Sunday, November 28, 2010

Week 14: Muddy

During week 14 we were introduced to enterprise computing.

Upon completion of this section we were suppose to be able to succesfully:
  • Discuss advanced storage technologies that are increasingly used to solve the storage problems faced by larger organizations.
  • Explain the concept of virtualization and discuss the potential benefits to either an individual or an organization.
  • Discuss the concept of thin client computing.
All of the above concepts were very new to me. I had to go beyond the lecture and reading to really grasp a true understanding of the material.

I decided to research the concept that was most muddy to me in this section.

According to the lecture, virtualization is is a technique for running multiple “virtual computers” on a single physical host computer system.  

To be more clear, "server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. The server administrator uses a software application to divide one physical server into multiple isolated virtual environments. The virtual environments are sometimes called virtual private servers, but they are also known as guests, instances, containers or emulations."

This video clearly and explicitly explains to concept of virtualization. What is virtualization?

Sunday, November 21, 2010

Secure E-mail

Wells Fargo

Above is the link from the article that I read about businesses that have used secure e-mail or other security measures to protect their data.

In this article Wells Fargo & Company tried to utilize a new way to efficiently and safely exchange confidential information with its business customers. A vice president in the bank's wholesale banking group articulated that she wanted a secure e-mail system that was user friendly and not too cumbersome. She explained that certificates were
always required for secure e-mail and not all users were tech savvy. Wells Fargo looked at three email encryption products and chose Voltage Security's SecureMail, which ended up being the most user friendly system for both employees and customers. Accoring to Well Fargo's Wholesale Architecture & CEO-Mobile application development team, SecureMail has saved time and money in mailing confidential customer documents via an express mail service.

Monday, November 15, 2010

Week 13: Clear

During week 13 we discussed computer security, ethics and privacy.


After completion of this topic, I was able to:
  • Identify computer security risks.
  • Identify ways to protect computers and data.
  • Discuss information theft and piracy as well as how to identify and avoid them.
  • Be aware of ethical standards and practices.
  • Understand how to protect information.
The information provided this week was straight forward and left no room for confusion. In researching outside information and news articles for this topic, I came a cross an article about anti-virus software scams.

Anti-virus software scams are putting millions of people at risk by posing as legitimate anti-virus software when in actuality fraudsters are advertising malicious software, known as ‘scareware’, in disguise.

The goal of these fraudsters is to obtain the victims credit card information or compromise their computer for other illegal activity, such as identity fraud.

To read the article in entirety, visit this link:  Anti-virus software scams put millions at risk of identity fraud


Here are some sure ways of protecting yourself from computer viruses:

1. Never open a file attachment sent to you from an unknown source. In most cases, the safest thing to do is delete them as soon as you see them in your mailbox.

2. Understand that patches and updates for programs are rarely distributed by email. (Microsoft and other reputable companies use other means, which are more secure.)

3. Never open a file unless you know what it is. If you've received it from someone you know, ask him or her about it. (They may have a virus infection that is mailing out copies of itself without their knowledge.)

4. Files containing virus content are always sent disguised in some way. For example, the message may say a screensaver, bill or invoice is attached.

5. Users of Outlook and Outlook Express should disable the Preview Pane. A recent virus was thought (but not proven) to infect simply by being displayed in Outlook Express. It is be safer to avoid any risk!

Friday, November 12, 2010

Extra Credit: Avatar

For my extra credit for creating an avatar, I used doppelme.com

The site was very simple and easy to use! All the tools provided allowed me to have fun with the customization of my funky avatar.

I was able to customize my avatar by changing the hair, eye color and outfit.

I loved that doppelme gave me the option of putting my avatar in my signature, web page, blog etc.

Thursday, November 11, 2010

Week 12: Clear

In class this week, we had an introduction into computer communications and the components required for successful communications.

