วันจันทร์ที่ 29 พฤศจิกายน พ.ศ. 2553


How Do Web Search Engines Work

Search engines are the key to finding specific information on the vast expanse of the World Wide Web. Without sophisticated search engines, it would be virtually impossible to locate anything on the Web without knowing a specific URL. But do you know how search engines work? And do you know what makes some search engines more effective than others?
When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.
There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) and those that are powered by human submissions; and those that are a hybrid of the two.
Opportunity vs. Risk : 
Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine.
Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index.

In both cases, when you query a search engine to locate information, you're actually searching through the index that the search engine has created —you are not actually searching the Web. These indices are giant databases of information that is collected and stored and subsequently searched. This explains why sometimes a search on a commercial search engine, such as Yahoo! or Google, will return results that are, in fact, dead links. Since the search results are based on the index, if the index hasn't been updated since a Web page became invalid the search engine treats the page as still an active link even though it no longer is. It will remain that way until the index is updated.
So why will the same search on different search engines produce different results? Part of the answer to that question is because not all indices are going to be exactly the same. It depends on what the spiders find or what the humans submitted. But more important, not every search engine uses the same algorithm to search through the indices. The algorithm is what the search engines use to determine the relevance of the information in the index to what the user is searching for.
One of the elements that a search engine algorithm scans for is the frequency and location of keywords on a Web page. Those with higher frequency are typically considered more relevant. But search engine technology is becoming sophisticated in its attempt to discourage what is known as keyword stuffing, or spamdexing.
Another common element that algorithms analyze is the way that pages link to other pages in the Web. By analyzing how pages link to each other, an engine can both determine what a page is about (if the keywords of the linked pages are similar to the keywords on the original page) and whether that page is considered "important" and deserving of a boost in ranking. Just as the technology is becoming increasingly sophisticated to ignore keyword stuffing, it is also becoming more savvy to Web masters who build artificial links into their sites in order to build an artificial ranking.
Did You Know...
The first tool for searching the Internet, created in 1990, was called "Archie". It downloaded directory listings of all files located on public anonymous FTP servers; creating a searchable database of filenames. A year later "Gopher" was created. It indexed plain text documents. "Veronica" and "Jughead" came along to search Gopher's index systems. The first actual Web search engine was developed by Matthew Gray in 1993 and was called "Wandex". [Source ]
Key Terms To Understanding Web Search Engines
spider trap
A condition of dynamic Web sites in which a search engine’s spider becomes trapped in an endless loop of code.
search engine
A program that searches documents for specified keywords and returns a list of the documents where the keywords were found.
meta tag
A special HTML tag that provides information about a Web page.
deep link
A hyperlink either on a Web page or in the results of a search engine query to a page on a Web site other than the site’s home page.
robot
A program that runs automatically without human intervention.

Activities at Sarawittaya School 29/11/2010


Activities at Sarawittaya School

Please indebtify the difference between the library resources for school students and university students?

        content of the library materail what all contents for school student is base on need of subject but the library in university is more content that the university library .

Please indentify reading activities for school and university? sha ll it be the same or difference?

        some I was the school student before continue to university student so all retivities for is sanething.

What do you like most about the school library ?

        - Enviroment nice dicoration nice  space
        - Equipment internet service mini movie
        - Book have many kind of book

What do you suggest for improvement ?

          Everything in the library is perfect no need to improve.

Rubric 29/11/2010

Evaluation Rubric:

   

1.   CASE STUDY                       

      LEVEL 4
       LEVEL 3
        LEVEL 2
     LEVEL 1
Context and Background Information
The episode is clearly situated with the appropriate details e.g. grade level, subject being taught etc.
The episode is situated with most of the appropriate details
The episode has few of the appropriate details
No context or background information
Content
Incidents are interesting and realistically portrayed
Incidents are interesting but not realistically portrayed
Incidents are realistically portrayed but not interesting.
Incidents are neither interesting, nor realistically portrayed.
Writing Skills
Writing is totally free of errors

Report of the episode is very concise
  There are occasional errors.


Report could be tightened a little
There are more than occasional errors

 Report could be tightened quite a lot
 Errors are frequent 


Report of the episode is extremely long-winded.
Format
Format is appropriate and enhances the understanding of the critical episode in a creative and dramatic manner throughout the case
Format is appropriate and enhances the understanding of the critical episode in dramatic manner for most the case
Format is appropriate and enhances the understanding of the critical episode some of the time
Format is appropriate but seldom enhances the understanding of the critical episode



2.   PRESENTATION


      LEVEL 4
     LEVEL 3
      LEVEL 2
     LEVEL 1

Delivery and Enthusiasm

Very clear and concise flow of ideas.

