Saturday, April 17, 2010

Secure E-mail Project

Thunderbird





Secure E-Mail Articles
        An extensive article about what it means to secure your e-mail, why it's important and how to set it up can be found here at stopdesign.com. This article begins with explaining what it means to secure your e-mail: protecting passwords, log-in information and the contents of your e-mail messages which are "flying" around in open air when using an open-network Internet connection. The article explains how simple it is for someone also on the network to obtain tons of sensitive information from your computer; without even a hint of warning, someone may be checking your e-mail right along with you on your work lunch break at Panera or Starbucks. This not only puts the individual's personal data at risk, but it also offers up the user's company information-by unknowingly providing unsecured access to your work e-mail, passwords and files by simply logging onto an open network without a secure system in place, you are putting your company in extreme danger of exposure of private information.
       Major networks, such as those a high-volume business conferences, often have the lowest security possible security settings, meaning corporate information is more vulnerable than ever as each employee logs on. E-mail not is not sent through a secure device is available for "sniffers" to read plain and clear in simple, non scrambled, unencrypted text. So what's the answer? Secure your e-mail! Companies should set up secure e-mail accounts for their employees on a private network. Passwords should be used to access the network and the e-mail client at all times, and security settings should be set high. Since there is no way to tell if your data has been read and "stolen" already, these measures should be put into place immediately, so stop any further leakage of important company data.


Here is an article on Tech Suberb that explains a step-by-step method to how and why secure e-mail set up is necessary.

Options for secure e-mail providers article on Life Hacker 

  • An important fact: "Hint: you can tell a web site connection is "secure" if the address isn't just http://, it's https://. The "s" isnt' for savings, it's for secure. Good idea to double-check for the "s" on any page where you enter credit card info to purchase stuff, too."

Week 14: Muddy

Virtualization

  • The abstraction of computer resources 
  • A technique for running multiple "virtual computers" on a single physical host computer system
  • Made up of CPU, memory, storage, NIC but no hard drive
  • "The creation of a virtual-rather than actual-version of something, such as an operating system, a server, a storage device or network resources" (searchservervirtualization.com)
  • "Virtualization can be viewed as part of an overall trend in enterprise IT that includes autonomic computing, a scenario in which the IT environment will be able to manage itself based on perceived activity and utility computing, in which computer processing power is seen as a utility that clients can pay for only as needed. The usual goal of virtualization is to centralize administrative tasks while improving scalability and workloads," says searchservervirtualization.com.
Together, these explanations create a clearer picture for me to visualize this process. 

Main benefits of virtualization include:
  • Shared resources
  • Ability to run independently of other machines, so if one crashes it doesn't affect the other
  • Generic devices mean easy migration and repaid deployment 
  • Multiple machines in 1 box mean power and space savings
  • Ability to run multiple operating systems, for example, Mac OSX and Windows Vista on the same machine.
  • Increased technical support
  • Machine portability
  • Security and ability to restore prior settings with patching and backups
  • Consolidation of machines, utilizing maximum efficiency 
  • Reduced hardware, server room, energy and power costs
  • Faster turnaround and fewer errors
  • Testing capabilities
  • Redundancy 
  • Disaster recover with "the cloud" data is easily duplicated to a remote site
  • Scaling and speed
So what does it mean to have virtualization technology? This article details its applications further and what the concept means for smaller businesses in particular. 

Below is a diagram of the different forms of virtualization management
(netforce.ie)


Wednesday, April 7, 2010

Herman Miller Creative Presentation

Creative class presentation of portfolio work on Herman Miller's new environmentally friendly Aeron chair. I created the presentation using Prezie and though it was a little strange at first, I ended up loving it. The presentation includes the brief, 1 print ad, 1 outdoor, 1 viral and 1 mock-up microsite. This is part of my final portfolio for Copy and Visualization (ADV4101). Enjoy! I'm sorry in advance if you experience motion sickness. 

Click the arrow to start, then hover over over the "more" button and click "auto play" 

 

 

Sunday, April 4, 2010

Week 12: Clear

Change Management
"The effective management of a business change such that executive leaders, managers and front line employees work in concert to successfully implement the needed process, technology or organizational changes."