After completing the lesson we should have been able to do the following:


  • Discuss the components required for successful communications
  • Identify various sending and receiving devices
  • Describe uses of computer communications
  • List advantages of using a network
  • Differentiate among client/server, peer-to-peer, and P2P networks
  • Describe the various network communications standards
  • Explain the purpose of communications software
  • Describe various types of lines for communications over the telephone network
  • Describe commonly used communications devices
  • Discuss different ways to set up a home network
  • Identify various physical and wireless transmission media 
This weeks information was neither unclear nor complex.  I will explain one of the concepts that I understood very well.

Setting up a home network might seem daunting or intimidating. But in reality the concept actually sounds worst than it is.


Once you know what type of network you want and have the necessary hardware, there are four possible steps to take (two of these are not always required):
  1. Install any necessary hardware.
  2. Set up an Internet connection (optional).
  3. Connect the computers.
  4. Run the Set Up a Wireless Router or Access Point wizard (wireless only).
Start by setting up one computer. Once you set up the network and you are sure that the first computer is working correctly, you can add additional computers or devices.

Thursday, November 4, 2010

Microsoft Access Project

Before doing this project I was very intimated of database programs. However, after tackling and fighting and overcoming much frustration, I started to understand some of the concepts and features that Microsoft Access had to offer. I think what I learned from using Access is how to successfully make a form. Microsoft Access forms provide a quick and easy way to modify and insert records into your databases.

I think the one thing that this database should do to increase its functionality is to provide some sort of help box for users. There were several times when I had a question and I had to turn to Google for help in finding the answer. I don't think that Access is overly user friendly. When it comes to databases if you don't have some type of computer science capacity then these programs can prove to be somewhat challenging. If Microsoft were to implement a user friendly interface with a help box then things would become a lot easier for users. 

Week 11: Muddy

During week 11 we were introduced to information systems development.

Being that I am not a very computer savvy person at all, this section proved to be challenging for me. It was difficult for me to fully grasp the simple concepts that we were expected to understand by the end of the section.

The objectives of this section included:
  • List the phases in the system development cycle
  • Discuss the importance of project management
  • Explain the activities performed in each phase of the system development cycle
  • Describe different tools and processes used in each step of the system development cycle
  • Discuss the importance of change management
  • Describe different techniques for converting to a new system
  • Explain the role of the system analyst
  • Describe a project management application, Microsoft Project
I thought that it would be beneficial for me to do some outside research to see if I could find a easier way of understanding the material. The concept that I wanted to fully understand was the system development cycle.

After I did my outside research, I found that the system development cycle was simply a conceptual model used in project management that describes the stages involved in an information system development project from an initial feasibility study through maintenance of the completed application.


The stages include:
1. Planning
2. Analysis
3. Design
4. Implementation
5. Operation, Support and Security


After finally grasping this information, I was able to understand that the purpose of system analysis is to:
- Determine needs
-Solve problems
- Define requirements
-Work around roadblocks

Wednesday, October 27, 2010

Week 10: Muddy

During week 10 of this course we learned about Database Management. After completing this topic we should have been able to do the following:

  • Define what a database is
  • Describe different users of information
  • Identify the qualities of valuable information
  • Discuss the terms character, fields, key fields, data types, records, files and tables
  • Identify file maintenance techniques and how they are different than databases
  • Describe the most common types of databases
  • Describe the fundamental concepts of the relational database model
  • Understand the hierarchy within relational databases
  • Describe the Microsoft Access relational database management system and its components
  • Create tables, import data, create queries, forms and reports using MS Access
  • Explain how to interact with web databases
  • Describe basic database design guidelines
After completing the required readings and watching the lectures and doing the access scavenger hunt, the concept of database management was still quite unclear to me.

After doing some outside research, I found that according to webopedia.com database management is simply a collection of programs that enables you to store, modify, and extract information from a database.

There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on maniframes. The following are examples of database applications:

  • computerized library systems


    • automated teller machines

  • flight reservation systems


    • computerized parts inventory systems
    As I went through the lectues, I had a hard time remembering/understanding what a query was. Webopeda.com gave a great breakdown of this concept: it stated that
    queries were requests for information from a database, which is a stylized question.

