Thursday, March 6, 2008

What is NewsML?

It is a News markup language for the News industry initiated by International Press Telecommunications Council (IPTC). Based on the Extensible Markup Language (XML), NewsML is a standard way to describe news information content so that it can be distributed and reused widely on Web sites and other media. The use of NewsML could, for example, allow a news editor to search for, locate, and download various forms of content (photographic images, text, video) from different Web sites and then easily combine them for presentation on the news site.

NewsML and similar XML-based standards, such as Extensible Public Relations Language (XPRL) and Extensible Business Reporting Language (XBRL), are designed to make it easier to format and present information related to their specific business sectors.
Because NewsML, XBRL, and XPRL are all based on XML and support other XML standards, such as XML Schema Definition (XSD), they enable interexchange of data.

Reference: http://searchsoa.techtarget.com/sDefinition/0,,sid26_gci848027,00.html

Who is using NewsML?

Reuters
The Wall Street Journal
BBC
Channel NewsAsia
Business Wire
Many more listed in the website given below

Reference: http://www.newsml.org/pages/whouse_main.php

Below are some examples:




The latest: NewsML-G2

NewsML™ is a media-type agnostic news exchange format for general news and NewsML-G2 2.0 is its latest standard.

NewsML-G2 provides exchange formats for:
- General news: textual news, articles, photos, graphics, audio and video can be exchanged for the News Item
- A flexible mechanism for packaging news in a structured way - the Package Item.
- Information about concepts, used for values in controlled vocabularies - the Concept Item - and further a format to exchange full controlled vocabularies as a single file - the Knowledge Item.
- A wrapper around items to transmit them by any electronic means - the News Message.

NewsML-G2 is a member of the family of G2-Standards, thus is shares many of its components with the other standards of this family. These shared components make the IPTC News Architecture for G2 and can be considered as the framework all the G2-Standars are built on.

More information on NewsML can be retrieved at http://www.iptc.org/G2-Standards/newsml-g2.php

What is multimedia?

Multimedia is simply multiple forms of media integrated together. Media can be text, graphics, audio, animation, video, data, etc.

Multimedia can also stand for interactive types of media such as video games CD ROMs that teach a foreign language, or an information Kiosk at a subway terminal. Other terms that are sometimes used for multimedia include hypermedia and rich media.

Reference: http://www.tech-faq.com/multimedia.shtml

Impact of multimedia for marketing

Marketing: Visually appealing presentations with product demos can be used for creating a high impact for a new product that is being launched. Customers get a fair idea about the product in an interesting and informative manner. Demos and simulations of the products enable customers to visualize and experience the working of the product.”

Reference: http://www.icreonglobal.com/entertainment_&_media.shtml


How multimedia is used for marketing of new products?

1. Web page

For example: Tiger Balm uses its web page to advertise its new product – Tiger Balm Neck and Shoulder Rub Boost. The webpage has text and graphic to inform consumers the benefit of the product.


Another example is Samsung i620. Samsung uses its website to showcase its new phone via simulation and text information. In this way, consumers are able to imagine how the actual physical product would be like, and allow them to experience a new way of retrieving information other than the traditional way of looking at pictures that are presented in brochures, magazines etc.



Yet another example is Microsoft surface computer. The company uses lots of videos, graphics, reports, audio etc to advertise this product. Videos can be found in youtube, and many other channels in the Internet.

2. Mobile phone

For example, Sony Ericsson W550i, N71, N95, iPhone, LG KF600 and so many more are multimedia phones.

These phones can be used by marketers to promote their products via the applications that users subscribe to. For example, google search and yahoo search is available in mobile phones, like computer sets, users can get access to Internet for news, videos, songs, and so many more.

Wednesday, March 5, 2008

Protection and Risk-prevention tools and methods against Virus, Worms, Spyware, Phishing, and other threats etc


Are you afraid that someone that you do not know actually knows your name, your home address, your favorites, and what’s worst – your credit card numbers, passwords, and IDs? If you are afraid, then I will tell you not to be. Chinese spirits have Taoist priests to capture them. Human viruses have immune systems to destroy them. And Computer threats have security programs to eliminate them.

