Sunday, April 18, 2010

Week Fourteen: Clear

This week is the last week in ISM3004, and I'm not sure if it's because of the project or because of finals coming up, but this week was a little bit harder to retain. But I did understand the information, and found it to be useful since it can not only help to save money, but to save space and your data! 
From RAID storage systems, to virtualization, to thin client computing, each has its own price range and its different abilities to help save and store data. I thought the idea of RAID storage systems were quite interesting since its purpose is to contain multiple drives into one. There are multiple RAID systems, two work differently from each other, RAID 1 and RAID 0, while RAID 5 and 6 help to combine the two, but each work at different speeds with other slight differences. I also found this article that helps to explain RAID as well:http://compreviews.about.com/od/storage/l/aaRAIDPage1.htm.
This week we also discussed virtualization and thin client computing. Virtualization seems nifty because it allows the user to run multiple virtual computers within one actual computer. Such as being able to run both Windows and Linux while running the Mac OS, all at the same time on a Mac. This not only saves space, but it also greatly increases productivity. Just as Professor Olson states in the lecture, the T.A.C assistants greatly benefit from using this because they have the ability to help users who have any of the platforms instead of being restricted to only Windows, only Linux, or only Mac OS. Thin client computing (as pictured above) is also a great space saver as well as information saver because it allows all the data to be sent to a central system instead of having a hard drive within the computer itself. 

Secure Email Project

I actually really liked this project. At first I thought it was going to be a lot harder than it was, especially with all the frantic posts I was reading on the discussion board. But besides waiting for the emails back from Dr. Means, I think the hardest part was finding an article "about businesses that have used or should have used secure email or other security measures to protect data." Especially since many of the articles are from several years ago. The article I found (linked below) is about the FBI's private information being leaked, and how a man used encrypted emails to leak this information.
Article: http://www.businessweek.com/technology/content/aug2001/tc20010829_039.htm
The aforementioned article, titled Digital Trail Leads to Accused Spy, is about Brian P. Regan giving out information that included pictures from the FBI's private informations to another country. The country, which was referred to as 'Country A' in the files, was identified as Libya by a Washington Post report. Regan was using a free email account through which he sent encrypted emails that were supposed to be unreadable by the US government. Naturally, the FBI was able to decrypt the messages and discovered that Regan had sent "a set of overhead satellite photos, as well as a CIA intelligence report, two pages from a classified CIA newsletter, and other documents" (Poulson, 1). The article then goes on to explain that Regan was accused of passing this private information through Intelink, which is "a classified global intranet that links the thirteen U.S. intelligence agencies to each other, and to their 'customers' in the White House, Congress, the Pentagon and other government agencies," according to the article. Since Intelink is only supposed allowed to be used by certain people, there was concern for the information that was available. People feared that there might be information available that others shouldn't know, which almost resulted in Intelink's shut down. Fortunately, those in charge were able to tweak people's access to Intelink, so that you would need a certain digital certificate, or have to be cleared in order to access certain things. Albeit the potential troubles that could be caused by having access to Intelink, as was seen in the case with Regan, the system is also what allowed FBI agents to investigate his case and to eventually catch him in the act.   

Sunday, April 11, 2010

Week Thirteen: Clear

This week's topic was computer security and safety, ethics and privacy. Although this topic was briefly discussed earlier in the course, this week went more in depth with the topic. From describing the people who commit cybercrimes, to ways to protect your computer from harmful software, to how much information one should consider giving out over the web. According to the text, Discovering Computers 2010, there are seven basic categories of those who commit cybercrimes. They are: hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. Each of the people who commit cybercrimes do it for their own personal reasons, whether it be personal gain, because they can, or to "teach a company/person a lesson about their security."
All of the computer risks mentioned can involve the people mentioned above, except for system failure, generally. Internet and network attacks, unauthorized access and use, hardware theft, software theft, and information theft are usually committed by a person, or people, whereas system failure is usually attributed to a power surge, or any kind of natural disaster. All of these computer risks can be experienced by both an individual or a company/corporation. 
Although I was aware that cybercriminals try to use e-mail as a way for infecting a computer, by sending spam, I didn't realize that they can also copy real companies' emails, request information through there, and commit their crime. This is both problematic for the company and the individual alike, because not only does the individual risk getting a virus, a worm, or the like, but they also could experience information theft (i.e. identity theft). The company could then be blamed if something like this happens, or they could potentially lose their customers' trust. 
Therefore, computer users must always beware of not only the e-mails they receive, but the attachments, and the webpages linked within the e-mail. Ways in which computer users can help to keep their computers safe, since their is no way to completely keep a computer safe from computer crimes, are by installing anti-virus software, continually backing up their data, staying informed about recent virus alerts, as well as installing firewalls into their computer. 
For more information, I found this website useful: http://www.us-cert.gov/cas/tips/  