Two Perspectives of Change Management:

1. Managers Perspective: A results-oriented change in company strategy via senior level executives or business leaders. These individuals weigh the pros and cons of these changes , specifically the return on investment of the change in comparison to alternative strategic initiatives.

2. Front-line Employees Perspective: Day-to-day, operations-focused employees with such duties as serving customers, processing orders, and doing whatever it takes to get the job done on the floor. These individuals are more concerned with the personal issues they will face daily as a result of the change-a major factor that could result in a "dangerous mix of different priorities."

Click here to learn more about Change Management.

Database Project

Microsoft Access

During the process of completing this database project in Microsoft Access I learned a lot. Creating tables was probably the activity I was most acclimated to since I have experience in programs like Excel. Figuring out how to correctly import the data, however, was a bit of a trial-and-error type of experience. I ended up getting it right the third time around. I learned how to create a query from that imported data which was, in my opinion, the most useful of activities. I then learned how to create forms and reports which included a lot of specific property editing, but that taught me how to effectively organize and present information. Overall, I learned that I would never choose to use this confusing database and I hope that this was my first and only time having to.

(geekpedia.com)
I struggled with this database even though I watched the lectures, read the textbook chapter, watched outside tutorials and used the searchable help tool. Microsoft Access would benefit from creating a more intuitive application. Even through using the help tool I felt like I was really on my own trying to figure out the next step. It could streamline tasks by making items less separated-I was very confused and thought I had to somehow "merge" the tables, queries, forms and reports into one database, like I would with different PDF files. By using the same verbiage, this database would seem less complicated. For example, when I was trying to make the MemberID field not editable in the form, I could only find the "allow edit" option for forms in their entirety, instead of for just the MemberID field. I had to do multiple searches and trials until I realized that "disabling" that field would make it read-only. There is no reason why this field shouldn't have the same options as the form, at least for the exact same tasks. Microsoft Access should learn more about its users and predict what they might like to do next.

Sunday, March 28, 2010

Week 11: Clear

Web Databases 
Although they might not know it, members of my generation probably spend the majority of their time on the Internet using Web databases. "One of the more profound features of the Web is the vast amount of information it provides," explains Shelly Vermaat in the course textbook, Discovering Computers 2009. These bits of information include:

  • Jobs
  • Travel Destinations
  • TV programming
  • Pictures 
  • Movies
  • Videos
  • Local and Nationwide Weather
  • Sporting Events
  • Legislative Information
  • E-commerce 
  • Financial
  • And so much more...
All of this information exists on the Web in databases.  But not only do users access these bits of information through Web databases-they also provide information to Web databases via "E-forms." Many Web sites request personal data from users (name, address, telephone number, preferences, certain behaviors or opinions, etc.) for the database to store and use in the future on things like customer-brand communication, advertising or promotions. 

The main type of Web database that users my age probably use the most are collaborative databases. These databases are used to store and share personal media items like photos, videos or recordings between registered users. The Web page of these databases act as the "front end" which users are able to clearly interact with. Examples of collaborative databases:
Click here to learn how to create a Web database using Microsoft Access 2010. 

Saturday, March 20, 2010

Excel Project

Excel Project 
As an Excel beginner, I took the time to watch and take notes on the lecture videos as well as watch tutorial and how-to videos on the Web. I referenced Excel's help option when I was confused about a step, and was able to work through it using the program's own tools. The task to organize a spreadsheet of data concerning a 20 minute workout interval for 500 people was lengthy but worthy. The information was arranged by subject gender, age, heart rate, target hear rate, highest heart rate and time outputs for each minute. 

I learned how to create, replicate and work with formulas by creating new columns of data interpretation. Simple formulas like summations and finding maximums were easy to apply, while the logic test formulas were a bit more challenging, but even more useful. In working directly with formulas, I was able to realize their relevance as an effective tool.

Pivot tables were used to separate and further delve into specific portions of the raw data. They were difficult to understand at first, and I had a hard time figuring out how to tell it where I wanted the information to be derived from, but once I did, everything came together. They organized my information neatly and could calculate practically anything imaginable. Though Excel isn't the simplest program to learn over night, it is definitely crucial in the business world to keep data neat, organized and to save time and money. 

Below is a screen capture of one of the pivot tables I created to show the average increase in heart rate among females and males, displayed in ages grouped by decade. 






