Monday, February 16, 2015

Friday, July 4, 2014

Information Technology Architecture



“information”  means many things to many people depending on the context scientifically. Information is processed data. Information can also be loosely defined as that which aids decision making, information, through abstract, could be visualized as a coomodity which could be brought or sold. Other writer define information as any potentially useful fact quality or value tathat can be exprees with exactness .information is watherever is capable of causing a human mind to change its oppinon about the current of the state of real world according to Dewarevaile and gilbert (2000)
Communcation refers to the transfer of ecxhnage of information from person to person or from one place to another when action produce a reaction weither positive or negative communication as taken place. Other writer in the field of communication studies have defined communication as a process, a transfer of information, ideas, thought  and messages. It involves a sender, a receiver, a code  and a language that is understood by both the sender and the receiver. A process involving the passing of messages through the use of symbol which all parties in the communication encounter understand it involve the exchange of ideas, facts, attitudes and believes between people. If it is not one way affairs. There must be a sender to transmit the message, and receiver to make appriopriate descision on how th rest of the exchange continues. James etal (2004) technology refers to the use of scientific knowledge to invent tools that assist the human beign in there effort to overcome environmental hazard and impediment to comfort. In this regard, technology refers the thing like computer telllephone, cel phone , GSM handset, Television, radio e.t.c.
            Put together therefore ICT has been defined by Dewarttiville girlbert (2000) as the acquisition analysis , manipulation, storage and distribution of information , and design and provision of equipment and software for these purpose. ICT and information’s technologies (IT) are similar concept that can be used interchangeably. IT implies communication and therefore  it become an obvious that the two term are synonymous.
2.4 information technology architecture
Information technology (IT) architecture is a blue point that is developed, implemented, maintained, and used to explain and guide how an organization IT and information management element works together to efficiently accomplished the mission of the organization. IT architecture addresses the following views: business activities, and processes data sets and information flows, application and software, and technology. A proper architecture is not limited to adware and software issue.
2.4.1 Objectives of IT Architecture
            David A Mcafee (1997) presented the IT architecture as been   guided by the following objective, which helps make decision for establishing individual standards:-
1.     Architecture decision should serve the department mission.
2.     The architecture serve heterogeneous environment
3.     The greater the consensus achieves for individual architecture decision the greater the benefits.
4.     The architecture should identify areas of stability without impeding essential innovation.
5.     Architectural decision should described tangible result of conformance and non conformance with the architecture.
6.     Architectural decision should provide sufficient documentation to assess the compliance of a specific implementation      
2.4.2 purpose of it architecture.
            The purpose of the IT architecture is to guide the process of planning, acquiring building, modifying, interfacing and deploying. IT resources throughout the department.  As such then IT architecture should offer a means of stable evolution by identify by technology that work together to satisfy the need of the department user 
2.4.3 Benefit of it architecture.
1.  It’s a way to inform the developers department directions.
2. It will help in making planning, development and purchase decision.
3. It will be useful in aligning information technology provider for the development
4. It will reduce the maintenance and support requirements
5. It will help planning migration to new technologies
 2.4.4 componet of IT architecture.
            The IT architecture that is created by the strategic business/IT planning process is a conceptual blue point that includes the following major components:
1.     Teaching platform: the internet, intranets and extranets and other networks, computer system software and integrated software application provide a computing and communication infrastructure or platform that supports the strategic use of information technology for E-business, e-commerce and other business / IT applications.
2.     Data Resources: many type of operational and specialized data base including data warehouse and internet / Intranet data base store and provide data and information for business processes and decision support.
3.     Application architecture: business application of information technology is design as an integrated architecture or portfolio of enterprises system that support strategic business initiatives.
4.     IT Organization: the organizational structure of IT functions within a company and distribution of IT /IS specialists are design to meet the changing strategies of a business. (Conned from MIT 706: information technology centre management, lecture note)
2.4.5 IT Architecture framework.
            The framework for the IT architecture is that of a cube sliced into five section or layers from back to front. Each section or layer represented a type of architectural specification from the most general IT Policies layer at the back of the cube to the most specific product layer of the front of the cubes.
            A comprehensive view of an IT architecture specifies: (1). Policies and (2). Principle that indicate direction (3). Services and common solutions (4). Standards and Guidelines and (5). Product that detailed the mean of implementation(Davic A. Mcafee(1997) 

Thursday, November 8, 2012

Atacama Desert

In the Atacama Desert fell real snow!
The invasion of cold air in the rear of the cyclone decreased the thermometer readings in the mountains to negative values.
Cooling was accompanied by precipitation: rain on the coast and snow in the mountains, which formed a temporary snow cover.
Located in the north of Chile, Atacama Desert is the most arid place on earth. Below 50 mm of rain is a years average here. In some places precipitation comes only once in few decades. In the Antafogasta area the year average precipitation is only 1 mm. Some weather stations have never recorded rain.
According to the research of scientists from the UK, there are river beds that havent seen water in the past 120,000 years.