Sunday, April 4, 2010

Week Twelve: Clear

I found this week's lesson about information system development to be understandable and enjoyable in a way since it is more relate-able. What I mean by the topic being more relate-able is that even though not everyone may be a system analyst, a programmer, or a project manager, most people have had to complete some kind of group project that required them to use some of the same skills that project managers user. The idea of planning a project can be a strenuous process, but having to be in charge of a group of people as well can be a difficult task. 
Even though not every project requires a large amount of work, nor does it demand too many hours, the stages of planning are similar to those mentioned in the text for the system development life cycle (SDLC). The stages are: 1) planning, 2) analysis, 3) design, 4) implementation, and 5) operation, support, and security. Granted, not all real world projects are going to go into that much detail for some stages, if they are even a part of the project, but in the world of information systems, they are very important. Each of the stages is constantly going through a rotation because that is the only way to make the system run smoothly and efficiently. The system will usually be dealt with through a project team, which is assigned a project manager. It is the manager's duty to keep on top of the project and make sure that everything is going as planned, and that the project will be done on time. 
One of the ways that the project manager can create an organized system for their team is by using a project management software such as the one pictured above, a Gantt chart, which was developed by Henry L. Gantt. This chart is used to show the activities that need to be done for the project and the times which they need to be done. Another tool, which is pictured in the textbook (Figure 12-3), is a PERT chart, short for Program Evaluation and Review Technique. This chart was developed by the U.S. Department of Defense, and is used to "analyze the time required to complete a task and identifies the minimum time required for and entire project" (Discovering Computers 2010, 624). The role of being a project manager doesn't end there, they must always be watching the budget of the project and the company, how the team is managing their time, and if there are any setbacks, such as additional steps that they did not foresee. The link below did a good job in explaining more on being a project manager. 
http://management.about.com/cs/projectmanagement/a/PM101.htm

Database Project

After working on the database project, I learned a wide range of new skills since I have never used Microsoft Access before. Although the project had its tough points, it wasn't as bad as I thought it was originally going to be. I found Access to actually be an interesting new tool for preparing reports and forms. I like how it allows users to create a multitude of information and store it all together. It is also useful for when a user only needs/wants to display or report certain information about a customer, for example. Microsoft Access allows the user to still keep the data within the database, but to hide it so that other users who don't need the information, won't be able to see it. The designs also make Access a little more fun and quirky, so that the forms and reports aren't just plain and white like any other document. All of the features of Access were new to me, so the fact that you could build new data off of older data was also really interesting. It also helps that Access allows for an easy way to import and export data.
Although I really enjoyed using Microsoft Access, and many of its parts were fairly simple and straight forward for the most part, there were some confusing points. Since there are so many features and ways to tweak the forms, queries, reports and tables, it can get a bit overwhelming, not to mention difficult to find certain things. For example, when completing the report activity portion of the project, the last step of putting the footer was a little bit difficult since there is a text box option and a label option as well. Not only that, but since there were about twenty little buttons in the group, it made it a little bit difficult to find. I also thought that the import function was wonderful, but a little confusing the first couple of times around, especially trying to append the imported information to the already existing information. Other than those minor setbacks, I liked trying out Microsoft Access and now view it as a potentially useful tool in the future. 

