Christmas Message





In the spirit of the season, we quote the words of the great clergyman and pray that this festive season that we all 

"...remain listening and attentive ... so that the cry of the poor may not leave us indifferent, the suffering of the sick and the one who is in need may not find us distracted, the solitude of the elderly and the fragility of children may move us, and that everyone may always love and venerate every human life".


Merry Christmas

Online Scams to be Aware of This Christmas

The Holidays are here. It would be nice if this season of cheers was all happiness and joy, but unfortunately, there are malicious people out there who will capitalize on your good spirits to cause havoc and scam you out of a lot of money. 

People tend to drop their guarding during the holidays, resulting in emotional vulnerabilities that can easily be exploited. If you think that you are safe from scams just because you are safe at home behind a computer screen, think again.

The basic idea of a scam is always the same: trickery and deceit.

Please keep these tips in mind and stay alert.

Deceptive Giveaways on Social Networks

 

For those who spend a lot of time on social networks - especially Facebook - there is a need to be wary when you come across any link. Even links shared by a friend trusted with whole heart could be a potential threat. Though your friend may be the farthest thing from malicious, but also there is also always a chance that their account has been compromised. 

Around this time of the year, there will be  plenty of claims that promise free giveaways, free gift cards, and free products where the only catch is that you need to click a link and answer a  question or fill out some details. If you click, you are as good as done. 

At best, these sites will steal your personal details and spam you in the future or sell your data to other companies that will spam you in the future. At worst, they will snag your credit card details or install dangerous malware on your computer without you knowing.

Stay safe by not clicking on these links. If you are really interested, you can get away by running a few search to see if the giveaway is legitimate, and still yet you need to be wary.

Shopping Notification Emails

The months of November, December, and January are filled with online shoppers who want to take advantage of amazing deals and holiday sales; and that means there are lots of  products being shipped all around the world. Scammers have learnt to exploit this by sending out fake notification emails. 

If you have not purchased anything online and/or cannot recognize the purported sender or product, toss up the email notification out or chalk it as a scam. Do not fall for these. 

Why are these dangerous? It is simply because they will usually mention some sort of problem with the shipping or delivery of your product and ask you to sign in to resolve the issue. The hope is that you will click one of the email links - which will be a fake - and enter your online details (Amazon, eBay, etc). they will steal that information and use it against you.
Stay safe by never clicking on a links that are directly within an email. If for example you get an Amazon notification, the safest thing is to open a new tab in your browser and enter manually by typing in the address proper. Links though they seem more convenient, but emails and link addresses are easy to spoof and use as hoax. 

Fake Online Charities




As Christmas nears closer, we tend to feel a bit more generous towards those who are sick and in need and charity donations increase in the winter months.

The sad thing is that scammers know how to exploit this also.

Before giving out a few bucks of your money to the charity that wins your heart, you should be aware that you might be donating to a fake. These scammers will collect hundreds or thousands of dollars before pulling the plug and running away with all the money. Though it is a sick praise but it does happen.

Be safe by researching the charity you are donating to and donate to only those who have proven to be reputable.

Phising Malware Apps


 Like computers, smartphones are vulnerable to malware and viruses. This is not quite surprising as smartphones are pretty-much mini-computers nowadays. However, the surprising issue is that there are now prevalent malware in the mobile world. 

During the holiday season, scammers will try - and succeed - in putting fake shopping apps on the various app stores in order to trick users into typing in their personal details. People can end up giving away banking details or entire identities this way. 

Stay safe by downloading apps that have received good reviews. If there is a need to use a shopping app, then stick with the ones that are tried and true. Experimenting with new apps can be fun but there is also risk involved. likewise, stay up-to-date with smartphones antivirus apps.

Anonymous E-Cards


E-Cards seem like a relic of the Internet Age from the past but they are still alive and kicking. It is always nice to receive a e-card because it shows that there is someone out there who is thinking of you. Fake  e-cards on the hands are a pain in the butt.

If you have not gotten a fake e-card before, it is simply pretty to spot. An email is received from an unnamed person with the email saying there is need to click a link to view the sent e-card. 

However, never open e-cards from anonymous senders. A genuine e-card should atleast identify the sender in the email. If it does not say who it is - or you do not recognize the sender - put it in the trash. Better to be safe than sorry. 

As you celebrate the yuletide season, do not let these scams put a taint on your Christmas. However, be aware of their existence and be smart as you browse the web this holiday season. Being scammed is the fastest way to lose all of your holiday cheers and we would not want that to happen.

Social Media Statisitcs that you could make use of in promoting you Business

If you’re managing social media for your business, it might be useful to know about some of the most surprising social media statistics this year. Here are 10 that might make you rethink the way you’re approaching social media.

1. The fastest growing demographic on Twitter is the 55–64 year age bracket.

  • This demographic has grown 79% since 2012.
  • The 45–54 year age bracket is the fastest growing demographic on both Facebook and Google+.
  • For Facebook, this group has jumped 46%.
  • For Google+, 56%.
Those are impressive numbers against the prevailing idea that social media is "just for teenagers." It certainly points to the importance of having a solid social media strategy if these age brackets fit into your target demographic.
Rethink it: Keep older users in mind when using social media, particularly on these three platforms. Our age makes a difference to our taste and interests.


2. 189 million of Facebook’s users are "mobile only"

Not only does Facebook have millions of users who don’t access it from a desktop or laptop, but mobile use generates 30% of Facebook’s ad revenue as well. This is a 7% increase from the end of 2012 already.
Rethink it: There are probably more users accessing Facebook from mobile devices than you thought. It’s worth considering how your content displays on mobile devices and smaller screens before posting it, particularly if your target market is full of mobile users.