Friday, March 19, 2010

Week 10: Muddy

Bandwidth 
Defined in the lecture as "the amount of data that can be transmitted through a given communications channel in a given period of time," I was a bit confused about what bandwidth actually was. Though I am familiar with the term and how it is used, conceptualizing how it works in the broader realm of things proved to be a challenge for me. 

Bandwidth is further defined as:

"A data transmission rate; the maximum amount of information (bits/second) that can be transmitted along a channel." (wordnetweb.princeton.edu/perl/webwn)

"The amount of spectrum available to each communications licensee." (www.cetconnect.org/TElevision/Digital_Glossary.aspx)

"The total range of frequency required to pass a specific, modulated signal without distortion or loss of data."  (chesapeake.towson.edu/glossary.asp)

"How much information you can send through a connection. The capacity of a connection usually measured in bits per second." (www.chicowebdesign.com/common-terms.php)

These definitions further explain the concept of bandwidth in and easier, more understandable way when they're put side by side. 


So now that the concept of bandwidth is more clear, how is this useful information for you?
Bandwidth relates to the incoming and outgoing amount of data exchanged through a particular computer or network of computers. More data exchange means a slower network and thus, requires larger bandwidth as to not "clog up" the connection. To give you a sense of how much bandwidth is needed for different tasks, while an e-mail may take up about 2kb, streaming a movie may take about 2.5gb of bandwidth-an extreme difference (wisegeek.com). So, depending on what your computer is used for, you may need more bandwidth to properly fulfill these tasks. 

Different types of bandwidth include:

Narrow Band: An Internet connection speed that is most commonly associated with dial-up and uses phone lines and transmitting over voice-grade frequencies. Its highest effective speed the connection can provide is about 56k, or, 56,000 bits per second (http://www.wisegeek.com/what-is-narrowband.htm). 

Broadband: "Even the slowest broadband speeds are usually 5 times faster than narrow band," states wisegeek.com. The FCC defines broadband as a high-speed Internet access, with data transmission speeds reaching 200kbps per second or higher either downstream or upstream. So why is it so much better than dialup?
  • Allows more information and content to be transmitted through the pipeline
  • Provides access to the highest quality Internet services like VOIP, media streaming, gaming and interactive services. 
  • Full-range accessibility to opportunities on the Internet.
  • Broadband is always on and does not disturb any phone lines or require any reconnection.
  • Faster transmission which means great efficiency and time saved.
Click here to learn more about broadband 

It is important to be familiar with bandwidth and the different types especially as items are being accomplished more and more online. Knowing the right connection capability for your purpose is crucial in getting a task done quickly and efficiently.  

Sunday, March 7, 2010

Week 9: Clear

Excel


Excel is an extensive program that allows users to effectively organize, manipulate, interpret and display different types of data. Excel 2007 has the capacity to hold 1 million rows and 16,000 columns of information that can be individually or collectively calculated, put into tables, organized as charts or visuals and so much more. This program is widely used in the business world and is a very useful tool to learn in order to become a hirable prospect upon college graduation. A basic foundation of the program is required for many internships and careers in todays world, here is an overview of some key features.


Functions like conditional formatting, relative and absolute referencing, and sorting and filtering are some of the most used functions of the program, thus, they are some of the most important tools to know.


Conditional Formatting: "Conditional formatting allows you to select one or more cells, and create rules for when and how those cells are formatted. You can control the cell font, fill colour and border setting, based on the selected cell's contents, or based on the contents of another cell. If the rules (conditions) that you specified are met, then the formatting is applied."

Relative Reference: "Each cell on an Excel Worksheet has it’s own unique address, e. g. A1 is the relative address of the first cell on all Worksheets, while IV65536 is the relative address of the last cell on all Worksheets. The reason why they are called relative is because they are relative to the cell they are used in."

Absolute Reference: "A reference to a cell that does not change no matter where it is copied," as denoted with a "$" sign in the formula bar.


Sorting: Used to make information easier to read, "it's easy to sort your data by using the Sort buttons on the toolbar. But, be careful, or one column may be sorted, while others are not."


Filtering:"Sets the rules for the data that should remain visible after the filter is applied. You can use one criterion, or several."

Click
here for some "Quick Tips" when using Excel spreadsheets

Visit the
Microsoft Web site to learn more about Excel 2007, watch tutorials, seek help and purchase the program for yourself.