Demonstrates passionate interest in the topic and engagement with the class.
Clear flow of ideas


Demonstrates interest in topic and engagement with the class.
Most ideas flow but focus is lost at times

Limited evidence of interest in and engagement with the topic
Hard to follow the flow of ideas.

Lack of enthusiasm and interest.

Visuals
Visuals augmented and extended  comprehension of the issues in unique ways
Use of visuals related to the material
Limited use of visuals loosely related to the material
No use of visuals. 
Staging
Uses stage effects, such as props, costumes, sound effects, in a unique and dramatic manner that enhances the understanding of the issues in the case study
Uses stage effects, such as props, costumes, sound effects, in an effective manner to extend understanding of the issues in the case study
Limited use of stage effects, and/or used in a manner that did not enhance the understanding of the issues in the case study.
No use of stage effects
Involvement of the class:
-Questions
-Generating discussion
-Activities
Excellent and salient discussion points that elucidated material to develop deep understanding

Appropriate and imaginative activities used to extend understanding in a creative manner
Questions and discussion addressed important information that developed understanding

Appropriate activities used to clarify understanding
Questions and discussion addressed surface features of the topic

Limited use of activities to clarify understanding
 Little or no attempt to engage the class in learning
Response to Class Queries




Excellent response to student comments and discussion with appropriate content supported by theory/research
Good response to class questions and discussion with some connection made to theory/research
Satisfactory response to class questions and discussion with limited reference to theory and research
Limited response to questions and discussion with no reference to theory/research
                      


source

Knowledge Manament 29/11/2010

Knowledge Management

What is the management?   
       Management in all business areas and organizational activities are the acts of getting people together to accomplish desired goals and objectives efficiently and effectively. Management comprises planning, organizing, staffing, leading or directing, and controlling an organization (a group of one or more people or entities) or effort for the purpose of accomplishing a goal. Resourcing encompasses the deployment and manipulation of human resources, financial resources, technological resources, and natural resources.


What is Knowledge management?
      Knowledge Management is the collection of processes that govern the creation, dissemination, and utilization of knowledge. In one form or another, knowledge management has been around for a very long time. Practitioners have included philosophers, priests, teachers, politicians, scribes, Liberians, etc.


What is information system?
      An information system  is any combination of information technology and people's activities using that technology to support operations, management, and decision-making.] In a very broad sense, the term information system is frequently used to refer to the interaction between people, algorithmic processes, data and technology. In this sense, the term is used to refer not only to the information and communication technology  an organization uses, but also to the way in which people interact with this technology in support of business processes


What are the component of information system?
      The main components of information systems are computer hardware and software, databases,
5 COMPONENTS OF INFORMATION SYSTEM:
1. IT i.e. hardware and software
2. Data/Information
3. Procedures/Policies
4. People
5. Purpose
6. Communication Networks

Why do you need  apply the knowledge management process in our business?    
      Many organizations are now in the throes of implementing knowledge management strategies. However, like many other ground-breaking initiatives, success is often elusive. This workshop is primarily aimed at knowledge managers and knowledge management teams, taking them step by step through the key stages of the implementation of knowledge-based strategies. It is also beneficial for any senior manager, especially R&D, marketing, and business development manager, who wants to use better knowledge management as a key to improved business performance.


Copyright 29/11/2010


Monday, November 8, 2010

Copyright

1. What is the copyright?

Answer: Copyright is a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The exclusive rights are however balanced for public interest purposes with limitations and exceptions such as fair dealing and fair use.

2. What is fair use?

Answer: Fair use, a limitation and exception to the exclusive right granted by copyright law to the author of a creative work, is a doctrine in United States copyright  that allows limited use of copyrighted material without requiring permission from the rights holders. For example, such as commentary, criticism, news reporting, research, teaching, library archiving and scholarship.

3. What is patent?

Answer:  A patent  is a set of exclusive rights granted by a state (national government) to an inventor or their assignees for a limited period of time in exchange for a public disclosure of an invention. For example, such as  the procedure for granting patents, the requirements placed on the patented, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements.

4. Why some inventions can not be copyrights?

Answer: Because the several categories of material are generally not eligible for copyright protection, such as works that have not been fixed in a tangible form of expression.



