Sunday, December 20, 2009

Computer Crime: The law on the misuse of computers and networks. Paul Mobbsfor.



Computer crime is an oft-used term that has a very vague meaning. The law on computer crime tends to lag behind the actual practice of computer-based crime much more than is the case in other branches of crime.

Computers are a tool, and, like any other tool, can used by people intent on causing damage or carrying out some form of illegal activity. The nature of today's Internet and computer networks means that criminal activity can be carried out across national borders. This can create problems over the jurisdiction of those investigating the crime, and over differences in the law of the relevant countries where the crime took place; an activity deemed criminal in the home country of the target of the crime, for example, may not be considered so in the country from which the offending action was launched.

There are number of ways in which computers can be used for crime:



• to commit 'real-world' crimes, such as forgery, fraud or copyright piracy, just like any other technical device; these types of computer-enabled crime are not usually prosecuted using other relevant laws rather than computer crime law;



• to damage or modify other computerised systems; these are the types of activity that are usually prosecuted using computer crime legislation;



• used for activities that cannot be prosecuted but that skate around the edges of legality; to the frequent frustration of law makers and security consultants, these sorts of activity cannot be legislated against because they often employ everyday, lawful means on the Internet.



Computers and the Internet are complex, but they function on a very narrow set of technical principles. This provides great flexibility, but makes it very difficult to legislate against certain types of activity without affecting others.

More on http://www.internetrights.org.uk

Monday, December 7, 2009

Things that make your computer slow by Linda St.Cyr


Several things can make a computer slow. A slow computer loads files at the speed of a turtle, takes forever to open new windows and prevents work from getting done as quickly as possible. Learning how a computer that once was fast goes to being slow can help you know why the computer slows but also how to prevent it from slowing down and ultimately having a hard drive crash.

Software Programs

Software programs are preloaded onto a new computer. This can be Windows (any version), games, paint programs, Word programs or many others. Some software programs are needed to use the computer, and some software programs get downloaded over time. Often these programs, once downloaded, get placed in the start-up menu of your computer. This additional information loads when the computer gets turned on. This takes time and slows the computer down drastically if there are a lot of software programs to load. Keeping software programs to a minimum of what you use consistently and getting rid of the rest can make the computer load faster.

Space and Storage

Each program on a computer takes up space on its hard drive. Computers with older processors have smaller amounts of available space. Newer computers offer a variety of space options when they are purchased. Some of the preloaded software programs on the computer take up space. Each new software, application or service that is added to the computer takes up more and more of this space. As this space gets used up there is little space left to run new software programs. The full storage makes a computer slow because of all the information it must process in the storage space. This space cannot be upgraded directly on the computer, but an external hard drive can be purchased to give the computer you are using more available space. Another way to add more space onto the computer is to go into the "My Computer" tab, right click on "Local Hard Drive," click on "Properties," and see how much space is taken up on the computer and how much available space is left. If the open space is small, click on "Disc Cleanup" to compress old files and remove temporary ones that may have been added to the computer you were while on the Internet.

Too Many Applications


Doing too many things at once on the computer can make it operate slowly. Opening up email in one window and doing Internet searches in another window, while uploading pictures from a digital camera while running instant messenger services, can slow down a computer so much that it may even freeze up. All of these programs take time for a computer to process, load and function. When too many applications are opened the computer has to take its time loading them properly, which means it will finish loading the first application completely before moving on to the next application. This can make all the other applications seem like they are taking forever to load. Running one application at a time and closing out an application before using another can make a computer run much faster.

Viruses

When a computer gets a virus from another computer, a program or wherever computer viruses come from, it will slow down. Files may get erased or corrupted. Personal information can be hacked into, or the computer may crash and come to a complete halt. Using an anti-virus program can keep the computer free of bugs and viruses. It will let you know if files are corrupt or if a virus is suspected. An anti-virus program can speed up a computer where a virus will ultimately shut it down.

Internet Connections and Browsers

Internet access speeds up the time in which it takes you to get information and to entertain yourself. A dial-up connection runs Internet service through a phone line. This connection is very slow compared to new, faster Internet service technologies like DSL and cable. Having a dial-up Internet service can make a computer slow because it takes longer to transfer the information. High-speed Internet services speed up web loading times because they are designed to connect at higher speeds. Internet browsers can also cause a computer to be slow. Browsers that do not function well with the computer's operating system can make the wait time for computer pages to be loaded long and painful. Updating the browser or changing your browser can make Internet pages load faster.

Sunday, November 29, 2009

All About Windows 7


Windows 7 is the most recent publicly available version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 7 was released to manufacturing on July 22, 2009, and general retail availability on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

Unlike its predecessor, which introduced a large number of new features, Windows 7 was intended to be a more focused, incremental upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible. Presentations given by Microsoft in 2008 focused on multi-touch support, a redesigned Windows Shell with a new taskbar, referred to as the Superbar, a home networking system called HomeGroup, and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail, Windows Movie Maker, and Windows Photo Gallery, are not included in Windows 7; most are instead offered separately as part of the free Windows Live Essentials suite.


http://en.wikipedia.org/wiki/Windows_7

Thursday, November 12, 2009

Learning and Teaching Information technology in Cameroon schools.