Extra Credit: Avatar



I used the TizMe avatar created to create my avatar featured above. The tools were really fun to use because the site offered a wide variety of clothes, hairstyles, and accessories to personalize your avatar. I enjoyed going though the different tops and bottoms of the clothes, mixing and matching the styles. I ended up going with a white top and gray sweatpants because it is more my style, and it was one of the more conservative options. I chose a dog as one of my accessories because even though I don't have a dog, I love dogs. I also chose an iPod because I love listening to music on my iPod. Overall, I really liked this avatar creation program.

Sunday, March 28, 2010

Week Eleven: Clear

This week we learned about database management. Although most of this information seems fairly straight forward (along with the face that I haven't yet completed the Database project), it just seemed like there was an overwhelming amount of information. Especially since there are different models of database management systems (DBMS). 
The general concept of what a database does is simple to understand, since it is basically the storing of information with the ability to modify, add and delete certain entries. As I was reading the textbook, databases did seem quite similar to the functions of Excel. But after reading the FAQ 10-2 box "When should I use a database instead of a spreadsheet?" I understood the difference between the two programs. Basically, databases, such as Microsoft Access should be used when information needs to be manipulated in a quick manner, such as updating, adding, modifying, or deleting. Whereas Microsoft Excel's spreadsheets should be used when information needs to be manipulated as far as the user having to do calculations with the data, create charts, or review any of the statistics given. 
I also never realized how prevalent databases are in our society. They are used to store student information for schools, in doctor's offices to store records, and even as a way for marketers to find a target market for their product. Although databases, for the most part seem to be fairly simple to manipulate as far as creating certain fields depending on the database, and entering information about users, not everything should be done be an individual; unless of course, they are a computer programmer. A computer programmer should be used for such instances as sharing data from multiple files so as to create one file. 

Sunday, March 21, 2010

Week Ten: Clear

Networks:
This week we learned about Networks as well as several communication concepts. This topic was actually really informative because when a user uses a laptop, desktop, the internet, or the world wide web, they don't necessarily think about where the information is coming from and how it is getting to their screen. Or at least I don't. This topic opened my eyes to the realization that networks are spread across LAN, WLAN, MAN, and WAN. 
LAN is a local area network which is usually used to connect only a limited area such as a home, school or office. Essentially, each house that has an internet connection has a LAN network. WLAN is a wireless LAN; basically a LAN connection that doesn't use any wires. WLAN will often work from a connected LAN, so these too can be featured in the home and other small environments. MAN, a metropolitan area network brings LAN connections together that are close by to one another. Usually within a city, a MAN network will take place, or as an example given in lecture, a group of schools that are close by to one another, who want to keep their networks together. Even bigger than the MAN network is the WAN network, which is a wide area network. This covers very large geographic areas, which can include a city, a state, a country, or even the world! 
In order for home computers, company computers, or any computer really to have access to any of the above listed networks, the computer must be connected somehow to a router. A router is used to communicate data from one location to another, no matter how far the computers may be from one another. A router is also used for sending and receiving data for multiple users. In order to reach a certain websites front page, a request goes through the router in order to gain access to that webpage.
(I found this web page really helpful in clarifying a few things: http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm).   

Saturday, March 20, 2010

Excel Project

This week I worked on the Excel Project. To be honest, I thought that this project was going to be a lot more difficult and time-consuming than it actually was. Of course, there were several times when my frustration got the better of me, but I think this project was extremely useful. Not only did it require the manipulation of a "normal" table of data, (that which was featured in the "Raw Data" sheet), it also required the creation of not just one, but two(!) pivot tables. 
For me, the pivot tables were probably the most challenging since you had to place certain categories in either the row or the column, and then having to change from the defaulted sum to the average, or the count of the numbers. As I read through the discussion boards, I came upon the same problem as several other students where the percentages featured in the "Average Increase" pivot table (featured above) were in the thousands. After playing with the decimal places and the number formats for several minutes, I realized that I was using "sum" instead of "average." After switching, my numbers fixed themselves and I simply changed the percentages to one decimal place. I also decided to add a little color to the pivot table by using the "Pivot Style Dark 9" option under design. I thought this made the table a little more appealing and user friendly instead of being all white like the "raw data" table.
One reason that this project didn't seem that difficult was because a large portion of it was adding and manipulating a basic excel table. I actually found this part kind of fun because it included the usage of formulas. The formulas function of excel made calculating the data so much simpler, especially considering that there were about 500 rows of data! Also, the fact that this project was displayed as a real-life situation with the gym owner made me realize how useful Excel really is for a multitude of reasons. 

