วันพฤหัสบดีที่ 5 มีนาคม พ.ศ. 2552

Top 10 Thai Food

Have you ever tried Thai food? Do you like it? Thai food is one of the things that every foreigner should try when they come to Thailand. At my old school, when we have visitors from other countries we always take them out to eat. We take them to a Thai restaurant to try Thai food and also teach them about table manners too!
Not long ago, the Office of the National Culture Commission announced the top ten Thai dishes best liked by foreigners. In cooperation with the Ministry of Foreigner Affairs, the Office had conducted a survey of Thai restaurants all over the world to find out ten favourite Thai dishes of foreigners. In the survey 1,000 Thai restaurant around the world were asked to fill in a questionnaire. However, only 500 restaurants which have Thai chefs and offer the authentic Thai food were qualified for being taken into consideration.

The results were the top ten Thai dishes which are listed below in order of their percentages of popularity:

1.Tom Yam Kung (spicy shrimp soup)


2.Kaeng Khiao Wan Kai (green chicken curry)



3.Phat Thai (fried noodles of Thai style)



4.Phat Kaphrao (meat fried with sweet basils)


5.Kai Phat Met Mamuang Himmaphan (chicken fried with cashew nuts)

6.Phanaeng (meat in coconut cream)

7.Kaeng Phet Pet Yang (roast duck curry)
8.Tom Kha Kai (chicken in coconut soup)
9.Yam Nua (spicy beef salad)
10.Mu or Kai sa-te (roast pork or chicken coated with turmeric)

วันจันทร์ที่ 24 พฤศจิกายน พ.ศ. 2551

COPYRIGHT&FAIR USE


Fair use is a doctrine in United States copyright law that allows limited use of copyrighted material without requiring permission from the rights holders, such as use for scholarship or review. It provides for the legal, non-licensed citation or incorporation of copyrighted material in another author's work under a four-factor balancing test. The term "fair use" originated in the United States, but has been added to Israeli and the UK law as well; a similar principle, fair dealing, exists in some other common law jurisdictions. Civil law jurisdictions have other limitations and exceptions to copyright.


Copyright is a legal concept, enacted by governments, giving the creator of an original work of authorship exclusive rights to control its distribution for a certain time period, after which the work enters the public domain. Generally, it is "the right to copy", but usually provides the author with other rights as well, such as the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other, related rights. It is an intellectual property form (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete. Copyright was initially conceived as a way for governments in Europe to restrict printing; the contemporary intent of copyright is to promote the creation of new works by giving authors control of and profit from them.
Copyright has been internationally standardized, lasting between fifty to a hundred years from the author's death, or a finite period for anonymous or corporate authorship; some jurisdictions have required formalities to establishing copyright, most recognize copyright in any completed work, without formal registration. Generally, copyright is enforced as a
civil matter, though some jurisdictions do apply criminal sanctions.
Most
jurisdictions recognize copyright limitations, allowing "fair" exceptions to the author's exclusivity of copyright, and giving users certain rights. The development of the Internet, digital media, computer network technologies, such as peer-to-peer filesharing, have prompted reinterpretation of these exceptions, introduced new difficulties in enforcing copyright, and inspired additional challenges to copyright law's philosophic basis. Simultaneously, businesses with great economic dependence upon copyright have advocated the extension and expansion of their copy rights, and sought additional legal and technological enforcement.

KNOWLEDGE MANAGEMENT


Knowledge Management (KM) comprises a range of practices used in an organisation to identify, create, represent, distribute and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organisational processes or practice. An established discipline since 1995, KM includes courses taught in the fields of business administration, information systems, management, and library and information sciences [1]. More recently, other fields, to include those focused on information and media, computer science, public health, and public policy, also have started contributing to KM research. Many large companies and non-profit organisations have resources dedicated to internal KM efforts, often as a part of their 'Business Strategy', 'Information Technology', or 'Human Resource Management' departments [2]. Several consulting companies also exist that provide strategy and advice regarding KM to these organisations.
KM efforts typically focus on organisational
objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, and continuous improvement of the organisation. KM efforts overlap with Organisational Learning, and may be distinguished from by a greater focus on the management of knowledge as a strategic asset and a focus on encouraging the exchange of knowledge. KM efforts can help individuals and groups to share valuable organisational insights, to reduce redundant work, to avoid reinventing the wheel per se, to reduce training time for new employees, to retain intellectual capital as employees turnover in an organisation, and to adapt to changing environments and markets.


วันจันทร์ที่ 10 พฤศจิกายน พ.ศ. 2551

INFORMATION SYSTEMS


Information systems are the software and hardware systems that support data-intensive applications. Information Systems publishes articles concerning the design and implementation of languages, data models, algorithms, software and hardware for information systems.Subject areas include data management issues as presented in the principal international database conferences (e.g. ACM SIGMOD, ACM PODS, VLDB and EDBT) as well as data-related issues from the fields of data mining, information retrieval, natural language processing, internet data management, visual and audio information systems, scientific computing, and organisational behaviour. All papers should motivate the problems they address with compelling examples from real or potential applications. Systems papers must be serious about experimentation either on real systems or simulations based on traces from real systems. Papers from industrial organisations that discuss the practical implementation of systems are welcome. Theoretical papers should have a clear motivation from applications. They should either break significant new ground or unify and extend existing algorithms. Such papers should clearly state which ideas have potentially wide applicability. In addition to publishing submitted articles, the Editors-in-Chief will invite retrospective articles that describe significant projects by the principal architects of those projects. Authors of such articles should write in the first person, tracing the social as well as technical history of their projects, describing the evolution of ideas, mistakes made, and reality tests. Technical results should be explained in a uniform notation with the emphasis on clarity and on ideas that may have applications outside of the environment of that research. Particularly complex details may be summarised with references to previously published papers.