As the use of information technology increases throughout the world, the school systems in Cameroon are bound to keep pace. Students and teachers are therefore called upon to use more technical tools in the production of course materials and student projects. Basic skills such as using computers, from the use of email to power point presentation have become a core competency.


Studies have shown that the use of computers in every level of education opens a new era of knowledge and offers a tool that has the potential to change existing educational methods. Within most secondary and high schools in Cameroon, computer technology has become a fundamental part of education and will likely be more so in the future. However, a fundamental problem today is the effective exploitation of this resource in the educational system by teachers. Educators must be prepared for the use of this technology in classrooms because the role of teacher is now evolving from giving information to facilitator of learning. To achieve this goal, the following basic principles have to be met by institutions:

- Teachers must obtain the fundamental concepts, knowledge and skills for applying technology in educational settings. There is an urgent need for purchasing sufficient hardware and software for basic education in schools and thus making computer and related technology part of classroom teaching activities. A laboratory to ensure student/teacher access to computers during school hours is a necessity.

- The second need is for in-service training in computer technology. The effectiveness of teachers is a determinant to educational quality. In service training is therefore important to enhance the effectiveness of teachers. Teachers need to receive training which will build their confidence so they can become capable of dealing with the latest technology.

- The final step is training students to become effective users of the internet for research. Students need to learn how to use technology to design, develop, publish and present products. They will hence use technology resources that demonstrate and communicate concepts inside and outside the classroom as they prepare for the real world. It is therefore imperative for institutions to seize this opportunity by defining and implementing technology skills as a first step in assuring all students become proficient information technology users in future.

Wednesday, October 21, 2009

Fastest growing careers

Demand for personal financial advisors is projected to grow a whopping 41 percent between 2006 and 2016. Which other careers on Money and PayScale.com' s list of America's best jobs will see big opportunities?
1. Telecommunications Network Engineer
Best Jobs rank: 30
10-year growth: 53 percent
Current total employment: 21,000
Traditionally hired to control and maintain power grids and communications for phone and cable companies, telecommunications network engineers are seeing demand from potential employers rise with the demand for Wi-Fi, broadband and other new technologies. Telecom has gone green, too: Energy and environmental companies have opportunities for engineers to help build communications infrastructure for their new products.
2. Systems Engineer
Best Jobs rank: 1
10-year growth: 45 percent
Current total employment: 88,000
Systems engineers possess a wide breadth of knowledge and engineering skills that have long been widely sought within the aerospace and defense industries. Now companies from car manufacturers to consumer products firms are quickly realizing the value of systems engineers as well, leading to a hiring boom.
3. Personal Finance Advisor
Best Jobs rank: N/A
10-year growth: 41 percent
Current total employment: 20,000
The personal financial advisor profession has exploded as baby boomers reach retirement age and seek advice on making their nest eggs last. Meanwhile, younger folks are seeking guidance on managing savings and retirement accounts in lieu of a company pension plan. "People know they have to manage their own financial futures, and they're turning to financial advisors to help," says Richard Salman, president of the Financial Planning Association.
4. Veterinarian
Best Jobs rank: 25
10-year growth: 35 percent
Current total employment: 68,000
Pet ownership has grown 17 percent in the past 10 years, and as more people embrace furry friends, more vets are needed to keep them healthy. The veterinary medicine field has echoed advances in human medicine, and veterinary specialists in fields like oncology and ophthalmology have found clients clamoring for services. Another growth driver: An increased demand for vets in fields like food safety, disease control and pharmaceutical research.
5. Senior Financial Analyst
Best Jobs rank: 21
10-year growth: 34 percent
Current total employment: 127,000
Recession or not, investors and businesses need to put their money somewhere, and they continue relying on experts to examine the risk-reward profile of securities and projects. "One of the things that came out of the financial crisis is people need to do their own due diligence, and there is even more attention being paid to analysis," says Bob Johnson, a senior managing director at the CFA Institute.
6. Business Analyst, IT
Best Jobs rank: 17
10-year growth: 29 percent
Current total employment: 125,000
Companies are increasingly relying on IT business analysts to make sure they're using technology efficiently and cost-effectively. In the past, this job was often farmed out to consultants, but many companies now prefer to use in-house analysts who have in-depth knowledge of their specific industry.
7. Software Development Director
Best Jobs rank: N/A
10-year growth: 28 percent
Current total employment: 12,000
Just like an architect would design a building to be structurally sound, aesthetically pleasing and functionally practical, a software architect designs computer programs that help a business run efficiently and practically. The auto industry is a particular hot spot: Cars these days can easily have at least 40 computers inside to run everything from the lights and radio to the seat-warmers -- and these gurus are needed to design the programs that keep them running.

Wednesday, September 16, 2009

Technology Security: understanding how malware attacks your computer.

Whenever you connect to the Internet, read your email, or share files with others, you are at risk. Why? Because there are automated attacks against your computer. These attacks can come directly, or indirectly, by malicious software (or malware) designed to harm your computer. Fortunately, you can protect yourself by taking a few simple precautions. But you need to understand the risks and how to avoid them.
How They Attack By Email:
Email Malware.

. May appear to come from someone you know or trick you into opening.
. May not have symptoms of infection but may be silently gathering information .
. Some may reduce performance or cause strange behaviors like a spontaneous reboot .

