Monday, February 16, 2015
Friday, July 4, 2014
Information Technology Architecture
“information” means many things to many people depending on
the context scientifically. Information is processed data. Information can also
be loosely defined as that which aids decision making, information, through
abstract, could be visualized as a coomodity which could be brought or sold.
Other writer define information as any potentially useful fact quality or value
tathat can be exprees with exactness .information is watherever is capable of
causing a human mind to change its oppinon about the current of the state of
real world according to Dewarevaile and gilbert (2000)
Communcation
refers to the transfer of ecxhnage of information from person to person or from
one place to another when action produce a reaction weither positive or
negative communication as taken place. Other writer in the field of
communication studies have defined communication as a process, a transfer of
information, ideas, thought and
messages. It involves a sender, a receiver, a code and a language that is understood by both the
sender and the receiver. A process involving the passing of messages through
the use of symbol which all parties in the communication encounter understand
it involve the exchange of ideas, facts, attitudes and believes between people.
If it is not one way affairs. There must be a sender to transmit the message,
and receiver to make appriopriate descision on how th rest of the exchange
continues. James etal (2004) technology refers to the use of scientific
knowledge to invent tools that assist the human beign in there effort to
overcome environmental hazard and impediment to comfort. In this regard,
technology refers the thing like computer telllephone, cel phone , GSM handset,
Television, radio e.t.c.
Put together therefore ICT has been
defined by Dewarttiville girlbert (2000) as the acquisition analysis ,
manipulation, storage and distribution of information , and design and provision
of equipment and software for these purpose. ICT and information’s technologies
(IT) are similar concept that can be used interchangeably. IT implies
communication and therefore it become an
obvious that the two term are synonymous.
2.4
information technology architecture
Information
technology (IT) architecture is a blue point that is developed, implemented,
maintained, and used to explain and guide how an organization IT and
information management element works together to efficiently accomplished the
mission of the organization. IT architecture addresses the following views:
business activities, and processes data sets and information flows, application
and software, and technology. A proper architecture is not limited to adware
and software issue.
2.4.1
Objectives of IT Architecture
David A Mcafee (1997) presented the IT
architecture as been guided by the following objective, which helps
make decision for establishing individual standards:-
1. Architecture decision should serve
the department mission.
2. The architecture serve heterogeneous
environment
3. The greater the consensus achieves
for individual architecture decision the greater the benefits.
4. The architecture should identify
areas of stability without impeding essential innovation.
5. Architectural decision should
described tangible result of conformance and non conformance with the
architecture.
6. Architectural decision should provide
sufficient documentation to assess the compliance of a specific
implementation
2.4.2
purpose of it architecture.
The purpose of the IT architecture
is to guide the process of planning, acquiring building, modifying, interfacing
and deploying. IT resources throughout the department. As such then IT architecture should offer a
means of stable evolution by identify by technology that work together to
satisfy the need of the department user
2.4.3
Benefit of it architecture.
1. It’s a way to inform the developers
department directions.
2. It will
help in making planning, development and purchase decision.
3. It will
be useful in aligning information technology provider for the development
4. It will
reduce the maintenance and support requirements
5. It will
help planning migration to new technologies
2.4.4 componet of IT architecture.
The IT architecture that is created
by the strategic business/IT planning process is a conceptual blue point that
includes the following major components:
1. Teaching platform: the internet,
intranets and extranets and other networks, computer system software and
integrated software application provide a computing and communication
infrastructure or platform that supports the strategic use of information technology
for E-business, e-commerce and other business / IT applications.
2. Data Resources: many type of
operational and specialized data base including data warehouse and internet / Intranet
data base store and provide data and information for business processes and
decision support.
3. Application architecture: business
application of information technology is design as an integrated architecture
or portfolio of enterprises system that support strategic business initiatives.
4. IT Organization: the organizational
structure of IT functions within a company and distribution of IT /IS specialists
are design to meet the changing strategies of a business. (Conned from MIT 706:
information technology centre management, lecture note)
2.4.5 IT
Architecture framework.
The framework for the IT
architecture is that of a cube sliced into five section or layers from back to
front. Each section or layer represented a type of architectural specification
from the most general IT Policies layer at the back of the cube to the most
specific product layer of the front of the cubes.
A comprehensive view of an IT
architecture specifies: (1). Policies and (2). Principle that indicate
direction (3). Services and common solutions (4). Standards and Guidelines and
(5). Product that detailed the mean of implementation(Davic A.
Mcafee(1997)
Thursday, November 8, 2012
Atacama Desert
In the Atacama Desert fell real snow!
The invasion of cold air in the rear of the cyclone decreased the thermometer readings in the mountains to negative values.
Cooling was accompanied by precipitation: rain on the coast and snow in the mountains, which formed a temporary snow cover.
