The Redundant Array of Inexpensive Disk, also known as RAID, is used to combine two or more physical drives into a single unit that acts like a large hard disk. This allows for the hard disks to work together thus providing faster speeds. There are three main types of RAID organizations, these are RAID0, RAID1, and RAID5.
RAID0 is also called stripped disk. It's when the data is spread over numerous disks that dramatically improves speeds constantly. However, if one of the disks fail then the data on all of the disk is lost and the system crashes. This is better known as redundancy. In RAID0 there isn't any mirroring or any parity. It is best for people who have temporary data and want to access it quickly.
RAID1 is also known as mirroring. Basically its two or more drives that are exact copies of each other in a 1:1 ratio. If one of the drives fails the system will still perform just as fast and there isn't any data loss. The only step needed to be done is to "re-mirror" the data to the replacement drive.
RAID5 requires three or more drives that all the data is spread across except for one. The last drive is used for parity. Parity is when the drive adds up the data bits of the others and records the sum, if odd as a 1 and 0 if even. The benefits of RAID5 is it's fast speeds and reliability. If a drive fails then there is no data loss but the speed is reduced. The IT then must replace the failed drive and allow the system to reconstruct the data on the new disk before another failure occurs.
The Business Environment
RAID systems are used all over in the business world. In fact, nearly every big corporation uses one. The most common is the RAID5 because it is the most reliable. The odds of more than one disk failing at the same time is astronomical. In addition, RAID1 is used a lot more in smaller corporations because of the speeds it offers. It's also much more reliable than RAID0. RAID0 is mostly used in video editing and companies like that because their data is temporary and they don't care about it as much.
Related Article
This site tells about all the different types of RAID systems and how they are used. It is very short and gets to the point so it's a good learning tool. It also distinguishes between the types of each and what types of companies use them.
Sunday, April 18, 2010
Thursday, April 15, 2010
Secure Email Project
TJX corporation is being sued by nearly 300 banks because it failed to secure their data correctly over the past 18 months. An unknown amount of people hacked into their system and exposed over 45.7 million credit and debit card holders. This is a serious identity fraud problem that could be well avoided if the company was more secure with their data. The banks have suffered tremendously from this incident and are demanded to be compensated. The suit is not only that the company wasn't secure enough but also that it lied on how it was handling the data. The PCI Data Security Standard (PCI DSS) even stated the other companies should study the security breach of TJX just to learn what not to do with customer data. More Information about the lawsuit can be found here.
Sunday, April 11, 2010
Week 13: Clear: Information Theft & Piracy
Information theft is when somebody steals another's personal information and uses it to their benefit. Some of the most common stolen information is financial data such as credit card numbers and passwords to accounts such as email and Ebay. This is a rising problem due to the capabilities of computers and their users. This information is most commonly stolen by viruses and hackers.
Software piracy is highly illegal and highly frowned upon. There are many laws that exist due to the abundance of software piracy. All software comes with a EULA that states somewhere in the document not to redistribute or copy without the approval from the creator. People who violate this are punished to the fullest extent of the law which is generally $250,000 and some jail time.
In order to avoid these things users must be very cautious. For instance, to protect yourself from information theft you want to install an anti-virus software and a firewall. This way hackers can't penetrate your system and steal your information. To be protected from piracy you can decide only to buy software from well respected sellers and avoid any website that is known for piracy. Basically, the only way to be protected of these things is to be smart about web surfing and using a computer.
The Business Environment
In the business world a company can get in huge trouble with software piracy and information theft. Specifically, a company can even get in trouble for getting it's own information stolen such as banks and lawyers. This can cause huge problems in the outside environment with this leaked information. I think the knowledge of software piracy and information theft is vital for companies because it could really hurt a company if they don't.
Related Link
This Link explains software piracy and how it is used. It also goes into detail how to protect yourself and others of piracy. It's definitely a good tool to use to learn about software piracy and theft.
