Sunday, November 28, 2010

Week 14:Clear/ Thin Client

A thin client is a software program or an actual computer that relies on another computer to do a great amount of its work. A thin client is mainly used to do one function, such as, surfing the Web or e-mails. It is simpler than a computer in that it does not contain everything a computer has. Thin computers have CPU, RAM, NIC, IO (screen, keyboard, mouse, and sound), but do not contain a hard drive. Many people choose a thin client over a normal computer because it is more efficient with the simple tasks that need to be accomplished. Also, using a thin client to complete the assignment will be less expensive for the user. I recommend thin clients to those who are not computer savvy because it will be easier to use since there are not as many functions and features.

Image taken from hp.com
Thin clients are important for small businesses. Small businesses may not have to spend a lot of money getting new computers for the office when they can just use thin clients to do specific tasks for the company. Thin clients still have a large amount of memory, storage, CPU power, and more efficient use of HW resources. The HW repairs faster and is less disruptive to the users. All these benefits will help the business run smoothly and efficiently.

http://www.wisegeek.com/what-is-a-thin-client.htm
The link above will take you to an article that explains more in depth about thin clients and if they are right for you!

Thursday, November 18, 2010

Week 13: Clear/Piracy

Piracy is a type of software theft where one copies and distributes copyright protected software. This can harm developers and consumers by having a higher risk for viruses. Even though it is frowned upon in the United States, it is very common over seas. For example in Vietnam it is almost encouraged to have piracy. There are stores that sell particular programs to fit ones budget. Programs can cost as low as half of what you would originally buy it for. Even though it may be illegal, many owners are warned as to when the police are coming to stores to check for unauthorized copied programs, coincidentally on those days the stores are closed. Some say its worth the risk to purchase these programs even though you are at a higher risk for catching viruses and worms. Below is the link to the article regarding piracy in Vietnam:  http://news.cnet.com/8301-17938_105-10122530-1.html

Image taken from findmysoft.com
Piracy is very concerning for businesses. It is very important for companies to not purchase programs that have been unauthorized to be copied because it is copyright protected software. Because these programs can cause worms and viruses, companies should stay away from them because they should not put their businesses in danger. If businesses catch a virus or worm on their systems they could cause major damage to the business. This damage could cause delays and loss of vital information for the company and client.

The link below takes you to an article that goes more in depth of what piracy is:
http://www.fastiis.org/our_services/enforcement/software_theft/

Wednesday, November 17, 2010

Project-Secure Email

In the case study, "The Need For Secure Email," Brad Blake, IT director at the Boston University School of Medicine, expressed the need for signed and encrypted e-mails. There is information that is private for the patients and doctors that should only be seen by those in that particular department. Without encryption any one can open this e-mail that contains sensitive information, such as your SSN. Blake looked for a program that would be compatible with portable devices, such as Blackberry, since most doctors communicate with the department using them. He found after research that Voltage Security SecureMail met all the needs for the hospital and different departments there. 
Below is the link to the case study:

Below is a screen capture of Thunderbird, with the signed e-mail:

Below is a screen capture of Thunderbird with the encrypted e-mail:



Sunday, November 14, 2010

Week 12: Clear/ VoIP

Image taken from baacs.com
Voice Over Internet Protocol (VoIP) is useful in many ways. VoIP lets one make voice calls using broadband Internet instead of a phone line. A person speaks into a microphone attached to you computer; your voice is then converted to compressed digital data stream; the data is transmitted across any IP network; data that is transmitted is received, converted into sound, then sent to audio output devices. Examples of VoIP are Skype and Vonage.

VoIP is used in many businesses today. It is a good way for National and International Companies to communicate, have business meetings, and present ideas. Some VoIP systems allow the use of video, such as Skype. Without this new technology many companies would not be as successful. They would not be able to expand their consumers or products across the globe.

The link below takes you to a Web site that answers questions and explains more about voice over internet protocol:

http://www.fcc.gov/voip/

Saturday, November 13, 2010

ISM Extra Credit- Second Life

Second Life is a way to escape from reality and the real world. I have never used Second Life prior to this extra credit assignment, but my experience with Second Life was good, although I probably will not keep up with it after this assignment. As I started my life in Second Life, I created my avatar to be gothic, his name is Snape Crescendo. He went to many destinations such as Welcome Island, Viviane Fashion Show, Caribbean Resort, Vamporium, and the September Rainforest. I explored each Island and talked to many people. It was very interesting to realize that you can buy houses, cars, and other things. Below is a screen shot of Snape Crescendo at September Rainforest.


Thursday, November 11, 2010

ISM Extra Credit- VoIP

VoIP is a way to call and see your friends and family all at once. This was not my first time using VoIP. I always use Skype, it is convenient and easy to use. I started to use Skype when I came to college to call my parents. My first time using Skype was good experience and I have continued to use it over the years, especially to call my friends from different schools. VoIP has become very popular, many of my professors have started to use Skype during office hours, to call students who are unable to come into their office. For this extra credit assignment I called my sister and her husband in Saint Petersburg.

http://www.screencast.com/users/sarahfaulkner/folders/Jing/media/58a66345-777a-43d5-97a2-9621ecf57b7a 

Saturday, November 6, 2010

Database project

I have not used Access before, so I learned new skills in each section of the database project.  I learned how to create a new table and how to add fields and field descriptions.  The process of importing data into the database was the most difficult part of this project for me.  This was because some of the field descriptions that I used did not match those in the data I was importing.  Also, date fields like birthdates and joined dates were input differently.  It took quite a while to get all of the data to match so the import would work correctly, but I finally learned how to do it. I also learned how to create a Select query, with the data ordered in ascending order.  I learned how to create a Form, add information to the form and set a field so that it is read-only, by using the Lock feature. Finally, I learned how to create a report, where the data is grouped and sorted, and how to add a footer to the report. 

Regarding enhancements to the database, I thought of several types of information that could be added.  I would think the manager of any business, like a gym, would like to see some financial information on a report.  For example, the report could show the annual or monthly amount each members pays, or whether any members are past due in their payments.  Since the report shows when certain members left, it could also show the reason why they left.  Finally, for the “Individual” members, the report could show if they are married or have children, so that the manager could sell to the family members. 

Tuesday, November 2, 2010

Week 11: Clear/ System Analyst

In order to be a system analyst one must love to write, communicate effectively, and listen well. System analysts create solutions for businesses to become more efficient and productive. They do research on a problem, plan and propose solutions, promote software and systems and coordinate problem solving processes. They also guarantee that the business standards and requirements are met.
Image taken from bplteensofwa.wordpress.com

A system analyst is very important for the business world. Since they are familiar with computer programming languages, operating systems, and computer hardware platforms, they translate a company's request into a technical specification. They solve problems for companies regarding their software system and help them run more efficiently. They also help write reports for these companies. 

The above link will take you to an article that explains all the components of system analyst's job.

This video will explain a day in the shoes of a system analyst.