Sunday, April 18, 2010

Week 14: Muddy

This week’s lecture, I was a little confused on what RAID actually is. The lecture described it as multiple devices treated as if they were one. But what really is that?? So, I searched the web and did some research on RAID (redundant array of inexpensive disks). I found that the website Wikipedia provided the best information on this topic.

http://en.wikipedia.org/wiki/RAID

Raid is a technology that allows high levels of storage reliability from low-cost and less reliable PC through techniques of arranging the devices into arrays for redundancy. It is also used for computer data storage schemes that can divide and replicate data among multiple hard disk drives. So basically, this array distributes data across multiple disks and seen by the computer user and operating system as one single disk.




Friday, April 16, 2010

Secure Email Project

https://www.pgp.com/insight/newsroom/press_releases/browne_jacobson_pgp_universal_gateway_email.html

In this article, Browne Jacobson, one of the largest law firms in the UK, has selected PGP Corporation, a global leader in enterprise data protection, to secure its electronic communications. Browne Jacobson is able to encrypt sensitive information in emails to clients ensuring secure communication and compliance with various regulations. With an increasing number of data breaches in the UK, Browne Jacobson is taking a proactive approach to defend its clients’ communications with secure emails.

Sunday, April 11, 2010

Week 13: Clear

Software Piracy is also known as copyright infringement of software. It is a common practice of copying or distributing unauthorized computer software. For example, making more copies of software than the license allows, or installing software licensed for one computer onto multiple computers or a server. If accused of piracy, then someone is claiming that you have violated their copyright by copying part or all of their work without authorization, or have enabled other people to make such copies. Since copying software is an act or copyright infringement, it is subject to civil and criminal penalties.

Software Piracy is extremely important to businesses because they can be held liable for a software copyright infringement whether or not they know their conduct violates federal law. According to bbb.org, criminal penalties include fines of as much as $250,000 and jail terms of up to 5 years. Software piracy costs the software industry over $10 Billion in lost revenue each year and costs U.S. businesses millions in fines and legal fees. It is highly recommended that businesses adopt a software policy to help avoid any violations of software licensing.

I found great resources at Better Business Bureau.
http://www.bbb.org/us/article/computer-software-piracy-406

Sunday, April 4, 2010

VoIP



I just have to start out by saying that

I ABSOLUTELY LOVE SKYPE. =)


This assignment was not my first experience with using VoIP; I often Skype my mom who lives in California. I believe this is such a great way to interact with your family and friends on a more personal level which makes you feel so close even though you can be 3000 miles away. Skype also allows you to make free calls over the internet to other people on Skype for as long as you like, to wherever you like. In this short clip, I’m chatting with my brother who lives in Key West.


http://www.screencast.com/t/MzFiZjczZ

My Avatar


When creating my Avatar, I used the site Face Your Manga. This was a really easy site that walked you through the whole process, picking out features, step by step. They even had an accessory step. Creating an Avatar is really cool because you can design it to resemble anyone. =) I love my Avatar because it looks like a cartoon character of myself.

Saturday, April 3, 2010

Project: Database

Having no prior experience with using Access, this project has taught me a lot. Watching the lectures and working through the project was the best method of learning Access for me. I learned how to create tables and queries, and connect them together using forms and reports. Also, I learned how to export and import data using excel to create new tables. I was having a hard time with the import activity at first, but once I figured it out, I absolutely love how you can tie in customer information to your business to keep you organized. One day, I hope to use my new skills I’ve learned when operating my own business.

If I could choose one way to enhance the functionality of this database, I would change the way to import data. After trying several times, I finally figured it out. After that, I definitely would simplify this process. Also, I found it difficult to create a report in the design view. IT’S WAYYY TOO CONFUSING!! And to create a report footnote; forget it. I enjoyed working in the layout view so you can see exactly what the report is going to look like.

