Friday, April 1, 2016













IT has made great leaps in recent years to make sense of the huge volumes of data being generated in every industry. But the IT trends of 2016 are going to be about taking the next step, a very exciting step.
Companies looked out across the sea of sensors, mobile devices, social media, video and other sources, and they called it “big data.” They began to glean business insights from the data, identifying important new patterns and connections. Manufacturers discovered significant ways to improve operational efficiencies in both manufacturing and product service. Commercial enterprises developed a more complete understanding of their customers’ true needs and habits to develop better products to improve revenue and profitability.
But as 2016 approaches, the focus is shifting toward more specific decisions guided by relevant data in critical contexts. Bringing in new sources of data to complete the analytical picture — the right sources for the right analysis — will allow IT-driven businesses to improve the decisions, at scale, that deliver the most productivity, while mitigating risk to the organization.
In fact, CIOs who develop strategies around this trend, and everything that follows from it, will give their organizations an opportunity to gain a competitive edge. Here are the top IT trends to watch in 2016:

Contextual data drives value

Building on the growth of information generated by digital engagement platforms and data supplied by Internet of Things (IoT) devices, contextualized analytics will be a prevailing force in 2016. In a novel, context describes the setting and the scene where characters act. In an enterprise, contextual data provides the same type of broader picture. Data points such as device, location, language, social network or influencers help enterprises develop improved insights, personalize products or services, or even suggest specific actions. More context will allow enterprises to create a more integrated and valuable information experience for clients, employees, partners and citizens.
For example, telematic data gathered from vehicles will help automakers improve the durability of components and identify potential problems, notifying drivers before trouble occurs. Insurers will be better able to manage risks and offer drivers more personalized, usage-based policies. Taken a step further, in insurance, the whole concept of pooling risks may disappear because the data revolution will enable insurers to underwrite down to the individual level.

As context increases, cybertargets increase

As data becomes more contextually rich, it becomes more valuable to the enterprise — and to cybercriminals as well. The growing risk of attack will require next-generation techniques for network defense, identity access management, risk management and now information management. Public clouds will play a role in the integration of contextual data, so these will need to be included in security system architectures. Context-rich environments will force enterprises to give significant thought to acceptable risk levels and controls as they share a growing range of information.
However, the same context-rich environment can be tapped to provide a much higher degree of situational awareness. With more information about users and uses, real-time alerts and network analytics, organizations will be able to maintain a more comprehensive and consistent security posture and an increased ability to automatically detect suspicious activity.

API economy is strong

Enterprises have discovered the power of APIs and will continue to build on them. APIs are no longer just a development tool. APIs enable information access and exchange between systems, often acting as a wrapper around older systems. This allows organizations to combine data from legacy applications and new applications. APIs create new channels for service integration, information coordination, ecosystems of information sharing and economies around information derivatives. The core of a digital strategy depends on democratizing information access, and APIs play a central role in that process. They are the key to a business strategy for innovation and a key to providing contextual information.
The move toward APIs also underscores the move away from an in-house IT mentality and embraces outside infrastructure, cloud computing, as-a-service options, the freelance economy and the participation ecosystem. It features an IT-centric set of initiatives designed to make the enterprise more open, agile and prepared to participate in the “outside-in” digital economy.

CIOs partner to bring information into context

IT no longer supports the business; it is the business. As a result, IT is learning to think in business terms and ask questions such as, "How will we differentiate?" and "How will we grow our top line and bottom line?"
This shift explains why the CIO's role will continue to change, taking on the task of partnering with the business to drive information and technology value. This partnership is part of what's called business relationship management (BRM), and it will help the enterprise gain access to the right information and technology to make better decisions and introduce competitive products, quickly and at scale. As owner of the organization's information and technology, the CIO is uniquely positioned to lead the development of digital business innovations.