วันจันทร์ที่ 3 พฤศจิกายน พ.ศ. 2551

INFORMATION TECHNOLOGY


Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term is more recognizable than ever before. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex
computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.
When computer and communications technologies are combined, the result is information technology, or "infotech". Information Technology (IT) is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it is noted that the use of computers and information are associated.


Reference:http://en.wikipedia.org/wiki/Information_technology

วันจันทร์ที่ 27 ตุลาคม พ.ศ. 2551

RUBRIC


Model for Viability
In determining a blog for business use, the acronym RUBRIC (Figure 1) reflects the six tests that make up the model for the blog’s viability. RUBRIC stands for Reliability, Usability, Behavior, Reflection, Information, and Creativity.
Reliability
At the core of the RUBRIC model is reliability. When reliability ceases to exist, the blog, however aesthetically gratifying it may be, will not be useful in a business context. Reliable sources include C-level executives, industry experts and strategists, and well-respected thinkers in the field.
Usability
A reliable blog can only be effective if intuitively navigable by its target audience. The second layer of this model is “ease of use.” A graphic, table, text, and other navigation tools should be appropriately placed to reflect the mission, vision, and goal of the blog. Any decision on pop-up windows, links to other sites, shopping carts, advertisements, font sizes, colors, backgrounds, audio, and use of multimedia software like Flash, should thematically alignment with the business directives of the blog.
Behavior
A layer above “ease of navigation” is the “appropriateness” of the blog. A blog written in the first person can reflect accessibility to the writer while a scholarly written blog shows an authority in the field. There can be many perceptions of blogs and a survey should be conducted to determine if the audience’s perception aligns with the corporate culture intended by the blog developers. When this behavior is inconsistent across all blog pages and/or posting entries, then the “idea” of the blog crumbles.
Reflection
It is important for a blog developer to be flexible in their product. When a poll of the target audience results in confused readers or requests made for increased updates to the blog, for example, the developers should be immediate in their response. “Reflection” wraps the three other layers of this model as it is in this stage where there may be constant flux due to the many external factors affecting the blog’s content, appearance, and navigation. Another example would be a merger by the blog sponsor resulting in combining two or more seemingly disparate blogs into a cohesive website. In as much as the blog is updated frequently, so does the design to reflect the state of the business as well as the needs of the audience.
Information
The blog information should always be current and relevant. The main concept of a blog is its ability to be practically instantaneous in its postings. When this inherent blog characteristic fails, the website as a whole becomes ineffective. The sources of information can be very reliable but if the information is not current, audiences do not to use this blog as a reference.
Creativity
The overall layer that surrounds this RUBRIC model is the blog’s ability to shine above the rest. The creativity of a blog comes through in the form of the “spirit” of the developers and its writers. The uniqueness of a blog provides a lasting imprint to its readers. When readers use a blog’s links to leave the blog without returning, then the site’s “hook” is lost. When the blog is noted for its overall refined state, then its creativity edge is engaged.
This six-component blog-model-for-viability to corporate use can be utilized in the form of a checklist, discussion points with developers and project supporters, audience surveys as well as focus group topics. It is important for developers to have a clear understanding of their corporate mission to have a direct alignment with the blog being developed.

วันจันทร์ที่ 20 ตุลาคม พ.ศ. 2551

HISTORY OF THE INTERNET


Prior to the widespread internetworking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network, and the prevalent computer networking method was based on the central mainframe method. In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor pioneered calls for a joined-up global network to address interoperability problems. Concurrently, several research programs began to research principles of networking between separate physical networks, and this led to the development of Packet switching. These included Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and UCLA research programs.
This led to the development of several packet switched networking solutions in the late 1960s and 1970s, including
ARPANET and X.25. Additionally, public access and hobbyist networking systems grew in popularity, including UUCP and FidoNet. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for inter-networking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet protocol suite, the concept of the network could be separated from its physical implementation. This spread of inter-network began to form into the idea of a global inter-network that would be called 'The Internet', and this began to quickly spread as existing networks were converted to become compatible with this. This spread quickly across the advanced telecommunication networks of the western world, and then began to penetrate into the rest of the world as it became the de-facto international standard and global network. However, the disparity of growth led to a digital divide that is still a concern today.
Following commercialisation and introduction of privately run
Internet Service Providers in the 1980s, and its expansion into popular use in the 1990s, the Internet has had a drastic impact on culture and commerce. This includes the rise of near instant communication by e-mail, text based discussion forums, the World Wide Web. Investor speculation in new markets provided by these innovations would also lead to the inflation and collapse of the Dot-com bubble, a major market collapse. But despite this, Internet continues to grow.