Sunday, April 18, 2010

Week 14: Muddy


The hardest concept for me to understand this week was the idea of virtualization and Virtual Machines (VM). Virtualization is the up and coming, latest concept in the world of technology. It is a technique for running multiple "virtual computers" on a single physical host computer system, supposedly like a file on the harddrive. Since I have never before used a virtual computer, and the concept of an entire harddrive being condensed into a file, and then multiple files being on a single computer seems too out there for me to understand.

VMWare is the leader in virtual machine software, giving Microsoft a run for their money. It allows a computer to run multiple Operating Systems at once, like Windows and OSX on a Macintosh computer. The software resides on top of the hardware, and under the operating system -- a concept that is still a little confusing to me, probably because I have never been inside a computer before. Virtualization cuts cost, saves space, and helps businesses be more versatile. It is a very important concept for all future business leaders to understand.

To better understand virtual machines and VMWare, read this article from the NY Times:
http://www.nytimes.com/2009/08/31/technology/business-computing/31virtual.html?_r=1

Secure Email Project



Article about a business that should have used secure email or another security measure to protect their data:
http://www.nytimes.com/2005/06/09/business/09data.html

The NY Times article I read is about the mishap that Citigroup had when their magnetic strip of 120,000 Japanese customers' personal data disappeared and is still yet to be found. The information compromised included names, addresses, account numbers and balances. This recently happened again to CitiBank customers of Citigroup; an entire box of tapes traveling by UPS was lost, containing personal information of almost 4 million Americans. Although the company is in the process of transferring to "secure electronic channels" to move important data, currently their information is open to any "computer-savvy" thief who can pull the information off of the magnetic computer tape. Citigroup, as well as ChoicePoint, Wachovia, and Time Warner, need to invest in encryption and securing all of their technological pathways.

Sunday, April 11, 2010

Week 13: Clear

security blog! click here ____

Sunday, April 4, 2010

Creating an Avatar



I used "Doppelme" for my experience with the avatar creation tools. I had first attempted to use "Simpsonize me" but the website was too overloaded because of its "immense popularity" and turned me away. Doppelme turned out to be a great experience. There were a few characteristics that were accessible without signing up, but since it was free I wanted to access all of my options and registered for the website. I was sent a password to my e-mail, and then had the opportunity to change it immediately to something I would remember. I was able to pick my skin color, eye color, hair style and color, and facial expression with many options. Clothing was very limited, since most of it seemed to be geared for males. I did have fun with it though, and put myself on the beach with my favorite accessory: my laptop, though I was not able to change the color and show that my laptop is pink. When I have time, I would love to go through all of the websites and see the various avatars I could make for myself. The idea of playing with a cartoon version of myself is a very interesting and possibly controversial topic. I could change my hairstyle and see how I would look with various differences, or try a new style of clothing out on my cartoon self. I always wanted to be on a cartoon, and this is a great opportunity to see how I would look, and use this image to convince the station heads to make me a character.

VoIP and Video Capture

Voice over IP happens to be a very familiar topic to me, because I have been using Skype for quite some time. My brother lives overseas, so Skype is the cheapest/best way to see and talk to him. Many of my friends have gone to college around the country, so Skype has been the best way to keep in touch, show new hairstyles and clothes, and properly convey emotions. Using Jing, however, was a new experience for me. I really like the concept of being able to keep video conversations that I have. Screenshots can easily be done by print screen, but capturing video on your computer is such a novel idea! I can keep conversations I have with my friends and family for memories to look back on years from now.

http://www.screencast.com/t/YTJkMTE3O

Week 12: Clear

Information systems are very important and i need to write 2 to 3 well written paragraphs asap about this! don't forget!

Database Project


This project was definitely the most challenging so far, since I have never before used Microsoft Access. It was so interesting to learn how to use this new application, especially because I can see how useful it will be to my future. The program can be used for large databases, helpful to any career, whether it is an order sheet, product list, clientele, or a way to keep track of your co-vendors. The hardest part for me was figuring out how to import the data correctly from an Excel file to the Access database. After many trials and errors, playing around with various advanced features, and using intermediary programs such as Notepad, I was able to import the data perfectly into my current Members database. Creating the query, form, and report were fairly easy, though still very interesting to learn how it all worked firsthand.