Enterprise platform players continue to converge

Another trend is the ongoing convergence and consolidation of enterprise infrastructure players, as the recent announcement of a “mega-merger” between Dell and EMC illustrates. This consolidation answers the market's demand for more standardized, agile and complete solutions out of the box. Converged infrastructure is moving toward public cloud styles, which extend purchasing and operating leverage, enable agility and improve self-service for IT. Look for greater specialization of these platforms in future products and services to create IT leverage in specific workload styles in specific industries. For example, financial services platforms will combine to create core banking as a service, next-generation telematics platforms will emerge to collect and manage data from connected cars, and mobile and social platforms will converge.
Finally, if there's anything that's certain about the future, it's that some new innovative technology or application will surface in 2016 that will change our thinking, again. This continuing change and renewal is what makes IT such an exciting field to be a part of today, and I can't wait to see what else 2016 will bring.

SUCCESS STORIES

CSC SUCCESSFULLY IMPLEMENTS STUDENT INFORMATION SYSTEM FOR MASDAR INSTITUTE OF TECHNOLOGY USING ORACLE’S PEOPLESOFT CAMPUS SOLUTIONS

 

Masdar Institute of Science and Technology

CLIENT: 

Masdar Institute of Science and Technology

CHALLENGE:

  • No Integration between legacy SIS system and various external and internal systems

SOLUTION:

  • automated all critical and non-critical business processes, and integrated the campus solutions system with external and internal systems available in the institute to cater the business needs

RESULTS:

  • Improved the user experience, and reduced the overhead costs and human errors
  • The automated system has improved the control over the business process

The Customer: Masdar Institute of Science and Technology, located in Abu Dhabi, U.A.E., is a private, not-for-profit, independent, graduate-level, research-driven institute developed with the support and cooperation of Massachusetts Institute of Technology (MIT). The Institute offers graduate degree programs (MSc & PhD) in science and engineering disciplines with a focus on advanced energy and sustainable technologies.

THE CHALLENGES

Most of the critical SIS processes were manual e.g. Clearance, Petitioning, Transcript Generation, Internship, Thesis, Housing, CHEDS Reporting and prone to human errors. No Integration between legacy SIS system and various external and internal systems. Data maintenance and Reporting was a major challenge.

THE SOLUTIONS

CSC has automated all critical and non-critical business processes, and integrated the campus solutions system with external and internal systems available in the institute to cater the business needs. As CSC always believe in the Oracle’s Campus Solutionscapability, the team has provided the solutions using the delivered product, and extended the features only if the need of the extension is very high.

THE RESULTS

It has improved the user experience, and reduced the overhead costs and human errors. The seamless integration between the systems helps the institute to plan the financial needs of the institute upfront for the upcoming academic year. The automated system has improved the control over the business process.

Saturday, March 26, 2016

Tested/Working Code:

##775# – EPST/PRL – PRL Settings
##786# – EPST – Status Menu
##3282# – EPST – Data Programming Menu (User Name, Advanced, Restore, Enable HFA, DSA Server, MMSC URL)
##2539# – EPST/A-Key – Data A key menu
##7738# – EPST/P_Rev – Protocol Revision
##8626337# – EPST/Vocoder – Unsure
##33284# – Debug – Debug Menu – (Debug Screen, Test Calls, RC Data, HDR/1X Selection, Voice Privacy, DTMF Set, Korea Mode Set)
##3424# – Diagnostic – Connect to phone in diag mode
##4772579# – Reset the GPS
##72786# – changes DSA back to Factory
##889# – enables TTY
*#*#34971539#*#* – update firmwire
*#*#7594#*#* – change the End Call / Power button action
*#*#273283*255*663282*#*#* – code opens a File copy screen where you can backup your media files
*#*#197328640#*#* – enter into Service mode
*#*#232339#*#* – WLAN test (Use “Menu” button to start various tests)
*#*#526#*#* – WLAN test (Use “Menu”button to start various tests)
*#*#528#*#* – WLAN test (Use “Menu”button to start various tests)
*#*#7780#*#* – Factory reset
*2767*3855# – Factory Format
*#*#232338#*#* – Shows WiFi MAC address
*#*#1472365#*#* – GPS test
*#*#1575#*#* – Another GPS test
*#*#232331#*#* – Bluetooth test
*#*#232337#*# – Shows Bluetooth device address
*#*#8255#*#* – launch GTalk Service Monitor.
*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate
*#*#1234#*#* – PDA and Phone
*#*#1111#*#* – FTA SW Version
*#*#2222#*#* – FTA HW Version
*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number
*#*#0283#*#* – Packet Loopback
*#*#0*#*#* – LCD test
*#*#0673#*#* OR *#*#0289#*#* – Melody test
*#*#0842#*#* – Device test (Vibration test and BackLight test)
*#*#2663#*#* – Touch screen version
*#*#2664#*#* – Touch screen test
*#*#0588#*#* – Proximity sensor test
*#*#3264#*#* – RAM version
—– Was only able to get the following working on CM6 Rom —– 
*#*#4636#*#* – Phone Information – “Phone information, Battery information, Battery history, Useage statistics, Wifi information” (froyo only)