What To Do

. Only open email attachments that come from a trusted source and that are expected.
. Scan email attachments with AntiVirus prior to opening .
. Delete all unwanted messages without opening.
. Keep security patches up to date.

Email SPAM : How You Know

. Spam is a serious security concern as it can be used to deliver Malware.
. Messages that do not include your email address in the TO: or CC: fields are common forms of Spam .
. Some Spam can contain offensive language or links to Web sites with inappropriate content.

What To Do

If you suspect an email is spam, do not respond, just delete it .
Consider disabling the email's preview pane and reading emails in plain text.

Email Phishing : How You Know

. Requests for confidential information via email are not legitimate .
. Phishing attacks may use scare tactics to entice a response.
. Fraudulent emails are often not personalized .
. Phishing attacks may consist of a group of emails that share similar properties like details in the header and footer.

What To Do

. Be extremely wary of emails asking for confidential information .
. Confirm the authenticity of a suspicious request before responding in email.

How They Attack From The Web, Web Phishing
How You Know

. Fraudulent websites are used to steal personal information.
. Phishing attacks re-direct victims to a bogus Web site where malicious code is downloaded and used to collect sensitive information .

What To Do

. When visiting a website, type the address directly into the browser rather than following a link.
. Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser.
. Do not provide personal information to any unsolicited requests for information.
. Confirm authenticity of a Web site .

Web Spyware : How You Know

. Many "free" programs downloaded from the web install software that tracks your behavior and displays unwanted advertisements.
. Some web pages will attempt to install spyware when you visit their page.

What To Do

. Allow only authorized programs to connect to the Web.
. Do not accept or open suspicious error dialogs from within the browser .
. Spyware may come as part of a "free deal" offer - Do not accept free deals .

Internet Vulnerabilities : How You Know

A vulnerability in the web browser may create a weakness in the computer security providing an opportunity for some websites to download malicious code

What To Do

. Install product updates and security patches before using the internet .
. Keep web browser up to date with latest patches.
. Make sure your computer is configured securely.
. Automatically shield newly discovered security holes with your Antivirus software .

How They Attack: From Instant Messaging; Instant Messaging Malware : How You Know

. IM attachments, just like email attachments, can carry destructive viruses, Trojan horses, and worms .
. Some new worms use IM software to send themselves to every member of your buddy list .

What To Do

. Don't open attachments or click on Web links sent by someone you don't know .
. Don't send files over IM.
. If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session .
. Remove viruses from IM with your AntiVirus software .

Instant Messaging SPAM : How You Know

Some Spam can contain offensive language or links to Web sites with inappropriate content

What To Do

. Reject all Instant Messages from persons who are not on your Buddy list
. Do not click on URL links within IM unless from a known source and expected

Instant Messaging Vulnerabilities : How You Know

Most instant messages still travel unencrypted across the Internet, exposing private conversations to anyone who can find a way to listen in .

What To Do

. Never send personal information through an IM .
. Keep your IM software up to date.
. Keep your operating system and security software up to date'

How They Attack From File Sharing: File Sharing Malware

. Malware may spread through common peer-to-peer file sharing applications by placing themselves in shared directories with enticing filenames.
. Some Malware threats use peer-to-peer networks to communicate out from an infected system .

What To Do

. Scan all files with an Internet Security solution before transferring them to your system.
. Only transfer files from a well known source .
. Use your Windows Firewall to block all unsolicited outbound communication.

Use Virus Protection:
Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from your hard disk or completely disable your computer. Others don't cause direct damage, but worsen your computer's performance and stability.Antivirus programs scan e‑mail and other files on your computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.Windows does not have a built-in antivirus program, but your computer manufacturer might have installed one. Check Security Center to find out if your computer has antivirus protection. If not, go to the Microsoft Antivirus Partners webpage to find an antivirus program.Because new viruses are identified every day, it's important to select an antivirus program with an automatic update capability. When the antivirus software is updated, it adds new viruses to its list of viruses to check for, helping to protect your computer from new attacks. If the list of viruses is out of date, your computer is vulnerable to new threats. Updates usually require an annual subscription fee. Keep the subscription current to receive regular updates.

If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.

Use Spyware Protection:

Spyware is software that can display advertisements, collect information about you, or change settings on your computer, generally without appropriately obtaining your consent. For example, spyware can install unwanted toolbars, links, or favorites in your web browser, change your default home page, or display pop-up ads frequently. Some spyware displays no symptoms that you can detect, but it secretly collects sensitive information, such as which websites you visit or text that you type. Most spyware is installed through free software that you download, but in some cases simply visiting a website results in a spyware infection.

Tuesday, September 8, 2009

Office 2010: What Microsoft will and won't say. By Mary-Jo Foley




A new build of Office 2010 — more recent than the Community Technology Preview (CTP) Microsoft delivered in July to a select group of testers — allegedly has leaked. (But as of this posting, not yet leaked to the Web.)

The new build, which, according to Wzor, is labeled “Beta 1,” (Build 14.0.4417.1000) includes some updates to Office 2010’s built-in Backstage document-management platform and some of the new volume-licensing-activation tweaks that company officials recently acknowledged were coming. There is also a new “upload center” in the leaked build, which could be related to Office Web Apps, the Web-ified versions of key Office apps that Microsoft is planning to release to testers this fall.