Sunday, March 7, 2010

Week Nine: Clear

With the use of Microsoft Excel, the creation of spreadsheets is made simple. Not only does Excel allow the user to create one spreadsheet, but to create multiple spreadsheets together in a workbook. This week, learning about some of the basic functions of Excel, has been a review for me. Although I don't regularly use Excel, it is true that it is a very powerful tool. I originally learned the basics of Excel, along with some of its other functions in another computer class. Through ISM3004, more emphasis was put onto some of the functions that Excel is capable, one of which was the formulas ability.
The availability of formulas makes creating spreadsheets easier for users, especially when there are large amounts of data being used. Such formulas as =AVERAGE(), allows the user to average together a small, or a large amount of numbers. For example, if a user has 267 rows of data that they have to average together, instead of adding all the numbers together, and then dividing it by 267, they simply enter the formula =AVERAGE(A1:A267), and Excel will immediately give the answer. 
Along with the average formula, a user has the ability to add together data, subtract, multiply, divide, even look up data from a specific chart located on the spreadsheet. This can be an especially useful to a teacher who wants to see the letter grade for their students based on the total number of points received in the class. The can be down by using the =VLOOKUP() function. With the VLOOKUP function, the user enters the values which make the statement either true or false. In the case of a teacher, given in the example in the lecture, if they wish to record a students grade as unsatisfactory or satisfactory, the user only enters which value is to be marked as satisfactory and all that is not, will be marked as unsatisfactory.

Sunday, February 21, 2010

Week Seven: Clear

This week we learned about operating systems and utility programs. Although the topic was pretty easy to understand from a general point, it did get fairly nit-picky in certain areas. One of such topics is between application software and system software. As defined by Professor Olson in lecture 7a- Introduction, application software "helps you accomplish a task," these are specific tasks, such as Microsoft Word, or Turbo Tax. While system software is "the collection of programs that are needed for the smooth functioning of a computer and its peripheral devices," usually a more general function for a computer, such as an anti-virus program, or Microsoft Windows XP Professional. 
From the general topic of system software, comes the operating system, which many are familiar with as "what runs a computer." According to the book, "an operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources" (Discovering Computers 2010, 398). The operating system is such a powerful tool within a computer unit, because it is what allows the computer to run. Without an operating system, a computer would not be able to function, because of it would not have any instructions to follow, nor any programs to run. Because of the operating system, a user is able to start a computer, whether it be with a cold boot or a warm boot [a cold boot is when a user turns on a computer that was previously completely off, while a warm boot is when a user essentially restarts a computer that was already on]. Operating systems also provide a user interface; the one most common today for users is the graphical user interface, or GUI, which was invented in 1973 by Xerox Alto system, and then used by Apple in 1984, where it was then adopted by other computers today. The other kind of user interface, which is generally used more for network administrative use, is command-line interface. The operating system is also used for managing programs, memory, storage and handling input and output devices. 
Even though operating systems are immensely important in the use of a computer, utility systems, otherwise known as utility, helps users in the maintenance and use of their computer. Utility systems include file managers, which allow users to store documents, pictures, music, etc, into different folders for easy access later on. Search utility is an important function for when users wish to access a document quickly, or if they aren't able to find a file easily. The disk defragmenter utility is a very helpful tool in allowing users to not only have more space in their computer while their files become more organized, but it allows for faster processing as well.  

