Sunday, November 28, 2010

Week 14: Muddy/Virtualization

This week I chose to write about virtualization, because while listening to the lectures, I thought it was a very interesting concept, but I didn't quite understand it.  However, after researching many websites, I feel like I have a better grasp on the subject. 

The technical definition of virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device, or network resources.  It can be viewed as part of an overall trend in enterprise IT that includes autonomic computing, a scenario in which the IT environment will be able to manage itself based on perceived activity, and utility computing, in which computer processing power is seen as a utility that clients can pay for only as needed.  Most often the goal of virtualization is to centralize administrative tasks while improving scalability and work loads.

Some other advantages to virtualization include server consolidation, reduced power and cooling, green computing, and high availability and disaster recovery.  While virtualization technology is most popular in the server world, virtualization technology is also being used in data storage such as Storage Area Networks, and inside of operating systems such as Windows Server 2008 with Hyper-V.

Websites Cited:  http://www.virtualizationtechnology.com/
                          http://en.wikipedia.org/wiki/Virtualization

Sunday, November 21, 2010

Secure Email Project









I think that using secure email to ensure the safety and privacy of certain information is very important, especially in this day and age of rampant identity theft.  As thieves are finding new ways to steal citizen's identities, we in turn need to find new ways to protect ourselves from this.  Secure email is a great way.  That being said, I think that the government, specifically the IRS, especially needs to make sure that all information sent back and forth to them is encrypted and secure.  I found an IRS website, which talks about how data passed to private collection agencies must be encrypted.  The article states "The new F&PC System will serve as an inventory management system to assign, exchange, monitor, control and update delinquent taxpayer accounts between the IRS Authoritative Data Source (ADS) and the Private Collection Agencies with whom IRS will contract."  In reference to secure email, it says "The new system will assign and deliver delinquent taxpayer account data to PCAs (using secure email for Release 1.1 and Registered User Portal (RUP) for subsequent releases) and provide tax account updates on a daily and weekly basis."  The article also gives a list of the necessary data elements that will be sent to PCAs via secure encrypted email. 

As I said before, I think that the IRS is one "business" that certainly needs to make sure that all information sent is secure.  If there is a break in this system, or if information is sent that is not secure, then the IRS runs the risk of exploiting citizen's personal information for anyone who knows what they're doing to intercept and view.

Website Cited:  http://www.irs.gov/privacy/article/0,,id=140507,00.html

Tuesday, November 16, 2010

Week 13: Clear/Backdoors






Essentially what first got me interested in the concept of backdoors in computer programs was a novel I read called "Digital Fortress," by Dan Brown.  The book is about a team of codebreakers that work for the government, and their main job is to intercept codes from other countries, as well as domestic terrorist groups, to try and monitor their activities.  The book mentions the concept of backdoors several times.  I was immediately intrigued by this topic, because I had never heard of it before.  The book did a great job of teaching and explaining what backdoors are, and how they are written, while incorporating fictional characters and a plot as well.

The definition of a backdoor in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.  The backdoor may take the form of an installed program, or may subvert the system through a rootkit.  Once perpetrators gain access to unsecure computers, they often install a backdoor or modify an existing program to include a backdoor, which allows them to continue to access the computer remotely without the user's knowledge.  Malicious programs that open backdoors can be found in emails, ad banners, web sites, and downloads.  Trojan horses are a popular method of opening backdoors. 

There are programs that spend 24 hours a day surfing the web in search of unprotected and unknown backdoors.  They run around "pinging" IP's until they find one that sends back a signal indicating that access can be granted.  A program such as CallerIP scans all the ports (where your modem or cable or telephone is plugged in) on your system and alerts you to any malicious backdoors that can provide unauthorized access to your computer.

Websites Cited:  http://www.fraudaid.com/security_products/articles_information/what_is_a_backdoor.htm
                          http://en.wikipedia.org/wiki/Backdoor_(computing)

Sunday, November 14, 2010

Week 12: Clear/The Fall of Print Media

I chose to write my blog about an article that I read in chapter 9 of the textbook entitled "Will Widespread Wireless Broadband Connections Kill Print Media?"  The reason I chose this article is because I am a Journalism major, and the direction that technology is going effects me directly, in terms of my future career.  As mobile devices become increasingly popular, people are going to newspapers and magazines less for their news and entertainment.  When faced with the choice of purchasing a newspaper or accessing their favorite newspaper online for free, more people are beginning to prefer the online version. 

The basic content of the article talks about how airlines around the world recently started offering Wi-Fi hot spots on some flights.  Communications companies also began offering WiMax coverage throughout entire cities.  With the proliferation of high-speed wireless Internet access, some experts believe that the end is near for print media.  The traditional airport and city newspaper and magazine stands' days may be numbered, since it is now possible for travelers to choose from thousands of searchable publications on their mobile devices while travelling.  Even the morning newspaper delivery is at risk as more people choose to use mobile devices to access wirelessly their favorite newspapers from home.

While researching this topic online, I came across an article that further supports the notion that the end of print media is near.  Ryan Chittum, a former Wall Street Journal reporter now writing for the Columbia Journalism Review, wrote that McGraw-Hill sold BusinessWeek for between $2 million and $5 million. Yet in 2000, BusinessWeek was valued at $1 billion.  When asked for an explanation of this, he stated "So there's your new emblem for the fall of print.  That decline in value happened for the most part not because its readers abandoned it--circulation (rate base) dropped about 20 percent at that time-- but because its advertisers did."  McGraw-Hill invested about $20 million over the past two years. BusinessWeek losses in 2009 were more than $40 million on revenues of about $130 million. Ten years ago it had an operating profit of $100 million.

BusinessWeek is a great example of a newspaper that is failing due to the increase of technology within mobile devices.  The New York Times is also facing major financial difficulties.  For now, newspapers are holding on, but I have a feeling that the decline in profits will continue throughout the next several years.

Website cited:  http://www.siliconvalleywatcher.com/mt/archives/2009/10/businessweek_se.php

Sunday, November 7, 2010

Week 11: Clear/Communication Via E-Mail

This week's lesson was on information systems, and I found it quite difficult to identify a topic of interest for me to write about in my blog.  But while I was reading through chapter 12 of the textbook, I came across an article that caught my eye.  Although it is indirectly related to the subject matter of the chapter, I figured since it was in the book that it was fair game.  It has to do with an ethical issue, and the name of the article is "Does E-Mail make You Lie More?"

The main premise of the article discusses a study that was conducted on whether or not people are more likely to lie to someone via e-mail, as opposed to talking in person.  According to the study, 50% of people lied more when writing business-related e-mail messages than they did when writing with pen and paper.  Another study showed that people are more likely to lie via e-mail to co-workers than they are to strangers.  Researchers offer a number of reasons for the results of the various studies.  For example, one researcher found that people act in self-serving ways when typing, as opposed to writing by hand.  Others claim that the anonymous nature of sitting, perhaps miles away from a faceless e-mail recipient, simply makes people colder; or that the lack of facial cues, tone, and eye contact largely are to blame.

I found a website that correlated with this topic, which I found interesting.  It talked about how middle school and high school students are now being bullied on-line via instant messaging, text messaging, and e-mail.  Fifty-two percent of the students surveyed said that they indeed had at some point encountered bullying through these means.  I find this to be very disturbing, but it proves the point of the article in the textbook... that people in general are more likely to lie, bully, or disregard the feelings of the recipient on the other side, as long as the communication is not face to face.  I think this goes to show the transformation of our society as technology becomes more prevalent.

Websites cited:  http://www.stopbullyingnow.hrsa.gov/adults/cyber-bullying.aspx

Database Project

After much trial and error, I was finally able to complete the database project.  Since I have never worked with Microsoft Access before, I really had no idea what I was doing.  It took me awhile to figure certain things out, but once I did, I was able to understand them.  I learned a lot about how databases work, and the importance of them.  I also learned how to perform several different key functions within Access, such as creating a query, a form, and a report.  Since I am now familiar with the basic principles of Access, I think I will be able to use it in the future.

I think one thing that was not required in our project but that would enhance the functionality of this database would be to create relationships within the database.  A relationship is an association between common fields in two tables.  This association links information in one table to information in the related table.  You can also separate sensitive information, perhaps for security purposes, from the main table, so that others cannot view it.  In addition, creating a relationship to link all your information together helps to save space, and it is easier to edit and manage.  These are just some of the advantages of having relationships within your database.

Sunday, October 31, 2010

Week 10: Muddy/Megan's Law

Databases are used in a variety of ways, and in many different places and institutions.  As I was reading through chapter 10 in the textbook, I came across an article that I found to be of interest, so I decided to write my blog on it so I could do more research.  The article is about whether or not states should share criminal databases, and asked the question "should a database of people paroled or released for crimes be made public?"

In particular the article talks about Megan's Law, which is an informal name for laws in the United States requiring law enforcement authorities to make information available to the public regarding registered sex offenders.  It is named after a seven year-old girl in California who was violated and killed by a paroled felon.  Individual states decide what information will be made available in a public database.  Some commonly included information is the offender's name, picture, address, incarceration date, and nature of crime.  The information is often displayed on public websites, but can also be published in newspapers, distributed in pamphlets, or through various other means.

Today, all states employee these databases and are required to share the information with a national database.  In some communities, when an offender moves in, the police inform the local school system, which in turn sends parents a notification that includes a history, address, and photo of the wrongdoer.  Some states share information with each other regarding almost all criminals, and some allow citizens to search for these offenders by name.  Below I have included a picture taken of a sign that is just outside the city limits of Wapello, Iowa.  It is a good example of a community that uses a public database to declare an offender-free district.



I believe that this is a good way to regulate sex offenders within certain communities.  Although some may argue that this is an invasion of privacy, I think people have a right to know when a sex offender or pedophile moves into their neighborhood, especially people who have young children.

Website cited:  http://en.wikipedia.org/wiki/Megan's_Law