Blog Timeline

Document on Judiciary - Views on a National Information Policy

  • Tuesday, March 8, 2011
  • by hbopuri

In the wake of the 9-11 attacks, as America began searching for answers, it became clear that the means of sharing critical information between the various organizations engaged in protecting us were woefully inadequate. With the many initiatives put forth since then, there has been improvement in the timeliness and quality of information sharing, but there is still no comprehensive, methodical and disciplined approach to overcoming the institutional and cultural barriers to more effective information sharing. Without such a long term approach, we may be inadvertently increasing our risk – we may be moving away from a “risk avoidance” approach to information sharing to a “risk acceptance” approach in which we have not properly weighed the risks versus benefits involved. This paper will lay out a recommended approach to a comprehensive national information policy that would be based on principles of risk management. The key points are:

            The Federal Government must develop a comprehensive national information policy that provides an overarching framework for developing specific guidance in areas such as information security, classification and declassification decisions, and information sharing with international, state, local, tribal, non-government partners and the public.

            This information policy must be based on a rational risk management methodology that balances need to know against the need to protect. Risk management, for the purposes of national policy, must include risk analysis and risk response processes.

            Risk, as a commonly used but not commonly understood term, is composed of criticality (sometimes referred to as “impact”), vulnerability, and threat (includes all hazards).

            The proposed risk management methodology can be developed on the basis of existing analytical models. The key concept is that, under the national information policy, content should regarded as an asset and that risks can be determined in a similar fashion to the way we determine risk for other assets, such as infrastructure.

Ecommerce in Cyber World

  • Saturday, December 18, 2010
  • by hbopuri

Abstract
Today, Information Technology Field is the fastest growing field among common people and is making history. Very importantly, Digital Technology has created a revolution in this IT field, with a phenomenal influence. With the huge development in World Wide Web, emerging into the Human Kind, market / common man had got better access to perform transactions through this medium called Cyberspace, for the sake of more convenience. The predefined terms and procedures for performing transaction and maintaining web work is called as Cyber space Laws. The threat of Cyberspace began with Copyright issues, though the content published on any website can be considered as a book or a magazine at a book store. The copyright rules are also applicable for the content published in websites. In some cases, users are deceived about Secured Socket Layers. As a matter of fact, most of the common users are not aware of checking the security levels of the site they are browsing, which in turn raises wide chances for fraud activities. Very importantly, some of the small to medium scale companies are relied on third party web hosting services, knowingly or unknowingly sharing the access to the program / content / information, which can play a crucial part in manipulations.

Introduction
Today, Information Technology Field is the fastest growing field among common people and is making history. Very importantly, Digital Technology has created a revolution in this IT field, with a phenomenal influence. The present era is significantly dependent on Internet today, starting from Online Games to Shopping to Confidential Banking process; everything is trusted and dependent on the word World Wide Web. This change has speeded up things in our daily routine, which resembles drastic change among our traditional lifestyle to this millennium era.

            The birth of Internet had started with an intention of serving major fields, like Military, as Intranet for their Secured communications and information passages within their internal departments with High Speed and safe delivery, and which eventually emerged into a common man life.

Secured Socket Layer in Ecommerce

  • Thursday, November 4, 2010
  • by hbopuri

Introduction
Today, Information Technology Field is the fastest growing field among common people and is making history. Very importantly, Digital Technology has created a revolution in this IT field, with a phenomenal influence. The present era is significantly dependent on Internet today, starting from Online Games to Shopping to Confidential Banking process; everything is trusted and dependent on the word World Wide Web. This change has speeded up things in our daily routine, which resembles drastic change among our traditional lifestyle to this millennium era.

            The birth of Internet had started with an intention of serving major fields, like Military, as Intranet for their Secured communications and information passages within their internal departments with High Speed and safe delivery, and which eventually emerged into a common man life.
World Wide Web
As we all know, there are few terms and procedures needed to be followed for operating any kind of transactions in this Physical world, which are also applicable for Cyberspace. These predefined terms and procedures are called as Cyber Laws. Considering the intersections of various fields on Internet, these laws are an attempt to apply laws designed for the physical world to human activity on the World Wide Web.

Mobile User Interfaces

  • Saturday, September 18, 2010
  • by hbopuri

Mobile User Interfaces
Abstract
In order for any UI to be successful, the vision and the work process (i.e. the concept design and the visual design / direction) must be there, and the technology must facilitate the implementation of such a vision. The UI vision is the undisputed law as a fundamental part of the device storytelling and brand positioning. Everything else is subordinate.
I would like to use this opportunity to work on Rich Mobile user interface to Make a Good Looking List with Powerful Features, customized Grids, Layouts in other words to make it modern by using Tool kits like Resco Mobile Forms.
I have option to Choose platform from Android, Windows phone and iPhone, out of those I choose to work on Windows Phone because it’s because the most popular development environment in developer community.

Business Intelligence

  • Saturday, April 24, 2010
  • by hbopuri

Business Intelligence
This is a technique implemented to get the data, in user required format. To be more specific, with BI a Computer can generate a report of an organization performance in Past, Present and also can predict the future performance. It can be in any means i.e., report based on sales, performance etc.
Based on these reports generated, Organization's makes decisions for the better performance of their entity.
In other words, Business Intelligence has made Decision Making much easier than before.
“Gartner” has acknowledged Microsoft as leader in Business Intelligence. As we are aware that Microsoft is working hard to reach the BI to all the common users through the software they develop, such as Microsoft Office.

Search

Latest Posts

  • Document on Judiciary - Views on a National Information Policy

    Read more
  • Ecommerce in Cyber World

    Read more
  • Secured Socket Layer in Ecommerce

    Read more