Microsoft officials declined to comment on the leak. I asked whether the allegedly leaked bits would be what Microsoft is planning to release as part of the public Beta 1 of Office 2010 due out later ths fall. A spokeswoman provided this statement in response:
“Microsoft officially released the Office 2010 technical preview in July and we are on track to deliver the public beta later this year. No additional Office 2010 code has been released by Microsoft since the technical preview. We strongly recommend that customers only download or use officially released Microsoft products, through appropriate Microsoft channels, since unofficial copies might contain malicious code.”

Even though Office 2010 seems pretty well baked, there’s still lots the company won’t say about the release, which Microsoft execs indicated to partners will ship in May/June 2010.
However, there are a few things the Office team is willing to talk about, especially regarding the product’s user-interface changes.

As Microsoft officials have said before, with Office 2010, all of the Office apps are getting the Ribbon interface. In Office 2010, OneNote, Publisher and Visio all will become “Ribbonized,” as will the rest of Outlook, said Aaron Butcher, Senior Program Manager on the Office User Experience Team. The Ribbon works a bit differently with each app, so adding it isn’t as straightforward a task for the User Experience team as it might seem. (The User Experience Team, a group of about 70 testers, designers, programmers and usability engineers, are the ones behind the UI changes in Office.)

“People said they would be better at their jobs if the could master Office,” Butcher told me during a recent phone interview. “We wanted to help them save time and to make everyone a power user.”
In spite of all Microsoft’s telemetry data that company officials cite when claiming the Ribbon is a success, there are plenty of customers and potential customers out there who aren’t Ribbon fans. Butcher noted that the Ribbon can be collapsed so that it takes up less room. (”Menu mode” is the closest you an get to doing away with the Ribbon all together, Butcher said.) Additionally, with Office 2010, users will be able to create their own custom set of commands. Users will be able to hide all labels or surface even more commands using the Ribbon.
If you’re holding out hope that Microsoft might completely do away with the Ribbon or offer a classic/Luddite option with Office 2010 or a future version of Office, you might want to come up for air. There are no such plans, Butcher said.

“We are really committed to the changes the Ribbon provides. Microsoft doesn’t want to have to support two distinct models (a Ribbonized view and a classic mode.” Plus, if we provided a classic mode, we’d be hurting developers who are building around Office,” Butcher said.
The Ribbon isn’t the only new UI element upon which the User Experience team is working. The aforementioned Backstage feature is part of that team’s domain. The Ribbon will be applied to the Backstage view in ways that it makes sense, Butcher said. Related to the Backstage overhaul, Office’s print function from scratch for the 2010 release. “There won’t be three different areas you need to go to to print,” Butcher said.

The User Experience team also has been instrumental in Office 2010’s enhanced tool tips — via which hovering over a specific tab will give a user a paragraph description on how to use a particular feature. And galleries — which Butcher describes as “mini-scripts, basically dialogues and commands under a single script,” is another.

What don’t you know about Office 2010 that you’d like to, at this point — other than when the heck those promised Office Web Apps are going to show up?

http://www.blogger.com/post-create.g?blogID=1153060451636228908



Thursday, August 27, 2009

Korea's educational system with emphasis on vocational training has produced the robust manpower necessary for labour-intensive industries:


Cameroon Tribune :

Education, vocational training, science and technology are important domains in which Cameroon and the Republic of Korea can foster bilateral cooperation. The experience can be beneficial to Cameroon in its development endeavour. Talking to C.T. on the subject, Cho Yulrae, Director General for Policy Planning in Korea's Ministry of Education, Science and Technology said, "Education and vocational training have been government's priority" which has produced the necessary manpower for labour-intensive industries from the 1960s. He said sharing experiences in education could be beneficial to Cameroon in its development drive.
Incheon bridge (12.3km) will link Soeul to Incheon expressway
It is known that education has contributed to democracy and political development in modern Korea by encouraging upward political socialization, opening opportunities to explore new fields of knowledge and sharing value systems and views about the country. Education has also played a major role in the nation's economic development by helping to produce robust manpower necessary for economic growth and facilitated the development of sophisticated industries and improved labour productivity. In the social and cultural domain, education has been instrumental in Korea's social and cultural development contributing to the formation of a modern value system and the establishment of development- oriented views.

Dr. Kin Jae-Kum, planning officer with the Korean Ministry of Education, Science and Technology said his country's educational system has what he called "a single-track 6 - 3 - 3 - 4 system" that requires six years in primary school, three years in middle school, three years in high school, and four years in university.

Education in Korea is crucial to individual success and competition is very heated and fierce. Cho Yulrae, Director General for Policy Planning with the Ministry of Education, Science and Technology says the problem "results from the one-size-fits- all school system, excessive competition for university entrance exams and lack of responsibility of public education". With the advent of a knowledge-based post-industrial society where human capital and knowledge are key to growth and prosperity, Korea has adopted a new concept of human resource development. It was the reason why President Lee Myung Bak's administration in 2008 merged the Ministry of Education and Human Resources Development with the Ministry of Science and Technology to enhance its synergetic effects.

The Korean government has also adopted a new educational programme to increase the number of their foreign students by 2010. It is planned that by that time the number of scholarships for foreign students in Korea will be doubled, and the number of foreign students will reach 100,000. Cameroon is not yet fully benefiting from the educational experience of Korea as there are only 66 Cameroonian students currently studying in Korean universities. There is however room for improvement as the two countries have expressed readiness to strengthen cooperation and exchange programmes in the field of education.