Nokia secret codes

Below, I have listed all Nokia secret codes. On the main screen type:


*#06# - is used to check the IMEI (International Mobile Equipment Identity).


*#7780# - resets to factory settings.


*#0000# - shows the software version of your mobile phone.


*#9999# - Phones software version if *#0000# does not work.


*#67705646# - clears the LCD display(operator logo).


*#147# - This lets you know who called you last (Only vodofone).


*#1471# - Last call (Only vodofone).


#pw+1234567890+1# - Provider Lock Status.


#pw+1234567890+2# - Network Lock Status.


#pw+1234567890+3# - Country Lock Status.


#pw+1234567890+4# - SIM Card Lock Status.


*#21# - This phone code allows you to check the number that "All Calls" are diverted to.


*#2640# - Displays phone security code in use.


*#30# - Lets you see the private number.


*#2820# - shows the address of your Bluetooth device.


*#62209526# - Display the WLAN adapter's MAC Address. It is available only for newer devices which support WLAN such as N80.


*#746025625# - Sim clock allowed status.


#pw+1234567890+1# - Displays any restrictions that your sim has.


*#92702689# - Takes you to a secret menu where you may find some of the information below:


1. Shows the Serial Number.


2. Shows the Month and Year of your mobile Manufacture.


3. Shows the date at which the mobile was purchased (MMYY).


4. Shows the life time of your mobile (time passed since last restart).


5. Shows the date at which your mobile was last repaired - if found (0000)


To exit from this mode, simply switch off and then switch on your mobile phone.


*#3370# - Enhanced Full Rate Codec (EFR) activation.


- This enables your mobile to work with increased signal strength, use better signal reception.


- This also helps you increase your GPRS speed to some extent.


- It has drawback that your phone battery will be consumed


*#3370* - Enhanced Full Rate Codec (EFR) deactivation. Phone will be automatically restarted automatically. Your battery life will increase by 30% but, phone will received less signal than with EFR activated.


*#4720# - used to activate Half Rate Codec. Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.


*#4720* - used to deactivate Half Rate Codec. The phone will be restarted automatically.


If you have forgotten wallet code for your Nokia S60 phone, you can use this code reset: *#7370925538#


Note, your data in the wallet will be erased. You will be asked the lock code. Default lock code is: 12345


*#3925538# - used to delete the contents and code of wallet.


*#7328748263373738# - used to reset security code.


Default security code is 12345
Unlock service provider: Insert your sim, switch on your mobile and press vol up(arrow keys) for 3 seconds, then you will be asked for pin code. Press C, then press *. A message will be flashed, press * again and 04*pin*pin*pin#


Change closed caller group (settings >security settings>user groups) to 00000 and your mobile will sound the message tone if you are near a radar speed trap. If you set this value to 500 it will cause your mobile to set off security alarms present at shop entrances and exits(works with only some of the Nokia phones.)

