Sunday, November 28, 2010

Week 14: Muddy/Virtualization

This week I chose to write about virtualization, because while listening to the lectures, I thought it was a very interesting concept, but I didn't quite understand it.  However, after researching many websites, I feel like I have a better grasp on the subject. 

The technical definition of virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device, or network resources.  It can be viewed as part of an overall trend in enterprise IT that includes autonomic computing, a scenario in which the IT environment will be able to manage itself based on perceived activity, and utility computing, in which computer processing power is seen as a utility that clients can pay for only as needed.  Most often the goal of virtualization is to centralize administrative tasks while improving scalability and work loads.

Some other advantages to virtualization include server consolidation, reduced power and cooling, green computing, and high availability and disaster recovery.  While virtualization technology is most popular in the server world, virtualization technology is also being used in data storage such as Storage Area Networks, and inside of operating systems such as Windows Server 2008 with Hyper-V.

Websites Cited:  http://www.virtualizationtechnology.com/
                          http://en.wikipedia.org/wiki/Virtualization

Sunday, November 21, 2010

Secure Email Project









I think that using secure email to ensure the safety and privacy of certain information is very important, especially in this day and age of rampant identity theft.  As thieves are finding new ways to steal citizen's identities, we in turn need to find new ways to protect ourselves from this.  Secure email is a great way.  That being said, I think that the government, specifically the IRS, especially needs to make sure that all information sent back and forth to them is encrypted and secure.  I found an IRS website, which talks about how data passed to private collection agencies must be encrypted.  The article states "The new F&PC System will serve as an inventory management system to assign, exchange, monitor, control and update delinquent taxpayer accounts between the IRS Authoritative Data Source (ADS) and the Private Collection Agencies with whom IRS will contract."  In reference to secure email, it says "The new system will assign and deliver delinquent taxpayer account data to PCAs (using secure email for Release 1.1 and Registered User Portal (RUP) for subsequent releases) and provide tax account updates on a daily and weekly basis."  The article also gives a list of the necessary data elements that will be sent to PCAs via secure encrypted email. 

As I said before, I think that the IRS is one "business" that certainly needs to make sure that all information sent is secure.  If there is a break in this system, or if information is sent that is not secure, then the IRS runs the risk of exploiting citizen's personal information for anyone who knows what they're doing to intercept and view.

Website Cited:  http://www.irs.gov/privacy/article/0,,id=140507,00.html

Tuesday, November 16, 2010

Week 13: Clear/Backdoors






Essentially what first got me interested in the concept of backdoors in computer programs was a novel I read called "Digital Fortress," by Dan Brown.  The book is about a team of codebreakers that work for the government, and their main job is to intercept codes from other countries, as well as domestic terrorist groups, to try and monitor their activities.  The book mentions the concept of backdoors several times.  I was immediately intrigued by this topic, because I had never heard of it before.  The book did a great job of teaching and explaining what backdoors are, and how they are written, while incorporating fictional characters and a plot as well.

The definition of a backdoor in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.  The backdoor may take the form of an installed program, or may subvert the system through a rootkit.  Once perpetrators gain access to unsecure computers, they often install a backdoor or modify an existing program to include a backdoor, which allows them to continue to access the computer remotely without the user's knowledge.  Malicious programs that open backdoors can be found in emails, ad banners, web sites, and downloads.  Trojan horses are a popular method of opening backdoors. 

There are programs that spend 24 hours a day surfing the web in search of unprotected and unknown backdoors.  They run around "pinging" IP's until they find one that sends back a signal indicating that access can be granted.  A program such as CallerIP scans all the ports (where your modem or cable or telephone is plugged in) on your system and alerts you to any malicious backdoors that can provide unauthorized access to your computer.

Websites Cited:  http://www.fraudaid.com/security_products/articles_information/what_is_a_backdoor.htm
                          http://en.wikipedia.org/wiki/Backdoor_(computing)

Sunday, November 14, 2010

Week 12: Clear/The Fall of Print Media

I chose to write my blog about an article that I read in chapter 9 of the textbook entitled "Will Widespread Wireless Broadband Connections Kill Print Media?"  The reason I chose this article is because I am a Journalism major, and the direction that technology is going effects me directly, in terms of my future career.  As mobile devices become increasingly popular, people are going to newspapers and magazines less for their news and entertainment.  When faced with the choice of purchasing a newspaper or accessing their favorite newspaper online for free, more people are beginning to prefer the online version. 