3. YouTube reaches more U.S. adults aged 18–34 than any cable network

Did you think TV was the best way to reach the masses? Well if you’re after 18–34 year olds in the U.S., you will have more luck reaching them through YouTube. Of course, one video won’t necessarily reach more viewers than a cable network could, but utilizing a platform with such a wide user base makes a lot of sense.
Rethink it: If you’ve been putting off adding video to your strategy, now’s the time to give it a go. You could start small with simple five-minute videos explaining what your company does or introducing your team.

4. Every second two new members join LinkedIn

LinkedIn, the social network for professionals, continues to grow every second. From groups to blogs to job listings, this platform is a rich source of information and conversation for professionals who want to connect to others in their industry.
Rethink it: LinkedIn is definitely worth paying attention to. In particular, this is a place where you may want to focus more on new users. Making your group or community a great source of information and a newbie-friendly space can help you to make the most out of the growing userbase.

5. Social Media has overtaken porn as the No. 1 activity on the web

We all knew social media was popular, but this popular? Apparently it is the most common thing we do online. Social media carries more weight than ever. It’s clearly not a fad, or a phase. It continues to grow as a habit, and new platforms continue to appear and develop.
Rethink it: Putting time and effort into your social media strategy clearly makes sense in light of these stats. If you weren’t already serious about social media, you might want to give it a bit more of your time now.

6. LinkedIn has a lower percentage of active users than Pinterest, Google+, Twitter and Facebook

Although LinkedIn is gathering new users at a fast rate, the number of active users is lower than most of the biggest social networks around. So more people are signing up, but they’re not participating. This means you’re probably not going to have as good a response with participatory content on LinkedIn, like contests or polls, as you might on Facebook or Twitter.
Rethink it: If you’re hoping to get people involved, think about which platforms are best for that.

7. 93% of marketers use social media for business

Only 7% of marketers say they do not use social media for their business. That means there are lots of people out there getting involved and managing a social media strategy. It’s becoming more common to include social media as part of an overall marketing budget or strategy, as opposed to when it was the outlier that no one wanted to spend time or money on.
Rethink it: If you’re struggling to make your strategy work, or you just want some advice, you don’t have to go it alone. If 93% of marketers are using social media for business, you can probably find someone to give you a hand. Plus, there are lots of blogs, videos and slide decks around to help you out.

8. 25% of smartphone owners ages 18–44 say they can’t recall the last time their smartphone wasn’t next to them

It’s pretty clear that mobile is a growing space that we need to pay attention to. And we’ve all heard the cliché of smartphone owners who don’t want to let go of their phones, even for five minutes. Well, apparently that’s not too far from the truth. 
Rethink it: While you can reach people almost anytime, since they have their smartphones with them almost always, this also means you can interrupt pretty much any part of their lives. Don’t forget that having a phone in your pocket all the time isn’t the same as being available all the time.

9. Even though 62% of marketers blog or plan to blog in 2013, only 9% of US marketing companies employ a full-time blogger

Blogging is clearly a big focus for marketers who want to take advantage of social media and content marketing. This is great, because blogging for your business has lots of advantages: you can control your company blog, you can set the tone and use it to market your product, share company news or provide interesting information for your customers.
(Of course, not all marketers work at marketing companies, but the stats are still interesting--how many companies in any industry can afford to hire--or already have--a full-time blogger?)
Rethink it: If you don’t have (or can’t afford) a full-time blogger for your business, be aware that having a content strategy that requires consistently posting on your blog will mean a lot of work for your marketing team and/or other team members in your company to keep up that volume. This can work, it’s just important to realize how big a task it is to run with a full-time content strategy without a full-time content creator.

10. 25% of Facebook users don’t bother with privacy settings

We’ve seen a lot of news about social media companies and privacy. But despite these high-profile cases of security-conscious users pushing back against social networks and web services, Velocity Digital reports that 25% of Facebook users don’t even look at their privacy settings.
Rethink it: Assuming that all of your customers are thinking along the same lines could be a big mistake. Especially if you’re basing that on what you’ve heard or read in the tech news. Remember that your customers might have very different priorities than what you expect.
Your social media strategy really comes down to what your goals are, and who your target customers are, but it doesn’t hurt to pay attention to the trends happening across the web. Hopefully these stats will help you to identify trends that will affect your strategy and adjust accordingly.



Above all this, Hyperia Limited provides you with fast speed and unrivaled Internet access to use with whatever social media portal of your choice.





Internet Security

The Internet with its ever expanding and enlarging nature will continue to connect more numbers of computers, mobile devices, and other devices/nodes to one another. Thus, the Internet is not just a single network, but rather, it is a collection of "loosely" connected networks accessible by any hub, host, o device connected over the network. 

However, with the convenience and easy access to information and ability to connect to the various terminals over the network, there also arises with it various risks. Amongst such of the risks is the issue of security of information accessed, extracted and used over the Internet. Information placed and made readily available over a network (such as the Internet, accessible worldwide) is more readily vulnerable than if such information is placed within a file cabinet within a location. Such information available on the network can be accessed, more copies of it created and worse still, evidence of such access can be hidden. 

Thus, for information on the Internet to be termed secured, its availability, confidentiality and integrity needs to be considered and evaluated. 
Information accessed, read, copied and used by an unauthorized person makes such information to lose its confidentiality. When such information becomes available over an unsecured network thereby prompting its modification in unexpected and unauthorized ways causes a loss of integrity, and when those authorized to access and use such information cannot have access to it because it has been erased or deleted results in loss of availability. 

Gaining unauthorized access to information over an unsecured network is relatively easy while detecting such intrusion is quite hard to do. Rapidly advancing technology and the open nature of the Internet makes it difficult to achieve watertight security. This is why you too must keep an eye on your own safety, especially when downloading files and supplying personal details on the Internet. It's wise for you to take some personal precautions, as this will ensure that any risks related to using the Internet are kept to a minimum.