To increase the usefulness of this database, I would recommend collecting the home phone numbers of all current members and adding them to the table. I would also enhance the functionality of the database by adding a query sorting the remaining members by Joined Date, finding breaking points to create multiple queries, in order to retain the memebrs with different approaches. Since there are many formatting options available, it would probably help the functionality to add color coding, bolding, or darkened borders. I would take advantage of the filter tool, as well as the relationships function. By analyzing various relationships, the gym could see if there is a relationship between leaving/staying and location, age, or membership type, which would definitely help with recruitment and retention.


Here is a print screen of my Members Database:

Sunday, March 28, 2010

Week 11: Muddy

Read chapter 10 and write 2-3 well written paragraphs asap :)

Sunday, March 21, 2010

Week 10: Muddy

Read chapter 9 and watch lectures so you can write 2-3 well written paragraphs!!!

Excel Project

The Excel project was a very interesting and fun way to apply all that I've learned about Excel. We were given step-by-step instructions to edit and analyze data from a fitness center research experiment. I was able to learn different functions and commands that I hadn't been previously aware of, simply by clicking around and using the Help application. I had never used Freeze Panes before, and although the concept was quickly understood, I needed to refer to the Excel Help discussion board to figure out how to freeze the top two rows as opposed to just the first row or the first 14 rows. This function can come in handy often with large amounts of information, so you can see the labels that you have allocated each column without scrolling up every time you get confused or forget.

I had been taught all about Pivot Tables in the Excel lectures for the scavenger hunt, however I had never before actually applied the concept. It is a very useful and convenient way to summarize and analyze data of any amounts. You can quickly change one aspect, such as sum to average, to look at your data in a completely different way. It is a very customizable table, with the option to show or not show various labels and/or totals. Through the process of completing this project, I also came across information that will help me in everday life. A person's maximum heart rate = 220 - their age. Therefore, my maximum heart rate is 199. All in all, this project was extremely useful and fun to complete, and made me further appreciate and want to use Excel whenever I am dealing with data, or charts of any kind.

Screen Capture of the "AvgIncrease" Pivot Table

Saturday, March 6, 2010

Week 9: Clear

I love working with Excel, and learned how to navigate it Freshman Year in CGS2531. Excel has all of these fun shortcuts that I love to learn and use.

Sunday, February 21, 2010

Week 7: Clear




I know that I have been posting many "Clear" posts lately, so I was planning on writing a "Muddy" post for this week, however my favorite/the most interesting part I found, I happen to understand. This week I learned how important it is to defragment your computer. Personally, I have a Dell computer with Windows Vista. However, I have never before known how my computer was saving its files or how to defragment my hard drive.
Files on a Windows computer are not stored in one contiguous piece. They are broken up into fragments and stored in different locations across the hard drive. As files and programs are created and deleted, fragments are created for Windows to try and fill up every nook and cranny of the hard drive. Unfortunately, as files become more and more fragmented, the hard disk has to do more work to access all pieces of the files. It causes mechanical work in addition to the electronic processes, and results in lower performance by your computer. This could end in early hard drive failure, or atleast problems within the computer system.
By defragmenting the computer, files and unused space are reorganized in to contiguous sectors on the hard disk so that the operating system can access the data faster and programs can run quicker. It is recommended to perform this task on a "frequent and regular" basis. This way the computer can run 50-80% faster without paying someone to revamp or fix your computer. By simply clicking the "Defragment Now" button found in the tools menu, we can see significant performance improvement in our computers. I was not aware of this fact, and now plan on defragmenting my system quite often. Hopefully this will save me a lot of frustration and time.
For a tutorial or more information on this topic, you can visit:

Sunday, February 14, 2010

Week 6: Clear




When I was going through all of the lectures this week, the concept that stuck out the most to me were the health risks that are becoming a huge issue in our world today. The most prevalent one is Repetitive Strain Injury or RSI. This happens if you do the exact same bodily motion over again, such as typing, gripping the mouse, or staring at the monitor, because that can cause damage to your tendons, nerves, and muscles. The damage can take form as tendonitis, carpal tunnel syndrome, cubital tunnel syndrome, mild facial pain syndrome, burcitis, or tensivitis. As computers are used more and more every day, repetitive strain injuries are a real health risk. You should watch out for symptoms for yourself, your families, and those you supervise in the business environment. Symptoms to watch out for are tightness, discomfort, stiffness, soreness or burning in the hands, wrists, fingers, forearms, or elbows; gentling, coldness, or numbness in the hands; clumsiness or loss of strength and coordination in the hands; pain that wakes you up at night; feeling a need to massage your hands, wrists, and arms; and/or pain in the upper back, shoulders, or neck associated with using the computer. If you notice any of these, then it is definitely time to change your habits so it doesn’t get worse. Also, you shouldn’t always wait until you see a problem before you take precautions; preventative actions should be taken so that there is never a need to worry.

There are actions we can take ourselves, as well as technologies we can purchase to reduce the risks of injury by computers. Natural tactics include correct typing techniques, correct posture and chair height, and not resting or angling your wrists while typing or using the mouse. If your wrists are straight and you are at the correct position for your computer screen, your body will be in a more natural and comfortable position while you do your work. Many people surf the web just to pass time, for no purpose or work goal. If you eliminate unnecessary computer use, or do some of our work with paper, pen, and physical calculators, the risks will be severely reduced. It is also recommended to take breaks from constant computer usage, even just to walk around the room, stretch your legs, arms, and necks. This would be very beneficial to you. I would suggest interval breaks for the entire office, where everyone can get up and walk around and do hand exercises for a few minutes to prevent your employees from being injured as well. There are “natural” keyboards that are built at various angles so that wrists aren’t strained while you get your work done. There are different shaped mice to keep your arm at a natural angle to avoid stress. Wrist rests are also a valuable purchase, because they provide a way for you to not hold your wrists at a straight angle, without causing long term damage. Monitor and chair adjusting should be taken into account if any symptoms are noticed.

Other things that I am sure will become a concern in society soon are damage to your eyes from the monitor, and radiation from the computer. We place laptops on our thighs and near our reproductive areas. I have a strong feeling that cancer will be found in those areas because of this, in addition to reproductive issues of some kind.

For more information on symptoms and preventative tactics of RSI, you can visit:
http://www.safecomputingtips.com/repetitive-stress-injury.html
http://www.eecs.umich.edu/~cscott/rsi.html

Friday, February 12, 2010

Web 2.0 Tools Project





When I found out I had to make a video for this class, I went through what I could possibly make it about. I could do a slideshow of one of my family vacations or a history of my friendships. I wanted to do something that would entertain myself as well as everyone else. Then I realized I had the perfect video, that just needed some editing, and would be perfect for this project. My apartment complex has a job position titled "Maverick" that plans events for the neighborhood, acts as a liasion between the residents and the leasing office, and tries to make residents feel welcome and comfortable. The community tries to make it a home away from home in a college town. I decided to apply for this job, and the first round of interviews/requirements was a video application. This is what I started with to make the video for this project. I put it together on Windows Movie Maker, with clips I took with my video camera. I then uploaded the video through One True Media. I found out at this point what I had been missing out on all of these years, not knowing about the various web 2.0 applications. It was so simple to upload a movie to this website and then embed it into my blog. It took me a long time to figure out a good application to make an interaction method for classmates to provide feedback, and finally used polldaddy.com to make the poll shown below. Making and posting this video, I hope to show classmates, and anyone else who comes across my video how to properly market yourself for a job, and how to successfully make a video application for an interview. Obviously, mine is not the only way to do it. I wanted mine to be fun, which is why I included the bloopers at the end. It must have properly shown off my personality and intelligence, because I got the job! I learned that there are many different web 2.0 applications out there that are free and easy to use, and I should definitely take advantage of them. This project was very helpful because the world is changing every day as technology becomes more and more important in the workplace as well as our everday lives. Companies are increasingly requiring videos to be submitted before they will hire you, and they also require familiarity with various internet aspects. I hope everyone enjoys my video as much as I enjoyed making it!



This is what my original storyboard looked like...

Sunday, February 7, 2010

Week 5: Clear


The concept I found most interesting and most understandable during this week of Hardware lectures, was during the section on the Processor. The processor is constantly directing, organizing, receiving, interpreting, and initiating instructions. It makes sure that the correct sequence is carried out by the correct application. Instructions are cycled through the processor atleast a million times a second.