Wednesday, July 22, 2009

Dominique & Stephane discuss their experience at ECA holiday program.

Dominique 1. Why did you choose to undertake this holiday program?

I have chosen to undertake this computer holiday program because with the High Technology nowadays, everything has been computerize .Due to this fact, there is a need for me to know about computer. Besides, the computer holiday program will also help to occupied me during this Long holiday period.


2. How do you think it's going to help you in your future career?

I think it's going to help me in my future career because today everything is computerized. And with the knowledge from the computer holiday program will be able to bring innovations, and may be save confidential information (secret professional) or do some researches concerning my future career.

3. What are your future goals and ambitions studying computer?

My future goal and studying computer is due its team as a fashionable instrument which can be used to measure the intellectual capacity of someone and I don't want to be part of those who don't have any basic knowledge of it. As for my ambition I wish to be a computer engineer. So, studying computer now will help me to be a bit familiar with its functioning and it basics which will help me full in perusing my goals.

Stephane Pourquoi avez-vous choisi d'entreprendre ce programme de vacances?

J'ai choisi d'entreprendre ce programme de vacances, parce que, avec la haute technologie de nos jours, tout a été d'informatiser. De ce fait, il existe un besoin pour moi de savoir sur ordinateur. En outre, l'ordinateur de vacances programme contribuera également à me occupés au cours de cette longue période de vacances. Nous savons tous que dans le mondeentier l'informatique est a la cle de tous activite et c'est pour cela que nous devions apprendre a travailler et a traier les information

Comment pensez-vous que cela va vous aider dans votre future carrière?

Je pense que cela va m'aider dans ma carrière, car aujourd'hui tout est informatisé. Et avec la connaissance de l'ordinateur du programme de vacances, je vais être en mesure d'apporter des innovations, et de mai enregistrer des informations confidentielles (secret professionnel) ou faire des recherches concernant ma future carrière. L'infiormatique est comme pour nous aujourd'hui un pasport dans le dommaine de l'mploie et c'est pourquoi j'ai decider de faire 'limformatique pour faire plus tard les dessind'achitecture et mieu travailler dans word et exel ou encord etre plus tard un ingegnieur et pour pouvoir construir nos route et developper notre pays.

Quels sont vos objectifs pour l'avenir et les ambitions d'Ă©tudier l'informatique?

Mon objectif futur est d'étudier l'informatique en raison de son équipe comme un instrument de la mode qui peut être utilisé pour mesurer la capacité intellectuelle de quelqu'un, et je ne veux pas faire partie de ceux qui n'ont pas de connaissances de base de celui-ci. Quant à mon ambition, je tiens à être un ingénieur en informatique. Ainsi, l'étude de l'ordinateur maintenant m'aidera à être un peu familier avec le fonctionnement de base et qui pourra m'aider en pleine lecture de mes objectifs. Il est bien et tres avantegieux l'apprentissage de l'informatique parce que avec sa nous pouvons tout faire en 2010 celui qui ne serai capable d'ultiliser un ordinateur ne serai pas a la pointe de l'information.

Monday, July 20, 2009

Why computer education is important for youths in Cameroon: ECA summer camp experience.

Summer Camp Computer youth program
According to the Princeton review, computer science now ranks in the top 10 of undergraduate majors for young people entering American Universities. It is for this reason that in most parts of the world, even in developing countries, like Cameroon – computer science education is fastly being integrated into primary and secondary school curriculum. Some of the advantages of learning computers early are teamwork, algorithmic thought process, problem solving practice and comfort with emerging technology.

Summer camp youths listen to computer lectures. Over the past years, we see computers vastly becoming popular as household items. Imagine the luxury of sending an instant email instead of posting a letter. Checking news, weather and watching even favorite sports programs via the internet has become a normal routine.



Today our children’s lives are getting influenced by technology. We find computers in use everywhere, whether going to the supermarket or bank. This is because it is faster and helps us complete our work without mistakes. It is in this regards that parents too have to realize the need to help children develop strong computer skills. Computers and internet are here to stay with software titles targeting children increasingly available in the market.

Internet research session at Summer computer camp

One benefit of the computer is that children are learning to become smarter. They are growing up computer literate and thus will have a huge advantage in their future lives. One reason is because computer literacy has become a huge job qualification and developing an early comfort zone puts children ahead.


At ECA, we have therefore developed a computer literacy program every summer holiday to train our youths, and acquaint them with specific knowledge of computer technology. Our program focuses on the following principles:

1. Teaching young people operational skills by immerging them in a variety of software programs and internet technology
2. Creating an awareness of what the computer can do, as a tool for learning and finding out about things through research.
3. An awareness of ideas and behavior that are part of the computer culture, such as knowledge of safe behavior on the internet.
4. A body of successful experiences that over time will develop within a young person the intuition for dealing with new things he or she encounters in a computer environment.
5. A clear attitude of the mastery, discovery, purpose and pleasure in using computer effectively.