Software piracy is highly illegal and highly frowned upon. There are many laws that exist due to the abundance of software piracy. All software comes with a EULA that states somewhere in the document not to redistribute or copy without the approval from the creator. People who violate this are punished to the fullest extent of the law which is generally $250,000 and some jail time.
In order to avoid these things users must be very cautious. For instance, to protect yourself from information theft you want to install an anti-virus software and a firewall. This way hackers can't penetrate your system and steal your information. To be protected from piracy you can decide only to buy software from well respected sellers and avoid any website that is known for piracy. Basically, the only way to be protected of these things is to be smart about web surfing and using a computer.
The Business Environment
In the business world a company can get in huge trouble with software piracy and information theft. Specifically, a company can even get in trouble for getting it's own information stolen such as banks and lawyers. This can cause huge problems in the outside environment with this leaked information. I think the knowledge of software piracy and information theft is vital for companies because it could really hurt a company if they don't.
Related Link
This Link explains software piracy and how it is used. It also goes into detail how to protect yourself and others of piracy. It's definitely a good tool to use to learn about software piracy and theft.
Sunday, April 4, 2010
Week 12: Clear: Microsoft Project
Microsoft Project is project management software created by Microsoft used for assisting project managers with developing plans, assigning resources, tracking progress, managing budgets, and analyzing workloads. The Application creates what are called critical path schedules. These critcal path schedules are mathematically based algrithms used for scheduling project activities. In addition, Microsoft Project can create schedules that are resource leveled and visualized in a Gantt chart. A Gantt chart is a chart that illustrates project schedules in a bar chart.
Microsoft Project was invented in 1984 for the Operating System DOS. It was created by a company working for Microsoft however, Microsoft bought the rights to the software in 1985. The company then released versions two, three, and four of the software the following year. The Version four of the software was the final release. A few years later in 1991 a version was released for Macintosh.
Microsoft Project uses assignment work and resource rates to create budgets. As the resources are assigned to the tasks and the amount of work is estimated, the programs calculates how to allocate the resources to the project. Resources can be people, equipment, and materials. The only problem with Project is that it can't determain how many finished products can be producted with a certain amount of raw material because it presumes that additional raw material is always available without limit.
The Business Environment
Microsoft Project is a very useful program in the Business World. It can allocate resources very cheaply and easily. Almost to the point to where a company wouldn't need an accountant. Second to Microsoft Access I believe Microsoft Project is the best tool a company can have.
Related Link
TopTenReviews tells the features of Microsoft Project and how it can be used. It also states that it's a very useful tool and costs around 450 dollars. I think this would be a quick way to understand the program and a pretty good learning tool also.
Wednesday, March 31, 2010
Database Project
Man, this was the hardest project yet. I had no idea what a database really was and what Microsoft Access really did. This opened my eyes to the Microsoft Office Suite that I own and how much it can do. I learned using Access how to import data and add to it with the ease of using a wizard. I also learned how to customize anything and everything on Access from the tables to the reports and forms. This was by far the most informative project yet.
The coolest thing I believe I did to this database was create the New Member Form. The New Member Form was really easy to make and had a lot of functionality to it. I think it's amazing that I can create a form with the information from the database and make it totally separate then use it to add new people. This made me realize how smart Access is and how easy it is to use for a business.
Sunday, March 28, 2010
Week 11: Clear: What is an Excel Database?
An Excel Database is a set of data that is organized so it can be accessed, retrieved and used over and over again. In the database you enter data, which is the unprocessed items such as text, numbers, images, audio, and video. You can use any input on your computer to enter the data. For instance a microphone to enter audio or your web cam to enter a video.
The information of a database is the data that is processed. This means that the data is organized, meaningful, and useful. This is how companies keep records and store information. When a database is created it can be shared with anyone. It even can have a password to protect it to make sure unwanted viewers can't see.
A database can calculate many functions for the user. However, the computer saying that justifies this is "garbage in, garbage out." This means that in order for the computer to produce the correct information, the data that was entered must be correct. This is why a lot of people have trouble with databases because they don't understand how to fully use them.
