Monday, April 12, 2010

Week 14: Clear

This week we studied Enterprise computing which elaborated on RAID, Redundant Array of Inexpensive Disks. There are many differnt levels of RAID ranging from the most simple RAID1 to the most complex RAID6. RAID 1, or mirroring is simply the use of a pair of drives which mirror each other. If one drive were to fail, the second drive keeps right on moving at full speed with no data loss. The most complex to date is the RAID6 which is any form of RAID that can continue in the event of two concurrent disk failures.

RAID is very important in the business environment because it can severly limit the risk of data loss in the event of disk failure. Whether you are a small business keeping data on your individual customers or a massive corporation keeping data on thousands of employees, it can be catastrophic if your system fails and all of your data needs to be recovered (assuming it can be). RAID is much quicker than using standard backup devices such as tape or external hard drives.

In an attempt to learn more about RAID I came across an article titled Beginners Guides: Installing RAID on a desktop PC located at http://www.pcstats.com/articleview.cfm?articleID=830 . This artcile really helped to elaborate on the benefits of RAID and the process involved with setting them up.

 

Wednesday, April 7, 2010

Secure Email Project


http://www.techiwarehouse.com/cms/engine.php?page_id=ee2ef23b

The article I found about businesses using encryption was titled SafeData Helps Companies Comply with New Data Privacy Laws. In todays electronic age personal data is transmitted over the internet millions of times a day which sets up a dangerous situation. Recently Massachusetts and Nevada passed legislation which prohibits businesses from electronically transferring personally identifiable information which is not encrypted outside of their secure system. I personally think this is an excellent idea. When you think about all of the financial information our banks and financial advisors have the ability to email, or our medical professionals with all of our personal medical history. This could be something as harmless as me calling the bank and asking them to email me a recent statement. If this were to be sent un-encrypted, it could very easily fall into the wrong hands. The article goes on to mention that many other states are expected to follow suit in the very near future.

Week 13: Clear



During this weeks lectures and reading, the topic I found to be most clear was computer security risks. During my studies I was very interested to learn that their are 7 categories of perpetrators of cyber crimes: hacker, cracker, script kittie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist. All of the different classifications work in differnet ways but are all dangerous to the computing world.

It is very important for the business world to understand these different types of security risks. Knowledge of these predators allows them to boost up security to block hackers, crackers, and script kiddies. Internally they will be able to prevent corporate spies, unethical employees, cyberextortionists, and cyberterrorists.

While doing additional research on the topic of Hackers versus Crackers, I came across an article located at http://www.techiwarehouse.com/cms/engine.php?page_id=ee2ef23b which does a really good job of seperating the two classifications.

Wednesday, March 24, 2010

Week 12: Clear

This week we learned about information systems. While enjoying this topic, the area I found to be most clear was the System Development Life Cycle also known as the SDLC. The SDLC consists of five phases: Planning, Analysis, Design, Implementation, and Operating, Support, and Security. System development is a collaboration of representatives from many different departments all of which bring different talents and skills to the table. These activities and representatives come together to complete the system.

System Development Life Cycle is extremely important in the business environment because it creates solutions to problems. When I company foresees a change in process or a problem which needs to be modified or improved, the Cycle begins. It allows ateam of professionals to brainstorm and eventually develop a system to assist in correcting or streamlining the issue.

While attempting to better understand the topic of SDLC, I came across a very well written article about this topic. The website which housed this article is located at http://ezinearticles.com/?Definition-of-SDLC-and-Its-Phases&id=2817306.


Thursday, March 18, 2010

Database Project

The database project using Microsoft Access was a challenging, yet interesting, project. While completing this project I learned how to successfully create a database by either manually inputing data or by importing external data. Once my database was created I learned how to change the format to fit my purpose and desire. Now that I had my data just they way I wanted it, I learned how to complete queries and present my queried data in a report or form view. By completing this project I feel that I have learned the necessary skills to work with Access in the future.

If I were given the option to modify this database, I would set the membership type to auto fill when you begin typing. Since you only have two options, Individual and Family, this would save a great deal of extra typing. This would be accomplished by setting up a combobox and adding a dropdown list which contained your default values. In addition to this I would setup the gender field to only allow Male or Female. This would be accompished by setting up a validation rule in the design view. I would also add validation text to pop up if any other data was input. This would let the user know what error was being made.

Tuesday, March 9, 2010

Week 11: Clear

After reading chapter 10 and reviewing this weeks lectures, the concept I found most clear was relational databases. A relational database stores information and organizes it into a two dimensional table. When designing a database, most programmers will use a process called normalization. This process helps to insure the least amount of redundancy.

Relational databases are very important for businesses. A business may use a relational databases for task such as payroll, accounts receivable, accounts payable, inventory, and many other functions. This database help the company stay  organized which ultimately will lead to more profitablity.

While do more research on relational databases, I came across a website located at http://www.howstuffworks.com/question599.htm which explains the history of databases. While reading this information, I learned that databases began in 1970 and were originate by IBM.

Wednesday, March 3, 2010

Week 10: Clear



Free Clipart
This week the concept which I found to be very clear and educational was Communications Devices. There are many different devices used to transmit and receive data. The most common devices are Dial-Up Modems, ISDN, DSL, and Cable modems. A Dial-Up Modem uses a homes telephone line to transmit and receive data. An ISDN modem sends information to an ISDN line and receives information from an ISDN line. A DSL modem uses a DSL line to transmit and receive data and a Cable modem uses a homes cable tv line to transmit and receive data.

These devices are instrumental in the success of a business. Without the use of a Communications device a business could not transmit and receive data. A good example of this is a banks ATM machine. When you use the machine it transmits the transaction to the main computer to verify the information, then receives data from the main computer on how to proceed.

An article I found on WiFi Notes.com located at http://www.wifinotes.com/computer-networks/network-communication-devices.html did an excellent job of elaborating on the hardware involved in communications devices as well as the process associated with each.