Students pose with instructor In general, computers are offering substantial benefits to young children and their overall development. With parental guidance, quality software, safe surfing tips, their own love of discovery and learning, we see that children can reap lifelong benefits of computer literacy for the rest of their technology filled lives. Accordingly, if a family can afford a computer without sacrificing other important items for the child, then the current environment calls for an investment on a computer. This tool will in most occasions replace books for learning and be integrated in the family’s day to day activities.

Thursday, July 16, 2009

Choosing a Career in Computer Hardware Engineering:

Computer Laboratory for hardware testing
One of the most difficult decisions every young person has to make in their lifetime is deciding on a career. It is even a more daunting task in societies where there are few or no career counselors in high schools, and universities where such decisions can be made much early.

For most young people, figuring out what their purpose in life is and how to find their dream career is a lifetime decision. Who is there to guide them through this crucial life cycle stage? It isn’t everyone who can set goals and believe they will work for him or her. It is therefore important to know who you are first as well as where you want to be in life down the road. There is no doubt; everyone has a purpose on earth. For some people, it may becoming a musician, soccer player, lawyer or computer hardware engineer.


We have discussed about the importance of computer education and how it has become an integral part of life. It is therefore a given that computer knowledge coupled with certain job skills increases one’s chance of getting a job. Higher education involving network administration, hardware maintenance or software skills open doors for brighter job opportunities.


Computer Hardware Engineer:

Within the domain of computers, the hardware engineer’s job includes research, development and installation of computer hardware. Ideally a Bachelors degree in engineering or technology is required to work as a computer hardware engineer. The rapid improvements we see today in computer technology are due to the work of computer hardware engineers and technicians.

Circuit Board design by Hardware Engineer
They design and test keyboards, modems, computer chips, printers, circuit boards, computer systems and also oversee the manufacturing of these items. To become a successful computer hardware engineer you must be creative, analytically minded and detail oriented. You must also be willing to work in a team environment since hardware engineers must relate with people from a variety of fields as well as having good interpersonal skills.

Fully designed computer motherboard - heart of personal computer
A typical day in the life of a computer hardware engineer may include providing technical support to designers, marketing and other team members throughout the product development and implementation process. He or she may also test and verify hardware support peripherals to ensure they meet specifications by recording and analyzing test data. Finally, the hardware engineer may monitor the functioning of equipment, make modifications, analyze information to determine, recommend and plan layout.

If you are therefore thinking about a career as a computer hardware engineer, then you are about to make a wise life decision. The opportunities for income generation and growth are enormous. You are on the right path to success.

Thursday, June 18, 2009

MAKING A CAREER IN SOFTWARE


Computers are a critical component of our daily life—both at home and in the office. But without software, computers may as well be called useless machines. “Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems. ‘Software’ is sometimes used in a broader context to mean anything which is not hardware but which is used with hardware, such as film, tapes and records”.




Because of the rise in reliance on computers, there is a need for highly trained workers to design and implement new software that incorporates all of the latest technology. It has become difficult to find another area in the work force today expecting more growth than software.

There are several specializations within the area of Software Engineering. The most common are Systems Analysts (or Programmer Analysts) and Database Administrators. Of course there are many others, particularly pertaining to the Internet such as web site designers, but they don’t technically fall into the Software Engineering focus. So what do these various types of software engineers do?

Systems Analysts tackle computer problems and solve them, as well as work directly with consumers and organizations to meet their particular needs. Basically, they will evaluate an organization and help them maximize their investment in equipment, personnel, and business processes. Systems Analysts may also design new systems or help correct current systems to meet an organization’s individual requirements. Updating systems may include creating new software that runs an organization’s computers. Because Systems Analysts are responsible for both reviewing current systems and creating new ones, they need to be proficient in both areas, as well as able to work with various programming languages. They also need to be experienced in client server applications development, and multimedia and Internet technology.
Database Administrators are responsible for handling the massive volume of data that is created on a daily basis at any organization. Between the Internet and the general electronic business that is performed today, the ability to store, manage, and extract data efficiently is critical.

Database Administrators work with database management systems and help an organization determine the best possible way to organize and store their data. Database Administrators may also design and implement database system security, including areas such as data integrity, backup, and keeping databases secure.



Most areas of Software Engineering require, at the least, a Bachelor’s Degree in Computer Science, although degrees in information science and management information systems (MIS) may also be helpful. MIS programs differ from traditional computer science degrees in that they also focus on business and management as well. Organizations with management positions for Software Engineers are often seeking individuals with a Masters in Business Administration degree with a focus on Information Systems. But for some Network systems and data communications analysts (such as web administrators), an associate’s degree in computer science or even the completion of a certification program is sufficient.

Wednesday, June 10, 2009

STUDENT INTERNSHIP EXPERIENCE

Susan - busy at work with a gentle smile

At ECA internships are regarded as a work related experience to help students strengthen their professional philosophy and understanding of the evolution of information technology and its application in a working environment. For these students, the real world experience is the ability to use technology in a workplace environment, communicate with a variety of other people and act professionally.

