Which has greater importance in a hotel stay

Sunday, April 18, 2010

week 14: CLear

Enterprise storage is for large storage of high technology and is in common use in businesses. Enterprise storage is far more reliable than what is currently used by consumers. There are four main uses for enterprise storage and its for archiving, backup, disaster recovery, and online storage. It is used by many industries that need to be protected or use the possibilities that enterprise storage offer.

Enterprise storage obviously has a great effect on business. It has yet to be used by individual consumers and is only used by businesses. It is key for large businesses with large amounts of information to use enterprise storage. The key is getting enterprise storage to be able to be practical for use by consumers. The site gave valuable information about enterprise storage.

Week 14: Secure Email

The securing of email and is a pertinent issue to many companies and individuals but so is the possibility of cloud storage. Currently client-server is used but cloud storage would be on-demand like a public utility. Cloud storage has begun to gain steam as paradigm shift that should occur. Email is believed to be the first application that cloud storage needs to secure. The CEO of Proofpoint believes that soon cloud storage will be the way of the Internet and securing email is integral to that. The article I have summarized can be found here.


The screen capture can be found here


Sunday, April 11, 2010

week 13: CLear

Phishing is a crime that is committed everyday to unsuspecting individuals. Phishing is the crime of attempting to acquire sensitive information such as passwords, credit card details through electronic communication. The way individuals fall victim is the communication appears to have been sent by a trustworthy source. As Internet use expands and changes the techniques used for phishing evolve and change creating a problem that is very hard to solve. One key deterrent is awareness by individuals of the tactics used in phishing, with that individuals can avoid being tricked by phishing.

Phishing is a very serious crime and people need to learn how to defend themselves. As a country we are on the internet more and the problem of phishing can not be ignored. Those involved in business need to be very cautious due to not only having sensitive information about themselves that can be stolen but their company as well. This website made by Microsoft offers invaluable tips on how to be a victim of phishing.

An example of items to look for in phishing e-mails.

Sunday, April 4, 2010

Week 12: Database

During this project I learned to use a program I had never used before. I learned how to use a database and how to manipulate it. There are many functions to be used with databases such as creating queries and forms. The queries were very fun to use and would be very valuable in data organization. The forms were also neat and allowed good summarization of data.

The major issue I encountered while doing this project was the importing of data. It is difficult to combine tables and reorganize the data. Several times I attempted to download a table and a row would be missing. This was difficult to deal with in combination with the lack to go back to fix errors. This issue however most likely compounded by human error.

Sunday, March 28, 2010

week 11: CLear

A database is a collection of data used by users to access information. There are many types of databases such as operational, analytical, and external each used by different users. Operational database is used in organizations to support operations and increase efficiency. The security of databases is critical due to the vast amount of valuable information. There is software that manages the storage of the data.

Databases are a crucial component to businesses success. Once a organization has large amounts of data they must begin storing them in databases. To not do this would be detrimental to the success of the organization. Not just a database is needed but an easy to use and navigate one. Here is a link to the world's most popular open source database.

Sunday, March 21, 2010

Excel Project

Our excel project consisted of manipulating data in regards to heart rate during exercise. The fisrt thing we did was manipulate the raw data and get new figures. The second part consisted of data analysis and using pivot tables. The actions we did gave us more information and elaborated on the data.

The project let me use the skills I learned in excel doing our last project. This project was very easy due to that and made it more enjoyable. I feel that I am now pretty well versed in excel and have never been this confident using it. Excel is a very useful program and I'm happy to be better at it now.

Here is a screenshot of one of the pivot tables:

Sunday, March 7, 2010

week 9: Clear

Excel which is apart of the the Microsoft Office applications allows users to create spreadsheets easily and quickly. It is offered for both Microsoft Windows and Mac OS X and has been in use since 1987. Once an individual learns the basics it allows them to create spreadsheets and charts for various uses. There have been over 10 versions but not till version 5 did the application begin to be used widely.


Excel is an invaluble tool for all involved in business. It is by far easier to use than paper speadsheets and has almost wiped them out in their use. When being interviewed a common question is how good are you at using excel and to say effiecient is an upperhand. The lack of knowledge of excel could easily cause one to lose a potential job. Knowing the ins and outs of excel wll only be beneficial. This website posts tips for use such as shortcuts and graphics.

Excel on Mac OS X

Sunday, February 21, 2010

week 7: Clear

A graphical user interface or GUI is the way in which users interact with their software. A GUI allows you to interact with menus and visual images in contrast to a command-line interface which only allows users type on a keyboard. Graphical user interface is the most widely used interface today. A GUI is much simpler to use than a command-line because it does not require exact spelling. grammar, and punctuation.