Internet Vulnerability

Many early network protocols that now form part of the Internet infrastructure were designed without security in mind. Without a fundamentally secure infrastructure, network defense becomes more difficult. Furthermore, the Internet is an extremely dynamic environment, in terms of both topology and emerging technology. Due to the inherent openness of the Internet and the original design of the protocols, Internet attacks in general are quick, easy, inexpensive, and may be hard to detect or trace. An attacker does not have to be physically present to carry out the attack. In fact, many attacks can be launched readily from anywhere in the world - and the location of the attacker can easily be hidden. Nor is it always necessary to "break in" to a site (gain privileges on it) to compromise confidentiality, integrity, or availability of its information or service.

Even so, many sites place unwarranted trust in the Internet. It is common for sites to be unaware of the risks or unconcerned about the amount of trust they place in the Internet. They may not be aware of what can happen to their information and systems. They may believe that their site will not be a target or that precautions they have taken are sufficient. Because the technology is constantly changing and intruders are constantly developing new tools and techniques, solutions do not remain effective indefinitely.

Since much of the traffic on the Internet is not encrypted, confidentiality and integrity are difficult to achieve. This situation undermines not only applications (such as financial applications that are network-based) but also more fundamental mechanisms such as authentication and non-repudiation (see the section on basic security concepts for definitions). As a result, sites may be affected by a security compromise at another site over which they have no control. An example of this is a packet sniffer that is installed at one site but allows the intruder to gather information about other domains (possibly in other countries).

Another factor that contributes to the vulnerability of the Internet is the rapid growth and use of the network, accompanied by rapid deployment of network services involving complex applications. Often, these services are not designed, configured, or maintained securely. In the rush to get new products to market, developers do not adequately ensure that they do not repeat previous mistakes or introduce new vulnerabilities.

Compounding the problem, operating system security is rarely a purchase criterion. Commercial operating system vendors often report that sales are driven by customer demand for performance, price, ease of use, maintenance, and support. As a result, off-the-shelf operating systems are shipped in an easy-to-use but insecure configuration that allows sites to use the system soon after installation. These hosts/sites are often not fully configured from a security perspective before connecting. This lack of secure configuration makes them vulnerable to attacks, which sometimes occur within minutes of connection.

Finally, the explosive growth of the Internet has expanded the need for well-trained and experienced people to engineer and manage the network in a secure manner. Because the need for network security experts far exceeds the supply, inexperienced people are called upon to secure systems, opening windows of opportunity for the intruder community.


Internet Security

Internet security encompasses computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption and use of firewalls. 

A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
Role of firewalls in Internet security and web security[edit]
Firewalls impose restrictions on incoming and outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points. Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.

Security Technology

A variety of technologies have been developed to help organizations secure their systems and information against intruders. These technologies help protect systems and information against attacks, detect unusual or suspicious activities, and respond to events that affect security. In this section, the focus is on two core areas: operational technology and cryptography. The purpose of operational technology is to maintain and defend the availability of data resources in a secure manner. The purpose of cryptography is to secure the confidentiality, integrity, and authenticity of data resources.

Operational Technology

Intruders actively seek ways to access networks and hosts. Armed with knowledge about specific vulnerabilities, social engineering techniques, and tools to automate information gathering and systems infiltration, intruders can often gain entry into systems with disconcerting ease. System administrators face the dilemma of maximizing the availability of system services to valid users while minimizing the susceptibility of complex network infrastructures to attack. Unfortunately, services often depend on the same characteristics of systems and network protocols that make them susceptible to compromise by intruders. In response, technologies have evolved to reduce the impact of such threats. No single technology addresses all the problems. Nevertheless, organizations can significantly improve their resistance to attack by carefully preparing and strategically deploying personnel and operational technologies. Data resources and assets can be protected, suspicious activity can be detected and assessed, and appropriate responses can be made to security events as they occur.
One-Time Passwords. Intruders often install packet sniffers to capture passwords as they traverse networks during remote log-in processes. Therefore, all passwords should at least be encrypted as they traverse networks. A better solution is to use one-time passwords because there are times when a password is required to initiate a connection before confidentiality can be protected.

One common example occurs in remote dial-up connections. Remote users, such as those traveling on business, dial in to their organization's modem pool to access network and data resources. To identify and authenticate themselves to the dial-up server, they must enter a user ID and password. Because this initial exchange between the user and server may be monitored by intruders, it is essential that the passwords are not reusable. In other words, intruders should not be able to gain access by masquerading as a legitimate user using a password they have captured.

One-time password technologies address this problem. Remote users carry a device synchronized with software and hardware on the dial-up server. The device displays random passwords, each of which remains in effect for a limited time period (typically 60 seconds). These passwords are never repeated and are valid only for a specific user during the period that each is displayed. In addition, users are often limited to one successful use of any given password. One-time password technologies significantly reduce unauthorized entry at gateways requiring an initial password.

Firewalls. Intruders often attempt to gain access to networked systems by pretending to initiate connections from trusted hosts. They squash the emissions of the genuine host using a denial-of-service attack and then attempt to connect to a target system using the address of the genuine host. To counter these address-spoofing attacks and enforce limitations on authorized connections into the organization's network, it is necessary to filter all incoming and outgoing network traffic.

A firewall is a collection of hardware and software designed to examine a stream of network traffic and service requests. Its purpose is to eliminate from the stream those packets or requests that fail to meet the security criteria established by the organization. A simple firewall may consist of a filtering router, configured to discard packets that arrive from unauthorized addresses or that represent attempts to connect to unauthorized service ports. More sophisticated implementations may include bastion hosts, on which proxy mechanisms operate on behalf of services. These mechanisms authenticate requests, verify their form and content, and relay approved service requests to the appropriate service hosts. Because firewalls are typically the first line of defense against intruders, their configuration must be carefully implemented and tested before connections are established between internal networks and the Internet.