The basic content of the article talks about how airlines around the world recently started offering Wi-Fi hot spots on some flights.  Communications companies also began offering WiMax coverage throughout entire cities.  With the proliferation of high-speed wireless Internet access, some experts believe that the end is near for print media.  The traditional airport and city newspaper and magazine stands' days may be numbered, since it is now possible for travelers to choose from thousands of searchable publications on their mobile devices while travelling.  Even the morning newspaper delivery is at risk as more people choose to use mobile devices to access wirelessly their favorite newspapers from home.

While researching this topic online, I came across an article that further supports the notion that the end of print media is near.  Ryan Chittum, a former Wall Street Journal reporter now writing for the Columbia Journalism Review, wrote that McGraw-Hill sold BusinessWeek for between $2 million and $5 million. Yet in 2000, BusinessWeek was valued at $1 billion.  When asked for an explanation of this, he stated "So there's your new emblem for the fall of print.  That decline in value happened for the most part not because its readers abandoned it--circulation (rate base) dropped about 20 percent at that time-- but because its advertisers did."  McGraw-Hill invested about $20 million over the past two years. BusinessWeek losses in 2009 were more than $40 million on revenues of about $130 million. Ten years ago it had an operating profit of $100 million.

BusinessWeek is a great example of a newspaper that is failing due to the increase of technology within mobile devices.  The New York Times is also facing major financial difficulties.  For now, newspapers are holding on, but I have a feeling that the decline in profits will continue throughout the next several years.

Website cited:  http://www.siliconvalleywatcher.com/mt/archives/2009/10/businessweek_se.php

Sunday, November 7, 2010

Week 11: Clear/Communication Via E-Mail

This week's lesson was on information systems, and I found it quite difficult to identify a topic of interest for me to write about in my blog.  But while I was reading through chapter 12 of the textbook, I came across an article that caught my eye.  Although it is indirectly related to the subject matter of the chapter, I figured since it was in the book that it was fair game.  It has to do with an ethical issue, and the name of the article is "Does E-Mail make You Lie More?"

The main premise of the article discusses a study that was conducted on whether or not people are more likely to lie to someone via e-mail, as opposed to talking in person.  According to the study, 50% of people lied more when writing business-related e-mail messages than they did when writing with pen and paper.  Another study showed that people are more likely to lie via e-mail to co-workers than they are to strangers.  Researchers offer a number of reasons for the results of the various studies.  For example, one researcher found that people act in self-serving ways when typing, as opposed to writing by hand.  Others claim that the anonymous nature of sitting, perhaps miles away from a faceless e-mail recipient, simply makes people colder; or that the lack of facial cues, tone, and eye contact largely are to blame.

I found a website that correlated with this topic, which I found interesting.  It talked about how middle school and high school students are now being bullied on-line via instant messaging, text messaging, and e-mail.  Fifty-two percent of the students surveyed said that they indeed had at some point encountered bullying through these means.  I find this to be very disturbing, but it proves the point of the article in the textbook... that people in general are more likely to lie, bully, or disregard the feelings of the recipient on the other side, as long as the communication is not face to face.  I think this goes to show the transformation of our society as technology becomes more prevalent.

Websites cited:  http://www.stopbullyingnow.hrsa.gov/adults/cyber-bullying.aspx

Database Project

After much trial and error, I was finally able to complete the database project.  Since I have never worked with Microsoft Access before, I really had no idea what I was doing.  It took me awhile to figure certain things out, but once I did, I was able to understand them.  I learned a lot about how databases work, and the importance of them.  I also learned how to perform several different key functions within Access, such as creating a query, a form, and a report.  Since I am now familiar with the basic principles of Access, I think I will be able to use it in the future.