    For example, the query: SELECT ALL WHERE NAME = "SMITH" AND AGE > 35 requests all rescords in which the NAME field is SMITH and the AGE field is greater than 35.

    Doing outside research on this topic has really helped me to clearly understand the concepts presented in this section.

    Saturday, October 23, 2010

    Web Presentation 2.0

    In staying with the guide lines provided by the rubric for critiquing our presentations, I believe that I met all the requirements that were asked of the professor.

    I had a logical flow of content in my presentation. I went in sequential order in explaining the points of my presentation.

    For all my headings, I phrased the title in somewhat of a question. So, I anticipated what my listener was thinking.

    I attempted to grab the readers attention in the first couple slides of the presentation, by providing an interesting and engaging topic with supporting information in each slide.

    I avoided invalid claims and double checked my work for errors and unbelievable claims.  I also avoided clutter by keeping slides simple and clear.

    To ensure readability, I kept the words on the slide to a minimum and did more talking in each slide explaining my point clearly and effectively.

    I first showed the information and then began to go over the information verbally to my audience.

    By critiquing my peer's presentation before completing my own gave me a better idea of what was expected from me on this project. I liked looking at my classmates work and using the rubric to analyze their presentation. This process allowed me to have a better understanding when completing my own work.

    Upon completion of this project, I learned how to effectively use PowerPoint to my advantage. I had no idea that I could create slides and then add a narration to the slide. This is a very effective way to present an idea in the business world. Especially, with the rise in technology; you never know if a future employer will request a PowerPoint from you via E-mail. If that is ever the case, I know now how to add a narration to make my point explicitly clear.


    A link to my Presentation: Web Presentation 2.0

    Wednesday, October 20, 2010

    Week 9: Clear

    This weeks lesson was about the Internet and the Worldwide Web, how it works and what can be done with it.

    According the lectures, the Internet is a world-wide network of networks connecting businesses, government agencies, educational institutions and individuals.

    There are two main ways to connect to the Internet. The methods of connecting to the internet include: Dial-up access (which I remember using in elementary school on my Toshiba desktop computer) and High-speed/Broadband access.

    To get internet you must go through something known as access providers. According the the lecture, and access provider is a business that provides individuals and businesses with access to the Internet for a fee.

    Moving on to the Web. The lecture states that the Web is where you search for and use information. Individuals can also share and view media files on the Web.

    The Internet has grown significantly since it began more than 30 years ago. It is now used in a wide variety of ways and provides individuals with endless opportunities to browse and connect with people from around the world.

    Below is a great video giving numbers and statistics of the state of the Internet:

    The State of the Internet

    Thursday, October 7, 2010

    Week 7: Clear

    This week we learned about presentations. After completing the necessary reading and presentations we were suppose to succesfully be able to do the following:
    • identify elements of effective presentations in a multiple-choice quiz
    • recall principles of storyboarding, visualizing information, layout principles and making presentation ideas stick in a multiple-choice quiz
    • select an appropriate topic for presentation based on a given set of criteria
    • practice and apply correct principles of developing effective presentations
    • critique your own presentation and peer presentations based on a set of given criteria for effective presentations
    As a public relations student, it is very important to understand the concepts of effective presenting. In doing research to explain the concepts behind great presentations, I came across this video: Effective Presentation.

    It highlights the ways in which a someone should go about giving a great presentation and getting others to clearly and efectively understand their concepts.

    Sometime's it can be scary or even intimidating for some people to do presentations, but it takes time to practice this craft and become a great presenter of a concept. Nothing happends overnight. Practice and patience are the key elements to mastering this craft.

    Week 6: Muddy

    This week was about all things multimedia; including audio, images and video.