To open wap browser, press and hold "0" on the main screen and wap browser will be opened.

Note: Some Nokia secret codes can harm your mobile. So, try these Nokia secret codes at your own risk. Also, some of these nokia secret codes will not work depending on your phone model.

So friends, I have listed almost all Nokia secret codes, I know. I hope these nokia secret codes will help you in configuring your Nokia mobile phones as you wish.

Sunday, March 6, 2016

There are more than 3 telecommunication providers in Sri Lanka.

Let's see how to reload or pay your bill online through dialog telecom.


  • First visit dialog.lk (use the link below)https://www.dialog.lk/dlg/browse/reloadPayBillOnline.jsp

  • Then it will appear ask for some information on which kind of bill that you want to pay. They given facility to pay the mobile, dialog television and the fixed line. If you wish to reload your mobile instead of paying the bill you too pick the mobile from the toggle.
  • Then after the selection has done you must enter your mobile number in the right side cage.
  • click on the next button.


  • you must have a email address to go up in the process. Then fill out the simple details which it appears on. Those are, How much you want to pay, Your email address and the most important part of the whole process how you gonna pay.
You can use three types of credit cards.(including debit cards which has international payment access(ex.Sampath Bank Web Card)) Or select the dialog methods like Ez cash and Star points.

  • Click the next. Then you will automatically redirect to a payment gate way if you choose the credit cards in the process. 

Click on the proceed button to make your payment. You will get a confirmation email and a text message shortly to confirm your action.

Saturday, February 20, 2016

Grand Canyon University Logo


Earn Your Bachelor of Science in Information Technology or Computer Programming


These programs offer learners the skills to integrate information systems and develop business applications for improved user efficiency.

Four Information Technology emphases now offered:

Business Entrepreneurship: The emphasis in Business Entrepreneurship provides the knowledge to build and leverage networks, to identify suitable business opportunities. The program instills a deep appreciation of the end product. It prepares learners to create tech interfaces that can access information at a greater pace.
Health IT: The emphasis in health IT provides a deep understanding of health informatics in the context of its application to reduce health care costs and improve quality. The program places a strong focus on increasing a patient's access to health care information through IT innovations at scale.

Technology Innovation: The emphasis in technology innovation evaluates opportunities that are in development and products at the front end of the technological curve. It prepares scholars to thrive in technology driven business environments by providing exposure to the latest innovations in the field.
Cyber Security: The BS in information technology with an emphasis in cybersecurity exposes you to the relationships among cyber defense, cyber operations and cyber law. Acquire working knowledge of processes and goals of cyber forensics, and develop plans and strategies for security architectures. The emphasis culminates with an IT capstone project in cybersecurity.

Computer Programming degree:

This technology degree emphasizes integration of mobile network technologies, software as a service, proficiency in a variety of programming languages and much more. Students receive a contextual general education in addition to taking major courses focused on information security, cloud computing, software project management and more. This program can help students develop leadership, managerial and strategic planning skills for continuous career growth.

Grand Canyon University Campus

Enjoy Grand Canyon University's traditional campus experience. Nestled on over 115 acres in the heart of Phoenix, with new modern classrooms, suite style dorms and a focus on creating a rich student life, the GCU campus is a top choice for high school graduates.