Sunday, October 7, 2012

IN HIS PRESENCE

Memory Verse
"Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you:" Matthew 7:7
BIBLE PASSAGE: Matthew 6:5-15
INTRODUCTION
It is a common practice to lock up valuables in special rooms and with special keys. Where to keep these valuables whether in the outer rooms or in the inner strong rooms, depends on how valuable they are to you. Though there are different keys to these rooms, there is a 'master key, however, that is available to the master of the house to unlock at will any of the doors to these rooms. Today, we will begin to examine the spiritual master key of the house to unlock doors to answers to petitions of God's children, that is, prayer.
OUTLINES
1. WHAT IS PRAYER?
2. WHY SHOULD WE PRAY?
3. WHERE AND WHEN CAN ONE PRAY?
WHAT IS PRAYER?
Prayer, simply put, is the soul of man talking to God. It is worship addressed to God the Father, in the name of God the Son and through the power of the Holy Spirit Acts 12:5; John14:13; Ephesians 6:18; Romans 8:26-27. Prayer should consist of the following:
(a) Adoration i.e. praises and worship of God for what God is e.g. God is good, merciful, kind, powerful, faithful, just etc. When you praise God for what He is rather than what He has done for you, it is true worship - Ps. 95:6. (b) Confession and repentance from every known sin - Ps. 32:5. Washing in the blood of Christ will follow. If you are already sanctified and you have no sin to confess, wash in the blood all the same. You can never be too clean.
(c) Thanksgiving. Be thankful for anything and everything that God has done - Phil. 4:6.
(d) Supplication Le. Intercession, requests, petitions and desires can now be addressed to God, in the name of Jesus through the power of the Holy Spirit – ITim. 2:1.
WHY SHOULD WE PRAY?
God commands us to pray - Luke 18:1; 1 Thess.5:17; 1 Chron.16:11; James 5:13; Psalm 50:15. Jesus prayed and Christian followers of Jesus are expected to pray - Mark 1:35; Luke 6:12; Luke 3:21. The early Church prayed, so, churches too should pray - Acts 4:23-31; Acts 12:5-6; Eph. 1:15-20; CoI.4:12. The believers of old prayed too e.g. Moses in Exodus 15:23-25; Jesus, Matthew 26:39-42, David in Psalm 51:1-2 and Elijah too­1 Kgs.18:37-39; James 5:17-18.

                                                                  
WHERE AND WHEN CAN ONE PRAY?
We can pray everywhere - I Timothy 2:8, in the closet - Matthew 6:6, or in the church, - Luke 18:10. Private prayer may be made in the secret place. Family prayer will involve a large group and may be made in the sitting room while public prayer may be made before the congregation.
We can pray in the morning - Psalm 5:3, at noon and in the evening ­Psalm 55: 17, day and night - Psalm 88: 1, daily - Psalm 86:3, and always ­Luke 18:1-. It is not only when you are on your knees with your eyes closed that you can pray. You can pray as you drive to work, while at work or while resting. Singing praises to God is also a form of prayer. Pray without ceasing 1 Thess. 5:17.
CONCLUSION
We have just discovered some fundamental truths about the master key, especially the aspects of when and where to apply it. Let us, therefore, act now and present all our petitions to God in the name of Jesus Christ. It is certain that He will answer accordingly to His perfect will for us.

Tuesday, July 24, 2012

SECURITY ALERT This piece of information came from a Security detective. Kindly note there is a new technique used by robbers and car hijackers to escape from arrest due to their criminal activities.Theyare collecting used scratch cards and once they abandon the car or where they dump the deadbodies they leave the already used scratch card at the scene. Once the security officer arrive there they will use the scratch card serial numbers to track on which phone number it was loaded then the security officer will start tracking the phone number owner. Already, some people have been fell victim of this case are in security officer custody.TO BE ON THE SAFE SIDE Once you load airtime make sure you destroy the card before you dispose it to avoid such incidences. PLEASE SHARE THIS WITH EVERYONE, IT 's cheap and Safe to stay safe. WE WON'T FALL VICTIMS of Negligence and Evil circumstances or situations in Jesus Name.. Amen.

Tuesday, February 1, 2011

MYSTRY STONE AT LARABANGA


The Mystery Stone in Larabanga
At the outskirts of Larabanga a town the Upper West region of Ghana is a legendary mystic stone which according to stories, whilst a main road was being constructed, whenever the stone was removed to make way for the construction, it always returned to its original place on several occasions.
Now that's some legend, why don't you make a trip to see for yourself and maybe try to remove it......."if you want it well done, you do it yourself"... ;)


Legend has it that this stone on the outskirts of Larabanga (Northern Region) always returns to its original resting place when moved. Due to this legend the main road that runs through this area had to be diverted around the stone.