I think one thing that was not required in our project but that would enhance the functionality of this database would be to create relationships within the database.  A relationship is an association between common fields in two tables.  This association links information in one table to information in the related table.  You can also separate sensitive information, perhaps for security purposes, from the main table, so that others cannot view it.  In addition, creating a relationship to link all your information together helps to save space, and it is easier to edit and manage.  These are just some of the advantages of having relationships within your database.

Sunday, October 31, 2010

Week 10: Muddy/Megan's Law

Databases are used in a variety of ways, and in many different places and institutions.  As I was reading through chapter 10 in the textbook, I came across an article that I found to be of interest, so I decided to write my blog on it so I could do more research.  The article is about whether or not states should share criminal databases, and asked the question "should a database of people paroled or released for crimes be made public?"

In particular the article talks about Megan's Law, which is an informal name for laws in the United States requiring law enforcement authorities to make information available to the public regarding registered sex offenders.  It is named after a seven year-old girl in California who was violated and killed by a paroled felon.  Individual states decide what information will be made available in a public database.  Some commonly included information is the offender's name, picture, address, incarceration date, and nature of crime.  The information is often displayed on public websites, but can also be published in newspapers, distributed in pamphlets, or through various other means.

Today, all states employee these databases and are required to share the information with a national database.  In some communities, when an offender moves in, the police inform the local school system, which in turn sends parents a notification that includes a history, address, and photo of the wrongdoer.  Some states share information with each other regarding almost all criminals, and some allow citizens to search for these offenders by name.  Below I have included a picture taken of a sign that is just outside the city limits of Wapello, Iowa.  It is a good example of a community that uses a public database to declare an offender-free district.



I believe that this is a good way to regulate sex offenders within certain communities.  Although some may argue that this is an invasion of privacy, I think people have a right to know when a sex offender or pedophile moves into their neighborhood, especially people who have young children.

Website cited:  http://en.wikipedia.org/wiki/Megan's_Law

Saturday, October 23, 2010

Presentation and Web 2.0 Project

Presentation Evaluation Rubric
Name of Presenter: 
Your Name:  

Missing or lacking
Meets the minimum but could be improved
Excellent
Is there a logical flow and sequence of content? How could it be improved?


 Yes
Does the presenter anticipate questions and answer them in the right place? At what points did you have questions that were not answered?


 I think I answered all of the questions
Did the presenter grab your attention in the first 30-60 seconds?


 Yes
Did the presenter ask questions and spark your curiosity?

 I didn't really ask questions but hopefully I sparked some curiosity

Did the presenter set the context with a concise explanation? Is it clear what the presenter is trying to share?


 Yes
Did the presenter validate any claims?

Kind of

Did the presenter avoid inconsistencies and errors, typos and unbelievable claims?


 Yes
How well did the presenter avoid clutter?


 I believe I avoided clutter
What did the presenter do to ensure readability?


 I left the text slides up longer so that people had time to read them
Did the presenter say it, and then show it or did he/she read the slides?

 I basically just showed it




I reviewed Natasha Betty's presentation, and I was very impressed.  I could tell that a lot of thought and effort went into it.  It also had a personal connection with her, since she had studied abroad herself.  I believed in what she said, and she did a great job illustrating all of her points with graphic images.  All in all, I think her presentation was very effective.
This project taught me many things.  The obvious skill I obtained was the ability to create a presentation all on my own.  I learned that there are so many different tools and resources available to aid in the creation process.  It wasn't as hard as I thought it was going to be... once I got started, I began to enjoy it.  This will help me in the future because I am almost positive that at some point in my career, I will be required to present some sort of material to a group of people.  I feel confident that I will be able to create and deliver a presentation with ease.

Thursday, October 21, 2010

Week 9: Muddy/Wi-Fi

I, as I believe so many others have, always assumed that the term "Wi-Fi" was short for "Wireless Fidelity."  However after this week's lesson I now realize that in all actuality that is completely wrong.  In fact, Wi-Fi isn't even short for anything, it is simply a name which refers to a range of connectivity technologies.  This comes as a surprise to me, so I decided to write my blog about it so I could research it further.