Saturday, February 13, 2010

Week Six: Clear

Memory and Storage
Along with RSI (repetitive strain injury) [see previous blog], another topic that I felt was important was storage! As well as memory, but since I'm currently searching for storage for the data on my computer, it seems more important to me right now. :) Although memory is close behind since I'm also currently researching laptops! But more on that later, maybe
So before this course, and this lesson, I wasn't aware that there was more than one type of storage. I thought that there was just flash drives and external hard drives, and that you just stick all your necessary information on there and that's it. But once again, I was wrong. There are actually quite a few kinds of storage, and devices that can be used. [Yay for being informed! :) ] In addition to watching the lectures, I also found this website that helped in the explanation of storage: http://computer.howstuffworks.com/removable-storage.htm. Different types of storage include portable storage (i.e. USB flash drives or memory cards), not-so-portable storage (i.e. internal hard disk, as well as well as some external hard disks), or online storage (i.e. cloud storage). Although everyone should have some kind of storage for backing up data, it is different for everyone. Depending on the amount of storage space needed, products will vary. USB flash drives are usually handy to carry around in case a document or presentation needs to be saved, or turned in. External hard drives generally come with a lot more storage space. Along with external hard drives are pocket hard drives, which allow for more portability, while potentially offering a decent amount of storage space. 
Memory is also an important component of a computer! Depending on what the user of the computer is going to do with the computer, determines how much memory is necessary at the time of purchase. This website helped to explain a little more about memory and its different components: http://www.howstuffworks.com/computer-memory.htm. The website explains the difference between RAM and ROM, as well as describe flash memory, virtual memory, and memory sticks. Memory is not only important in computers today, but also in other electronic devices such as PDAs, cameras, cell phones, and smartphones. Since our society is becoming more technological, people are looking for good portable devices that allows them to keep certain data (i.e. pictures or documents) with them at all times. Another reason, is that music players are becoming more popular on cellphones and smartphones. Storing songs on any device can take up a good portion of memory depending on how much music a person listens too. 
Thus, memory meets storage. Although the two are vastly different, they are very important and oftentimes are used together. But, as I learned in class, before making any major purchases, it is always smart to think what you're going to use the device for and then researching the product before buying it. Following these steps not only help to save money on buying several products, but also allow you to get the most for your money.    

Web 2.0 Tools Project

After creating this Web 2.0 Tools Project, I realized that it was a lot harder than I had expected it to be. But overall the project was fun to create. Although it was frustrating at times, I'm happy with the outcome of my project. 
This project inspired me to be more creative in the way I displayed my pictures and the fonts and colors that I used. By using the Vuvox Collage program to create a slideshow I realized how resourceful this tool could be for future use. Not only is it good for sharing of personal information, but after looking at several other of the presentations featured on the website, it is also a good way to market your business. The program allows for a professional manner because it allows the user to post both pictures and videos of the message they are trying to get across. The upload process was also fast and simple, granting easy access to all the media needed for the presentation. As I found, and as stated in some feedback, the scrollbar at the bottom allows viewers to scroll back and forth throughout the presentation while taking their time and looking at available pictures. Another wonderful thing about this tool is that when you make changes or edit the littlest thing about the presentation, it automatically updates the presentation no matter where you have already posted your presentation.
Thus, I thought this project was every useful, although quite stressful. I went through a few methods of creating my story before officially deciding to use the Vuvox Collage program. In addition to posting my project here, I also posted a link on my Twitter and my Facebook. :) 


Here are the links for my collage, as well as the interaction space where comments/feedback can be posted.  
Web 2.0 Project    
Interaction Method


Enjoy :)

Web 2.0 Interaction Method









Here is my Web 2.0 Project. I would appreciate any comments. Thank you! :)

