Wednesday, November 26, 2008

Blogs Usage by Organization


The number of organization using blog is growing rapidly. Many staff members and volunteers use blogs for conversation, news, and general transparency, it seems like organizations are begin to understand the use of blog. Organizations of all sizes and sectors are utilizing this community building tool.

What is blog? what is the difference between blog and website?
All website has a home page, with links to lots of sub-pages that have more detail. Most business site follows the same format. But a blog is much simpler than a website. A blog is normally a single page of entries. There may be archives of older entries, but the main page of a blog is all anyone really cares about. A blog is organized in reverse chronological order, from most recent entry to least recent. A blog is normally public where the whole world can see it. Basically, a blog is a lot like an online journal or diary. The author can talk about anything and everything. Many blogs are full of interesting links that the author has found. Blogs often contain stories or little snippets of information that are interesting to the author.




What is the advantage of using Blog for organization?

Blogs are cost effective, no need to know programming, easy to update and build up online network.

Cost-Effective Site Creation: There is need to worry about site creation costs and maintenance fees when using free blog sites. This Internet service offers fully-functional site development tools to create professional-looking websites complete with features and applications. No don't have to hire a professional Web developer to do the job since free blog sites can be made with just a few clicks of a mouse button.

No Need For HTML Programming: One problem faced by organization is coming up with a site from scratch using HTML programming. HTML or Hypertext Markup Language is used by Web programmers to create websites complete with all the features and provisos that make it look professional and clean. Free blog sites offer a user-friendly interface that will allow an organization to create their website just by toggling some of its features. There is no need to place in HTML formatting tags instead by just using text boxes, site contents are created. Pictures and Links can be entered just by clicking the button. Blogs are user friendly.

Easy Update: Information is very important in putting up a website. To improve or maintain the online popularity, it is necessary to update information relevant to the topic that will attract the interest of other visitors. Free blog sites contains features where information can be posted just by typing and pasting it. And, third-party applications can be submitted directly to the blog without opening a Web browser. Basically, managing a blog is much easier and efficient than website.

Build Up the Online Network: Since most Web surfers today are busy checking out blogs instead of looking for information they need on different sites on the Internet. Therefore, an organization can easily build-up their online network with every visitor that drops by this page. Since each of the posts can be given a comment by anyone who views the blog, they can easily interact with them to increase their online popularity. Guestbook and chat room are offered free by blog sites to make the page as interactive as possible for better communication with others.

The Chart below shows the percentage of each different topics that are posted in blogs. And different languages that are used in blogs.

Although there are several advantages, many organization avoid using blogs due to some disadvantages that associated with it. For example blogs are easy to start but they are hard to maintain. Writing coherently is one of the most difficult and time consuming tasks for a human being to undertake. Far from blogs being a cheap strategy, they are very expensive one, in that they eat up time. As a result, many blogs are not updated, thus damaging rather than enhancing the reputation of the organization. Also, many people don't have very much to say that's interesting or unable to write down their ideas in a compelling and clear manner. Moreover, organizations are not democracies. The web makes many organizations look like disorganizations, with multiple tones and opinions. Most customer prefers it if the organization they are about to purchase from is at least somewhat coherent.



References:
http://en.wikipedia.org/wiki/HTML
http://www.modernlifeisrubbish.co.uk/article/leading-average-top-blog-trends
http://www.netsquared.org/blog/amysampleward/organizations-putting-blogs-good-use




Disadvantage of Using Java Ring



Although, Java Ring can be the most secure storage medium for many industries, the cost of implementing the system could be very high. Even though ibutton can be purchased for cheaper price, in order to function, it needs a receiver such as blue dot receptor which could be very
expensive. Also, it needs a high level tools and method in order to program application efficiently, reliably, securely.



A Java Ring-based system doesn’t automatically allow user mobility. The problem with the Java Ring that many of the organization don't even know the existence of Java Ring. User mobility is only possible if every machine that the user accesses has a iButon reader attached. The machine must support the same standard ibutton reader interfaces or use the same proprietary iButton reader.

iButton has a limited processor power and memory. For better performance and scalability it is imperative to move the processing load to the application server. Also only limited amount of information can be stored which means an individual might need to carry more than one Java Ring. Carrying the Java Ring everywhere could lead to theft issues .



References:
http://people.cs.uchicago.edu/~dinoj/smartcard/javaring.html
http://www.javaworld.com/javaworld/jw-04-1998/jw-04-javadev.html?page=2
http://www.javaworld.com/javaworld/jw-04-1998/jw-04-javadev.html?page=3

Tuesday, November 25, 2008

Advantages of Using Java Ring


The Java Ring are very easy and convenient way for users. They are more secure than using passwords since passwords are short or can be guessed. Java Ring provides authentication to users which is crucial for many applications. It is easier for administrator to maintain the security infrastructure. And, it provides real memory, more power, and a capacity for dynamic programming. Java Ring used widely all around the world for several applications such as Access Control, Asset Management, e-Cash and for many other purpose.