Monitoring Tools. Continuous monitoring of network activity is required if a site is to maintain confidence in the security of its network and data resources. Network monitors may be installed at strategic locations to collect and examine information continuously that may indicate suspicious activity. It is possible to have automatic notifications alert system administrators when the monitor detects anomalous readings, such as a burst of activity that may indicate a denial-of-service attempt. Such notifications may use a variety of channels, including electronic mail and mobile paging. Sophisticated systems capable of reacting to questionable network activity may be implemented to disconnect and block suspect connections, limit or disable affected services, isolate affected systems, and collect evidence for subsequent analysis.

Tools to scan, monitor, and eradicate viruses can identify and destroy malicious programs that may have inadvertently been transmitted onto host systems. The damage potential of viruses ranges from mere annoyance (e.g., an unexpected "Happy Holidays" jingle without further effect) to the obliteration of critical data resources. To ensure continued protection, the virus identification data on which such tools depend must be kept up to date. Most virus tool vendors provide subscription services or other distribution facilities to help customers keep up to date with the latest viral strains.

Security Analysis Tools. Because of the increasing sophistication of intruder methods and the vulnerabilities present in commonly used applications, it is essential to assess periodically network susceptibility to compromise. A variety of vulnerability identification tools are available, which have garnered both praise and criticism. System administrators find these tools useful in identifying weaknesses in their systems. Critics argue that such tools, especially those freely available to the Internet community, pose a threat if acquired and misused by intruders.

Cryptography

One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.

Encryption is the process of translating information from its original form (called plaintext) into an encoded, incomprehensible form (called ciphertext). Decryption refers to the process of taking ciphertext and translating it back into plaintext. Any type of data may be encrypted, including digitized images and sounds.

Cryptography secures information by protecting its confidentiality. Cryptography can also be used to protect information about the integrity and authenticity of data. For example, checksums are often used to verify the integrity of a block of information. A checksum, which is a number calculated from the contents of a file, can be used to determine if the contents are correct. An intruder, however, may be able to forge the checksum after modifying the block of information. Unless the checksum is protected, such modification might not be detected. Cryptographic checksums (also called message digests) help prevent undetected modification of information by encrypting the checksum in a way that makes the checksum unique.

The authenticity of data can be protected in a similar way. For example, to transmit information to a colleague by E-mail, the sender first encrypts the information to protect its confidentiality and then attaches an encrypted digital signature to the message. When the colleague receives the message, he or she checks the origin of the message by using a key to verify the sender's digital signature and decrypts the information using the corresponding decryption key. To protect against the chance of intruders modifying or forging the information in transit, digital signatures are formed by encrypting a combination of a checksum of the information and the author's unique private key. A side effect of such authentication is the concept of non-repudiation. A person who places their cryptographic digital signature on an electronic document cannot later claim that they did not sign it, since in theory they are the only one who could have created the correct signature.

Current laws in several countries, including the United States, restrict cryptographic technology from export or import across national borders. In the era of the Internet, it is particularly important to be aware of all applicable local and foreign regulations governing the use of cryptography.

Other actions that could be taken in order to ensure optimum security over the Internet are as follows:

  • Choose strong, unique passwords and ensure they are secured.
  • Enable multi-step verification for accounts used over the Internet.
  • Ensure your Softwares are Updates.
  • Be wary of suspicious emails and alerts.
  • Registry scan your computer, networks and applications with updated anti-virus programs where possible..
  • Avoid scams and prevent Identity theft.
  • Very important, all activities over the Internet should be over a secured network.


Web Information Retrieval, Search Engines and Web Crawlers

The role that right and factual information now plays in this current age cannot be overemphasized. Proper and accurate information plays a major role in every decision making process. It is also however not an exaggeration to say that the survival of virtually all fields depends on information. 

However, with the vast amount of data readily available on various sources with the Internet hosting a larger percentage of them, there is thus a need to retrieve only the needed information from the readily available ones.

Information retrieval is thus the activity of obtaining information resources relevant (or satisfactory) to an information need from a collection of information resources. 

There is now available on the internet a vast collection of electronic information which are readily made available on different websites and pages covering large geographical areas with ease of access, use and consistency. The World Wide Web (WWW), as a global distributed information repository, has become the largest data sources in today’s world. 

Web Information Retrieval is therefore a technology for helping users to accurately, quickly and easily find information on the web. An information retrieval process begins when a user enters a query into the system. Queries are formal statements of information needs, for example search strings in web search engines. With the proliferation of huge amounts of (heterogeneous) data on the Web, the importance of information retrieval (IR) has grown considerably over the last few years. 

The internet has over 90 million domains, over 70 million personal blogs which are viewed by over 1 billion people around the world. Ironically the very size of this collection has become an obstacle for easy information retrieval . As the internet constantly expands, the amount of available online information expands as well. The user has to shift through scores of pages to come upon the information he/she desires. In this vast space of information, it is important to create order even without global scale. This may be done by using either building classification catalog or a search engine. Both of them require a web crawling tool to ease the burden of manual data processing. The issue on how to efficiently find, gather and retrieve this information has led to the research and development of systems and tools that attempt to provide a solution to this problem. 

A common tool available on the internet used for adequate information retrieval is the search engines. A search engine is an information retrieval system designed to help find information stored on a computer system. The most visible form of a search engine is a web search engine which searches for the information on the World Wide Web. Search engines provide an interface to a group of items that enables the user to specify the criteria about an item of interest and have the engine find the matching items. Search Engines are however able to do their job with the aid of Web Crawlers. Web crawlers are the heart of search engine.