Lyonga - takes a deserved break after a long day

Most ECA students conduct their internships program with private firms, organizations and IT outfits in Limbe which offer students an opportunity to pursue their interest in the delivery of computer technology. Students are not directed to any particular internship site. However, they have the opportunity to focus on a variety of settings and select their internship experience according to their major area of interest. The internship program usually last anywhere from one to six months.
Rose - handling the challenge with supervisor on the side

In whatever setting the internship takes place, the experience often includes a close working relationship with an experienced professional. It offers a window for the student to increase his or her confidence by experiencing firsthand involvement in planning, implementing and marketing IT services. It is also an opportunity for the student to apply personal and professional knowledge and skills, and a chance to receive supervisory evaluations towards identifying strong areas of skill and expertise as well as those areas that may need to be enhanced upon graduation.
Moses - reflecting on what lies ahead.

Friday, May 29, 2009

GREETINGS FROM INDIA

Technology is transforming the world. The way we do business, learn, communicate and entertain is fast changing. To be successful today in any field of study, be it business, law, medicine, or banking you must have a strong command of information technology. Indeed, a background in IT offers high paying jobs, a path to multiple careers and job growth. That is why ECA's former laboratory Manager and Technical instructor decided to let go the stunning natural beauty of Limbe for a tech - saavy environment in Hyderabad, India. Professor Derick Enow sends greetings from his school campus at Zoom technologies.



I am a student of information Technology and my main area of interest is networking.I have chosen to take it professionally and I am currently concentrating on implementation using the approaches of Cisco Systems,the Microsoft Corporation and Linux.Presently,I am taking courses for the Cicsco Certified Network Associate(CCNA),Cisco Certified Network Professional(CCNP),Microsoft Certified IT Professional(MCITP) and the Redhat Certified Engineer(RCE).I am currently studying at Zoom Technologies,Hyderabad-India.My main goal is to be an expert in networking,and to take all the paths that will lead to this goal in order to obtain the Cisco Certified Internetwork Expert(CCIE) certification,which is one of the most respected in this field of study.

Tuesday, May 26, 2009

INTERNET SEARCH ENGINES



One of the most fascinating developments of the World Wide Web (www) is the ability to conduct research from your desk top without visiting a nearby library. This is even more true in the developing world, where public libraries are hard to find. In the past, most students had to rely on outdated text books and lectures by instructors to conduct research. The Internet has changed all of this within the last decade. There are now literally thousands of e-books, articles, newspapers and scholarly journals on every subject imaginable on the net. The underlying problem is how you acquire this information without the necessary background in computers. Basically, you don’t have to be a computer guru or subject matter expert to conduct research on the net.

Large databases of web pages files known as SEARCH ENGINES make it possible to manage information from the internet. Once a search is conducted, the results could be a list of categories or subcategories and full text documents. Simply stated, search engines provide links to web sites containing most information a user is looking for. These lists are commonly referred as hits and depending on area of interest, you can make a selection of hits found to match your topic. You may be wondering how developers of search engines make money. A lot of search engines are supported by advertisers. Advertisers pay money in order to have their listings ranked higher in search results. Other search engines make money by running advertisements alongside the result of the search engine.

There are over a hundred search engines on the Internet. However, some are more user friendly than others. One thing to remember is that search engines do not directly search the web. Every search engine searches a database of WebPages that it has copied and stored. Therefore when you use a search engine, you are searching a stored copy of the real web page and then retrieve the most current page by clicking on the link. It is also worth noting here that, search engines databases are built by computer robot programs known as spiders. These spiders crawl the web looking for pages to include in their database.

Here is a listing o f the most popular search engines based on recent surveys.
Google. http://www.google.com

Google was launched in 1998 and rose to prominence in 2000. It represents the most comprehensive collection of web pages on the internet and consists of more than 1 billion URL’s (uniform resource locator) internet address, e.g. http://www.ecotelacademy.org/programs.html

Yahoo. http://www.yahoo.com

Yahoo provides results that are arranged in relevant subject categories followed by web sites and individual sites. Yahoo.com was launched in 2004.

A few other top search engines are:

http://www.ask.com
http://www.exalead.com
http://www.viewzi.com
http://www.info.com
http://www.infoseek.com
http://www.altavista.com
http://www.alltheweb.com
http://www.msn.com

Monday, May 18, 2009

THE FEAR OF COMPUTERS IN OUR SOCIETY


Cyber-phobia, otherwise known as the fear of computers is too prevalent in our society. For many people, the fear of computers is associated with the fear of the unknown. For middle age and older people who did not grow up with computers in Cameroon, the evolution of information technology has led to intimidation, fear and anxiety. However this fear is not uncommon and can be overcome. The younger generation has started using computers as part of their education. So the fear of the unknown is somehow eliminated.

The introduction of PC’s in 1980 began a revolution in the world that continues to peak. Today in Cameroon, it is becoming impossible to avoid dealing with a computer on a frequent basis. Computers control cars, telephones and office equipment. Most banking is now done with computers, example sending or receiving money from western union or money gram. Without leaving our homes, we can even buy items from around the world and use the computer to compare prices and shop. With the power of the internet, computers allow us to communicate instantly, gone are the days when a letter from Cameroon to Europe took one month. There is absolutely no topic that you can think of that you cannot find a site for on the internet. All you need is to use a search engine such as Google or yahoo and conduct a search.

