Sunday, November 28, 2010
Week 14 Muddy: Thin Client
Thin client computing is an alternative desktop model made possible through virtualization. Using a thin client replaces the traditional PC, reduces maintenance costs and increases management efficiency. It is a part of a larger virtual network consuming less energy and space. The following article details additional benefits of thin client computing.
http://www.wisegeek.com/what-is-a-thin-client.htm
Sunday, November 21, 2010
Secure Email
http://www.businesswire.com/news/home/20101117005101/en
Article:
Dell Encryption Solution Helps Organizations Protect Data and Comply with Government Regulations
“Public exposure of private and highly sensitive data continues to occur in organizations both large and small,” said Eric Ouellet, vice president, Secure Business Enablement, Gartner. “Managed endpoint encryption solutions that are flexible and adaptable to the demands of mobile users help minimize risks and are an important part of best practice frameworks.”
The Dell computer company recently implemented the Dell Data ProtectionEncryption to protect information on devices in case of loss or theft. The benefits of the encryption are :
•Easy deployment and integration into heterogeneous IT environments (Dell and non-Dell systems) with support for existing authentication and patching processes.
•Quick recovery of systems with errors by avoiding a multi-step, time-consuming process of decrypting, transporting data and re-encrypting.
•One solution to encrypt data on the disk, plus removable media such as USB thumb drives, external hard drives, eSata drives, 1394 devices, optical storage³ and Secure Digital (SD).
•Pre-set policy templates to provide an easy starting point for compliance management and maintenance.
Friday, November 19, 2010
Week 13 Clear: Computer Forensics
Computer forensics sometimes referred to as computer forensic science is defined by Wikipedia is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.
Computer forensics is used to discover digital evidence, documents, and "explain the current state of a digital artifact; such as a computer system, storage medium." The scope of a forensic analysis can be very broad or very detailed. Computer forensic scientist may be needed to retrieve documents or very simple information or reconstruct a series of events. As computer use increases exponentially, the need for experts in this field is growing. There are abundant opportunities for predators, computer criminals or hacker to take advantage of uneducated or unaware computer users.
Additional Resources:
Advantages - Article: http://www.computerforensics1.com/computer-forensic-advantage.html
Computer Forensics @ Work -Video: http://www.youtube.com/watch?v=--ZHo0Z2mgY
Sunday, November 14, 2010
Week 12: Muddy
Bandwidth can be defined as the electronic pathway that connects your computer to the internet. If you think of it in terms of a traffic lane, the wider the bandwidth the more internet traffic can travel to your computer and at faster speeds. The number one thing to remember is the more bandwidth you have, the faster your computer connection.
The following link provides additional details about bandwidth.
http://www.wisegeek.com/what-is-internet-bandwidth.htm
VoIP Extra Credit
What a pleasant surprise! My sister has lived all over the country for the past few years and I've never used skype. My best friend's husband is in the military and told me how much she loved it but trying it out never interested me. My favorite thing about this class has been stepping out of my comfort zone and trying new things. Technology is useful and fun.
Skype is wonderful. I'm glad that the basic service is free. It is user friendly and if one overlooks the ocasional service interuptions due to faulty internet connections, it can be a useful personally and professionally. I definately see my self continuing my use to communicate with me sister who recently moved from Florida to New Hampshire. I'm excited! I currently work for a small nonprofit and I can see our staff of four using skype for informal meetings when we shift from having a physical location to home offices.
For this extra credit project I recorded a chat with my sister in New Hampshire. The Jing application stopped working a couple of times but I think I finally recorded a segment of our conversation successfully. I had the most trouble attaching the video to my blog. I tried so many different options because the blogger site said it kept having trouble uploading my video.
file:///C:/Users/Jasmine/Desktop/Lane_Jasmine_Skype_Extra_Credit.swf
http://portal.sliderocket.com/AILKL/Skype
My Web Face!
I absolutely LOVED this activity! I've never tried or even thought about trying to create an avatar. This was a really cool activity. I didn't know what to expect. I clicked one of the links from the list provided and it took me to another list of avatar applications. I randomly chose mywebface.com. It turned out to be pretty simple to navigate. I enjoyed the process of choosing intricate details like hair, eyebrows, facial blemishes and such. I was trying to create a cartoon version of myself that was as close to reality as possible. I struggled with accomplishing this goal because none of the options for body type and facial shape were exactly right but in the end, I made an avatar I was very pleased with.
Sunday, November 7, 2010
Week 11: Managing Change -Muddy
Winston Churchill
Change Management involves implementing individual and/or organizational change while reducing turnover, accelerating the implementation, reducing productivity loss, reducing employee resistance and ensuring change is flowing smoothly in the right direction. The article reading highlighted two perspectives on change management: the managers' perspective and the employee's perspective.
The managers’ perspective on change is results oriented.
When can the change be completed?
How much improvement will be realized?
How will this change impact our financial performance?
What is the required investment?
How will this change impact our customers?
"I need results"
Employee perspective:
Lack the broader context or knowledge base of why the change is being made.
They also do not share the same accountability as managers.
"What will this change mean to me?"
Change management is a way to manage the possible risk of employees resisting the change, valued personnel leaving the organization, delaying critical projects, declining productivity and making customer or clients feel negative impacts of the change.
The best way to get the most value from change management is to address it at the beginning not after the organizational changes have already started. It will be the most effective way to implement a business change and have both managers and employees work together successfully.
The goal of change management is to implement these business changes quickly to:
minimize the impact on productivity
avoid unnecessary turnover or loss of valued employees
eliminate any adverse impact on your customers
achieve the desired business outcomes as soon as possible
http://www.change-management.com/change-management-overview.htm
Additional resources:
http://http//www.tech-faq.com/change-management.html
Week 10: Databases - Clear
information from O'Reily Media
SQL is a special-purpose language used to define, access, and manipulate data. SQL is nonprocedural, meaning that it describes the necessary components (i.e., tables) and desired results without dictating exactly how those results should be computed. Every SQL implementation sits atop a database engine, whose job it is to interpret SQL statements and determine how the various data structures in the database should be accessed to accurately and efficiently produce the desired outcome.
The SQL language includes two distinct sets of commands: Data Definition Language (DDL) is the subset of SQL used to define and modify various data structures, while Data Manipulation Language (DML) is the subset of SQL used to access and manipulate data contained within the data structures previously defined via DDL. DDL includes numerous commands for handling such tasks as creating tables, indexes, views, and constraints, while DML is comprised of just five statements:
INSERT
Adds data to a database.
UPDATE
Modifies data in a database.
DELETE
Removes data from a database.
MERGE
Adds and/or modifies data in a database. MERGE is part of the 2003 ANSI SQL standard.
SELECT
Retrieves data from a database.
http://www.devshed.com/c/a/Oracle/Introduction-to-SQL/
Microsoft Access Project
The next step was the most challenging for me, creating a query. Selecting the data and using the design view made things simple but I struggled with the criteria for the accurate dates. Somehow I deleted information on my "members" table. This was frustrating and made it difficult to move forward with the project without starting completely over.
Everything the began to come together and kinda sort of became a little fun despite the tedium. I enjoyed creating the form and the report. This experience has taught me that if I want to apply this knowledge to my current job, I will have to a lot plenty of time (and patience) to complete different tasks until I become extremely proficient. The results of using a database are beneficial to anyone.
Additional ways to enhance the functionality of this database would be to create membership applications with the gym logos on the forms or attach member photos to their membership information.