Thursday, November 25, 2010

Week 14: Muddy- Thin Client Computing

Until this weeks lectures, I was unaware of thin client computing. I didn't understand how it worked or why anyone would want to use it. But I know see how it can save time and money. But what is thin client computing you may be asking.

The easiest way to begin is to explain what "think client" computing is. Most of us use a think client within our homes and businesses. This is a regular PC or MAC computer with a powerful CPU, RAM, NIC, Storage, software, etc. I use these daily at work and home. Your laptop is also a think client. This may also be referred to as "fat" or "heavy" computing. Now that you understand the thick client, I believe it is much easier to understand what a thin client is. A thin client utilizes a central terminal. It has a modest CPU and RAM, but relies mostly on the centralized CPU and RAM. Processing and storage occurs elsewhere. For example, within an office environment everyone will have a screen and a keyboard as normal but the system does not rely on itself as a normal computer operates. All information is sent back to the central terminal.
So what advantages does this have?

  • More efficient use of resources
  • Initial setup maybe for expensive, but over the long run money is saved
  • If an individual thin client fails, nothing is lost
  • Hardware repairs much faster
  • Linked clones
  • Allocating hardware and storage as users need
I currently work for a logistics company that uses separate desktop computers for each person and a main server room. I have had my computer fail which left me without a computer for a day. Luckily I saved most of my information on the global drive so I was able to access my information on the new computer, but with the thin client system I would have avoided the down time. Each user has their own OS system and applications but they can be accessed on any thin client within this terminal. 

I believe the thick client computing will be obsolete in the future for businesses. The cost of replacing a desktop computing and upgrading every so ofter gets very expensive. ZDnet.com has a great article on the way of the thin client and how it is beneficial. Could thin clients possibly work on our homes as well? Technology has come such a long way that I would not doubt one day being able to access everything on a thin client at home as well. 

Sunday, November 21, 2010

Secure Email Project

When reviewing the requirements for this project, I didn't think it would be to difficult. But I had another thing coming! I complete my school work on a Macbook, so the steps were a bit different versus completing this on a PC. Everything was going smoothly until I had a download the certificate, which kept opening in Keychain Access. Needless to say, I have never worked in Keychain access and was unfamiliar with what this did. I finally realized that the certificate needed to be backed up through Firefox, but just had different steps than what was outlined for a PC.

I now understand why secure and encrypted emails are used within businesses. If you receive an email from an outside party with a digital certificate attached or it is encrypted, I would be much more trust worthy of that email.


After reading "Secure email today: extremely beneficial and incredibly convenient" located on Business Managements site, it seems that many businesses may  neglect to use secure email. After a survey was conducted in Germany only 27% of CEO's asked were encrypting their messages and only 36% were signing them. This article list multiple advantages for using encryption and signatures when emailing. 

  • Reason #1- Business Requirement- many businesses should require these steps due to so many emails being sent around with time constraints and important material. This will ensure the data is coming from an accurate source. 
  • Reason #2- Legal Requirements- There are some guidelines to using encryption's and signatures. Most businesses check to make sure they are within law. Some businesses even have procedures for sending emails to ensure the sender is accurate.
  • Reason #3- Customer Trust- If a customer sees the encryption and signature, they feel much safer. Many hackers are using phishing as a means to invade privacy. This will give customers trust and it is a less expensive reassurance. 
Technology is always evolving and businesses much keep up to ensure progress. There are many hackers out there shifting through the internet trying to get in and find personal information. These steps will help prevent that. 

Here is a screen shot of my Thunderbird account:



Week 13: Muddy- Protecting Our Internet Selves

Most of us have been affected my a computer virus. Unfortunately, my computer was not usable after it became infected and it was must easier getting a new computer. Before viewing this weeks lectures, I didn't give much thought to the possibility of getting another virus on my computer. I have a MAC for both my laptop and home computer and would like to think these are not susceptible to viruses, but I am wrong!

Many of us are daily users of Facebook, but do not think of the affects it could have on our computers and also our lives. We have Dell's at work and in my down time, I used to play Farmville. Shortly after my farm began to grow, my computer crashed. This followed on many others around the office, we soon realized that viruses were traveling to our computers through Farmville. Farmville has a statement out stating that they believe some trojans may have hidden behind their links and found their way into out computers, but it hasn't been proven.

We not only have to worry about computer viruses but other people invading our privacy and retrieving valuable information from us. Many people create fake facebooks to become friends with others only to access their information. This is referred to as "Information theft." Stanford has a good website explaining computer crimes and how it may affect you. PCMAG.com has a great slide show to demonstrate how to protect yourself on Facebook, such as:


  • Only accept friend request with people you know
  • Customize your profile view to friends only
  • Make sure your photos are "friends only"
  • Hide your information from Google and other search sites

All of this is outlined within the slideshow and show you how to change your Facebook. 

When I was a child, I ran around outside with friends getting dirty. Now this generation is growing up on computers and video games. We need to make sure we teach them how to protect their selves. There are many threats over the internet that they aren't aware of. We maybe more hesitant of online offers for free Ipods or friend request from unknown people but we must remember our children grew up with computers so they maybe more trusting. Childonlineprotection.net offers a great article on the dangers of the internet to a child and how to protect your own. 

Make sure you protect yourself and your family from online invasion! There are many helpful sites that offer tips. 