A web crawler is a program or automated script which browses the World Wide Web in a methodical and automated manner thus enabling it to form an important component of web search engines. They are used to collect the corpus of web pages indexed by the search engine. Moreover, they are used in many other applications that process large numbers of web pages, such as web data mining and comparison shopping engines.

Web crawlers start with a list of URLs to visit, called the seeds. As the crawler visits these URLs, it identifies all the hyperlinks in the page and adds them to the list of URLs to visit, called the crawl frontier.  In order to crawl a substantial fraction of the “surface web” in a reasonable amount of time, web crawlers must download thousands of pages per second, and are typically distributed over tens or hundreds of computers. Their two main data structures – the “frontier” set of yet-to-be-crawled URLs and the set of discovered URLs – typically do not fit into main memory, so efficient disk-based representations need to be used. Finally, the need to be “polite” to content providers and not to overload any particular web server, and a desire to prioritize the crawl towards high-quality pages and to maintain corpus freshness impose additional engineering challenges.  

Web crawler’s search engine performs two basic functions. First, it compiles an ongoing index of web addresses (URLs).  Then, it retrieves and marks a document, analyzes the content of both its title and its full text, registers the relevant link it contains and then stores the information in its database. When a user submits a query in the form of one or more keywords, the web crawler compares it with the information in its index and reports back any matches and then stores the information in a database. Its second function is to search the internet in real time for the sites that matches a given query. It does this in an exact process of performing its first function, following links from one page to another.

Big players in the computer industry, such as Google, Microsoft and Yahoo!, are the primary contributors of technology for fast access to Web-based information; and searching capabilities are now integrated into most information systems, ranging from business management software and customer relationship systems to social networks and mobile phone applications.


The first search engine created was Archie, created in 1989 by Alan Emtage. Archie helped solve the data scatter problem by combining a script-based data gatherer with a regular expression matcher for retrieving file names matching a user query. Essentially Archie became a database of web filenames which it would match with the user’s queries. Just as Archie started to gain ground and popularity, Veronica was developed by the University of Nevada System Computing Services . Veronica served the same purpose as Archie, but it worked on plain text files. Soon another user interface name Jughead, a tool for obtaining menu information from various Gopher servers appeared later with the same purpose as Veronica, both of these were used for files sent via Gopher, which was created as an Archie alternative. 

In 1993, Matthew Gray created what is considered the first robot, called World Wide Web Wanderer. It was initially used for counting Web servers to measure the size of the Web. The Wanderer ran monthly from 1993 to 1995. Later, it was used to obtain URLs, forming the first database of Web sites called Wandex.  Also in 1993, Martijn Koster created ALIWEB (Archie-Like Indexing of the Web). ALIWEB allowed users to submit their own pages to be indexed. ALIWEB was a search engine based on automated meta-data collection, for the Web 

Brian Pinkerton of the University of Washington released WebCrawler on April 20, 1994 initially as a desktop application and not as a web service as it is been used today. It later went live on the web with a database containing documents from over 6,000 web servers. It was the first crawler which indexed entire pages while other bots were storing a URL, a title and at most 100 words. It was the first full-text search engine on the Internet; the entire text of each page was indexed for the first time. Soon it became so popular that during daytime hours it could not be used as the WebCrawler was averaging 15,000 hits a day.  WebCrawler opened the door for many other services to follow suit. After the debut of WebCrawler came Lycos, Infoseek, and OpenText.

Alta Vista also began in 1995. It was the first search engine to allow natural language inquires and advanced searching techniques. It also provides a multimedia search for photos, music, and videos. Inktomi started in 1996 and in June 1999 Inktomi introduced a directory search engine powered by "concept induction" technology. "Concept induction," according to the company, "takes the experience of human analysis and applies the same habits to a computerized analysis of links, usage, and other patterns to determine which sites are most popular and the most productive." AskJeeves and Northern Light were both launched in 1997. Google was launched in 1997 by Sergey Brian and Larry Page as part of a research project at Stanford University. It uses inbound links to rank sites. In 1998 MSN Search and the Open Directory were also started. 

Google came about as a result of its founders' attempt to organize the web into something searchable. Their early prototype was based upon a few basic principles, including:

  • The best pages tend to be the ones that people linked to the most.
  • The best description of a page is often derived from the anchor text associated with the links to a page.

Both of these principles were observed as structural features of the world wide web, and theories were developed to exploit these principles to optimize the task of retrieving the best documents for a user query.

Internet Marketing in Business Operations

Marketing basically is the communication of the value of a product or service to customers, for the purpose of selling the product or service. Thus, marketing plays a pivotal role in the daily operation and sustenance of every business as it serves as a critical business function for attracting customers.

Today, marketing encompasses many different and pivotal elements. One of the most exciting and potentially profitable areas of marketing today is Internet Marketing. If properly utilized, Internet Marketing can give you greater financial viability and organizational stability.  

The Internet (especially the Web) is a place where anyone can communicate with vast numbers of potential clients and where even a companies and organizations can showcase their products and services with ease and cost effectiveness means. 

Internet marketing (or online marketing, digital marketing, e-marketing or web marketing), is making a name for itself globally bringing with it massive potential.

Despite the enormous benefit associated with Online (Internet) Marketing, many people though are still uncertain as to what it actually is or how it works while those who are familiar with it are still skeptical to embracing it and incorporating it into their business functions and operations. Internet Marketing builds your brand and allows people to find your website by utilizing a number of different online tools. This includes Search Engine Optimization (SEO), PPC (pay per click) ads, Web Page Ranking (Web PR),  Online Reputation Management(ORM), social media management, email marketing, promotions and competitions.
One of the major attractions of internet marketing is that campaigns are tailored around your specific company requirements and goals. 

