Tuesday, November 27, 2007
11/19/07 Class Notes
systems are built around a single, monolithic computer that is shared by all users on the system
Client/Server: a central server is used to store information that is accessed and acted upon by any number of client machines connected to the server through a network
N-Tier: compartmentalizes different functions of a system into modules that interact with one another
Distributed: is a system of servers, loosely coupled across a dispersed network, that work together to deliver a website
Data Layer: provide fast, reliable access to data needed to run a system
the data layer is responsible for maintaining information about the relationships between data
11/5/07 Class Notes
Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware)
Boot Virus–Attacks boot sectors of the hard drive
"Trojan horses” –a botplanted in the systems being attacked, can be operated locally or remotely for malicious purposes
Viruses-
Fast to attack–Easily invade and infect computer hard disk
Slow to defend–Less likely to detect and destroy
Hard to find (Stealth)–Memory resident (registry)Able to manipulate its execution to disguise its presence
Use Password, alphanumeric, mix with upper and lower cases, change frequently, no dictionary names
Use Encryption, coding of messages in traffic between the customer placing an order and the merchant’s network processing the order
Firewall: frequently used for Internet security
Enforces an access control policy between two networks
Detects intruders, blocks them from entry, keeps track what they did and notifies the system administratorSummary and Exercises
10/31/07
What are security concerns (examples)?
What are two types of threats (client/server)
Virus – Computer Enemy #1 threat
How to prevent and protect?
SECURITY CONCERNS:
examples
Uncover confidentiality (bank account)
Leak Authentication and Access Control (user name, password of your Web, email)
Conduct ID theft (over 50% is credit card fraud)
Hack or Intrude Web sites
Happens to client computers examples
Deliberate Corruption of Files (e.g., rename files)
Delete Stored Information
Use Virus (bring down system)
SERVER SECURIY THREATS
Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack)
Web server directories (folders) can be accessed and corrupted
Server Threats:
DENIAL OF SERVICE
Hackers …
Break into less-secured computers
Installs stealth program which duplicates itself (congest network traffic)
Target network from a remote location (RPC) and activates the planted program
Victim’s network is overwhelmed and other users are denied access to Web and Email
10/17/07
Developing Computer Applications has a Life Cycle:
Plan the site: requirements, define audience
Design: function/technical design
Execution: building/testing internally
Release: make available to publicPlanning the Site
Define the site's goals, determine who will be involved, understand time and need constraints
Process and detailed planningDefine Audience:
Output: customized peer review form for presentation
Need analysis: customer expectations
Make list of intended audience
Identify what the prospective customers want or need
Competitive Analysis:
Helps to make site better as opposed to your competition
Evaluate criteria: personalization, consistency, and ease of navigation
Design Tips:
Keep it simple
Enhance response time
Focus on content
Ensure company's name is visible
Emphasize appearance
Allow easy return to homepageSite Design and Evaluation Criteria (ACSS)
Appearance: make sure site it aesthetically pleasing, use professional tools for help
Consistency: build one image, use style guide
Scalability: simultaneous scalable access, capable of expanding
Security: threats (ID theft, privacy), protect from hackers
10/15/07 Class Notes
What is mobile commerce?
E-commerce over wireless network, transmission of user data without wires
Why wireless?
Convenience, flexibility, efficiency, anytime/anywhere accessWireless LAN
Most common standard for wireless networking
Flexible and cheaper, but only travels 150 feet
B2B: CRM and EAICRM:
Customer Relationship Management
retain old customers and get new ones
strategy (ideas) & implementations (software) of managing customer relationship (for retention)
Components of CRM strategy:
Sales force automation: from contacts to sales
Customer service: customer care and self-care, tailoring and personalization
Analytics: analyze, report, and predictCRM Implementation: application examples include siebel and ePiphany
EAI: Enterprise Application Integration
Use middleware for integration
10/10/07 Class Notes
Benifits: Conveinence, flexibility, efficieny, anytime-anywhere access.
Wireless standards are protocols that are standard for any computer that runs on a wirless network.
Wireless LAN is the most common form of wirless network.
Opportunities and Limitations: Low power, small screens, limited memory, small key pads, questionable conncetions.
Customer relationship management - stratagies and implementations of managing customer relationships.
Components: sales force automation, customer service, analysis.Siebel and ePiphany make CRM technology.
Architecture: 3-tier architecture, presetation, busines logic, data.EAI is middleware - enterprise application implementation. All of the applications put together.
10/8/07 Class Notes
A two are three tier architecture of an intranet is having a user interface, database management, and customer relationship management.
The intranet is needed to link people together, and establish the fundamentals of a developing enterprise.
The architecture of an intranet is how it is designed and how many layers of systems it has.
10/1/07 Class Notes
ISP is a company that provides internet access and services to consumers
2. Why ISP?
Excellent and efficient service and access to the internetEnables e-commerce
3. Is ISP a type of SP? What are other SP?
Yes - ISP is a type of SPOther SPs are: Health SP & Application SP
4. What is web hosting?
Web hosting is the use of web to enable web data sharing over networks enabled by ISP
5. How to choose ISP?
PriceSpeedAvailabilityServices
Tuesday, September 18, 2007
9/12/07 Class notes
1. Group Project
- select 1 opportunity, document on your class blogs
- ask 5 questions. What is c and 4p?
- create new project blog for the group on the product/service
2. Plan/Study for video resume
- where to get digital camera
- how to upload to Youtube
- how to link it to the blog
3. Complete all assignments
- web page res.htm
- blogging ideas and class notes
- practice Gmail chatting
Homework assignment: conceive a 1-2 minute script for your product/service, preparing for video introduction
9/10/07 Class notes
1. Purchase book
2. Training 1 (use Frontpage to create single html resume
Agenda:
1. talk about assignment - Frontpage
2. group projects
3. repeat money-making-machine
Notes on webpages:
basic unit of webpage=html file
html: hypertext markup language
hyper: linkeable>hyperlink: linkable text
markup: format -
Sunday, September 9, 2007
9/5/07 Class notes
Today's class covered 4 main topics:
1. Review assignments
Discussion with parents assignment – 5 main questions
· Who are the customers?
· What are the products and services?
· How much do they charge per unit?
· How are the products and services distributed to the customers?
· How do they make their products and services known?
2. Creation of blog on blogger.com
· Short bio
· Class notes
· Video resumé
3. expand the money making machine model
GSE Goal Strategy Execution – Path to Success
· Goals
· Strategy – how to get it don
· Execution – how to do it
4. using Frontpage to create a webpage