Grand Canyon University

Earn Your DegreeGrand Canyon University was founded in 1949, and is a regionally accredited, private Christian university, recognized as offering some of the best online education programs in the nation by noteworthy sources including Fortune Small Business, Forbes.com, thebestschools.com and more.
Located in Phoenix, Arizona, GCU offers a variety of nursing and health care programs, including undergraduate, graduate and bridge programs. Students can elect to take courses online or through our evening classes, which meet just once a week at the Phoenix campus and other satellite locations throughout Arizona.
https://youtu.be/cWNEZLbP9Lk



Need
    Image result for it education
  • Education is a life long process therefore anytime anywhere access to it is the need
  • Information explosion is an ever increasing phenomena therefore there is need to get access to this information
  • Education should meet the needs of variety of learners and therefore IT is important in meeting this need
  • It is a requirement of the society that the individuals should posses technological literacy
  • We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer
Importance
  • access to variety of learning resources
  • immediacy to information
  • anytime learning
  • anywhere learning
  • collaborative learning
  • multimedia approach to education
  • authentic and up to date information
  • access to online libraries
  • teaching of different subjects made interesting
  • educational data storage
  • distance education
  • access to the source of information
  • multiple communication channels-e-mail,chat,forum,blogs,etc.
  • access to open courseware
  • better accesses to children with disabilities
  • reduces time on many routine tasks
Information Technology in Education

INTRODUCTION Information Technology in Education, effects of the continuing developments in information technology (IT) on education.
The pace of change brought about by new technologies has had a significant effect on the way people live, work, and play worldwide. New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Information technology, while an important area of study in its own right, is having a major impact across all curriculum areas. Easy worldwide communication provides instant access to a vast array of data, challenging assimilation and assessment skills. Rapid communication, plus increased access to IT in the home, at work, and in educational establishments, could mean that learning becomes a truly lifelong activity—an activity in which the pace of technological change forces constant evaluation of the learning process itself.
Significance of IT in education
  • Access to variety of learning resources
In the era of technology. IT aids plenty of resources to enhance the teaching skills and learning ability. With the help of IT now it is easy to provide audio visual education. The learning resources are being widens and widen. Now with this vivid and vast technique as part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work.
  • Immediacy to information
IT has provided immediacy to education. Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated anywhere at any time. New IT has often been introduced into well-established patterns of working and living without radically altering them. For example, the traditional office, with secretaries working at keyboards and notes being written on paper and manually exchanged, has remained remarkably stable, even if personal computers have replaced typewriters.
  • Any time learning
Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated .One can study whenever he wills irrespective of whether it is day or night and irrespective of being in India or in US because of the boom in IT.
  • Collaborative learning
Now IT has made it easy to study as well as teach in groups or in clusters. With online we can be unite together to do the desired task. Efficient postal systems, the telephone (fixed and mobile), and various recording and playback systems based on computer technology all have a part to play in educational broadcasting in the new millennium. The Internet and its Web sites are now familiar to many children in developed countries and among educational elites elsewhere, but it remains of little significance to very many more, who lack the most basic means for subsistence.
  • Multimedia approach to education
Audio-Visual Education, planning, preparation, and use of devices and materials that involve sight, sound, or both, for educational purposes. Among the devices used are still and motion pictures, filmstrips, television, transparencies, audiotapes, records, teaching machines, computers, and videodiscs. The growth of audio-visual education has reflected developments in both technology and learning theory.
Studies in the psychology of learning suggest that the use of audio-visuals in education has several advantages. All learning is based on perception, the process by which the senses gain information from the environment. The higher processes of memory and concept formation cannot occur without prior perception. People can attend to only a limited amount of information at a time; their selection and perception of information is influenced by past experiences. Researchers have found that, other conditions being equal, more information is taken in if it is received simultaneously in two modalities (vision and hearing, for example) rather than in a single modality. Furthermore, learning is enhanced when material is organized and that organization is evident to the student.
These findings suggest the value of audio-visuals in the educational process. They can facilitate perception of the most important features, can be carefully organized, and can require the student to use more than one modality.
  • Authentic and up to date information
The information and data which are available on the net is purely correct and up to date.
Internet, a collection of computer networks that operate to common standards and enable the computers and the programs they run to communicate directly provides true and correct information.
  • Online library
Internets support thousands of different kinds of operational and experimental services one of which is online library. We can get plenty of data on this online library.
As part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work. This requires them to select the medium best suited to conveying their message, to structure information in a hierarchical manner, and to link together information to produce a multidimensional document.
  • Distance learning
Distance Learning, method of learning at a distance rather than in a classroom. Late 20th-century communications technologies, in their most recent phases multimedia and interactive, open up new possibilities, both individual and institutional, for an unprecedented expansion of home-based learning, much of it part-time. The term distance learning was coined within the context of a continuing communications revolution, largely replacing a hitherto confusing mixed nomenclature—home study, independent study, external study, and, most common, though restricted in pedagogic means, correspondence study. The convergence of increased demand for access to educational facilities and innovative communications technology has been increasingly exploited in face of criticisms that distance learning is an inadequate substitute for learning alongside others in formal institutions. A powerful incentive has been reduced costs per student. At the same time, students studying at home themselves save on travel time and other costs.
Whatever the reasoning, distance learning widens access for students unable for whatever reason (course availability, geographical remoteness, family circumstances, individual disability) to study alongside others. At the same time, it appeals to students who prefer learning at home. In addition, it appeals to organizers of professional and business education, providing an incentive to rethink the most effective way of communicating vital information.
  • Better accesses to children with disabilities
Information technology has brought drastic changes in the life of disabled children. IT provides various software and technique to educate these poor peoples. Unless provided early with special training, people profoundly deaf from birth are incapable of learning to speak. Deafness from birth causes severe sensory deprivation, which can seriously affect a person's intellectual capacity or ability to learn. A child who sustains a hearing loss early in life may lack the language stimulation experienced by children who can hear. The critical period for neurological plasticity is up to age seven. Failure of acoustic sensory input during this period results in failure of formation of synaptic connections and, possibly, an irremediable situation for the child. A delay in learning language may cause a deaf child's academic progress to be slower than that of hearing children. The academic lag tends to be cumulative, so that a deaf adolescent may be four or more academic years behind his or her hearing peers. Deaf children who receive early language stimulation through sign language, however, generally achieve academically alongside their hearing peers.
The integration of information technology in teaching is a central matter in ensuring quality in the educational system. There are two equally important reasons for integrating information technology in teaching. Pupils must become familiar with the use of information technology, since all jobs in the society of the future will be dependent on it, and information technology must be used in teaching in order to improve its quality and make it more effective.