The Internet has provided a rare opportunity especially for small to medium sized enterprises. It moves organizations beyond the physical constraints of their traditional distribution channels and creates a world wide virtual community in which small and medium sized companies can compete with large enterprises. The Internet ins now used as a virtual storefront where products are offered directly to customers. 

For many people, the web and the Internet in general is their primary information channel. In the early days of the phone, use of the new tool was for a while optional. Then soonest, it became that if you do not have a phone, then you do not have a business. This is now the position the internet has come to take this present age. Given our world’s rapidly increasing electronic connectedness, building an effective website may be regarded as much more than simply important, it is essential to the future strength of your business. The potentials of the Internet, and its complementary tools of websites such as email, online commerce, and interactive communication systems, is enormous. 

A website can be much more than a simple contact point providing a few pages of information. It has the potential to be a powerful part of your strategic marketing program. It could be operating at, or beyond, the level of effectiveness of your best marketing. An organization's website can be integrated with and to support all marketing efforts. In fact, it can even become the hub of all your marketing, just as it can be of itself a powerful marketing tool.

The Internet is a serious and important marketing medium. Marketing on the Internet just keeps on exploding. The Web, in particular, is the center of an information revolution comparable to the period following Guttenberg’s development of the moveable-type press. We have settled into a more accurate knowledge of what the Web can and can’t do. Some of the real advantages of the Web are interactivity, targeting, extensive market penetration, economy and measurability.

An effective website can be so very much more than just some images and basic information. It is an interactive research tool, a communications channel and a relationship builder. It can allow customers to communicate with each other to build a supportive community. It is an enormously powerful brand builder. It’s a direct-response marketing tool just as it is an educational medium. It is a powerful and customizable sales letter, a catalog and an enriching experience of your products and services. It can be all this, and more — If it’s done correctly. Though the cost of doing business on the Internet may be increased, but so also has the potential. 


STRATEGIES TO ONLINE MARKETING 
  • Develop a web site focused around your business
  • The developed website should be optimized for online search engines
  • Pay-Per-Click advertising can be of  great help (especially Google Adwords
  • Email marketing is also another internet marketing solution
  • Make press releases always available (even for free of charge if need be)


With the numerous benefits of Internet Marketing, you can now put your business on the World Wide Web. However, another important note to consider is your access to the internet.

Hyperia Limited helps you grow your business by providing you with high speed, highly reliable and competitive braodband access to the Internet. 

Contact Us or call  234(1)9033414-5, +234 700HYPERIA (+234 7004973742) in bringing a revolution to your business.
\

Nigerian National Broadband Plan

As Nigeria continues its quest to become one of the 20 leading economies by 2020, the role to be played by the Information and Communications Technology sector can not be overlooked. However, recent advancements and development in the sector as witnessed has shown that much of the feat recorded has been aided by the Internet technology. The advent of the Internet has helped to revolutionized the global society as well as transformed economies and technological systems.

In Nigeria, stakeholders in the Information and Communications Technology (ICT) sector are concerned about the current level of Internet connectivity, quality of service and its penetration in the country. This is against the backdrop of the experience in other countries where speedy broadband penetration has been contributing substantially to economic growth.

In order to promote and improve Internet connectivity in Nigeria and its utilization by Nigerians, the Federal Government of the country had launched a roadmap for National Broadband in the country. A committee has already been set up and launched by the government to fashion out the modalities for the roadmap as well as how it will be effectively implemented. The committee or council members consists of major stakeholders in the ICT industry including the past Vice Chairman of the Nigeria Communications Commission (NCC), Dr. Ernest Ndukwe, the immediate past President of the Nigeria Computer Society (NCS), Prof. Ademola Aladekomo amongst others. 

According to the Honourable Minister for Communication technology, Mrs. Omobola Johnson, the calibre and integrity of the members of the committee, lightens one's hope of the success of the policy. 
“... I have no doubt that with the credibility and the composition of the nominees to this council and working closely with the ministry, I have no doubt that we can achieve the objective of the broadband plan and look forward to work with you on the delivery of these objectives.”
In showing the government's commitment and interest to fast-track the implementation process in the country, the minister further disclosed that there were two broadband policy objectives; 
  • To accelerate the penetration of affordable broadband Internet in the country 
  • To foster broadband usage for national development.

With all these in place, once can then say that the entire plan to lift Nigeria into prosperity in high speed Internet access has now come full circle having moved from initial disjointed talks in 2008 to today when a National Broadband Plan is in place and Broadband Council has been established to see it through.

The benefit to be enjoyed by the implementation of the broadband policy in Nigeria is numerous. Broadband is an essential infrastructure of the 21st Century. It enables access to business and job opportunities, improves healthcare, education and government services, and facilitates social interactions. 
Broadband is to the 21st Century Information Age what Electricity was to the Industrial Age.
It has a significant transformative effect on how people live and work. It empowers the individual user with previously unimaginable capabilities and global reach. The Internet is the world’s largest repository of information and knowledge  and High Speed Access is critical to fully harnessing the benefits of the Internet. 

Major identified barriers to the realisation of the set target includes services not being available at a good speed, the high price of broadband services, the lack of ownership of access devices due to affordability, 
low level of digital literacy, and poor perception of the value of broadband. 

Notwithstanding, in order to provide palliative measures to the identified roadblocks, the government of the country intends to embark on programs that are geared towards making broadband more affordable; lower device costs by reducing or eliminating import duties and other taxes as appropriate; launch intensive nationwide awareness campaigns to educate the citizenry about the value of broadband services. The Government will also introduce digital literacy education and training programs leveraging the community access centres established across the country as well as incorporate such programs into primary and secondary education. 
The Federal Government is committed to resolving identified challenges to the quest for accelerated broadband penetration in Nigeria and will collaborate with the State Governments, the Private Sector and other stakeholders to achieve the goal. Government also recognises that some incentives may be required to push services to the areas deemed less commercially viable. 