Sunday, February 21, 2010

Week 7: Clear

GUI vs. Command Line

Command Line Interfaces are of little use to the general public but they are essential for server administrators and programmers. All web servers operate using command line interfaces and most scripts are written that way. One common Command Line Language is “BASH”. You can find a glossary of BASH terms that can help you navigate and operate in a command line based environment, here.

A GUI (Graphical User Interface) like Windows or OS X Leopard makes it easy for laymen to operate computers but it adds a layer between the user and the machine. These programming environments help the developer translate things from “point and click” to machine language. However, the convenience of GUI means additional resources like CPU power and Memory have to be put towards translating from the graphical environment to machine languages. This is why many times Command Line Operations will be processed quicker than those executed via GUI.

Most modern businesses host websites on web servers that respond to command line languages. Fixing critical issues and troubleshooting website failures can be accomplished quickly in command line interfaces. Many businesses employ server administrators who have to be well versed in command line languages or purchase their hosting from companies that employ them.

Saturday, February 13, 2010

Week 6: Clear

Computer Hardware: Scanners
"Hardware" is an umbrella term for all the different parts and processes that make up computer systems. One ordinary device presented new and relevant information to me as somewhat of a "casual" computer user.

What I found to be most interesting were the different types of scanners and their uses, including some that may surprise you.

Document Scanner: a basic device that most users are comfortable with using to input images from paper documents, printed photos, photo negatives and more.
  • Flatbed with optional document feeder. Also known as "desktop scanner," is fast, efficient, able to scan multiple items automatically without pause in between, self-feeds. Highest resolution without interpolation that can be achieved is ~5,000 dpi and with interpolation, can reach 11,000 dpi (International Paper Knowledge Center)
  • Handheld . Compact, travel-size, one sheet scanning at a time, easy upkeep. Also known as "half-page scanners," are mostly useful for small photo scanning as they can only scan about 2-5 inches at a time. Least expensive type of scanner (International Paper)
Film Scanner: aka "slide scanners", Film scanners are small desktop scanners used to scan 35mm film and slides. Some of film/slide scanners include an APS (Advanced Photo System) film adapter for use with the APS film format.
  • Slides usually are higher quality than prints or digital formats and produce a higher quality scan. Slides are brighter than prints and have a higher dynamic range. Many slide scanners have (native) resolutions in the 5,000-6,000 ppi range and can be very expensive to purchase (International Paper).
  • Automatically corrects old film defects and errors.
Bar Code Scanner: used for data input exported from scanner to the PC then to an inventory database. Also known as a "bar code reader," it reads printed bar codes used to manage and track items, like in retail businesses (Topbits)
  • Fixed position: used by distributors and manufacturers
  • Handheld: used by cashiers and clerks at checkout counters
  • Stationary: mounted scanner used by stores with self-checkouts
  • Technology used in bar code scanners: video cameras, laser scanners, LED scanners (Topbits).
RFID Reader: Radio Frequency Identification is proximity-based (no need for direct contact) and is more costly per item scanned than bar codes.
  • Used for SunPass, library materials and Disney World parades
  • To learn more about RFID, visit the RFID Journal-an entire Web publication on the topic including technology news, features, and expert discussion.
Drum Scanner: one not discussed in class, also known as a "rotary scanner," scans thin, flexible images that are mounted on a rotating drum. They are very large and offer high-quality scans, with a 12,000 dpi without interpolation. They're also very expensive, ranging from $25,000-several hundred thousand dollars (International Paper).

Now you're an expert at scanners and should be able to choose the correct scanner for any type of use!

Monday, February 8, 2010

Web 2.0 Project: Advertising Story

I decided to do my Web 2.0 storyboard project about how I got to where I am today as an advertising student. I used VoiceThread.com to construct a slideshow of images I own as well as creative commons media found on the Internet. I then used the record option to voiceover to tell my story-a touch I found a bit more personal than type. This was a great learning experience. I experimented with lots of the storyboard and presentation tools and I think it will be very useful when I'm looking to present an idea in a creative way. The business world is so used to dull PowerPoint presentations, but these tools are a great departure from presenting static material-they allow users to interact with the information and their audience.

