This week’s lecture, I was a little confused on what RAID actually is. The lecture described it as multiple devices treated as if they were one. But what really is that?? So, I searched the web and did some research on RAID (redundant array of inexpensive disks). I found that the website Wikipedia provided the best information on this topic.
http://en.wikipedia.org/wiki/RAID
Raid is a technology that allows high levels of storage reliability from low-cost and less reliable PC through techniques of arranging the devices into arrays for redundancy. It is also used for computer data storage schemes that can divide and replicate data among multiple hard disk drives. So basically, this array distributes data across multiple disks and seen by the computer user and operating system as one single disk.
Sunday, April 18, 2010
Friday, April 16, 2010
Secure Email Project
https://www.pgp.com/insight/newsroom/press_releases/browne_jacobson_pgp_universal_gateway_email.html
In this article, Browne Jacobson, one of the largest law firms in the UK, has selected PGP Corporation, a global leader in enterprise data protection, to secure its electronic communications. Browne Jacobson is able to encrypt sensitive information in emails to clients ensuring secure communication and compliance with various regulations. With an increasing number of data breaches in the UK, Browne Jacobson is taking a proactive approach to defend its clients’ communications with secure emails.
In this article, Browne Jacobson, one of the largest law firms in the UK, has selected PGP Corporation, a global leader in enterprise data protection, to secure its electronic communications. Browne Jacobson is able to encrypt sensitive information in emails to clients ensuring secure communication and compliance with various regulations. With an increasing number of data breaches in the UK, Browne Jacobson is taking a proactive approach to defend its clients’ communications with secure emails.
Sunday, April 11, 2010
Week 13: Clear
Software Piracy is also known as copyright infringement of software. It is a common practice of copying or distributing unauthorized computer software. For example, making more copies of software than the license allows, or installing software licensed for one computer onto multiple computers or a server. If accused of piracy, then someone is claiming that you have violated their copyright by copying part or all of their work without authorization, or have enabled other people to make such copies. Since copying software is an act or copyright infringement, it is subject to civil and criminal penalties.
Software Piracy is extremely important to businesses because they can be held liable for a software copyright infringement whether or not they know their conduct violates federal law. According to bbb.org, criminal penalties include fines of as much as $250,000 and jail terms of up to 5 years. Software piracy costs the software industry over $10 Billion in lost revenue each year and costs U.S. businesses millions in fines and legal fees. It is highly recommended that businesses adopt a software policy to help avoid any violations of software licensing.
I found great resources at Better Business Bureau.
http://www.bbb.org/us/article/computer-software-piracy-406
Software Piracy is extremely important to businesses because they can be held liable for a software copyright infringement whether or not they know their conduct violates federal law. According to bbb.org, criminal penalties include fines of as much as $250,000 and jail terms of up to 5 years. Software piracy costs the software industry over $10 Billion in lost revenue each year and costs U.S. businesses millions in fines and legal fees. It is highly recommended that businesses adopt a software policy to help avoid any violations of software licensing.
I found great resources at Better Business Bureau.
http://www.bbb.org/us/article/computer-software-piracy-406
Sunday, April 4, 2010
VoIP
I just have to start out by saying that
I ABSOLUTELY LOVE SKYPE. =)
This assignment was not my first experience with using VoIP; I often Skype my mom who lives in California. I believe this is such a great way to interact with your family and friends on a more personal level which makes you feel so close even though you can be 3000 miles away. Skype also allows you to make free calls over the internet to other people on Skype for as long as you like, to wherever you like. In this short clip, I’m chatting with my brother who lives in Key West.
http://www.screencast.com/t/MzFiZjczZ
My Avatar
When creating my Avatar, I used the site Face Your Manga. This was a really easy site that walked you through the whole process, picking out features, step by step. They even had an accessory step. Creating an Avatar is really cool because you can design it to resemble anyone. =) I love my Avatar because it looks like a cartoon character of myself.
Saturday, April 3, 2010
Project: Database
Having no prior experience with using Access, this project has taught me a lot. Watching the lectures and working through the project was the best method of learning Access for me. I learned how to create tables and queries, and connect them together using forms and reports. Also, I learned how to export and import data using excel to create new tables. I was having a hard time with the import activity at first, but once I figured it out, I absolutely love how you can tie in customer information to your business to keep you organized. One day, I hope to use my new skills I’ve learned when operating my own business.
If I could choose one way to enhance the functionality of this database, I would change the way to import data. After trying several times, I finally figured it out. After that, I definitely would simplify this process. Also, I found it difficult to create a report in the design view. IT’S WAYYY TOO CONFUSING!! And to create a report footnote; forget it. I enjoyed working in the layout view so you can see exactly what the report is going to look like.
If I could choose one way to enhance the functionality of this database, I would change the way to import data. After trying several times, I finally figured it out. After that, I definitely would simplify this process. Also, I found it difficult to create a report in the design view. IT’S WAYYY TOO CONFUSING!! And to create a report footnote; forget it. I enjoyed working in the layout view so you can see exactly what the report is going to look like.
Week 12: Muddy
This week, I felt like the lecture briefly toughed based on the UML (unified modeling language). The professor only explained a table, so I needed to research more on this subject to get a better understanding of what the UML actually is. I found Wikipedia.org to be the best reference and provide the best explanation.
http://en.wikipedia.org/wiki/Unified_Modeling_Language
The Unified Modeling Language (UML) is a standardize general-purpose modeling language in the field of software engineering. Basically, it creates a visual model for software intensive systems. It is used to specify, visualize, modify, construct and document the artifacts of an object-oriented system under development. Almost like, looking at blueprints.
http://en.wikipedia.org/wiki/Unified_Modeling_Language
The Unified Modeling Language (UML) is a standardize general-purpose modeling language in the field of software engineering. Basically, it creates a visual model for software intensive systems. It is used to specify, visualize, modify, construct and document the artifacts of an object-oriented system under development. Almost like, looking at blueprints.
Subscribe to:
Posts (Atom)