For Nigeria to become one of the world’s leading economies by year 2020, high-speed broadband networks that will provide every Nigerian with fast, reliable and affordable internet access is a fundamental requirement. Broadband has been variously described as a transformative technology that levels the playing field and gives businesses access to regional, national, and international markets irrespective of geographical location. The huge success of digital mobile services in the country is a great platform upon which to build a national broadband strategy. 


World Population and Information Technology

Today is Word Population Day

World Population day is an annual event, observed on July 11th every year to raise the awareness of global population issues. The event which was established by the Governing Council of the United Nations Development Programme in 1989 was however inspired by public interest  when the world's population reached an approximate of five billion in July, 1999. However, on Monday, October 31st, the world's population was projected to hit a remarkable figure of  7 billion. 

According to the report released by the United Nations Population Funds (UNFPA), the international development agency responsible for the promotion of the rights of every person towards enjoying a life of health and equal opportunity, it states that, 

"... with planning and the right investment in people now - to empower them to make choices that are not only good for themselves but for our global commons - our world of 7 billion can have thriving, sustainable cities, productive labor forces that can fuel economic growth, youth populations that contribute to the well-being of economies and societies, and a generation of older people who are healthy and actively engaged in the social and economic affairs of their communities". 

Babatunde Osotimehin, Nigeria born Executive Director of UNFPA,  concludes by saying: 

"this “is a challenge, an opportunity and a call to action". 

In response to this challenge and call to action, Hyperia Limited, as part of its Corporate Social Responsibility and in furtherance to its resolve to make fast and cheap Internet Access readily available to everyone in Nigeria, writes on the World Population and Information Technology. 

A major use of technology is, and has been, to accommodate the growth of populations, and to remove the recognition of the importance of living within the carrying capacity of the environment. Albert A. Bartlett.

In nearly every corner of the world, from Lagos to Accra, Mumbai to Madrid, Washington to Ottawa, one cannot enter a café or walk down the street without seeing someone talking, texting, or surfing the Internet on their cell phones, laptops or tablet PCs. Information Technology (IT) has become ubiquitous and is changing every aspect of how people live their lives.

Recent advances in our ability to communicate and process information in digital form— a series of developments sometimes described as an “IT revolution”—are reshaping the economies and societies of many countries around the world.

The growth of information technology has sparked rapid economic growth and is changing the way people live, learn, and work. While technology is no "silver bullet" for the problems of the developing world, information and communications technology can be powerful democratizing forces, offering greater economic access to capital, allowing remote areas to overcome geographic boundaries, reducing educational disparities, and preventing cultural alienation, a risk that the divide between nations will grow if we fail to ensure that all nations have the opportunity to participate fully in the network economy and society.

Information Technology (IT)  is a driving factor in the process of globalization. Improvements in the early 1990s in computer hardware, software, and telecommunications greatly increased people’s ability to access information and economic potential. While advancements in Internet-based tools over the past five to ten years, such as social networking websites, twitter, and other Web2.0 applications are changing the way people use and share information for personal, political, and commercial purposes. These developments have facilitated efficiency gains in all sectors of the economy. IT drives the innovative use of resources to promote new products and ideas across nations and cultures, regardless of geographic location. Creating efficient and effective channels to exchange information, IT has been the catalyst for global integration.

Products based upon, or enhanced by, information technology are used in nearly every aspect of life in contemporary industrial societies. The spread of IT and its applications has been extraordinarily rapid. Just 30 years ago, for example, the use of desktop personal computers was still limited to a fairly small number of technologically advanced people. The overwhelming majority of people still produced documents with typewriters, which permitted no manipulation of text and offered no storage.

Twenty years ago, large and bulky mobile telephones were carried only by a small number of users in just a few U.S. cities. According to a 2013 International Telecoms Union (ITU) World Report, there were 6.8 billion cell phone subscriptions worldwide at the end of 2012. Global mobile cellular penetration reached 96 percent in 2012 (ICT Facts and Figures, 2013). In some developing countries, mobile phones are used by more people than the fixed line telephone network.

But perhaps most dramatically, before two decades ago, only scientists were using (or had even heard about) the Internet, the World Wide Web was not up and running, and the browsers that help users navigate the Web had not even been invented yet. Today, of course, the Internet and the Web have transformed commerce, creating entirely new ways for retailers and their customers to make transactions, for businesses to manage the flow of production inputs and market products, and for job seekers and job recruiters to find one another. According to ITU World Report 2013, the total amount of users reached more than 2.7 billion (39 percent of the world’s population) by 2013.

The news industry was dramatically transformed by the emergence of numerous Internet-enabled news-gathering and dissemination outlets. Websites, blogs, instant messaging systems, e-mail, social networking sites and other Internet-based communication systems have made it much easier for people with common interests to to connect, exchange information, and collaborate with each other. Education at all levels is continually transforming thanks to innovations in communication, education, and presentation software. Websites now serve as a primary source of information and analysis for the masses.

Globalization accelerates the change of technology. Every day it seems that  a new technological innovation is being created. The pace of change occurs so rapidly many people are always playing catch up, trying to purchase or update their new devices.  Technology is now the forefront of the modern world creating new jobs, innovations, and networking sites to allow individuals to connect globally. The timeline below shows the rapid transformation of how technology has accelerated within the last 20 years to 2012.  