I have embedded the thread below, so you can watch it here on my blog and comment in the blog post comments below just as you would any other blog post. This is the preferred method so the story doesn't get confusing with user comments on it.

The link to my VoiceThread presentation is http://voicethread.com/share/900136/ but please use my blog comment section to display feedback! Enjoy.


Interaction Discussion-Glad visitors also agree that using my voice for audio storytelling was a good move. It definitely took way longer to do it this way, but good to see that the few that have commented think it's a special touch.

Sunday, February 7, 2010

Week 5: Clear

http://www.gearsofwarrealm.com/wp-content/uploads/2006/11/XFPS%20360+keyboard+mouse.jpg




Typing & Pointing

This week was all about the little things that we may take for granted in our everyday computer lives-hardware. Each piece of hardware has its own special function that helps users easily perform tasks on the computer.


Standard Hardware Setup: the basic computer hardware tools that most are familiar with already.

QWERTY Keyboard: The standard typewriter keyboard; the keys for Q, W, E, R, T, Y are the first six from the left on the top row of letter keys. (dictionary.com)
  • Find out more about the invention of the QWERTY keyboard and find out how it got its name here.

Mouse: A palm-sized, button-operated device that can be slid over a desktop to move the cursor on a CRT to any position. (dictionary.com)
  • Check out this article to make the right decision about which mouse is right for you.

Interface: Equipment or programs designed to communicate information from one system of computing devices or programs to another. (dictionary.com)
  • Read more about PS2 connectors
  • Take a look at these fun USB gadgets


Enhanced Pointing Options:
-Multi-button mouse
-Trackball
-Touchpad
-Touchscreen

Saturday, January 30, 2010

Week 4: Muddy

Audio File Formats
As someone more familiar with image and video file formats, I had difficulty understanding the appropriate use for each file type that was simply listed. Taking matters into my own hands, I researched and discovered the importance of becoming familiar with audio formats in the business world. Especially in my field of study, advertising, being comfortable with audio files is crucial in creating items like radio spots or as an interactive element for a client's Web site. The following formats are the ones discussed in the class lecture, and will be explained further based on my outside research in my attempt to understand audio files.
  • WAV (Waveform Audio File Format): As one of the most common, WAV is a standard digital audio file format for storing waveform data. It allows audio recordings to be saved with different sampling rates and bitrates great for maintaining CD quality audio.
-Common on Windows-based systems
-Programs that open .wav files: iTunes, Roxio Toast, Windows Media Player
  • AIFF (Audio Interchangeable File Format): With average popularity among file formats, it provides CD-quality audio stored in a non-compressed, lossless format similar to the .wav format.
-Typically used to burn audio CDs
-Programs that open .aiff files: Quicktime Player, Roxio Creator, Windows Media Player, iTunes
  • WMA (Windows Media Audio): This very common file type is a proprietary format developed my Microsoft is similar to MP3 and can be converted into other formats.
-Commonly used to play music from the Web
-It's video counterpart, WMV is used to view Windows Media Video files
-Programs that open .wma files: Windows Media Player, Apple Quicktime, Web browsers, Nullsoft Winamp Media Player
  • MP3 (MPEG-1 Audio Layer 3): Another very common audio file format, the MP3 uses "layer 3" audio compression, and the quality depends on the bitrate used for compression, the higher the better.
-Used to store music files and audiobooks on hard drives
-Supported by most portable music players like the iPod, Zune and Kindle
-Programs that open .mpeg files: iTunes, VideoLAN/VLC media player, WMP
  • AAC (Advanced Audio Coding): This very common audio file is similar to MP3 but offers improvements like higher coding efficiency, an easier filterbank, and better handling of high frequencies.
-Maintains quality nearly indistinguishable from the original audio source
-Used as the default encoding used by Apple iTunes software
-Programs that use .aac file format: iTunes, MPlayer, WMP, KSP Sound Player
  • Apple Lossless: a.k.a "ALE", is an audio codec developed by Apple for lossless data comprehension of digital music.
-An audio converter is needed to extract audio from ALE files
-Does not utilize any Digital Rights management scheme.
  • FLAC: Free Losless Audio Codec is similar to the MP3 file format, but it is lossless, meaning the audio file is compressed without any loss of quality (very important!).
-Regurded as the fastest and most widely supported lossless audio codec, the only one that is non-proprietary (meaning it's independent and thus benefits by more freedom). [http://flac.sourceforge.net/]

Hopefully this description has helped you to understand the basics of each audio file format, if not:

Visit http://www.fileinfo.com/filetypes/audio for an even more detailed analysis.