Week 12: Muddy

This week, I felt like the lecture briefly toughed based on the UML (unified modeling language). The professor only explained a table, so I needed to research more on this subject to get a better understanding of what the UML actually is. I found Wikipedia.org to be the best reference and provide the best explanation.

http://en.wikipedia.org/wiki/Unified_Modeling_Language

The Unified Modeling Language (UML) is a standardize general-purpose modeling language in the field of software engineering. Basically, it creates a visual model for software intensive systems. It is used to specify, visualize, modify, construct and document the artifacts of an object-oriented system under development. Almost like, looking at blueprints.

Sunday, March 28, 2010

Week 11: Muddy

This week, I’m having a hard time grasping the concept of Queries in Access. The lecture briefly describes queries as how you interact with data from a database. It also explains how they support four basic data operations. I’m still a little confused. After researching, I found a more detailed definition at wikianswers.com as my reference.

http://wiki.answers.com/Q/What_is_query_in_access

A query is a way of extracting information from a database in Microsoft Access. It’s one of the most important things in a database to get information from your database or manipulate data. It usually involves certain criteria or requesting certain data. You can use queries to extract data to a separate table or delete data, change data and many other things.


Saturday, March 20, 2010

Excel Project

This week, we were assigned a project in Excel working on a spreadsheet for a large fitness company. The owner collected data from 500 subjects, measuring their heart rate every minute for 20 minutes.
From this data given, I was able to format the spreadsheet making it more organized and easier to analyze. I created formulas to calculate the Maximum Heart Rate based on each subjects age, the Target Heart Rate for maximum cardiovascular benefit for each subject, and show the Highest Heart Rate Achieved. This new data is able to tell the owner whether or not the subject achieved their target and if the exercise program was sufficient.

I have taken a computer class prior to this course, making me somewhat familiar with Excel and was able to navigate around. This course has taught me a tremendous amount of new tools like the IF, Max MIN formulas. I absolutely love how you can enter in one formula and apply it to all of your data instead of entering it in individually. I’ve learned that you can use Excel to store, manipulate, and graph data with different tables like the pivot table. Most importantly, I’ve learned that you can incorporate Excel in just about any project to organize data and make fast calculations. Excel makes life a whole lot easier in the business world! =)

This is my screen capture of the “AvgIncrease” Pivot Table.

Week 10: Clear

A firewall is a great device that is designed to block any unauthorized access entering a computer system. It acts as a boundary between networks to prevent unauthorized Internet users from accessing a private network. Firewalls are also used to examine all messages coming in or out and blocks any that doesn’t meet the security criteria. According to the lecture, they are the FIRST line of defense in protecting your network from viruses, DOS (Denial of Service) attacks, hacking, and worms. Most importantly, firewalls will help protect your identity as an individual or business.

Firewalls are extremely important in the business environment. Businesses need to protect their computers from danger with a firewall because most rely on their computer system on a daily basis. The internet is a large network of computers, making it easy for virus to spread. If your computer is connected to the internet, you are at risk and need the right security software. Also, if your computer is not connected to a firewall, hackers can gain access to personal information and destroy all your businesses important files. I’d rather be safe than sorry.

A great computer source where I got my information is SpamLaws.com. They explain thoroughly and share the benefits of using firewalls.
http://www.spamlaws.com/firewall-importance.html
I also found the illustration of how a firewall works at Wikipedia.com.
http://en.wikipedia.org/wiki/File:Firewall.png