Sunday, February 7, 2010

Week Five: Clear

So this week, there was so much information about memory, different types of storage, input/output devices, etc. Since Blogs five and six are both going to be dealing with all of this information, I figured I'd write about one of the most important issues that many people overlook, until it's too late sometimes. That issue is: repetitive strain injuries (RSI). As previously stated, many people don't pay attention to the signs of RSI, or write it off as nothing. As Mr. Olson states in the lecture, Typing and Pointing, more and more people are being faced with this problem because of the increase in technology use in today's society. 
Fortunately though, doctors as well as computer manufacturers are beginning to take notice and do something about this growing issue. I researched the topic of RSI a little more, and found these websites to be very helpful in not only explaining what RSI was, but some signs for how to tell if you have it (although it is recommended that a doctor be consulted if you think you have some of the listed symptoms), and some helpful ways to avoid it, or to make it better. The websites include: http://www.eecs.umich.edu/~cscott/rsi.html and http://www.ahealthyme.com/topic/rsi. Although both websites list common information, I think it just goes to show how important of a situation this is. I'll be the first to admit that I don't follow many of the rules to RSI prevention, but I'm working on changing that. 
A little FYI, repetitive strain injuries can occur in the workplace, or in the home and any where in between. But, as previously mentioned, manufacturers are coming out with products that help to reduce the occurrence of RSI. Some examples are ergonomic keyboards (pictured below) that create a divide in the keyboard and place the keys at an angle so that less stress is put on your wrists. There are also special types of mice that allow for easier use because the user does not have to continually move their wrist (or hand) with the mouse. 

Sunday, January 31, 2010

Week Four: Clear, but a little bit muddy!


So this week was a sort of a difficult one. It could have something do do with the fact that I was kind of rushing through the material since it was a busy week, and maybe it just hasn't all sank in yet. Looking through the material its fairly simple to understand; there is a multitude of software available for a plethora of uses. There are softwares available for businesses, for personal use, for communicating, and for multimedia purposes. 
http://www.buzzle.com/articles/different-types-of-application-software.html < This website helped to simplify what the text book was saying a little bit. It talks about what software actually is and describes what some of the different types of application software are. This website both helped in clarifying what the book was saying, as well as clearing up some of the information. What I learned about software that I think would be the most important concept, is that it helps to make things easier, as well as that it's used for a variety of things, and therefore, inescapable. 
Most professions will come into contact with software along the way. Businesses use it for presentations, and for creating spreadsheets. Engineers use it to plan out new designs or products. Manufacturers use it for the assembly line in the production of goods. Even video game designers use it to create their graphics. People also use software for personal reasons. Such as typing up documents, taking notes, editing videos and photo shopping pictures. Although there are more advanced softwares offered for editing photos and videos at a professional level, there are also softwares for personal use.           

Sunday, January 24, 2010

Week Three: Clear


Internet or World Wide Web?!
I say or because yes, there is a difference! This week in ISM3004, one of the many things I learned and found totally fascinating is that the internet and the World Wide Web aren't the same thing. Actually the World Wide Web, also known as the Web is a service that the internet provides. "While the Internet was developed in the late 1960s, the World Wide Web emerged in the early 1990s." (Discovering Computers 2010, 80) This definitely will change the way I address certain things, for example, when I want to research how to bake a cake, I will say I'm going to search the Web, instead of the Internet. This may not seem important, but really it is when taking into consideration the fact that some things a person doesn't have to use the Web for, but only the internet; things such as e-mail, or instant messaging. 
 I also learned that the Web contains about a trillion web pages, and that those web pages can generally be divided into groups such as educational, online social network, entertainment, and informational, just to name a few. Each web page contains links that take you to either other web pages within that same site, or to web pages that are by another author that may deal with the same issue. But in order to get to a web page in the first place, unless a user already knows the web page, the most helpful tools that the web offers are search engines! Some of the most common search engines available include Google.comYahoo.comAltavista.com and msn.com, just to name few. Web pages contain links, articles, pictures and sometimes interactive activities for its users. For more information on using web pages, I used this site to learn: http://www.howstuffworks.com/web-page.htm.
Not only do people use the Web for researching things or for entertainment, but also for buying goods! Sites such as ebay.com or amazon.com offer a variety of goods that people can purchase online and have shipped to them the next day or in a few weeks. In the textbook, the authors discuss three types of commerce that occur electronically, or as it is know, e-commerce. The three kinds of commerce are Business-to-consumer (B2C), where a business is selling to a customer; Consumer-to-consumer (C2C), where a consumer is selling to another consumer; and Business-to-business (B2B), where a business is selling to another business. Online shopping, as e-commerce is otherwise known to many, is becoming more and more popular in today's society because it's more convenient in the way that people don't have to leave their house and go to the store to buy something, but rather it can just be shipped to their house. Another advantage of online shopping is being able to pre-order certain items, as well as being able to buy items that maybe be sold out in stores. An example of online shopping's growing popularity is looking at online sales before the holiday time, especially in the north. In northern states people would rather not drive in the snow, so it's easier to just order something online. But even people who live in southern states will find shopping online easier instead of waiting in long lines around the holiday time. 
Both the Internet and the World Wide Web are important in the business world as well because it allows businesses not only to interact and communicate with other businesses, but with their customers as well. Offering their products online lets business open their client base to a much larger population rather than just having two or three stores scattered throughout the country.  