 Sourse         

วันจันทร์ที่ 4 ตุลาคม พ.ศ. 2553

How does the internet work? 3/10/10

1.What is the internet?

Visualization of the various routes through a portion of the Internet. From 'The Opte Project'
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet. Newspaper, book and other print publishing are having to adapt to Web sites and blogging. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The origins of the Internet reach back to the 1960s with both private and United States military research into robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by then an international network in the mid 1990s resulted in its popularization and incorporation into virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population used the services of the Internet.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

source

2.what is the Internet Protocol?

The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP.
The first major version of IP, now referred to as Internet Protocol Version 4 (IPv4) is the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is in active, growing deployment worldwide.



3.what is the OSI model?

The Internet Layer of the TCP/IP model is often compared directly with the Network Layer (Layer 3) in the Open Systems Interconnection (OSI) protocol stack. Although they have some overlap, these layering models represent different classification methods. In particular, the allowed characteristics of protocols (e.g., whether they are connection-oriented or connection-less) placed in these layers are different between the models. OSI's Network Layer is a "catch-all" layer for all protocols that facilitate network functionality. The Internet Layer, on the other hand, is specifically a suite of protocols that facilitate internetworking using the Internet Protocol.
Because of this, the OSI Network Layer is often[where?] described to include protocols such as the Address Resolution Protocol (ARP) which was placed in Link Layer by the original TCP/IP architects (RFC 1122, RFC 1123).
Strict comparison between the TCP/IP model and the OSI model should be avoided. Layering in TCP/IP is not a principal design criterion and is in general considered to be harmful (RFC 3439, section 3: "Layering Considered Harmful").
Despite clear primary references (see References below) and normative standards documents the Internet Layer is still sometimes improperly called network layer, in analogy to the OSI model.

source

4.what is the Internet Infrastructure?

The Internet is a global system of interconnected computer network s that use the ... (WWW) and the infrastructure to support electronic mail . ... Cloud infrastructure services, also known as "Infrastructure as a Service (IaaS)", delivers computer infrastructure - typically a platform virtualization environment - as a service. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis and amount of resources consumed (and therefore the cost) will typically reflect the level of activity. IaaS evolved from virtual private server offerings.[55]


5.what is Domain Names?

domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the Domain Name System (DNS).
Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.
Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites (e.g., en.wikipedia.org).
Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).
An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.
Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.
This article primarily discusses the group of domain names that are offered by domain name registrars for registration by the public. The Domain Name System article discusses the technical facilities and infrastructure of the domain name space and the hostname article deals with specific information about the use of domain names as identifiers of network hosts

source


6.What is world Wide Web? And its services?

World Wide Web

The Web's historic logo designed by Robert Cailliau
InventorSir Tim Berners-Lee[1]
Launch year1990
CompanyCERN
Available?Worldwide

The World Wide Web, abbreviated as WWW and commonly known as the Web, is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, English engineer and computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use "HyperText [...] to link and access information of various kinds as a web of nodes in which the user can browse at will",[2] and publicly introduced the project in December.[3]
"The World-Wide Web (W3) was developed to be a pool of human knowledge, and human culture, which would allow collaborators in remote sites to share their ideas and all aspects of a common project."


And
  • service - work done by one person or group that benefits another; "budget separately for goods and services"

  • service - an act of help or assistance; "he did them a service"

  • service - the act of public worship following prescribed rules; "the Sunday service"

  • service - a company or agency that performs a public service; subject to government regulation

  • service - employment in or work for another; "he retired after 30 years of service"

  • military service: a force that is a branch of the armed forces

  • service - Canadian writer (born in England) who wrote about life in the Yukon Territory (1874-1958)

  • service - avail: a means of serving; "of no avail"; "there's no help for it"

  • service - tableware consisting of a complete set of articles (silver or dishware) for use at table

  • service - servicing: the act of mating by male animals; "the bull was worth good money in servicing fees"

  • service - (law) the acts performed by an English feudal tenant for the benefit of his lord which formed the consideration for the property granted to him

  • service - serve: (sports) a stroke that puts the ball in play; "his powerful serves won the game"

  • service - be used by; as of a utility; "The sewage plant served the neighboring communities"; "The garage served to shelter his horses"


  • source


    7.How many Internet users in Thailand?