    After completing this section, we were suppose to be able to succesfully do the following:
  • Explain how image, audio and video data are represented on a computer system

  • Explain the difference between a standard video and a screencast and identify appropriate usage scenarios for each

  • Describe the difference between lossy vs lossless multimedia compression as applied to image, audio and video data; select the appropriate type of encryption in particular usage scenarios

  • Identify the most frequently used file types for each of the above types of multimedia data - type of multimedia data stored, and the key attributes of that storage type

  • Explain how to create new image, audio or video content

  • However, I was still muddy on audio files. In doing research, I found some information on audio files that made things a little clearer. I found that the Audio Files category includes compressed and uncompressed audio formats, which contain waveform data that can be played with audio playback software. This category also includes MIDI files, musical scores, and audio project files, which typically do not contain audio data.

    I think that this information is useful to know and will help anyone in their quest to have a greater understanding of audio files.

    Friday, October 1, 2010

    Excel Project

    While working on the Microsoft Excel project for this class, I started to slowing but surely understand a lot of the concepts that were once foreign to me that I spoke about in my previous blog post.

    After completing the project, I am now capable of doing the following things on my own:
    • Understand and navigate the three dimensions of an Excel workbook
    • Enter, edit and format data
    • Format and print worksheets
    • Use arithmetic operators to create formulas
    • Use absolute and relative cell references appropriately
    • Use selected general-purpose functions fluently
    • Find and learn to use more advanced/specialized functions when needed
    • Create and use pivot tables
    • Use built in help to improve Excel skills
    While doing the project, I realized how efficient Excel could actually be. I think the best thing that came out of this project was me learning how to use the pivot tables. It was truly amazing to me how Excel could automatically sift through a large amount of data and make sense of it all after a couple of clicks.  I was very proud of myself once I figured out how to create target heart rate percentages and target rates achieved. Two weeks ago, I would have never been able to tell you how to convert raw data in averages or percentages, but now I am able to do it with just a click on my mouse.

    Avg Increase
    The one thing that I continue to struggle with, however, is learning how to manipulate Excel 2007 on my Mac computer. After watching the lectures, I noticed that the professor used a Microsoft computer. In the beginning it was quite difficult to figure out how to apply the same concepts on my personal computer. But after figuring out how to use the wizzard, I was able to do the exact same thing.

    Thursday, September 23, 2010

    Week 5: Muddy

    This week's lesson was all about Excel. To begin, I would like to say that my personal journey with Excel has not been a easy one. My journey begins in high school when I first learned the basics of Excel in my computer class.

    My computer teacher did not spend much time on Excel and sped up the process. Because of this, I never learned the basics of Excel. I then built up an aggression towards it and always set myself up for failure. However, I am more willing now to catch up on what I missed in high school and become an Excel pro.

    In doing research for this blog, I found that excel really isn't as "muddy" as I thought it was. Commonly known, Excel is a spreadsheet application written and distributed by Microsoft. The application features calculation, graphing tools and pivot tables. 


    I also researched and found that there are several tutorials out there for individuals like me who need Microsoft Excel tutorials. This link provides you with the basics to get started with Excel. Excel Tutorial.

    The muddiest past of Excel for me was the differentiating between relative and absolute cell references.

    Relative cell reference is the most widely used type of cell reference in formulas.  Relative cell references are basic cell references that adjust and change when copied or when using AutoFill.
    Example:
    =SUM(B5:B8), as shown below, changes to =SUM(C5:C8) when copied across to the next cell.

      
    Situations arise in which the cell reference must remain the same when copied or when using AutoFill. This is when absolute cell reference comes into play. Dollar signs are used to hold a column and/or row reference constant. 
     
    Example:
    In the example below, when calculating commissions for sales staff, you would not want cell B10 to change when copying the formula down.  You want both the column and the row to remain the same to refer to that exact cell.  By using $B$10 in the formula, neither changes when copied.



    After researching these concepts more in depth they slowly but surely became more clear for me.

    (Examples taken from this link)

    Saturday, September 18, 2010

    Week4:Muddy

    After doing all the required reading on applications, I came across a concept that was still unclear to me at the end of the chapter.