People in the business world are constantly on computers and should know about the interface. There are many shortcuts used by a GUI and individuals need to learn these shortcuts to increase productivity. This link has information on the Mac OS X the current operating system on many Mac computers. This operating is very easy to use and I know this from firsthand experience.



A photo of the Windows 7 operating system




Sunday, February 14, 2010

week 6: Web 2.0 Project

I have posted a poll question and hope it will allow more insight. I am curious to see how people respond and see which one they value more preparedness, hospitality, or both equally.I have yet to receive any feedback on my story.
At first this assignment appeared like it was going to be very difficult. Once I picked a topic I realized it was not as bad as I thought. The directions confused me a little and creating the video seemed hard until I found OneTrueMedia.com. It was very easy to use and I felt like I was able to completely respond how I wanted to.
I'm a loser baby by Beck symbolizes the struggle I was having before getting employed. Hotel by Cassidy featuring R. Kelly is for the establishment being talked about. You're the best around by Joe Esposito represents the feeling one gets one being both prepared and hosbitable.
Web 2.0 projects I had never heard of before the project but it very effective communication device. It is a new and unique way to talk about oneself. It is a good way to display skills to potential employers.


Sunday, February 7, 2010

week 5: Clear

The machine cycle is the four step process that allows a processor to execute one instruction. The four steps in the process are fetch, decode, execute, and store. Steps one and two are called the fetch cycle and are same for each instruction. The fetch cycle processes the instruction. The third and are fourth step are called the execute cycle and are different dependent on the instruction.

The machine cycle is the most basic part of how computers work and should be known by all business people who want to be knowledgeable. The machine cycle allows users to be able to properly use their computers. Linux has a website that has info on the machine cycle.


The Machine Cycle

Sunday, January 31, 2010

week 4: Clear

A EULA or end-user license agreement is a contract between the purchaser and licensor which gives the former the right to use software. The EULA is unique in that the purchase is made before the contract is seen. Common in a EULA is a clause that protects the licensor in case of damage to the purchasers computer or data due to the software. Many EULA's contain extensive liability limitations.

EULA's are important because they tell how software can and cannot be used. This is very relevant in the business world due to the large amoun
t of software used. Individuals need to know what they are able to do with software to avoid legal ramifications. This website provided vast amounts of information on the subject.

A user-end license agreement for the Apple iPhone

Saturday, January 23, 2010

week 3: Clear

Wi-Fi, short for Wireless Fidelity, is wireless technology that allows free roam browsing of the internet. Wi-Fi is owned by Wi-Fi Alliance and was created by InterBrand. The technology used by Wi-Fi allows signals to be transmitted by use of radio waves. Wi-Fi uses wireless local area network devices to to work.

The basics of Wi-Fi technology has been around since 1985 but has only recently began to effect everyday life for individuals. In the not too distant future most cities will had Wi-Fi throughout them. Wi-Fi will has all ready effected the way business can be done and will continue to have effects. HowStuffWorks.com has a great article about the basics about and how to make your own Wi-Fi network.


A Linksys router used to allow a wireless internet connection



Sunday, January 17, 2010

Week 2: Clear

Binary codes is how all information and processes is represented in a computer. It would behove all who use computers to understand the basics of binary coding. Binary is a Base 2 numbering system which means it uses two unique digits to represent numbers. The two numbers binary uses are "0" and "1". Binary is a sophisticated system and use of is complicated.

Individuals should know the basics of binary due to how much it effects their lives. Every computer uses binary, and seeing as the internet has and will continue to revolutionize how we live individuals should educate themselves. I found a website that provided concise information about the basics.


A photo of binary coding.





Week 1: Clear

Proper netiquette should be followed by all on the internet. Internet etiquette or simply netiquette is the practices used mainly in communication to enable an enjoyable experience for all involved. Some of the basics of netiquette include not using ALL CAPS since that is considered shouting but smileys, for example :), can be used but only sparingly. There are netiquette practices for the sending, replying, and confidentiality of messages.

Netiquette is important during personal messages but is invaluable in its use in the business world. Not following proper netiquette can result in messages not being understand or altering the meaning of a message amongst other issues that can and will arise. Not using proper netiquette can come off as being unprofessional and that can
cause a lose of work or a job. A website that is very beneficial is "Top 26 Most Important Rules of Email Etiquette". As one can tell this website list 26 rules everyone should follow if their emailing.

Netiquette is easy to understand and easier to follow and plus you do not want your friends acting like this.