And for a similar informational listing of video file formats, click here.
For image files, click here.

Friday, January 22, 2010

Week 3: Clear

$ E-Commerce $

Short for "electronic commerce", e-commerce is a business transaction that occurs over an electronic network such as the Internet. It describes all business transactions that happen over the computer, on the Internet. E-commerce is a rapidly growing, convenient way to shop, trade, buy and sell without having to leave your home or office.

There are 3 different types of e-commerce, depending on who the buyer and seller are:
1. Business-to-Consumer: (B2C) Is the sale of goods and services to the general public.
Example: Wal-mart
2. Consumer-to-Consumer: (C2C) Is when consumers purchase directly from other consumers.
-Online auctions are a very common vehicle for C2C transactions, where a customer bids on an item being sold by another customer.
Example: eBay
3. Business-to-Business: (B2B) The most popular means of e-commerce occurs between two businesses.
-Business often sell their services, like online advertising, recruiting or market research, to other businesses.
Example: HRmarketer


But what would e-commerce be without the ability to take it with you?

$M-Commerce$

M-commerce, or "mobile commerce", is the e-commerce counterpart for use on mobile devices. An article written by Matt Bishop in the E-Commerce Times gives an interesting and educational view on the topic of m-commerce in today's society:
"As the number, power and flexibility of mobile devices has increased, so has their use for shopping. In 2008, a Nielsen survey found that 9 million people in the United States "have used their mobile phone to pay for goods or services," and many more expect to do so soon. In a 2009 survey by Deloitte, 45 percent of respondents said they would use their mobile phone to research prices, and 25 percent said they would use their phone to make purchases."

New technologies are going underway to expand m-commerce among consumers, as mobile purchase ability brings forth immense business retail opportunity. Companies like Amazon and Overstock.com have created free i-Phone applications where users can search, browse, compare, buy, track orders, etc. all on your mobile phone. Now all we need is the technology to teleport the items we buy to eliminate shipping costs.
Amazon.com i-Phone App

Saturday, January 16, 2010

Week 2: Clear

Advantages and Disadvantages of Using Computers
For most of us, computers have become an essential tool that we involve in our everyday lives. Whether it be at work, school, home, or pretty much anywhere in the public domain, we experience the pros and cons of computer use in the context of ourselves as individuals. But what about the broader spectrum of the good and the bad as it has effected society as a whole?