The Business Environment
Excel Databases are used everywhere in the business world. It's the main way companies store their important information. It would be extremely difficult for huge companies to operate without an Excel Database. Once fully learned, using an Excel Database is one of the most powerful tools a company can use.
Related Article
This Article explains what an Excel Database is and how to create one. It was really helpful in understanding the cloudy parts. I would recommend this site to a friend if they needed help with creating and using an Excel Database.
The information of a database is the data that is processed. This means that the data is organized, meaningful, and useful. This is how companies keep records and store information. When a database is created it can be shared with anyone. It even can have a password to protect it to make sure unwanted viewers can't see.
A database can calculate many functions for the user. However, the computer saying that justifies this is "garbage in, garbage out." This means that in order for the computer to produce the correct information, the data that was entered must be correct. This is why a lot of people have trouble with databases because they don't understand how to fully use them.
The Business Environment
Excel Databases are used everywhere in the business world. It's the main way companies store their important information. It would be extremely difficult for huge companies to operate without an Excel Database. Once fully learned, using an Excel Database is one of the most powerful tools a company can use.
Related Article
This Article explains what an Excel Database is and how to create one. It was really helpful in understanding the cloudy parts. I would recommend this site to a friend if they needed help with creating and using an Excel Database.
Sunday, March 21, 2010
Week 10: Clear: Differences Of client/server, peer-to-peer, and P2P networks
Client/Servers are basically as the name says, a client that connects to a server. Some examples are web browsers, email clients, and online chat clients. The Clients basically connect to the powerful server which sends them information so people can communicate on it. For instance, a common web browser would be Mozilla Firefox, a common email client would be Mozilla Thunderbird which is packaged with Firefox, and an example of an online chat client is Skype. All of these connect to a server which allows people to communicate with one another very easily.
A peer-to-peer network is when a computer connects directly to another computer over the internet to gather information from it. A typical peer-to-peer network doesn't have a client Some examples after FTP which is file transfer protocol and Limewire. These are generally the easiest to hack and are therefore, the most attack prone of all types of networks.
A p2p network is the abbreviation of the peer-to-peer network so it's the exact same thing. P2P networks are extremely popular and are often used for illegal purposes. For instance the most used networks are the limewire and bearshare network. These are commonly used for the illegal downloading of copyright material such as music and videos.
The Business Environment
These networks are vital for the business environment. The Client/Server networks are used for the company to communicate with the outer parts or to gather information from an external source. The peer-to-peer or p2p networks are used for the internal communication. If a boss wants to send a message to his/her employees he/she uses a p2p network to do so or an internal mail client. Without these businesses wouldn't be able to communicate at all.
Related Link
This link explains the similarities and the differences between peer-to-peer and client/server networks. It also describes the uses and which should be used with the goal desired. It was very helpful in understanding the cloudy parts of the subject.
A peer-to-peer network is when a computer connects directly to another computer over the internet to gather information from it. A typical peer-to-peer network doesn't have a client Some examples after FTP which is file transfer protocol and Limewire. These are generally the easiest to hack and are therefore, the most attack prone of all types of networks.
A p2p network is the abbreviation of the peer-to-peer network so it's the exact same thing. P2P networks are extremely popular and are often used for illegal purposes. For instance the most used networks are the limewire and bearshare network. These are commonly used for the illegal downloading of copyright material such as music and videos.
The Business Environment
These networks are vital for the business environment. The Client/Server networks are used for the company to communicate with the outer parts or to gather information from an external source. The peer-to-peer or p2p networks are used for the internal communication. If a boss wants to send a message to his/her employees he/she uses a p2p network to do so or an internal mail client. Without these businesses wouldn't be able to communicate at all.
Related Link
This link explains the similarities and the differences between peer-to-peer and client/server networks. It also describes the uses and which should be used with the goal desired. It was very helpful in understanding the cloudy parts of the subject.
Subscribe to:
Posts (Atom)