There are two ways to process this information; the first is similar to an assembly line for a vehicle. The parts are put into place and then moved down the row for the next pieces to be added on. The beginning operations are "dormant" while the next steps are taking place, which is extremly wasteful and inefficient. The second way is termed pipelining. With this process, the CPU is simultaneously working on 4 instructions. While the CPU is decoding instruction 1, it is fetching the information for instruction 2. When the first instruction is done, it can begin on instruction 5, as opposed to instruction 2. This is an extremely efficient process, increasing the performance of the system. There are even systems set up for if a decision needs to be made down the pipeline. There are 2 options for handling this situation. The first is to stall the pipeline, which would stop "fetching" new information until the decision has enough information to be made. Then the pipeline will continue with all instructions. The other is called branch predicting. The pipeline in this case follows through with one option, lets call it assumption A. If this was guessed correctly, the CPU keeps rolling along at full speed and the pipeline never stops working. If it guesses incorrectly and needs to perform assumption B, then it throws away the other, partially executed instructions, and follows assumption B. This process of pipelining is incredibly more productive than the simple assembly line approach.

If the concept is still unclear at all, the following website provides animations and graphics along with further explanations:

Sunday, January 31, 2010

Week 4: Muddy


This week I found the concepts of lossless compression and lossy compression difficult to understand. The way the instructor described it: lossless compression was “not throwing away data, just eliminating redundancy in the image to save space” and lossy compression, which is more widely used, “discards some data, but only nondiscernable data (to the majority of people).” Lossless compression is used for archiving original works, in order to be able to edit them later. Lossy compression is used for “delivering, it’s the ideal jpeg.” Unfortunately, I couldn’t understand how eliminating redundancy in an image doesn’t distort the image, and how that doesn’t count as throwing away data. I also don’t understand how some people can discern the data that was discarded in lossy compression, while the majority of people cannot tell.

After further research, I have found that lossless data compression allows the original data to be compressed and reconstructed the exact same, whereas lossy compression only allows an approximation of the original data to be reconstructed. A lossy compression technique can reduce the space needed by a greater amount than lossless compression, however only certain types of data (i.e. graphics, audio, and video) can tolerate lossy compression. Data and programs must be compressed with the lossless technique. In a scanned photograph, the sky is many different pixels of blue, but in lossy compression, the program picks one color of blue to be used for every pixel.

If you are still confused, or desire further information on the topic, I found
http://computer.howstuffworks.com/file-compression3.htm extremely helpful.

References:
http://www.webopedia.com/TERM/L/lossless_compression.html
http://en.wikipedia.org/wiki/Lossless_data_compression

Sunday, January 24, 2010

Week 3: Clear


Do you ever need to check your e-mail or Google a fact, but either you’re internet isn’t working or you’re not at home? Is the next step to see if you can catch Wi-Fi that doesn’t have a password? Everyone does it, but did you know it’s a crime? Wi-Fi crimes, also known as piggybacking, “war-driving,” or Wi-Fi tapping, are one of the newest internet crimes. Driving around trying to find someone else’s Wi-Fi connection, until you can access the internet without paying for it is a serious offense. Unfortunately, in a recent survey it was discovered that 54% of people admit to using someone else’s Wi-Fi connection without their permission, and the people who won’t admit to it would probably greatly increase this number.

There are ethical implications and opportunities for illegal activity. By stealing someone’s internet connection, you are slowing down their connection, you are not paying for the service you are receiving, and you are making your own computer vulnerable to other people who could access your content. Police are concerned because unsecured networks or wireless connections without passwords can be used for identity theft, since all passwords and credit card numbers are easily hacked. They also consider it a serious offense because anyone could download pornographic or other illegal materials without being caught, since only the Wi-Fi account holder can be traced. Eleven people have already been arrested for the seemingly harmless internet crime.

Next time you are setting up a wireless network, consider protecting yourself and add a password.