Sunday, March 7, 2010

Week 9: Muddy

This weeks lecture, I’m a little confused about Pivot Tables. Since the lecture was only a few minutes long, I searched Wikipedia and found a lot of great information to help better understand. http://en.wikipedia.org/wiki/Pivot_table
I found that a pivot table is a data summarization tool used for spreadsheets like Microsoft Excel. They are used to automatically sort, count, and total the data stored in one table to create a second table (pivot table) which will display the summarized data.
They usually consist of a row, column, and data fields which allow several kinds of aggregations like sum, average, etc.
Pivot Tables benefit in the business world because unlike a typical data entry where the data is stored only in columns and rows, a pivot table can help summarize the flat data, giving it depth, and highlighting the desired information. Pivot tables are better if you have a lot of information that needs to be summarized and they are now considered an important part of a spreadsheet application.
**(photo) Trainsignal Training a free computer training site.
http://www.trainsignaltraining.com/wpnew/wp-content/uploads/2008/01/Kasia_Pivot/1.jpg

Thursday, February 18, 2010

Week 7: Clear

Have you ever worked really hard on a project and right before you hit the save button, the computer crashes? Well, it’s not just your luck. Data loss is very common; 66% of all Internet users have experienced some sort of data loss. That’s a high percentage considering all you have to do is backup.
Backup?!?!?!?
Backup is a term used for making copies of important data that can be restored if any data is lost. Backups are not the same as archives. An archive is a primary copy of data used for future use and a backup is a secondary copy of data used to replace the original item. As long as new data is being created and changes are being made, backups will need to be updated.
Computer Backup is especially important in the business environment because most companies store their important information onto a computer. Without this data, some companies could simply not exist. It’s recommended that every business perform weekly or daily backups depending on the amount of information being stored. Several ways to backup information are hard disk imaging, online backup, and external storage devices.

For more information regarding backup, I found Spam Laws Online to be the best resource.
http://www.spamlaws.com/business-backup.html

Friday, February 12, 2010

My Web 2.0 Project


WOW this project was more time consuming then I thought…After reading the instructions over and over and finally understanding, I found myself spending the most time coming up with a cute story and looking through old pictures.
Using OneTrueMedia, my project best reflects my journey to the swamp and I am extremely pleased on how it turned out. This was a great assignment; I learned that everyone does have a story to tell and it’s great to reflect on the past. I have also learned that using Web 2.0 in business makes it much more exciting and you don’t have to stick with the same old boring presentation. I really enjoyed working on it and it's something I will cherish for years.

I used a comment box and a poll underneath my video as my interaction method. It has worked really well and I have gotten nothing but positive feedback from my peers.

Web 2.0 Tool Story
http://www.onetruemedia.com/shared?p=a5b72c45382521651bfe03&skin_id=701

Web 2.0 Interaction Method
http://tylerkocis.blogspot.com/2010/02/my-montage-21110-at-onetruemediacom.html

Monday, February 8, 2010

Week 6: Clear

The most clear concept this week is definitely the CD-ROM.
A CD-ROM, Compact Disc Read-Only-Memory, is a pre-pressed disc capable of storing large amounts of data. They are mass-produced by manufacturers where a glass master disc is created and used to make "stampers", and then multiple copies of the final disc are created. Once stamped by the vendor, they cannot be erased nor filled with new data. Also, CDs come in recordable (CD-R) and rewritable (CD-RW) discs, where a laser changes the properties of the dye called “burning”. To read a CD you need a CD-ROM player which all come in a standard size and format so you can load any type of CD-ROM into any CD-ROM player.
As CD-ROMs are rapidly growing, they are becoming very important to the business environment mainly because they can store large amounts of important data. A single CD has the capacity of storing the amounts of 700 floppy disks, or about 300,000 text pages. Not only has the CD-ROM replaced the floppy disk drive, it has allowed us to use our computers in ways that we never used them before with multimedia.It also works as a back up and optical storage device for your computer and they are relatively low in cost and size.

Wikipedia offers a great website for references because they explain all the aspects of a CD-ROM. http://en.wikipedia.org/wiki/CD-ROM

I also found PcGuide.com to be a great resource primarily because it explains the importance of a CD-ROM. http://www.pcguide.com/ref/cd/index.htm

Sunday, February 7, 2010

Week 5: Muddy

In this week’s lecture, The Processor, I found hyper-threading to be confusing due to the lack of information. The lecture only describes it as an execution process. I’m still confused, so I found a source online to better understand. TechTerms.com gave a more detailed explanation on hyper-threading, making this concept easier to grasp.

According to TechTerms.com:
http://www.techterms.com/definition/hyperthreading

Hyper-threading allows the processor to execute two threads, or sets of instructions, at the same time. It’s almost like having two separate processors working together. This can improve the processing performance by allowing the two programs to be processed as separate threads at the same time. Intel claims up to a 30% speed improvement compared with a, non-simultaneous multi-threading Pentium 4.

http://www.musicxpc.com/images/products/hyper_thread_works.jpg

Basically, hyper-treading extends to 2 threads. It multi-tasks more than one instruction thread, giving a significant increase in the processors performance and time.

Sunday, January 31, 2010

Week 4: Muddy

This week, Im a little confused about the Open Source Licences. The lecture states that the application's source code is given so users can modify, do whatever they want with it, and even resell.

After doing a little research, Wikipedia cleared it up buy saying that it is a copyright license for computer software that makes the source code available under terms that allow for modification and redistribution without having to pay the original author.

So, Open source doesn't just mean access to the source code or they can do whatever they want with it. Users must comply with the criteria of the developer.


http://en.wikipedia.org/wiki/Open-source_license

Sunday, January 24, 2010

Week 3: Muddy

In this weeks lecture, Using the Web, I found the topic Web 2.0 to be Muddy. The lecture describes it as a use of technology on the internet for creativity, collaboration, and information sharing. That’s a very broad definition and I needed more information to understand what Web 2.0 actually is. After doing some research, I found the website Wikipedia, to have a better explanation for this concept and it goes more in depth then the lectures.

http://en.wikipedia.org/wiki/Web_2.0

Web 2.0 includes web-based communities associated with web applications that work together involving information sharing and collaboration on the World Wide Web. The philosophy focuses on the idea that the people who use media, access the Internet, and use the Web should help customize media and technology for their own purposes. It’s a beginning of a new era in technology by allowing its users to interact with other users to change website content. The technologies by Web 2.0 include blogs, tags, RSS, social bookmarking, and AJAX.

Sunday, January 17, 2010

Week 2: Clear

The most clear concept this week, was definitely the advantages of using a computer found in chapter one. As computers become more accessible, the greater society relies on them. I can’t imagine going a day without signing on; especially since I have access on my phone. Computers are used in almost every field and are use by millions of people around the world. They are so important because they have allowed us to accomplish many tasks faster and easier. Can you imagine completing those tasks manually? How time consuming that would be.

Computers are particularly important for businesses because they can accurately keep record of important business transactions. They also make it accessible to buy and sell things online causing expansion for a business. More importantly, Computers have impacted the medical field, allowing access for research so diseases can be easily diagnosed. Computers have truly changed the world.

This article “Impact of Computers” is a great reference because it explains in detail the history and major impacts of computers.
http://tatooine.fortunecity.com/vonnegut/320/history.htm

Week 1: Muddy

After reviewing the material in week one, I found the concept of bots or spiders difficult to understand. The material says "the bots “crawl” the web by going to a page and collecting every single link on that page". Huh??? Maybe I was taking it too literally, but I just didn't understand what a bot actually was and why would it want to collect every link. Since this is an unfamiliar subject and I couldn't grasp this concept, I decided to surf the web for more information.

I came across a website called Google webmaster central:
http://www.google.com/support/webmasters/bin/answer.py?hl=en&answer=70897

I personally think this site was able to give me a better explanation and more details of bots. It also gave a great analogy; think of the web as looking into a really big book. In order to find anything in the book, you have to look at the index and it will direct you exactly where you need to go. These bots, which are search software, will collect documents from the web and build an index for a particular search engine like Google. So, every time you search for something on Google, the bots help by only pulling up the most relevant URL’s to your search.