INTRODUCTION

The information society challenges the education system. In recent years, the speedy, effective and global communication of knowledge has created a new foundation for co-operation and teamwork, both nationally and internationally. The increasing role played by information technology in the development of society calls for an active reaction to the challenges of the information society.
Already, new and greater demands are being made as to the core qualifications of individuals, as well as to their understanding and knowledge of the consequences of the introduction of information technology for the work and organisation of a company. Companies are no longer forced to gather all their functions in one place. The knowledge-intensive functions such as development and marketing can be sited in countries where the labour market can supply highly educated employees, whilst production itself can be moved to low wage countries. The result is the efficient handling, processing, co-ordination and administration of company resources, which is decisive for the competitiveness of the company.In a society which is becoming increasingly dependent on information and the processing of knowledge, great demands are therefore made that the individual should have a solid and broad educational foundation on which to build. Educational policy in the information society must ensure that:
  1. IT qualifications are developed by means of their integration in all activities in the education sector and
  2. The individual citizen must have an active and critical attitude to developments and not passively allow technological development to set the pace.

IT educational policy must ensure:
  • Up-to-date qualifications in the information society
  • Up-to-date qualifications gained against the background of a high general level of education in the population will be decisive if Denmark is to maintain competitiveness and its share of the global labor market in the information society. IT skills and IT understanding are thus central prerequisites for the individual, both now and especially in the future.
The advantage of using information technology is that time-consuming work routines can increasingly be performed by means of this technology and time can thus be devoted instead to communicating and informing, to the processing of information and the production of knowledge.
Subscribe to RSS Feed Follow me on Twitter!