Enterprise storage obviously has a great effect on business. It has yet to be used by individual consumers and is only used by businesses. It is key for large businesses with large amounts of information to use enterprise storage. The key is getting enterprise storage to be able to be practical for use by consumers. The site gave valuable information about enterprise storage.
Sunday, April 18, 2010
week 14: CLear
Enterprise storage is for large storage of high technology and is in common use in businesses. Enterprise storage is far more reliable than what is currently used by consumers. There are four main uses for enterprise storage and its for archiving, backup, disaster recovery, and online storage. It is used by many industries that need to be protected or use the possibilities that enterprise storage offer.
Week 14: Secure Email
The securing of email and is a pertinent issue to many companies and individuals but so is the possibility of cloud storage. Currently client-server is used but cloud storage would be on-demand like a public utility. Cloud storage has begun to gain steam as paradigm shift that should occur. Email is believed to be the first application that cloud storage needs to secure. The CEO of Proofpoint believes that soon cloud storage will be the way of the Internet and securing email is integral to that. The article I have summarized can be found here.
The screen capture can be found here

Sunday, April 11, 2010
week 13: CLear
Phishing is a crime that is committed everyday to unsuspecting individuals. Phishing is the crime of attempting to acquire sensitive information such as passwords, credit card details through electronic communication. The way individuals fall victim is the communication appears to have been sent by a trustworthy source. As Internet use expands and changes the techniques used for phishing evolve and change creating a problem that is very hard to solve. One key deterrent is awareness by individuals of the tactics used in phishing, with that individuals can avoid being tricked by phishing.
Phishing is a very serious crime and people need to learn how to defend themselves. As a country we are on the internet more and the problem of phishing can not be ignored. Those involved in business need to be very cautious due to not only having sensitive information about themselves that can be stolen but their company as well. This website made by Microsoft offers invaluable tips on how to be a victim of phishing.
An example of items to look for in phishing e-mails.

Sunday, April 4, 2010
Week 12: Database
During this project I learned to use a program I had never used before. I learned how to use a database and how to manipulate it. There are many functions to be used with databases such as creating queries and forms. The queries were very fun to use and would be very valuable in data organization. The forms were also neat and allowed good summarization of data.
The major issue I encountered while doing this project was the importing of data. It is difficult to combine tables and reorganize the data. Several times I attempted to download a table and a row would be missing. This was difficult to deal with in combination with the lack to go back to fix errors. This issue however most likely compounded by human error.
The major issue I encountered while doing this project was the importing of data. It is difficult to combine tables and reorganize the data. Several times I attempted to download a table and a row would be missing. This was difficult to deal with in combination with the lack to go back to fix errors. This issue however most likely compounded by human error.
Subscribe to:
Comments (Atom)