Monday, January 18, 2010

IPhone Vs. Blackberry...


So this morning I woke up to my radio, since it is my alarm, and the radio djs were having people call in and express their opinions about which one is better: the IPhone, or the Blackberry. I think the conversation came about because one of the announcers was deciding on which phone to get. I thought this was an interesting topic to blog about since cell phones are such a large part of today's society. Side note:Actually when I went to the Sprint store when I was fixing my phone (the sales lady forgot to add internet to my phone even though it was on the plan), and there was a couple talking to one of the salesmen there. They were asking him why it was important to get a phone, and that they were a luxury, yet they were becoming more expensive as far as upkeep and initial purchase than landlines. The salesman (who seemed like he was trying his hardest to keep calm), told the couple that about 95% of people today have cell phones (I don't know where he got that statistic, nor how true it is, but I'm guessing he was fairly close), and that a cell phone is actually a necessity since people are always out and about, and not many people are always home to answer their landlines. Although I didn't hear the rest of the conversation (I was dealing with my own phone issues), I'm guessing the couple wasn't convinced because they left shortly after. I think that what the salesman was saying was true though, because I for example, don't have a land line. I'm in college, and therefore find it unnecessary to order a phone service and pay for it when anyone who needs to call me can just call my cellphone. Even when I go home to visit my parents, I rarely pick up the phone unless my parents are expecting a call because if it's anyone important they have mine or my parent's cellphone numbers. 

Anyways! Back on track :) So on the radio people were calling in, saying whether they liked the Blackberry, or the IPhone; and of all the conversations I heard, the people had one or the other, so at least they were talking from experience. Personally, I've never owned an IPhone, but I do know people that have one, so I have used it and played with it. I also have an iTouch, so minus the calling and the texting, it's not too far off. I do however own the Blackberry Curve (as pictured above), which I bought in December of 2009. [I got the orange one so that I could get a blue cover for it. Go Gators! (:] So, I really haven't had my Blackberry for that long, only for about a month; but I already absolutely adore it! 
Okay, here is where I'm going to give my opinion about the two phones. Although, as I've mentioned, I don't really have much experience with the IPhone, I'll recount some pros and cons that I have faced. So, pros: all the applications that can be used on the phone, as well as the music playing feature. I also love the threaded message system. Cons: it's touch screen! this means that it can easily drop calls if you're not careful with the way you're holding the phone, or the way you place it. Also the buttons when texting. They're small and if you're not careful you may end up hitting multiple letters, or one that you don't want. Moving on, the Blackberry Curve! Mine is the 8330 from Sprint, so that is what I'm basing my opinion on. This is my first blackberry, and I'll admit I was hesitant about getting one. Of course, I've heard that they're "the best," but I've also heard that once you get one, no other phone is good enough, therefore giving birth to the so called "crackberry." So you can see my dilemma, Sprint doesn't necessarily have a large variety of phones, and I'm a constant text-er, so I needed a phone that could keep up with me and wouldn't die (which is the reason that I had to give up my old phone). I originally wanted the Palm Pre; I had been researching that phone since before it had came out, so when it was finally time to get my new phone, I was all for it! But as I asked several sales people about the battery life (hello, I have to be able to text and call like 24/7!), the reviews weren't that great. They said that the battery ran out fairly fast, especially since it was first generation, so that was kind of a let down, my next choice: the blackberry. So at that time, the orange was the newest color that they had, so after an hour or so of thought and comparison and constant questions, I decided to go with the blackberry. Okay back on track! So, pros: the full keyboard, the applications, the easy access to your email, facebook, and twitter, also, most importantly for me: the battery life! Which (knock on wood) I've had no problems with so far. Cons: I guess it is a little bit challenging to use, even now I get confused with certain things, and I will admit that the buttons can be annoying sometimes (maybe because I'm still used to my old phone's keyboard?). 
Okay, so basically that's it. This has turned into something longer than I would have expected to write. And if you've read this far I applaud and thank you for being patient with my ramblings. 
Also, if you're reading this, which do you like better? :)