Located in the north of Chile, Atacama Desert is the most arid place on earth. Below 50 mm of rain is a years average here. In some places precipitation comes only once in few decades. In the Antafogasta area the year average precipitation is only 1 mm. Some weather stations have never recorded rain.
According to the research of scientists from the UK, there are river beds that havent seen water in the past 120,000 years.
Cooling was accompanied by precipitation: rain on the coast and snow in the mountains, which formed a temporary snow cover.
Located in the north of Chile, Atacama Desert is the most arid place on earth. Below 50 mm of rain is a years average here. In some places precipitation comes only once in few decades. In the Antafogasta area the year average precipitation is only 1 mm. Some weather stations have never recorded rain.
According to the research of scientists from the UK, there are river beds that havent seen water in the past 120,000 years.
Sunday, October 7, 2012
IN HIS PRESENCE
Memory Verse
"Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you:" Matthew 7:7
BIBLE PASSAGE: Matthew 6:5-15
INTRODUCTION
It is a common practice to lock up valuables in special rooms and with special keys. Where to keep these valuables whether in the outer rooms or in the inner strong rooms, depends on how valuable they are to you. Though there are different keys to these rooms, there is a 'master key, however, that is available to the master of the house to unlock at will any of the doors to these rooms. Today, we will begin to examine the spiritual master key of the house to unlock doors to answers to petitions of God's children, that is, prayer.
OUTLINES
1. WHAT IS PRAYER?
2. WHY SHOULD WE PRAY?
3. WHERE AND WHEN CAN ONE PRAY?
WHAT IS PRAYER?
Prayer, simply put, is the soul of man talking to God. It is worship addressed to God the Father, in the name of God the Son and through the power of the Holy Spirit Acts 12:5; John14:13; Ephesians 6:18; Romans 8:26-27. Prayer should consist of the following:
(a) Adoration i.e. praises and worship of God for what God is e.g. God is good, merciful, kind, powerful, faithful, just etc. When you praise God for what He is rather than what He has done for you, it is true worship - Ps. 95:6. (b) Confession and repentance from every known sin - Ps. 32:5. Washing in the blood of Christ will follow. If you are already sanctified and you have no sin to confess, wash in the blood all the same. You can never be too clean.
(c) Thanksgiving. Be thankful for anything and everything that God has done - Phil. 4:6.
(d) Supplication Le. Intercession, requests, petitions and desires can now be addressed to God, in the name of Jesus through the power of the Holy Spirit – ITim. 2:1.
WHY SHOULD WE PRAY?
God commands us to pray - Luke 18:1; 1 Thess.5:17; 1 Chron.16:11; James 5:13; Psalm 50:15. Jesus prayed and Christian followers of Jesus are expected to pray - Mark 1:35; Luke 6:12; Luke 3:21. The early Church prayed, so, churches too should pray - Acts 4:23-31; Acts 12:5-6; Eph. 1:15-20; CoI.4:12. The believers of old prayed too e.g. Moses in Exodus 15:23-25; Jesus, Matthew 26:39-42, David in Psalm 51:1-2 and Elijah too1 Kgs.18:37-39; James 5:17-18.
WHERE AND WHEN CAN ONE PRAY?
We can pray everywhere - I Timothy 2:8, in the closet - Matthew 6:6, or in the church, - Luke 18:10. Private prayer may be made in the secret place. Family prayer will involve a large group and may be made in the sitting room while public prayer may be made before the congregation.
We can pray in the morning - Psalm 5:3, at noon and in the evening Psalm 55: 17, day and night - Psalm 88: 1, daily - Psalm 86:3, and always Luke 18:1-. It is not only when you are on your knees with your eyes closed that you can pray. You can pray as you drive to work, while at work or while resting. Singing praises to God is also a form of prayer. Pray without ceasing 1 Thess. 5:17.
CONCLUSION
We have just discovered some fundamental truths about the master key, especially the aspects of when and where to apply it. Let us, therefore, act now and present all our petitions to God in the name of Jesus Christ. It is certain that He will answer accordingly to His perfect will for us.
"Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you:" Matthew 7:7
BIBLE PASSAGE: Matthew 6:5-15
INTRODUCTION
It is a common practice to lock up valuables in special rooms and with special keys. Where to keep these valuables whether in the outer rooms or in the inner strong rooms, depends on how valuable they are to you. Though there are different keys to these rooms, there is a 'master key, however, that is available to the master of the house to unlock at will any of the doors to these rooms. Today, we will begin to examine the spiritual master key of the house to unlock doors to answers to petitions of God's children, that is, prayer.
OUTLINES
1. WHAT IS PRAYER?
2. WHY SHOULD WE PRAY?
3. WHERE AND WHEN CAN ONE PRAY?
WHAT IS PRAYER?