Asset Management:
The Java Ring provides a simple, secure way of identifying a person or asset. It can serve as an electronic serial number that is never duplicated. With an memory up to 32k bytes, Java Ring can also give the asset their own personalized database. Each asset will have the ability to store unique information about itself and have that information permanently affixed to the asset. This makes Java Ring perfect for various asset management and data collection functions such as equipment maintenance records and inventory management. For example, The Sun concept car's security is based on a Java Ring that contains a profile of the user. By connecting your Java Ring to a ring receptor in the car, and the car knows, based on your profile, what you are allowed to do. In a family where both the husband and wife drive the car, each has individualized settings, so that when they enter the car, their environments are configured to the profiles on their rings. Java Ring are authorized through Personal Identification Number so that no one can steal a person's ring and run off with the car.



Access Control
:
An Java Ring becomes a personalized key to protected assets and information. By touching the correct key to an iButton reader, the desired event, such as, opening a lock is enabled. Java Ring are perfect for various access control functions like access to buildings, computers, vehicles and equipment.



e-Cash:

Java Ring can be an personalized token and acts like a small change purse for one or multiple applications. It enables to complete transactions, like dispensing a candy bar or metering a prepaid volume of water. By using Java Ring, it eliminate the need to carry small amounts of cash, and it can service multiple, independent applications. They are perfect for a wide variety of e-Cash functions like mass transit systems, parking meters, gaming systems, vending and fleet refueling.


In additional, Java Ring can last longer than smart card. The silicon chip within the iButton is protected by the ultimate durable material: stainless steel. The iButton is wear-tested for 10-year durability. Moreover, the monolithic chip includes up to 134 K of SRAM that is specially designed so that it will rapidly erase its contents as a response to an intrusion. Rapid erasing of the SRAM memory is known as zeroization. When an iButton detects any intrusion, it erases its private keys leading to zeroization. With it zeroization capability and the private key, Java Ring is one of the least counterfeitable devices. It will destroy itself rather than reveal its secret when tampered.



References:
http://electronics.howstuffworks.com/digital-jewelry3.htm
http://en.wikipedia.org/wiki/Static_random_access_memory
http://en.wikipedia.org/wiki/Java_ring

The Usage of Java Ring Replaces Other Technology



The Java Ring is ideal for applications where information needs to travel with a person or object. It replaces many memory devices that can hold files and sub-directories and can be read and written like small floppy disks. It can also replaces many password protected devices that are used for financial transaction, point-of-sales transactions, remote access authorization, data logging , maintenance, and quality control. It has the potential to replace coins, paper money, credit card and other identification card. Since the rings can been programmed to store electronic cash, automatically unlock doors, store a medical information and other personal information. Also, Java Ring with the iButton can overcome the deficiencies of the secret passwords or pin number. It can be used to store the secret passwords and private keys needed to conduct a transaction. Using the Java Ring, the keystrokes can be eliminated with a quick press of the Blue Dot. Internet services like e-banking or door opener can be secured and personalized without entering the name and password.



The video explain about all the job tasks that can be accomplished using the iButton in the Java Ring. Beside personal computer access, many companies currently utilize the Java Ring technology to control physical access to restricted areas within their facilities or to keep track of truck maintenance or for mailbox identification. In the future, Java Ring can eliminate keys, and other tools that are carried by an individual for everyday usage.



References:

http://findarticles.com/p/articles/mi_m0CGN/is_/ai_20426377
http://electronics.howstuffworks.com/digital-jewelry3.htm
http://ringbow.com/?p=73

Sunday, November 9, 2008

The Java Ring



A Java Ring is a wearable finger ring that contains a small microprocessor. The Java Ring is an extremely secure java powered electronic token with a continuously running, unalterable real time clock. It is a sort of smartcard that one could wear on a finger. Java Ring was first introduced at the Sun Microsystem's JavaOne conference in March 1998. It was launched by Dallas Semiconductor. The Java Ring is made of stainless-steel, 16 millimeters in diameter, that houses a 1-million transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, and a java virtual machine, which is a piece of software that recognizes the java language and translates it for the user's computer system. It is a computerized ring that can be used to automatically unlock doors, store information or log on to computers.

The major component of this ring is iButton. The iButton is a self-powered computer chip with networking serial number housed in a 16mm stainless can. The iButton has an unique way of communication by touch contact of the button to a variety of read/write devices. iButton makes many capabilities which are limited to a stationary or hard wired computer and portable. Among these capabilities are user accessible memory, timekeeping, temperature measurement or logging, and encryption computation. It has the ability to perform large integer modular exponentiation at high speed which is central to RSA.



Each iButton has an unique address laser etched onto its chip inside the can. The address can be used as a key or identifier for each iButton.The iButton connects to computers with a blue dot receptor. Like a smart card, an iButton does not have an internal power source. It requires connection to a reader (Blue Dot Receptor) in order to be supplied with power and to receive input and send output. The receptor has an adapter that connects to the computer's serial, parallel, or USB port. Each receptor contains two blue dots to accommodates instance where multiple iButtons are required. Communication is established when an iButton is touched to the blue dot receptor. When not in contact with an receptor, the state of the Java virtual machine and memory is maintained with lithium backup power.



The Java iButton is simply the latest and most complex descendant of a long line of products that have proven themselves to be highly successful in the marketplace. With its stainless steel armor, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions. The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle.



References:

http://searchsoa.techtarget.com/sDefinition/0,,sid26_gci836660,00.html
http://electronics.howstuffworks.com/digital-jewelry.htm/printable
http://people.cs.uchicago.edu/~dinoj/smartcard/javaring.html