    In the objectives at the beginning of the chapter, it stated that upon completion of this section, I should be able to explain what a EULA is and how it works. In doing research on my own, I found a clear and concise definition of what EULA means.

    "Short for End-User License Agreement, the type of license used for most software. An EULA is a legal contract between the manufacturer and/or the author and the end user of an application. The EULA details how the software can and cannot be used and any restrictions that the manufacturer imposes."
    In doing research, I also learned that, as in typical legal contracts, the EULA protects both parties from liability if the software is used in a way not intended by the manufacturer or author.

    I also found that it is extremely critical that consumers read the End-User License Agreement before just clicking through it and agreeing with what is stated.

    Take a look at this article "Do you own that software?" It drives home the point of EULA's.

    Friday, September 10, 2010

    Week 3: Clear



    USB Flash drive


    The one part of the storage lecture that I understood clearly was the USB flash drives. I have been using a USB for storage since high school. In doing more research on USB’s I read that they were first launched almost ten years ago.


    USB flash drives have essentially revolutionized the way we transfer files in-between computers. What I like most about flash drives is the speed. The fastest flash drive currently on the market is a USB 2.0. This flash drive is able to reach speeds of up to 34 and 28 megabytes per second respectively. A faster flash drive means less time waiting to transfer flies.


    Currently everyone in the flash drive world is really looking forward to the USB 3.0. The manufacture Super Talent has already released three USB drives that takes advantage of the new faster interface.


    According to an article by the Web site “everything USB,” another big development with flash drives is how hardware encryption is becoming more of a commodity than a luxury.


    I love using USB’s. They are small, convenient and easy to use. I love that it’s the market for USB’s is expanding and becoming more accessible for everyone to use.

    Watch this video about the new USB flash drive

    Thursday, September 2, 2010

    Week 2: Muddy

     

    After doing the required reading for week two and watching the assigned lectures, I was very confused on a lot of the concepts.

    To begin with, I am not a very technology savvy individual. So, all the specific terms and concepts were difficult for me to understand. Upon completion of the lecture, we should have been able to explain the differences between application and system software, identify a particular program as either application or system software, provide a high-level explanation of the function of an operating system, understand the difference between the operatig system itself and system utilities.

    However, I was still not able to successfully achieve all these objectives; mainly understanding system software. So, to grasp a better understanding of the concept I researhed the term and came across this definition:

    System software refers to the files and programs that make up your computer's operating system. System files include libraries of functions, system services, drivers for printers and other hardware, system preferences, and other configuration files. The programs that are part of the system software include assemblers, compilers, file management tools, system utilities.
     
     As I now understand it, software is essentially a set of instructions that tells your computer what to do.
    Like the lecture said, without software your computer is just an expensive collection of electronic parts

    Monday, August 23, 2010

    Week 1: Clear

    After reading the required sections for the first week of class one concept was very clear to me. 

    The concept of netiquette was something foreign to me, but after I read the section on E-learning I became very familiar with the concept. 

    Essentially, netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. 

    It is often times seen as the Golden Rule of the Internet. As the reading stated on E-learning, with millions of people on the Internet at any given time, it is critical for individuals to "play nice." 

    Some of the netiquette rules and guidelines include:
    • Don't use all capital letters--it is seen as shouting
    • Be conservative in what you send and liberal in what you receive. You should not send heated messages
    • Use smileys to indicate tone of voice, but use them sparingly. :-) is an example of a smiley  
    • If you know the answer to a question being asked, answer it
    • Always check your facts before sending an e-mail of message

    Netiquette is important in the business environment because to be effective communicators we must strive to work proficiently with others, and we can only do so by developing and maintaining a certain level of trust and credibility with our online presence. 

    In searching Google for a web page that explains the concept of netiquette clearly and effectively I came across this site ( Netiquette .) 

    The site has a video that uses simple terms and entertainment to really drive home the concept of what netiquette really is.

    It provides useful tips on what you should and should not do on the Web to have a positive, strong presence.