Sunday, November 14, 2010

Week 12: Clear- Communication in the Workplace

Through out this weeks lectures, we learned many ways to communicate within your work place. we learned about asynchronous communications and synchronous communications. I use both of these on a daily basis, such as email in which i must wait for the other person to respond. They may not be at their computer to respond right away, but if we were on an instant message chat, I know I will receive a response immediately. Please see below graph which examples both communications:


Email is helpful but when speaking with people right away we use "WebEx" within my company on a daily basis. This allows me to speak with people over the telephone and provide them with a link that will allow them to connect to my desktop. I can control what they see and explain everything in detail. I recently used this when showing new customers how to operate within our system. Unfortunately, there are some limitations of using this "webinar." We must make sure no one else within the company is using this the same time as only so many people are allowed within the program at on time.



Some other useful ways to communicate within the office is by sharing data. Within my department, we share a calendar to ensure not everyone takes the same day off at once. Also when you invite someone within the office to a meeting whether it is over the phone or in person, you are able to send them an email invite. They can accept or deny this invite. If it is accepted, someone else is able to view their calendar to see when they maybe available for another meeting or to make sure nothing overlaps. This is very convenient and eliminates wasting time by trying to schedule around everyone.

So take a look at what types of programs you are using at work and see what may benefit you by sharing calendars or easier communication methods. There is easy to access information available online that explains how to share this data with people within your office. Good luck!

Friday, November 12, 2010

Extra Credit- Second Life

I have not had any experience with Second Life and thought it would be a good experience online. I downloaded all of the files needed and began at Orientation Island. At first, I was very confused by what to do. I had to learn the controls and how to operate the character. I changed my appearance and learned different expressions and body languages. Right after my orientation, I jumped into things and soon learned that you needed money to buy things from the mall and other stores. It took me a while to find other people within Second Life. I made a few mistakes by teleporting to random places which ended up being peoples private homes. But I soon got the hang of it.

I have visited many places but some of my favorites are New York City, Off The Wall, and NCI Kuula. I made friends with many people that taught me how things work within Second Life. Janey explained things very well as not to look at this as a video game having to accomplish things but as every day life. She explained that you have the options to rent or own your land. Sometimes it can be easier to rent so you don't owe as much. Of course if you don't pay, you get evicted or lose your land. I found a neat spot to earn money. The longer I sat at the spot the more money I earned. People want you to visit their places. You can build island, homes, parks, or anything else. I met a few friends who were kind enough to give me money, tea, and clothing. Check out a few images from within Second Life of my character:



I was able to locate a dance club within NY and show them a few moves! I had alot of fun meeting new people and discussing what was going on around the world. I was very surprised to find out this world works much like the real world. You can find many friends within Second Life. I suggest you try it out! You don't have to be yourself. You can be anyone you want to be!!


Sunday, November 7, 2010

Week 11: Clear- Implementation of a New System

During this week, we learned about the in's and out's of an information system. There are numerous steps in creating an information system:

  1. Planning
  2. Analysis
  3. Design
  4. Implementation
  5. Operation, support, security
I never realized it took so much to develop a new system. But what I want to focus on is the implementation phase. Two years ago, my company, NYK Logistics, began implementing a new system. Our old system was outdated and unable to hold all of our information. I do not believe our company did the best job at implementing this change. All of the employees were aware of the change but were not told how to use the system. The system change was a direct change, which is the "just do it" sort of strategy. Since we have been in the new system, there are continuous changes and fixes. I have developed a good relationship with the IT team who is broken down into certain specifications of the system. There is an IT team for the LTL system, a team for developing new quote systems, and an IT team for the customer portal. I am sure there are many more out there as well! 

Since the implementation of the new system and with the continuous improvements, the new enhancements are tested out within our "BETA" system. Once it works within out BETA system, it is pushed through for process within the "real" system. So make sure to keep everyone in mind when converting to a new system because it will affect everyone. Remember these key factors:
  1. Develop New programs
  2. Install and Test
  3. Train
  4. Convert
Be sure to include everyone in making announcements about these changes such as the immediate supervisors, upper management and even the CEO. This will help the users adjust easier to the changes.

 

Saturday, November 6, 2010

Database Project: Access 2003

We have been reviewing Microsoft Access in class for the past few weeks and I find the database program very easy to navigate. Throughout the course of completing my project, I did hit a few snags but nothing that I couldn't over come. I have taken Access classes in the past so I remember much of the information. Unfortunately, I only have Apple's so I had to use my mothers computer which has Access 2003. I would say that the 2007 version is much improved!! When auto numbering my MemberID's. I found that when adding in a new form the auto numbers would randomly generate in large negative numbers. I was unable to figure out why it was doing this. It only did it for two forms but the others were correct! I can see why this knowledge would be beneficial within the work place. Access saves alot of time typing when you can just import tables you have already created. You can run reports, queries, or add more information. It is a great way to navigate through information.

I work for a logistics company and we recently converted to a new program to manage our information. The old program was created and used through Access. It was very advanced but we began losing information. We have millions of "loads" which had to be archived into another system. This was the largest limitation when using Access. Our new system works through the Internet, so we are able to have an unlimited amount of information. But over all, as I previously stated I believe Access is a great system with not to many faults. There is a great deal of information over the Internet and books available on how to navigate through Access 2007. Microsoft provides a great deal of helpful information online. Here are top ten reasons why Microsoft suggest using Access with Excel as well!












So take a risk and give Access a shot. And remember if you have the 2007 version available it is much improved compared to the 2003!