Advantages of Using Computers:
1. Speed
  • Many computers process billions or trillions of operations in a single second, allowing users to quickly enter, retrieve, edit, save and store information at the click of a button. For example, think about how long it would take for you to calculate 9,453,362 x 8,736,110 in your head or on paper. When using a computer, it only takes as long as it takes you to type the numbers in.
2. Reliability
  • Science has come a long way in terms of making these machines dependable and reliable. They rarely break or fail which means a far less chance of error compared to that of human error. This is a crucial benefit of a computer because, for example, a large company in the business world simple can't afford a miscalculation of numbers or sales, or a misplaced file.
3. Consistency
  • Given the same input and processes, a modern computer will produce the same, consistent results time after time. The accuracy of a computer's output depends on the accuracy of the input. Computers are very complex. It is important that they remain consistent across the board so that we can learn how to use them and continually use them properly and with the results we want.
4. Storage
  • Computers have the ability to transfer data quickly from storage to memory, process it, and then store it again for future use. The huge amounts of data they are capable of immediately storing and retrieving are mind-boggling. Plus, they beat the heck out of file cabinets.
5. Communications
  • The most recent development of the computer's advantages allows them to communicate with each other and share any of the four information processing cycle operations (input, process, output and storage) with another computer or user. The limits of this benefit seem endless; instant communication with friends via e-mail, search on the Web, sharing files with clients, and the list goes on.
  • The computer's ability to communicate with other computers has brought us to where we are today in this technological world of sharing and interacting with information on the Internet, a concept broadly known as "Web 2.0". Web 2.0 is the new way that we, as users, literally create, interact with collaborate and are, overall, highly involved in Web content.
  • This video provides an interesting look at Web 2.0 and the questions it proposes in terms of usage, ownership, and the spread of information. Each one of the advantages of computer use has aided in the birth of Web 2.0.
Disadvantages of Using Computers:
1. Violation of Privacy
  • Tons of user information is entered into computers everyday-and not just personal computers. Credit card companies, health care facilities, banks, you name it, can all obtain and save information about you. Identity theft and theft of personal information or records are just some of the pitfalls of recording information electronically. Be careful which Web sites you trust with personal information like your address or forms of payment. Password-protect your computer as a general precaution.
2. Public Safety
  • Sharing information on the Internet can be as dangerous as it is fun and helpful. Keep in mind that when you use sites like Facebook, Twitter and Blogger, it's not just your friends that can access your profiles, posts, photos, statuses and videos. The Web is filled with strangers. Check out the FBI's online social-networking tips to make sure you protect yourself and your business from harmful situations.
3. Impact on Labor Force
  • While improving productivity in more ways than imaginable, creating lots of jobs and entirely new industries, the skills of millions of employees have been replaced by computers. Outsourcing has been made possible by computers, thus creating a more efficient work environment for the business world, but leaving tons of Americans jobless. Education is important in this ever-evolving, scientific world we live in, and above all, if you have a great educational foundation, you'll be more likely to produce work that cannot be replaced with a machine.
4. Health Risks
  • People are spending more and more time on their computers now more than ever. We can even take our computers with us, leaving users with virtually every opportunity to use them. Physical injuries can occur from overuse of the computer, and mental disorders, like computer addiction, can occur.
5. Impact on Environment
  • "Going Green" is an ongoing trend amongst American society today. Computer manufacturing processes and computer waste are depleting natural resources and polluting the environment. They release toxic materials when put into landfills and contain high levels of harmful chemicals. Companies are rapidly encouraging recycling of computers and computer parts, and some are even offering to dispose of your old computer (properly) when you buy a new one from them.
Here are two graphs that represent some other types of advantages and disadvantages users worry about found on the Clearinghouse on Early Education and Parenting site:

Advantages:










Disadvantages:












The advantages and disadvantages of computer use are extremely important and have shaped the way we use and interact with computers in the business world. To be a productive computer-user, you must know the limits of your machine and be aware of what it can and cannot provide. Armed with this knowledge, users can go on to use computers efficiently, safely and properly in business and in personal life.

Saturday, January 9, 2010

Week 1: Clear

Information Search

The World Wide Web is the largest, and in my opinion, most culturally relevant source of information that there is. Because of its ongoing mass-accumulation of content, it's important that we, as users, have some understanding of how it is organized and the appropriate ways to operate within it.

Two main tools that help us navigate the web are:
1. Search Engines: Web sites or software that search the Internet for documents that contain a key word, phrase or subject that is specified by the user to the search engine. Each engine has its own method of searching for information. (dictionary.com)
Examples: Google, Yahoo, Ask
2. Subject Directories: Smaller, more selective, searching Web sites than search engines.
Examples: About, Yahoo
The defining difference between the two navigational tools are that search engines use "bots" to collect information and links to build their databases while subject directories use humans to sort out and find information, thus making them much smaller but also useful.

Expand your knowledge: Learn how to efficiently search for what you're looking for on Google using the cheat sheet. It's useful to use more than one search engine when you're looking for something specific, since they usually provide unique results. As you can see in the chart below, Google holds the majority of search engine market share (most used) for 2009 with Yahoo coming in a not-so-close second.



(chart by: http://farm4.static.flickr.com/3283/3309147191_8505368d21.jpg)

It's critical to be as efficient as possible when searching for something on the Web since it is so vast. Without search engines the World Wide Web would be a mass of confusion of links that would soon be undoubtedly rendered useless.


Netiquette

Acting appropriately while online, otherwise known as "netiquette", is the golden rule of the Internet. It can be assumed that my generation already knows most of the basic rules of netiquette (writing in all caps=shouting, read before you send, etc.), but as we are approaching graduation, hence the "job search", this site on business netiquette will prove to be very helpful. Upon entering the corporate world, you are expected to act professionally and conduct yourself in an acceptable manner-including while online.