    As of 2008, there were 16,100,000 Internet users in Thailand.[1]
    Broadband Internet is readily available in major cities and towns, but is still to be sought after in smaller villages and in the countryside. As the statistics have shown, the majority of Internet users in Thailand still rely on dial-up access. TOT operates a nationwide local rate number, 1222, allowing dialing to most Internet service providers. Dial-up prepaid Internet packs can be readily bought in convenience stores and other places. Subscribers of fixed telephone lines by True Corporation have access to dial up Internet by dialing a certain number and then being billed on their normal telephone bill.
    The majority of broadband Internet access uses Asymmetric Digital Subscriber Line (ADSL). Some areas are covered by Cable Modems and G.shdsl. Consumer broadband Internet bandwidth ranges from 2 Mbit/s to 16 Mbit/s. Medium and large businesses use Leased Lines or Ethernet Internet/MPLS where fiber optic cables link many office buildings in the central business district areas such as Sukhumvit, Silom and Sathorn areas to the Thailand Internet backbone. Universities have access to fast Internet access, including the Trans-Eurasia Information Network (TEIN2) research network.
    A 3G UMTS/HSDPA network was launched in Bangkok and vicinity in December 2009 with speeds up to 7.2 Mbit/s on the 2100 MHz band. Major mobile network operators in Thailand are testing their 3G networks in limited urban areas on the 850 MHz and 900 MHz bands. The National Telecommunications Commission (NTC) has plans to auction out 4 further licenses to operate 3G UMTS/HSDPA networks on the 2100 MHz spectrum in 2010. A 3G CDMA network with speeds up to 3.1Mbit/s is available in 51 provinces nationwide.
    There are initiatives to offer mainstream FTTH (Fiber to the Home) providing bandwidth of up to 100 Mbit/s bundled with IPTV and VoIP. FTTH with speeds up to 30mbps is available in limited areas in Phuket.
    Thailand saw a rapid growth in the number of broadband users in 2005 with the initiation of unmetered broadband in 2004.[2]
    There are 1,116,000 (2008) Internet hosts in Thailand being the highest in South East Asia.[3]

    source

    วันจันทร์ที่ 27 กันยายน พ.ศ. 2553

    Students Wars

    Student Wars

    Nopprarat Maneetat (Get)
    53055304
    Watcharaphon Milap (Soybean)
    53010430


    IBC 101
    Access to Library and Information


    27 September 2010


    Summary

    Thai student fighting and destroy property of society which they doesn’t care or even worry what the society think of them. The shooting and stabbing happen nearly every day occurring showing to the public society. Many students from each college had been hurt and kill by another college. Many government property such as public transport had been wreak and damage by these student who doesn’t care what did they do to other people.


    Table of Content


    Abstract/ Executive Summary                    Page 1

    Table of Content

    Introduction                                                  Page 3

    Discussion                                                      Page 4

    Conclusions                                                   Page 5

    Recommendation                                                Page6

    Reference                                                      Page 7


    Introduction

    A nine year old Thai student from high school had been accident wounded and killed straight away. The news had been on air thought out nation television to public and every newspaper has been printed. Most of the parent of Thai society had been shocked with new headline that a young boy who is innocent and no idea what is happening had been wounded by a college student just fighting over for no reason. The principals from the boy high school were called in to Parliament twice for sessions on how to stop the violence. Gang violence has plagued schools for years, mostly at the country’s 835 vocational schools which cater later largely to the children of the working class such as taxi driver, security guard and factory workers. Police say there were 900 reported incidents in Bangkok in the first half of this year.





    Discussion

    This problem has been brought up for the government to discussion and tries to find a solution for college and public around the area. So many people are scare and worry; what would happen to anyone or any children, would this incident happen again?

    A problem of this college has been going on for many generations which are no method to end. Many people are terrifying the student will hurt them one day. Many nations saw the incident but they can not do anything or help the person that is being harm. If anyone came to help the individual that person will get hurt, so most people just observe and feel depressing.

    Many bus drivers wouldn’t go to pick up any of those college students because they’re terrified if one day they will get gunshot. There is no way to protect yourself because doesn’t know went this incident will occur. The student doesn’t intend to hurt anyone around them but sometime accident happens.




    Conclusions

    The problem doesn’t seem so big but it is a biggest problem right now for Thai society. One person can not do anything much and people could do anything at all. Is better for government and principles of the college to find a solution for everyone including public and make sure no one will get hurt by their students. The government should look into more way to find the problem and the student for these colleges. 




    References

    The Nation Newspaper on Monday, September 27, 2010