18 years ago: Internet commercialized
17 years ago: first mobile phone with Internet connectivity
15 years ago: Google named the search engine of choice by PC magazine
12 years ago: Blackberry launched
9 years ago: Facebook launched
7 years ago: Twitter launched
6 years ago: iPhone, the first of the smart phones, introduced
5 years ago: Groupon introduced
2 years ago: 17 million smart tablets sold — estimated that 100 + million by 2014
1 year ago: Google Glass announced
Every 60 seconds (so it seems): new apps, tailored to users’ specific needs created

Back at home here in Nigeria, just as there has been an increase in the world population, so also there has been a corresponding increase in the country's population. Taking into consideration the country's population between 2000 and 2011, the country's population increased from 142,895,600 to 155,215,573 according to the ITU. The internet population users also  grew rapidly from 200,000 users in 2000 to 5,000,000 in 2006. In 2009, the population of internet users soared to 23,982,200 while in 2011, there was an estimated 45,039,711 internet users. As at 31st December, 2012, there was an estimated 6,630,200 facebook users in Nigeria (Source: ITU).

With this set of statistics, Nigeria is being ranked amongst the 20 top countries that use the internet. According to the usage statistics on the top nations on the Internet, Internet World Stat, Nigeria occupies the 11th position, just immediately after France, which has Internet population of 50.29 million. Nigeria also comes ahead of Mexico. with Internet population of 42 million. This rating means that two per cent of global Internet population of 2.29 billion people are Nigerians. On a population estimate of 170.12 million people, Nigeria’s Internet penetration ratio was put at 26.5 per cent. This means that 26.5 persons out of every 100 Nigerians use the Internet.

With the decreasing costs of smartphones and tablets, we are seeing a whole new population accessing the Internet. Today, a teacher can purchase an Android tablet and bring unprecedented amounts of information into the classroom. Whether through more prevalent network connections like the fiber-optic links connecting Nigeria and Africa to the rest of the world, ever more creative software connecting people online, or the vast amounts of Web-based content now accessible to millions, technology is getting into a position to help educate the world. And learning is increasingly possible online: there are vast amounts of free information on the Web, from Wikipedia to millions of books accessible to all. Or middle- and high school-level YouTube classes and tutorial videos, and the interest is there. So in ways that were inconceivable only a few years ago, useful educational materials are spreading across the planet — and the cost of access is declining markedly.

However, there is still much work ahead of us and great opportunities to accelerate this access to information and Hyperia Limited is proud not only in taking up this challenge but also at providing feasible solutions to it. With our range of products and services readily available at your disposal, this is not the end. It is not even the beginning of the end. But it is, perhaps, the end of the beginning.

In conclusion, world technology has transformed our lives, allowing us to access information at any time from an ever growing number of devices. Tasks once performed by many have been reduced to a single click or tap. However, as the world population exceeds 7 billion people, we must ensure that all are armed with the skills to leverage the vast powers of information technology to improve their lives. 


The First Ever Website Now Regains its Original Address

On 30th of April, 1993, there was a revolution, the birth of a new technology that was going to change a lot of things. And yes, it did change a lot of things. It changed our mode of reasoning, it affected our social live interaction, it changed our daily routines and activities. It affected our whole lives.

Conseil Européen pour la Recherche Nucléaire (CERN),  an international organization operating the world's largest particle physics laboratory, made the World Wide Web (WWW) technology available on a royalty-free basis. The (web) technology was brought to a bloom through the free availability of the required software needed to run a server freely available along with a basic browser and a library of code.

The WWW technology was however made readily possible by the concerted efforts of a British physicist, Tim Berners-Lee.
Timothy Berners Lee, creator of the World Wide Web

Tim invented the web at CERN in 1989. The project, which Tim named "World Wide Web", was originally conceived and developed to meet the demand for information sharing between physicists in universities and institutes around the world.

Other Information Retrieval (IR) systems using the internet - such as WAIS and Gopher - were available at the time, but the web's simplicity along with the fact that the technology was royalty free led to its rapid adoption and development.

The first ever created website in the world was dedicated to the World Wide Web project itself and was hosted on Berners-Lee's NeXT computer. The website described the basic features of the web; how to access other people's documents and how to set up your own server. The website was hosted on Tim's NeXT machine - the original web server - which is still at CERN.
Snapshot of the first ever website


The first web browser - or browser-editor rather - was called WorldWideWeb as, after all, when it was written in 1990 it was the only way to see the web. Much later it was renamed Nexus in order to save confusion between the program and the abstract information space (which is now spelled World Wide Web with spaces).


On 30th of April, 2013, CERN in its celebration of twenty years of a free, open web and to mark the anniversary of the publication of the document that made the web technology free for everyone is starting a project to restore the first website and to preserve the digital assets that are associated with the birth of the web. In doing this, CERN took a bold step by  returning the first ever created website to its original address — http://info.cern.ch/hypertext/WWW/TheProject.html

Just as you view the website itself, also be sure to view the source of the first webpage. You’ll find quite a few things about early HTML that have long since changed — like the use of <HEADER> instead of <HEAD> or the complete absence of a root <HTML> tag. There’s also a trace of Berners-Lee’s famous NeXT machine in the <NEXTID N="55"> tag.



If I could make a comparison, what the first website looked like twenty years ago and what it looks like now, then I wonder what web sites will look like 20 years from today and how will they function.

Hyperia presents with a nostalgic feeling, some of the images that will ignite those golden moments that have now shaped our present lives.



Timothy Lee: The man behind the World Wide Web

Tim Lee (left) with Robert Cailliau(right), inventors of the World Wide Web posing next to the first Web Server, NeXT Computer  





The first web Server, Tim Bernee-Lee's NeXT Computer, still located at CERN Office



The first ever website created







Snapshots of the first Web Browser called Nexus




Documents officially putting the World Wide Web on a public domain