10 Ways to protect your PC!!!

1. Never download anything from doubtful source, never share confidential information through messaging systems, and avoid storing such data on a laptop, which is easier to lose. (Info stored in Hardware PC must be safeguarded too. Don’t be sorry like Edison’s case)

2. Use all-in-one security programs such as Symantec or McAfee, which include anti-virus, anti-phishing, anti-spyware and other useful tools. Always make sure that free anti-virus software provider is credible. *careful of Trojan

3. Always remember to update software definitions to ensure the computer is protected against the latest hacker programs.

4. Always remember to enable firewall, anti-spyware software installed, and non-expired anti-virus software present in the computer before going online.

5. Shred or tear up credit card and bank statements before disposal

6. Use less obvious passwords. If possible, do not use I/C numbers, phone numbers etc.

7. Check up on the person who requests for your personal information.

8. Refrain from revealing too much personal information in online diaries, social network sites etc. One potential source for retrieving personal data is Facebook or MySpace social networking sites.

9. Keep oneself updated with the latest news on cybercrime, security programs, methods implemented by banks to safeguard personal details etc

10. No choice, then encrypt your laptop.

References

Singh, K. (2007, September 14). Many have lax attitude towards IT fraud; Poll shows 1 in 5 does not shred credit card or bank statements before disposal, while one-third use easy-to-recall passwords. The Straits Times. Retrieved on March 5, 2008, from Lexis-Nexis database.

Loh, W. L. (2007, October 7). The price of your b@nk account: Just $440; Personal information pilfered by hackers can be sold and used for crimes like fraud and identity theft. The Straits Times. Retrieved on March 5, 2008, from Lexis-Nexis database.

Why do cybercrime exists?

Loh, W. L. (2007, October 7). The price of your b@nk account: Just $440; Personal information pilfered by hackers can be sold and used for crimes like fraud and identity theft. The Straits Times. Retrieved on March 5, 2008, from Lexis-Nexis database.


Money is a temptation to many people. Like most people, the ultimate motive of cyber thefts is to gain lots of money. However, instead of using legitimized means to earn money, they chose underhand methods. How much do these cyber thefts actually earn then?

In the black market, the details of an online banking account with at least thousands of dollars cost around $300 US. The information about a person’s life, including birth dates, credit card, and identification numbers cost up to $18 US. As for credit card information it is for $1US to $6 US. Moreover, a list of 29,000 e-mail addresses, the amount is $5US. It sounds really pathetic for the effort to steal these data. Hence, cyber thefts have to constantly look for large number of preys to hack into their computer systems for higher returns.

On the other hand, people who know how to utilize such information are able to embezzle funds from other people’s bank accounts. One example provided in the artile is the case on “New Yorker Shiva Brent Sharma, who at the age of 20, amassed a cyber loot of $150US,000 before he was nabbed in 2005 for identity theft.He bought stolen credit card accounts online and managed to transfer large amounts of money to himself. He once stole $20,000 US in less than 36 hours.”

Cybercrime is certainly a lucrative illegal business.

Cybercrime related news reported in Singapore

Yee, L. (2006, July 29). MAS warns of e-mail scam using its logo. The Straits Times. Retrieved on March 4, 2008, from Lexis-Nexis Academic database.


In this article, the Monetary Authority of Singapore (MAS) tries to inform the public that fake “e-mail containing its name, logo and letterhead are being used in a financial scam.” “The e-mail - sent by cyberspace tricksters on the lookout for easy money - typically asks recipients for personal information or to transfer funds to a particular party or account” was reported. The problem that MAS encountered is called ‘phishing’ – a form of Internet fraud that tries to dupe someone into providing confidential information such as credit cards, passwords, and make someone do something he/she would not / should not normally do such as transferring of money into a foreign account. Similar acts of ‘phishing’ also happened to big banks in Singapore such as OCBC Bank and Citibank.

The implication of ‘phishing’ could be devastating if one is not aware of the danger and clueless of how to protect he or she against cybercrime. The article below is an example of a man being cheated of $48,000 by cyber thefts.


Chong, E. (2006, June 13). Man loses $48,000 in Nigerian e-mail scam; One con artist arrested, sentenced to three years' jail; others still at large. The Straits Times. Retrieved on March 4, 2008, from Lexis-Nexis Academic database.


“BUSINESSMAN Ng Yong Ngee responded to an e-mail that sounded too good to be true - a 30 per cent share of $8US.5 million ($13S.6 million) for his help in transferring the money out of Britain.” With that, the 30-year-old owner of an interior design firm parted with about $48,000 - and became yet another victim of Nigerian con artists.”