For further explanation see this article:
http://www.securityfocus.com/columnists/237

Sunday, January 17, 2010

Week 2: Clear


As the years go by, society is relying more and more on computers. There are countless benefits from the ease that technology has brought us. We can gather information prior to shopping for important items, or any purchases for that matter. We can stay connected with our friends, family, and businesses whether they are around the corner or overseas. Unfortunately, there are also downsides to this helpful invention. While technology is decreasing the size of the world, as many would say, it may also be destroying the environment and our physical and mental well-being.

The advantages to using computers are endless. Individuals and companies can use them for instant access to trillions of pages of information from all over the world. Users can make well-informed decisions and be in constant communication with each other. Students can research and learn at a greater level, at a faster pace. Data and information flow at incredibly fast speeds and are processed along with billions of operations in seconds. The majority of electronic components are reliable, and don’t usually fail the user. Computers are consistent, producing the same results from the same input. Information and data can be stored, available for use at any time in the future. Wireless communication is now available on computers, which makes use incredibly convenient.


There are significant disadvantages to the use of computers in everyday life, some that we may not even be aware of yet. Once information is stored on the internet or in a computer, it is incredibly difficult to erase. This has become a violation of privacy or many individuals who have had their private lives broadcasted or their identities stolen. Innocent users have shared photos or other personal information publicly on computers and have since been victims of dangerous crimes. It is extremely important to protect yourself and be careful what information you release to the world. Despite the increase in productivity that computers have been responsible for, millions of employees have been replaced by this technology. Not everyone is up-to-date on the latest technology for labor, companies have increased their outsourcing of jobs, and many computers simply do the job faster than a human being can. Furthermore, health risks of computers are continually being brought to attention. There are potential injuries of the hands, wrists, elbows, eyes, neck, and back. There is a risk of computer addiction, which is a treatable disorder. I have a fear that there are many more health risks that will come about, particularly from the constant use of laptops, which sit on the person’s thighs. Computer manufacturing processes and computer waste are having a negative effect on our environment, depleting our natural resources and releasing toxic materials. It is important to recycle old computers and other technologies.

The future of computers in our society:
Advantage: http://www.nytimes.com/2006/10/31/science/31essa.html
Media and technology are improving to the extent that a person could record their entire life if they pleased.

Disadvantage: http://www.nytimes.com/2009/07/26/science/26robot.html
Artificial intelligence is rapidly increasing, even responding with emotions. Computers may actually follow those scary sci-fi movies and outsmart mankind
.

Week 1: Muddy



I have been assigned countless PowerPoint presentations and dance projects where I just use any music or photos I can find, completely unaware of the possibility of me breaking the law. Third grade history teachers and sixth grade dance teachers don’t mention the legal repercussions of using any material we can find, especially after we leave the protected environment that is grade school. In the business world, using any material we please could result in expensive legal fees, fines, and bad publicity. That’s why it is so important to learn all of the rules for borrowing copyrighted information. Unfortunately, this concept took a little bit of time for me to grasp because I’m so used to not thinking through these strict rules.

Currently, US Copyright laws give legal protection for almost all forms of creativity, including text, photos, and musical compositions. In order to use copyrighted material, you must be the copyright owner, have received written permission from the owner, or be using material in the public domain. Schools, teachers, and other educational establishments have a “fair use” provision in copyright law that allow circumstantially limited use of copyrighted materials without receiving permission. There are four factors very important to whether fair use is applicable: “the purpose and character of use, including whether such use is of a commercial nature or is for nonprofit educational purposes”, “the nature of the copyrighted work”, “the amount and substantiality of the portion used in relation to the copyrighted work as a whole”, and the effect of the copyrighted work on the potential market. Only the courts can determine whether a particular case counted as fair use, but these factors were a consensus of the conditions when fair use should apply or when permission is required. If the work is not in the public domain or used as fair use, then usually payment is required to receive permission to use the copyrighted material. It takes many years (an individual’s lifetime plus 70 years) for a copyright to be invalid, so copyright owners have a lot of time to make money off of people using their creative work. I definitely recommend getting a copyright any time your ideas take form, because you don’t want somebody else getting credit or making money off of your imagination.

The Disney Parody: A Fair(y) Use Tale video definitely helped to explain the rules of fair use to me in an amusing and understandable way, though I did have to rewind sometimes to catch what the characters had said.









Disney video:
University of Texas Document: