Monday, June 11, 2012

Trekking through the Himalayas...

The scope for trekking in Bhutan is immense - from short walks to arduous treks. The very moment you step off the road to start your trek you will be totally de-linked from the stressful sights and sounds of urban life. Instead, you will enjoy views of snowcapped peaks, dense forested hillsides and river valleys, and the sounds of birds and gushing streams, flowing down to the temperate river valleys from the melting snows of the mighty Himalayan peaks. Trekking provides an excellent opportunity to experience the real heart of Bhutan and gain insight into the rural culture of the kingdom.
In general, trekking in Bhutan is physically demanding due to frequent and abrupt changes in elevation necessitated by the terrain. Some trekking days can involve a strenuous walk along a rocky and muddy path, keeping on the move for 7-9 hours with few rests along the way, so as to reach the designated campsite before dark. A trek in Bhutan can be anything from a three day leisurely walk around a valley, to the arduous 25 day Snowman trek, taking one well above the snowline into Bhutan’s most remote high altitude settled region, Lunana. Most people take a trek which lasts around one week
The most important consideration is weather: the winter snows and summer rains effectively limit most treks to autumn and spring, Bhutan’s most popular trekking seasons. If you want to see alpine flowers you need to come during summer (July and August), but you should be prepared to encounter rain (and possibly leeches!). During the autumn, nights are cold but the days are clear, so you will enjoy spectacular views presenting great photo opportunities. Late spring is warmer, and the blooming season for endemic varieties of the Himalayan rhododendron, but there is a higher possibility of rain or snow. In winter, trekkers can enjoy several pleasant and not too taxing low altitude walks in the hills around the Punakha/Wangduephodrang valleys. Weather is very settled at this time of the year, with clear, sunny days and deep blue skies.
On your trek you will be accompanied by a small and efficient trekking team, who will guide you, prepare the meals, and look after all the camping arrangements. We provide two-person tents with foam mattresses, eating utensils, dining & toilet tents. Everything is transported by pack animals: horses in the low lands and yaks at higher elevations. There are no tea houses or lodges along the trekking routes.



Wednesday, January 25, 2012

Code of Ethics for IT Professionals:



A professional member of the computer Society of India (CSI) shall:

.     Organize the resources available to him and optimize these in attending the objectives of his organization,

.  Use the code of practice conveyed by the CSI from time to time in carrying out his task,

.  not misuse his authority or office for personal gains.

.  Comply with the Indian lawyer relating to the management of his organization particularly with regard to privacy and piracy, and operate within the spirit of these laws.

.  Conduct his affairs so as to uphold project and further the image and reputation of the CSI.

.  Maintain integrity in research and publication.

Codes of Practice

As regard ORGANIZATION an IT professional should:

. Act with integrity in carrying out the lawful policy and instructions of his organization and uphold its image and reputation,

. Plan, establish and review objectives and tasks for himself and his subordinates which are compatible with the code of practice of other
Practice of other professionals in enterprise, and direct all available effort towards the success of the enterprises rather than of him,

. Fully respect the confidentiality of information which comes to him in the course of his duities, and not use confidential information for personal
Information for personal gain or in a manner which may be detrimental to his organization or his clients,

. not snoop around in other people's computer files,

. in his contacts and dealings with other people, demonstrate his personal integrity and humanity and when called to give an opinion in his professional
Capacity, shall, to the best of his ability, give an opinion that is objective and reliable.

As regards the EMPLOYEES, an IT professional should:

.set an example to his subordinates through his own work and performance, through his leadership and by taking account of the needs and problems of his subordinates.

. develop people under him to become qualified for higher duties,

. pay proper regard to the safety and well-being of the personal for whom he is responsible,

. share his experience with fellow professionals.

As regards the CLIENTS, an IT professional should:

. ensure that the terms of all contracts and terms of business be stated clearly and ambiguously and honored,

. in no circumstance supply inherently unsafe goods or services,

. not use the computer to harm other people or to bear false witness,

. be objective and impartial when giving independent advice.

As regards COMMUNITY, an IT professional should:

. make a most effective us of all natural resources employed,

. be ready to give professional assistance in community affairs,

. not appropriate other people's intellectual output,

. always use a computer in ways that insure consideration and respect for fellow humans.



Source: Computer Society of India(C.S.I)

Thursday, January 19, 2012

Computer Hacking!!!!!!!

The term " Computer Hacking" traditionally describes the penetration of sabotage or espionage but for the pleasure of the overcoming the technical security measures.In practice.this kind offense can be frequently found.As far as the damage of these cases is concerned, a differentiation is essential:In numerous cases,the penetrated computer user is not actually harmed,but only endangered.However, in these case,too,the " formal sphere of secrecy" or the integrity of the concerned computer systems is violated.Contrary to this,considerable damages occur in other cases especially in other cases especially when the perpetrators later use their knowledge for committing espionage,sabotage or fraud.


Due to recent developments in the field of telephone and telecommunications technology( such as ISDN hacking does not only affects classic computer system but also increasing telephone lines, answer phones and voices-mail-system."Telephone hackers " dial themselves in to the telephone companies local phone exchanges and are thus able to eavesdrop on the digitally led conversations in a respective part of town.In US,besides other confidential information,especially the numbers of telephone access cards (calling cards) are eavesdropped on,which are then resold.

Tuesday, November 8, 2011

The impact of social issues on internet policy making

ABSTRACT

The advantages that internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that related with its use.Its global nature makes internet policy making a challanging task, creating new responsibilities for the policy makers world wide.Apart from the technical(e.g security, network availability,speed) and regulatory(e.g legal frameworks and standardization ) challanges that need to be tackled there are a number of social concerns that require special concern.It's important for the policy makers to see internet use as a social as well as a technical phenomenon.In this paper we examine how social concerns such as trust and digital democracy pertain all levels of internet policy, posing dilemmas and influencing the construction of an effective and socially responsible strategy for the internet.


Policy implementation for the internet and electronic commerce is a complex process since policy makers, national governments in their majority, have to act in a fast changing environment where international cooperation is imperative while also dealing with special national demands ( Papazafeiropoulou and pouloudi 2000). One of the areas that policy makers have to tackleds dealing with barriers have been reported in the adoption of network technologies today. These barriers are mostly derived from factors such as lack of awareness about the opportunities offered by electronic commerce as well as lack of trust to network security.Additionally the current legislative framework,drawn before the advent of the internet, is perceived as outdated.thus impending the expansion of on-line transactions.As the need for approprate policy measures that support the information society is increasing, It is important to prevent a predominantly technical, commercial or legal approch that neglects the boarder social issues related to policy making.

To this end, this paper examines social issues related to internet policy making and is structured as follows. in the next section we present the social concerns that are related to policy making in electronic commerce such as trust, privacy and digital democracy.In section  3 we discuss these concerns in the light of different policy issues arising from the use of network technologies and in section 4 we present their implications for the policy making in electronic commerce.The paper concludes with the importance of a holistic approch to polcy making and suggestions for further research.