My Blog
Sunday, November 28, 2010
Week 14 Muddy: Thin Client
Thin client computing is an alternative desktop model made possible through virtualization. Using a thin client replaces the traditional PC, reduces maintenance costs and increases management efficiency. It is a part of a larger virtual network consuming less energy and space. The following article details additional benefits of thin client computing.
http://www.wisegeek.com/what-is-a-thin-client.htm
Sunday, November 21, 2010
Secure Email
http://www.businesswire.com/news/home/20101117005101/en
Article:
Dell Encryption Solution Helps Organizations Protect Data and Comply with Government Regulations
“Public exposure of private and highly sensitive data continues to occur in organizations both large and small,” said Eric Ouellet, vice president, Secure Business Enablement, Gartner. “Managed endpoint encryption solutions that are flexible and adaptable to the demands of mobile users help minimize risks and are an important part of best practice frameworks.”
The Dell computer company recently implemented the Dell Data ProtectionEncryption to protect information on devices in case of loss or theft. The benefits of the encryption are :
•Easy deployment and integration into heterogeneous IT environments (Dell and non-Dell systems) with support for existing authentication and patching processes.
•Quick recovery of systems with errors by avoiding a multi-step, time-consuming process of decrypting, transporting data and re-encrypting.
•One solution to encrypt data on the disk, plus removable media such as USB thumb drives, external hard drives, eSata drives, 1394 devices, optical storage³ and Secure Digital (SD).
•Pre-set policy templates to provide an easy starting point for compliance management and maintenance.
Friday, November 19, 2010
Week 13 Clear: Computer Forensics
Computer forensics sometimes referred to as computer forensic science is defined by Wikipedia is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.
Computer forensics is used to discover digital evidence, documents, and "explain the current state of a digital artifact; such as a computer system, storage medium." The scope of a forensic analysis can be very broad or very detailed. Computer forensic scientist may be needed to retrieve documents or very simple information or reconstruct a series of events. As computer use increases exponentially, the need for experts in this field is growing. There are abundant opportunities for predators, computer criminals or hacker to take advantage of uneducated or unaware computer users.
Additional Resources:
Advantages - Article: http://www.computerforensics1.com/computer-forensic-advantage.html
Computer Forensics @ Work -Video: http://www.youtube.com/watch?v=--ZHo0Z2mgY
Sunday, November 14, 2010
Week 12: Muddy
Bandwidth can be defined as the electronic pathway that connects your computer to the internet. If you think of it in terms of a traffic lane, the wider the bandwidth the more internet traffic can travel to your computer and at faster speeds. The number one thing to remember is the more bandwidth you have, the faster your computer connection.
The following link provides additional details about bandwidth.
http://www.wisegeek.com/what-is-internet-bandwidth.htm
VoIP Extra Credit
What a pleasant surprise! My sister has lived all over the country for the past few years and I've never used skype. My best friend's husband is in the military and told me how much she loved it but trying it out never interested me. My favorite thing about this class has been stepping out of my comfort zone and trying new things. Technology is useful and fun.
Skype is wonderful. I'm glad that the basic service is free. It is user friendly and if one overlooks the ocasional service interuptions due to faulty internet connections, it can be a useful personally and professionally. I definately see my self continuing my use to communicate with me sister who recently moved from Florida to New Hampshire. I'm excited! I currently work for a small nonprofit and I can see our staff of four using skype for informal meetings when we shift from having a physical location to home offices.
For this extra credit project I recorded a chat with my sister in New Hampshire. The Jing application stopped working a couple of times but I think I finally recorded a segment of our conversation successfully. I had the most trouble attaching the video to my blog. I tried so many different options because the blogger site said it kept having trouble uploading my video.
file:///C:/Users/Jasmine/Desktop/Lane_Jasmine_Skype_Extra_Credit.swf
http://portal.sliderocket.com/AILKL/Skype
My Web Face!
I absolutely LOVED this activity! I've never tried or even thought about trying to create an avatar. This was a really cool activity. I didn't know what to expect. I clicked one of the links from the list provided and it took me to another list of avatar applications. I randomly chose mywebface.com. It turned out to be pretty simple to navigate. I enjoyed the process of choosing intricate details like hair, eyebrows, facial blemishes and such. I was trying to create a cartoon version of myself that was as close to reality as possible. I struggled with accomplishing this goal because none of the options for body type and facial shape were exactly right but in the end, I made an avatar I was very pleased with.
Sunday, November 7, 2010
Week 11: Managing Change -Muddy
Winston Churchill
Change Management involves implementing individual and/or organizational change while reducing turnover, accelerating the implementation, reducing productivity loss, reducing employee resistance and ensuring change is flowing smoothly in the right direction. The article reading highlighted two perspectives on change management: the managers' perspective and the employee's perspective.
The managers’ perspective on change is results oriented.
When can the change be completed?
How much improvement will be realized?
How will this change impact our financial performance?
What is the required investment?
How will this change impact our customers?
"I need results"
Employee perspective:
Lack the broader context or knowledge base of why the change is being made.
They also do not share the same accountability as managers.
"What will this change mean to me?"
Change management is a way to manage the possible risk of employees resisting the change, valued personnel leaving the organization, delaying critical projects, declining productivity and making customer or clients feel negative impacts of the change.
The best way to get the most value from change management is to address it at the beginning not after the organizational changes have already started. It will be the most effective way to implement a business change and have both managers and employees work together successfully.
The goal of change management is to implement these business changes quickly to:
minimize the impact on productivity
avoid unnecessary turnover or loss of valued employees
eliminate any adverse impact on your customers
achieve the desired business outcomes as soon as possible
http://www.change-management.com/change-management-overview.htm
Additional resources:
http://http//www.tech-faq.com/change-management.html