacher and student.
- Classrooms will be more visually stimulating will which make students more comfortable to voice out.


external image ex13591.jpg

4) Increased emphasis on learning models that were not available due to geographical barriers.
- Encourages active construction of knowledge and skills
- Students will also have the liberty to construct their own learning models with all the available electronic resources

5) Technological tools that will replace current tools
- No more whiteboards. Instead, there may be projectors combined with cameras allowing walls to be touchscreen computers.
- Electronic portfolios of students that allow comments and feedback. Parents able to easily monitor child's progress. 
- 3D printers that could print for example, historical objects that can allow students to interact with physically. 

Credits: Education 2025


Conclusion

Today, digital media is already slowly taking its place in institutions. Many of them rely heavily on digital media in the form of E- learning that enhances the learning experience of students. Many students are already getting accustomed to the idea of E-learning. Any question they have, they go to the different forms of digital media that give them the answer almost instantaneously.

Looking the different ideas that everyone has about the future digital classroom, we can already see some of the ideas slowly being incorporated into the learning experience. Many institutions today already have their own e-learning websites. Educators are already using  the different forms of digital media to educate their students. The whole style of learning and teaching is already changing from the boring old classroom to the incorporation of virtual aspects in the classroom.



Digital media used in a classroom does bring its benefits, however, there are also drawbacks to it.
1) Some students may learn best by physically and mentally interacting with what they are studying.
2) Distractions
3) More cheating may occur due to having easy access to technological devices