Tuesday, November 27, 2007

Video Resume

11/19/07 Class Notes

Mainframe:
systems are built around a single, monolithic computer that is shared by all users on the system

Client/Server: a central server is used to store information that is accessed and acted upon by any number of client machines connected to the server through a network

N-Tier: compartmentalizes different functions of a system into modules that interact with one another

Distributed: is a system of servers, loosely coupled across a dispersed network, that work together to deliver a website

Data Layer: provide fast, reliable access to data needed to run a system
the data layer is responsible for maintaining information about the relationships between data

11/7/07 Class Notes

Blog Presentations

11/5/07 Class Notes

EXAMPLES OF VIRUSES

Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware)

Boot Virus–Attacks boot sectors of the hard drive

"Trojan horses” –a botplanted in the systems being attacked, can be operated locally or remotely for malicious purposes

Viruses-
Fast to attack–Easily invade and infect computer hard disk
Slow to defend–Less likely to detect and destroy
Hard to find (Stealth)–Memory resident (registry)Able to manipulate its execution to disguise its presence

Use Password, alphanumeric, mix with upper and lower cases, change frequently, no dictionary names

Use Encryption, coding of messages in traffic between the customer placing an order and the merchant’s network processing the order


Firewall: frequently used for Internet security
Enforces an access control policy between two networks
Detects intruders, blocks them from entry, keeps track what they did and notifies the system administratorSummary and Exercises

10/31/07

OBJECTIVES
What are security concerns (examples)?
What are two types of threats (client/server)
Virus – Computer Enemy #1 threat
How to prevent and protect?

SECURITY CONCERNS:

examples
Uncover confidentiality (bank account)
Leak Authentication and Access Control (user name, password of your Web, email)
Conduct ID theft (over 50% is credit card fraud)
Hack or Intrude Web sites

Happens to client computers examples
Deliberate Corruption of Files (e.g., rename files)
Delete Stored Information
Use Virus (bring down system)

SERVER SECURIY THREATS
Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack)
Web server directories (folders) can be accessed and corrupted

Server Threats:
DENIAL OF SERVICE
Hackers …

Break into less-secured computers
Installs stealth program which duplicates itself (congest network traffic)
Target network from a remote location (RPC) and activates the planted program
Victim’s network is overwhelmed and other users are denied access to Web and Email

10/24/07

Test 1... no class

10/17/07

In FrontPage: design, HTML (handles presentation layer), split, previewSDLC = Software Development Life Cycle --> Project ManagerSite Design (Chapter 8)Web site is a computer application.

Developing Computer Applications has a Life Cycle:
Plan the site: requirements, define audience
Design: function/technical design
Execution: building/testing internally
Release: make available to publicPlanning the Site

Define the site's goals, determine who will be involved, understand time and need constraints

Process and detailed planningDefine Audience:
Output: customized peer review form for presentation
Need analysis: customer expectations
Make list of intended audience
Identify what the prospective customers want or need

Competitive Analysis:
Helps to make site better as opposed to your competition

Evaluate criteria: personalization, consistency, and ease of navigation

Design Tips:
Keep it simple
Enhance response time
Focus on content
Ensure company's name is visible
Emphasize appearance
Allow easy return to homepageSite Design and Evaluation Criteria (ACSS)

Appearance: make sure site it aesthetically pleasing, use professional tools for help
Consistency: build one image, use style guide
Scalability: simultaneous scalable access, capable of expanding
Security: threats (ID theft, privacy), protect from hackers

10/15/07 Class Notes

Mobile Commerce:

What is mobile commerce?
E-commerce over wireless network, transmission of user data without wires

Why wireless?
Convenience, flexibility, efficiency, anytime/anywhere accessWireless LAN
Most common standard for wireless networking
Flexible and cheaper, but only travels 150 feet


B2B: CRM and EAICRM:

Customer Relationship Management
retain old customers and get new ones
strategy (ideas) & implementations (software) of managing customer relationship (for retention)

Components of CRM strategy:

Sales force automation: from contacts to sales

Customer service: customer care and self-care, tailoring and personalization

Analytics: analyze, report, and predictCRM Implementation: application examples include siebel and ePiphany

EAI: Enterprise Application Integration
Use middleware for integration

10/10/07 Class Notes

Mobile comerce is internets, intranets, and wireless nets. It is e-comerce that is wireless.

Benifits: Conveinence, flexibility, efficieny, anytime-anywhere access.

Wireless standards are protocols that are standard for any computer that runs on a wirless network.

Wireless LAN is the most common form of wirless network.

Opportunities and Limitations: Low power, small screens, limited memory, small key pads, questionable conncetions.

Customer relationship management - stratagies and implementations of managing customer relationships.
Components: sales force automation, customer service, analysis.Siebel and ePiphany make CRM technology.

Architecture: 3-tier architecture, presetation, busines logic, data.EAI is middleware - enterprise application implementation. All of the applications put together.

10/8/07 Class Notes

Intranets are an organizational wide software and data system applying Internet technology in a closed network.

A two are three tier architecture of an intranet is having a user interface, database management, and customer relationship management.

The intranet is needed to link people together, and establish the fundamentals of a developing enterprise.

The architecture of an intranet is how it is designed and how many layers of systems it has.

10/1/07 Class Notes

1. What is ISP?
ISP is a company that provides internet access and services to consumers

2. Why ISP?
Excellent and efficient service and access to the internetEnables e-commerce

3. Is ISP a type of SP? What are other SP?
Yes - ISP is a type of SPOther SPs are: Health SP & Application SP

4. What is web hosting?
Web hosting is the use of web to enable web data sharing over networks enabled by ISP

5. How to choose ISP?
PriceSpeedAvailabilityServices

9/19/07

Six Internet Services
–Web
–Email
–Chat (instant messenger)
–Newsgroup
–FTP
–Telnet

Tuesday, September 18, 2007

9/12/07 Class notes

Two in-class projects: meet in library and use its pc's.

1. Group Project
  • select 1 opportunity, document on your class blogs
  • ask 5 questions. What is c and 4p?
  • create new project blog for the group on the product/service

2. Plan/Study for video resume

  • where to get digital camera
  • how to upload to Youtube
  • how to link it to the blog

3. Complete all assignments

  1. web page res.htm
  2. blogging ideas and class notes
  3. practice Gmail chatting

Homework assignment: conceive a 1-2 minute script for your product/service, preparing for video introduction

9/10/07 Class notes

Assignments:

1. Purchase book
2. Training 1 (use Frontpage to create single html resume

Agenda:
1. talk about assignment - Frontpage
2. group projects
3. repeat money-making-machine

Notes on webpages:

basic unit of webpage=html file
html: hypertext markup language
hyper: linkeable>hyperlink: linkable text
markup: format - - command

Sunday, September 9, 2007

9/5/07 Class notes

Today's class covered 4 main topics:

1. Review assignments

Discussion with parents assignment – 5 main questions
· Who are the customers?
· What are the products and services?
· How much do they charge per unit?
· How are the products and services distributed to the customers?
· How do they make their products and services known?

2. Creation of blog on blogger.com
· Short bio
· Class notes
· Video resumé

3. expand the money making machine model

GSE Goal Strategy Execution – Path to Success

· Goals
· Strategy – how to get it don
· Execution – how to do it


4. using Frontpage to create a webpage