Before the name Wi-Fi came in to play, the name given by the Wi-Fi Alliance was IEEE 802. 11.  However, this name was obviously not suitable as a reference to Wi-Fi.  So the Wi-Fi Alliance hired a firm called the Interbrand Corporation to determine a name that was "a little catchier."  What they came up with was Wi-Fi, which wasn't supposed to be short for anything.  People began to associate Wi-Fi with Wireless Fidelity because the Wi-Fi Alliance itself had often used this phrase in its press releases and documents.  They also incorporated the advertising slogan "The standard for Wireless Fidelity," but later removed the phrase from their marketing.  Despite this, some documents from the Alliance dated 2003 and 2004 still contain the term "Wireless Fidelity."  There was no official statement related to the dropping of the term.

Below I have included a graphical image of the yin-yang style Wi-Fi logo, which was also created by the Interbrand firm.  The yin-yang logo indicates the certification of a product for interoperability.




I think that this is an interesting fact that most people don't realize, and now that I have researched it I feel that I am more knowledgeable about Wi-Fi and its uses and functions.


Websites cited:  http://en.wikipedia.org/wiki/Wi-Fi

Friday, October 8, 2010

Week 7: Clear/The Takahashi Method

This week I chose to write about the Takahashi method of presenting slides during a presentation, because I thought it was very interesting and intriguing.  The Takahashi method is very similar to the Lessig method, which is known for its rapid display of short phrases and pictures.  However, the difference is that Masayoshi Takahashi is Japanese, and all of his slides are done in the Japanese alphabet!  Despite this difference, we can still apply the Takahashi method to any presentation that we wish to give.

The Takahashi method is very effective because it uses only one or two short words, using very large characters.  There are typically no pictures and no charts or graphs.  To make up for this, the presenter will use many more slides than in a traditional presentation, each slide being shown with a much shorter duration.  The slides use plain text in a visual manner, to help the audience quickly read and understand the material.  The words or phrases that Takahashi uses resemble Japanese newspaper headlines rather than sentences which must be read. 

Below is an example of one of Takahashi's slides.

I think that this method of presentation is great because it isn't giving your audience too much information all at once.  Rather, it is taking the most important word or words from a specific point that you are trying to make, and then expanding on it.  This way, people are focused on what you have to say instead of trying to read your slides or study the graphs you have provided.  When used in certain circumstances, I believe that the Takahashi method is a very effective way to deliver a presentation.

Saturday, October 2, 2010

Week 6: Clear/Digital Rights Management

Digital rights management, or DRM for short, is a very controversial subject.  I had no idea how controversial it was until I started doing some research for this week's blog post.  By definition, DRM is a generic term used for access control technologies that can be used by hardware manufacturers, publishers, copyright holders and individuals to limit the usage of digital content and devices.  There are many companies and artists who use DRM to protect their rights to their songs, movies, ect.  While this does prevent some illegal distribution of their products, it does not prevent all.  DRM also has some ramifications which some may claim to be completely unfair to the purchaser of the product.

There are many reasons why DRM is so controversial.  One of the main reasons people oppose DRM is because the song, movie, or whatever the purchased item may be, can only be played on the one device to which it is downloaded.  So, for example, if I downloaded a song onto my computer that was protected by DRM, my computer is the only place that I would be able to listen to that song.  I would not be allowed to transfer it to my MP3 player, Ipod, or any other device.  This seems unfair to many, because even though the money was spent for the product, it is only attainable in one place.  In some ways DRM may even encourage illegal downloading, just for this reason. 

Many individuals and companies have spoken out in opposition of DRM.  Some opponents statements include "DRM is an example of a malicious feature - a feature designed to hurt the user of the software, and therefore, its something for which there can never be toleration."  "If you can't figure out how to afford it without charging, you may be doing something wrong."  Major opponents of DRM even include Bill Gates, who addressed the topic of DRM in 2006.  He stated in his speech that "DRM is not where it should be, and causes problems for legitimate consumers while trying to distinguish between legitimate and illegitimate users." 

Upon my reading of the numerous opponents of DRM, it is obvious that it has a long way to go before it can find a balance which keeps both the manufacturers and consumers happy.  There are ways around DRM, an analog hole being one example.  Asus, which is a multinational computer product manufacturer centered in Taiwan, released a soundcard which features a function called "Analog Loopback Transformation," to bypass the restrictions of DRM.  This feature allows the user to record DRM-restricted audio via the soundcards built in analog I/O connection.  Despite these techniques, I believe that there are people out there who may not be comfortable with these methods of bypassing DRM, but who do, however, want these restrictions removed from their purchases.  It just may be that the average honest consumer of these products are being harmed the most.  

Website cited:  http://en.wikipedia.org/wiki/Digital_rights_management#Controversy

Thursday, September 30, 2010

Excel Project

The Excel project that I just completed was challenging, yet educational at the same time.  It forced me to learn skills that I otherwise probably wouldn't have taken the time to learn.  To sum up the requirements for this project... we were given a collection of data, and were instructed to make some changes to the existing data, as well as add to the data given.  We created formulas, changed numbers to percentages, and formatted the data to print in a specified manner.  We were also instructed to create two separate pivot tables, which were used to provide a summary of all of the information.  With the aid of the lecture videos, the Excel help discussions, and bit of common sense, I was able to complete all the tasks as required. 

I acquired several skills after the completion of this project.  I learned how to add columns and rows, to show specific data.  I also learned how to create different Excel formulas, in order to display information in various ways.  After I completed all of the requirements for the project, I was then able to format all of the information into a printable version which was easy to read and understand.  I think one of the more useful skills that I gained, however, was the creation of pivot tables.  Pivot tables are a great way to condense all of the information into just a few rows and columns, and sums up all of the important data onto one page.  They are very useful when presented with a very large amount of data. 

I now feel much more comfortable with navigating through Microsoft Excel.  This project was a lot of work, but will certainly be beneficial to me in the long run.  I have no doubt that in the future I will revisit what I have learned from this project, and put my newly acquired skills to practical use.



Thursday, September 23, 2010

Week 5: Muddy/Creating Pivot Tables in Microsoft Excel

As I was working through this weeks' lectures on Microsoft Excel, I found one of the topics to be a bit more challenging than all the others.  Although I watched the lecture on pivot tables twice, when I attempted to complete the exercise provided I still wasn't able to perform some of the tasks that were required.  I decided to write about pivot tables for this week's blog in an effort to learn more about this function of Excel.

While researching pivot tables via the Internet, I found a great explanation of what it is that a pivot table accomplishes; "You might think of a pivot table as a user created summary table of your original spreadsheet. You create the table by defining which fields to view and how the information should be displayed. Based on your field selections, Excel organizes the data so you see a different view of your data." 

This explanation helped put into perspective exactly what pivot tables are used for.  However, my problem was that I still wasn't quite sure how to use them effectively.  Although the lecture helped, for some reason I didn't have a clear grasp on the concept.  So I searched for videos which would demonstrate in further detail how to navigate through a pivot table on Excel.  I found one very useful video, which I have included below.

http://www.youtube.com/watch?v=YxKaJP8I-mA

This video helped me further understand the functions of pivot tables, and how to use them.  It explains that you would normally click on "new worksheet" rather than "existing worksheet," which I had previously made the mistake of doing.  It also gave clearer examples of what types of data go into the specific boxes.  For example, if you have information that contains numbers only, then you would drag that information in the sum values box.  However, if you have information that includes numbers and text, then, depending on how you want the information displayed on your sheet, you could drag it to column labels or row labels.  Upon doing so, your information is immediately displayed on the worksheet next to the pivot table just as you have indicated.

After watching this video tutorial, I hope to have an easier time with pivot tables not only to help with my Excel project, but to also help me later on in my career, when I put it to practical use.  Pivot tables are one of the many great functions of Microsoft Excel, and they are a great way to analyze a very large amount of data with just a few keystrokes.

Websites referenced:  http://www.timeatlas.com/5_minute_tips/chunkers/learn_to_use_pivot_tables_in_excel_2007_to_organize_data

Friday, September 17, 2010

Week 4: Clear/Horizontal vs. Vertical Applications

I decided to write about the difference between vertical and horizontal applications, because I have used both forms of applications in various jobs that I have worked.  I never knew that these software programs actually had names, so I found it interesting.

The first application, horizontal, is a software program that is used across different industries for many different uses by different people.  What first came to mind when I learned about horizontal applications was my use of it in a restaurant job that I had.  I was put in charge of cashing out each server at the end of their shift, and the program that we used to calculate the totals and earnings of each server was Microsoft Excel.  This is an example of a program that is used for many different purposes, but for that particular job, we used it to keep track of everyones daily cash outs.  It made the process of collecting money run much smoother.  My use of Microsoft Excel while at that job has helped me tremendously, and hopefully will help me with the Excel Project!  Other examples of horizontal applications include Adobe Photoshop, Microsoft Office, Open Office, and Adobe Creative suite.

The second application is vertical, and is defined as a software program that is designed to meet the specific needs of one vertical business market.  As with the horizontal application, when I first learned about vertical applications the first thing that popped into my mind was my job at Goodys Family Clothing (which is sadly out of business now.)  We had one entire system at Goodys that was designed to run the whole store.  While working there, I was assigned to many different departments, each with their own unique job requirements.  Sometimes I was a cashier, and just as the lectures pointed out, the system knew which items were on sale, and which were full price.  This was because when a shipment of clothing would arrive in the warehouse, we would set the prices in the scan gun, and then scan one item out of the shipment with the correct price.  This would in turn set the price for the entire shipment, saving lots of time.  We also had a system for price checks, which would allow customers to scan items to find out the price for themselves before purchase.  Although I would never work retail ever again, Goodys was a great learning experience for vertical applications!

To further my knowledge of vertical and horizontal applications, I did some research just to make sure I had a good grasp of the entire concept.  My research results took me to http://en.wikipedia.org/wiki/Vertical_application, which surprisingly didn't have very much information.  I found out that this is a relatively new topic, because none of the websites really provided me with anything useful other than what I had already learned.  This website even asked if I would like to expand on the information related to this topic, because they didn't feel that they had enough resources available!  Perhaps I will refer them to Charlie Hairston's informative lectures :) 

Side note:  I used orange and blue text color in an effort to show my Gator spirit, and to wish them luck against Tennessee.  Go Gators!!     




Sunday, September 12, 2010

Week 3: Clear/Ergonomics in the Workplace

I feel that ergonomics is an important subject to discuss because of the day and age that we currently live in.  We as a society depend on computers now more than we ever have before, from large enterprises to small businesses and home offices.  I believe that it is important for people to be educated on the practice of safety in the workplace, with regard to computers.

The actual definition of ergonomics is explained as the science of fitting workplace conditions and job demands to the capabilities of the working population.  Basically what that translates into is the process of making a particular work environment as safe and comfortable as possible.  This ranges from the comfort of your chair, to the position of your computer.  These may seem like mundane things, but can significantly effect an individuals health in the long run.  Some examples of ergonomic risk factors are found in jobs requiring repetitive, forceful, or prolonged exertions of the hands, frequent or heavy lifting, or pushing and/or carrying heavy objects.  The failure to recognize and address these risk factors can lead to serious health issues.

The picture below demonstrates all of the proper ergonomic practices that lead to a safe work environment.


The level of risk depends on the intensity, frequency, and duration of the exposure to these conditions and the individuals' capacity to meet the force of other job demands that might be involved.  If these simple steps are followed, it will ensure that the individual maintains the safest work environment possible.   However, if these rules are ignored, the consequences could lead to problems as serious as musculoskeletal disorders.   

Ergonomics is a topic that is becoming more widely discussed not only in the business environment, but in the home as well.  The amount of time that people spend in front of their computers is increasing as our society continues to advance in this technological age.  It is important for each individual to educate him/herself on this matter... sooner rather than later!



Sunday, September 5, 2010

Week 2: Clear/The Importance of Backing Up Your Data

This week I chose to write about computer data backup because I think that it is extremely important to protect all of the information that is stored on your computer.  Sometimes I feel that people don't realize how much they depend on their computers, and how devastating it can be if something happened to it.  I know this all too well, and I had to learn the hard way!  No one ever told me about the importance of backing up all your data... so I never did.  One night during a thunderstorm lightening struck the circuit breaker, and my computer was fried.  I lost all my music, pictures, and several other important documents that I won't ever get back.  I am still very bitter about this incident, and it happened five years ago.  I now make sure that I backup everything, because I don't ever want to go through that again.

One of the largest backup programs offered online is Mozy.  They go to great lengths to make sure that all of your information is encrypted and completely secure.  They use the same encoding system that banks use to send data via the Internet.  The military also uses this same encoding system... so you can rest assured that your data is 100% safe.  In addition, Mozy handles versioning, which means that it stores yesterdays renditions as well as today's renditions of your files with each backup, allowing you to pull data from different backup dates.  There are lots of different companies that offer computer backup and protection, Mozy is just one of them. 

One of the concepts that I learned about in the lectures was RAID 1 mirroring.  I did some additional research and found a website which explained this concept in further detail...   www.bestpricecomputers.co.uk/glossary/raid-1.htm.  Basically RAID 1 mirroring is an arrangement of hard disks that  creates an exact copy (or mirror) of a set of data on two or more disks.  (As shown in the picture below)  For example, RAID 1 writes two copies of the data simultaneously on two separate drives so that if one of the mirrored drives suffers a mechanical failure or does not respond, the remaining drive will continue to function.  RAID 1 is popular for accounting and other financial data, but is also commonly used for small database systems and enterprise servers.


I believe that more people should be made aware of the consequences of not backing up your computer information.  There are so many different ways that your computer can be destroyed... house fires, floods, theft, and even lightening storms.  It is completely irresponsible to not implement some type of backup system for your computer.  You just never know what could happen, so it's better to be safe than sorry!

Tuesday, August 31, 2010

Week 1: Muddy/The Fine Lines of Copyright Infringement

     I have always been a little uncertain about what is legally accessible on the Internet, and what is considered copyright infringement.  For example, years ago, before all the laws and restrictions on downloading music were so publicized, I would download music for free constantly through the use of Limewire.  I now understand that this is illegal, and I currently use ITunes to purchase my music before I download it.  However, other copyright laws aren't so clear to me.  Sometimes it is difficult for me to discern what is copyrighted and therefore off limits, and what is public domain.
    
     The Disney video that we were required to watch didn't necessarily help me better understand the concept of what is copyrighted versus what is not.  Don't get me wrong, I love Disney movies!  (Maybe a little too much)  I found the video more distracting, because in my mind I would constantly play out the rest of the movie scene, rather than grasp the concept of what they were trying to say.  If the quiz were given on those movies, I would certainly get an A! However I feel it is safe to assume that the quiz will not question my knowledge of my favorite Disney classics.  So I decided to do a little research.  Using the tools I learned in the Information Search section, I found some websites that helped me better understand exactly what copyright infringement is.

     I first looked to Wikipedia http://en.wikipedia.org/wiki/copyright_infringement for a definition and explanation of copyright infringement.  I find Wikipedia to be one of the most resourceful websites for understanding a concept.  I actually learned about where the word "piracy" comes from (just another label for the act of infringement,) which is something I found interesting.  It dates back as early as 1603, when the Stationer's Company of London received a royal charter giving the company a monopoly on publication, and tasked it with enforcing the charter.  The violators of this charter were labeled as "pirates."  The term was used again in 1703 by Daniel Defoe, who said that his novel The True Born Englishman was being "printed again and again by Pyrates."  Of course this term is still widely used today.

     One other website that I found to be very helpful was www.templetons.com/brad/copymyths.html.  The title of the article is "10 Big Myths About Copyright Explained."  It basically explains to the reader what is true in regards to copyright infringement and what is false, and why.  For example, just because something doesn't have a copyright notice doesn't mean that it's not copyrighted.  Although this was true in the past, the law in the U.S. is that almost everything that was an original and private creation after April 1, 1989 is copyrighted and protected, regardless of whether it has a notice or not.  It also goes into detail about the differences between copyright and trademark, and gives several examples of what information can be used legally and what is considered a copyright infringement.  After reading this article I felt like I had a better understanding of what I could consider public domain, and I will certainly keep that in mind as I continue to use the Internet as a multi-purpose tool.