With all this advantages, and tremendous power of technology, why do many middle age and older people in Cameroon still fear to use computers? As stated earlier, the reason is fear of the unknown. People who have not been exposed to computer technology automatically think it is too complicated or see no reason to use or own one. They also fear they cannot learn to use a computer and feel bewildered by strange terms such as memory, DVD Drive, boot, port, gigabyte, virus, spam, etc.
Like every learning experience, you have to try things out and explore. By sitting in front of a computer, you cannot under any circumstances hurt a computer or damage it. The fact is, this is a computer dominated society and all new jobs require knowledge of computing. For middle age and older people in our society, the fear of making a mistake, looking dumb or starting as a beginner are nothing but lame excuses for missing out an opportunity to be part of a culture that is mind expanding and invaluable in today’s world. You can eliminate cyber-phobia by enrolling in a computer class for beginners, this will help you become familiar with the idea of computers and make you understand there is nothing to fear but fear itself.

Thursday, May 14, 2009

MEET OUR ACADEMIC ADMINISTRATOR



Eyong Effi Atem was born in Limbe, South West Province of Cameroon. After attending primary and secondary schools in Buea, he moved to the University of Yaounde 2 Soa, where he studied and graduated with a degree in English Private Law in 2007. While studying in Yaounde, Effi enrolled concurrently at Power Bach Institute due to his love and special interest in the emerging ICT revolution in Cameroon. Upon completion of his course work at Power Bach Institute, he was awarded a diploma in Microsoft Office Specialist 2007 at the master level and a minor in computer maintenance.

Effi returned to his beloved City - Limbe and joined ECA in February 2008, as the pioneer instructor in the Microsoft office program and later became the academic administrator. In the course of his tenure at ECA, he quickly discovered ECA was the only training center in Fako division, offering MS 2007 in keeping up with changing technology. Under his leadership and smart wits, ECA has trained a good number of students in MS 2007. Most of his former students have used their new skills and gained employmentin the private sector. Many more have moved on to further studies. He hopes to start training students in MIcrosoft Office 2010, refered as Office 14 in the very near future.

Eyong Effi is single, a christain and looks forward to furthering his education. He has a passion in teaching, research and working with computers. He also enjoys quiet moments at the beach and listening to R&B,and Makossa. Effi is usually busy developing programs, teaching or studying. He is always available for chat as well.

Email: effischcl22@gmail.com

Tuesday, May 12, 2009

WIMAX DISRUPTS ONLINE STUDIES




In late 2008, MTN deployed WIMAX in Limbe to provide broadband internet to homes and businesses. With the launch of this new technology in Cameroon, MTN promised offering the most advanced services to businesses and residents, and bringing connectivity “EVERYWHERE YOU GO”. With WIMAX potential to replace a number of telecommunication infrastructure such as Satellite and DSL, ECA contacted MTN for internet services. However, for the last two months, there has been constant disruption of service with no connectivity lasting 4 hours in some occasions. The impact has been felt by students using the cafĂ© for research and online studies. Students have been forced to postpone assignments, and look for other venues to complete their work. ECA technicians have contacted MTN to find out the cause of this intermittent but constant disruption. The response has been network problems. We do not know if MTN is experiencing this problem only in Limbe but a quick solution will alleviate our headaches and bring life to normal for students. We are still waiting to see the affordability, availability, mobility and ease of use that WIMAX promises.

ABOUT WIMAX:

WIMAX is a wireless digital communications system. WIMAX can provide broadband wireless access up to 50 KM for fixed stations and 5-15 KM for mobile stations. A WIMAX network comprise of two elements: base station and subscriber station. Due to the lack of telecommunication infrastructure in Africa, poor internet service and outdated technology, WIMAX provides opportunities for broadband internet to rural and underserved areas that cannot be addressed with wired technology. WIMAX also promises to bring lower cost for operators and end users. It is a less expensive solution compared to DSL.

SCHOLARSHIP PROGRAM


ECA NEWS - LIMBE:

The chair of board of directors, today announced two additional scholarship slots have been created for orphans/under -served young adults wishing to enroll in the current Microsoft office class. The Microsoft package is a six months program. It prepares students for career positions such as office administrator and administrative assistant with a focus on customer service.




The office (2007) package includes courses in word, excel, Power point and publisher. Students are also introduced to customer service orientation, special software packages in banking, hotel management and business studies. Applicants interested in taking advantage of this opportunity should apply immediately. Please stop by at the lower level of Data building and contact Jerry for application package.

Thursday, May 7, 2009

ECA STUDENT LIFE

Student life at ECA is full of fun activities and learning. With abundance of information on the cyberspace, students hardly realize how much time they spend training. At ECA, students have the option to attend classes during the morning or afternoon sessions. Besides regular course work involving lectures, each student is assigned a computer for practical training.


With a state of the art internet facility on the first floor level, most students reinforce their training with online research activities. There is no lack of fun at ECA. A stroll to down beach or the botanical garden to catch some sea breeze is just a mile away.


Limbe Ocean front





SUMMER CAMPAIGN BEGINS









The summer campaign for IT classes during the long holidays is currently underway. Last year, we enrolled over thrity students in our computer camp. We also offered scholarships to the best students in selected primary schools in Limbe who excelled in computers. These students found their experience at ECA very enriching. They were introduced to basic courses in key boarding, internet, microsoft word and desktop publishing. Nowadays, it has become common place for parents in Cameroon to aquaint their kids during the long holidays with unique computer skills. So far, ECA has met that expectation with moderate tuition, hands on training and a friendly environment. For more information, go to www.ecotelacademy.org