Prayer, simply put, is the soul of man talking to God. It is worship addressed to God the Father, in the name of God the Son and through the power of the Holy Spirit Acts 12:5; John14:13; Ephesians 6:18; Romans 8:26-27. Prayer should consist of the following:
(a) Adoration i.e. praises and worship of God for what God is e.g. God is good, merciful, kind, powerful, faithful, just etc. When you praise God for what He is rather than what He has done for you, it is true worship - Ps. 95:6. (b) Confession and repentance from every known sin - Ps. 32:5. Washing in the blood of Christ will follow. If you are already sanctified and you have no sin to confess, wash in the blood all the same. You can never be too clean.
(c) Thanksgiving. Be thankful for anything and everything that God has done - Phil. 4:6.
(d) Supplication Le. Intercession, requests, petitions and desires can now be addressed to God, in the name of Jesus through the power of the Holy Spirit – ITim. 2:1.
WHY SHOULD WE PRAY?
God commands us to pray - Luke 18:1; 1 Thess.5:17; 1 Chron.16:11; James 5:13; Psalm 50:15. Jesus prayed and Christian followers of Jesus are expected to pray - Mark 1:35; Luke 6:12; Luke 3:21. The early Church prayed, so, churches too should pray - Acts 4:23-31; Acts 12:5-6; Eph. 1:15-20; CoI.4:12. The believers of old prayed too e.g. Moses in Exodus 15:23-25; Jesus, Matthew 26:39-42, David in Psalm 51:1-2 and Elijah too1 Kgs.18:37-39; James 5:17-18.
WHERE AND WHEN CAN ONE PRAY?
We can pray everywhere - I Timothy 2:8, in the closet - Matthew 6:6, or in the church, - Luke 18:10. Private prayer may be made in the secret place. Family prayer will involve a large group and may be made in the sitting room while public prayer may be made before the congregation.
We can pray in the morning - Psalm 5:3, at noon and in the evening Psalm 55: 17, day and night - Psalm 88: 1, daily - Psalm 86:3, and always Luke 18:1-. It is not only when you are on your knees with your eyes closed that you can pray. You can pray as you drive to work, while at work or while resting. Singing praises to God is also a form of prayer. Pray without ceasing 1 Thess. 5:17.
CONCLUSION
We have just discovered some fundamental truths about the master key, especially the aspects of when and where to apply it. Let us, therefore, act now and present all our petitions to God in the name of Jesus Christ. It is certain that He will answer accordingly to His perfect will for us.
Tuesday, July 24, 2012
SECURITY ALERT
This piece of information came from a Security detective. Kindly note there is a new technique used by robbers and car hijackers to escape from arrest due to their criminal activities.Theyare collecting used scratch cards and once they abandon the car or where they dump the deadbodies they leave the already used scratch card at the scene. Once the security officer arrive there they will use the scratch card serial numbers to track on which phone number it was loaded then the security officer will start tracking the phone number owner. Already, some people have been fell victim of this case are in security officer custody.TO BE ON THE SAFE SIDE Once you load airtime make sure you destroy the card before you dispose it to avoid such incidences. PLEASE SHARE THIS WITH EVERYONE, IT 's cheap and Safe to stay safe. WE WON'T FALL VICTIMS of Negligence and Evil circumstances or situations in Jesus Name.. Amen.
Saturday, July 14, 2012
Please be extremely careful especially if using internetmail such as Yahoo, Hotmail, AOL and so on. This information arrived this morning direct from both Microsoft and Norton. Please send it toeverybody you know who has access to the Internet. You may receive anapparently harmless email with a Power Point presentation ' Life is beautiful. ' If you receive it DO NOT OPEN THE FILE UNDER ANYCIRCUMSTANCES, and delete it immediately. If you open this file, a message will appear on your screen saying: 'It is too late now, your life is nolonger beautiful.' Subsequently you will LOSE EVERYTHING IN YOUR PC andthe person who sent it to you will gain access to your name, e-mail andpassword. This is a new virus which started to circulate on Tuesday afternoon. AOL has already confirmed the severity, and the antivirus software's are not capable of destroying it. The virus has been createdby a hacker who calls himself 'life owner.' PLEASE SEND A COPY OF TO YOUR FRIENDs
Tuesday, February 1, 2011
MYSTRY STONE AT LARABANGA

The Mystery Stone in Larabanga
At the outskirts of Larabanga a town the Upper West region of Ghana is a legendary mystic stone which according to stories, whilst a main road was being constructed, whenever the stone was removed to make way for the construction, it always returned to its original place on several occasions.
Now that's some legend, why don't you make a trip to see for yourself and maybe try to remove it......."if you want it well done, you do it yourself"... ;)
Legend has it that this stone on the outskirts of Larabanga (Northern Region) always returns to its original resting place when moved. Due to this legend the main road that runs through this area had to be diverted around the stone.
Subscribe to:
Posts (Atom)