Sunday, January 17, 2010

Week Two: Clear


I found this week to be a little bit more confusing then last week's lesson, probably due to the immense amount of information that was kind of thrown at me, or so it seemed. From learning about the basics of a computer, to all the dates about different computer discoveries and inventions, it all just started to jumble itself into one. Fortunately, the material itself wasn't that difficult to understand when looked at piece by piece. 
Reading in the text book and watching the lecture about the basic functions and uses of a computer was easy enough to understand since I've been using a computer for more than half of my life. Combining the knowledge that I have of how a computer works, and the different parts of the computer, it all started to make sense. Learning briefly about the different ways to store data and information, such as on USB flash drives or hard disks was very helpful, especially in today's society where computers are a large part of how a business functions. More and more companies are becoming more computer-based because of the easy access as well as the availability in a multitude of places. Therefore learning a little about data, the processing cycle and storage of data will be useful knowledge for the future, when files and records will be documented on the computer instead of on paper. 
Along with learning some basic information about the computers that we know and love today, I also learned about the history of the computer. It was very interesting to learn that even though people consider the start of the computer to be when the first actual machine came out, it in fact started as far back as 1642! Who knew that the simple adding machine that Pascal invented would eventually lead to what I'm currently typing on! It really is fascinating when thinking back to the large, bulky machines, that at the time they were created were such amazing, high-tech machines would now be considered slow to the current technology that is available to our society. I found a website that also gave the history of the computers and includes so very cool pictures, although not all the information is exactly the same:
http://www.computersciencelab.com/ComputerHistory/History.htm 

Friday, January 15, 2010

Week One: Clear

This week I learned about information search, netiquette, and copyright. After reading the posts about each subject, I thought about how each of them not only interacted with each other, but how they affected the business world. The information was all clear, and fairly easy to understand. This is what I learned.
Information search is important if a company is doing research on maybe a piece of technology, or about another company that they're interested in working with. Although information search is often portrayed as a fairly simple task, the work that goes along with it can be extensive as well as very intricate. This is because of the need to make sure that the information being read is from a legitimate site, such as government sites (.gov), or educational sites (.edu). Part of finding out if the site is legitimate, includes looking if the website has been recently updated, especially if the information being researched needs to be current. Another important part of the website, which overlaps with another learned concept, is the copyright.
Copyright is especially important in the business world because of all the publications, works, and material items that exist in today's society. In order to keep an idea that has been developed by a person, from being recreated over and over again, a copyright must be placed on it. Once a copyright has been placed on items such as books, plays, or movies, it can not be recreated, or distributed without the consent of the original author. This concept is vital when a business is creating presentations either for the general public, or for the company's use, because of the severe consequences that will be dealt if an item is used illegally. Such consequences include being sued for large amounts of money.
  Even though copyright is of huge importance in the business world, and information search is a necessary skill, netiquette has to be one of the most essential things in not only the business world, but for the Internet in general. Since text is usually difficult to interpret for a reader, the font, font size, and emoticons (i.e. smiley faces :-) ) being used are substantial in getting the message across.
Although I used to think that using ALL CAPITAL LETTERS was used in substitute for using bold, or italic text when it was not available to put emphasis into certain phrases, it is actually considered rude. Using all capital letters not only makes the message more difficult to read, it also makes the reader feel like the sender is screaming at them.
  All the information from the websites that were given through the course page made it easy to understand each of the concepts. In addition, I found this very helpful and to the point website about netiquette:
http://www.learnthenet.com/english/html/09NETIQT.HTM
On the web page, there is also a short YouTube video that was easy to understand and gave great examples.

Thursday, January 14, 2010

testing this out :)