As we have moved into the 21st century, technology has become so pervasive in our daily lives that it is almost unavoidable. It was only less than 20 years ago, that one would look to their local newspaper to find work or pay bills via the postal system that has served us reliably for so many years. However nowadays finding work involves going on the internet and searching many online job search sites and debit cards along with online banking have largely replaced cash or check payments in our daily financial transactions. With this in mind let us look at why information security is important and some of the sources of information threats.
-
-
IT Manager Duels
IT manager duels gets a second look and a longer game play session today. After playing the tutorial last week and covering, the basics of game play along with some fundamental mechanics of the game. This week like in the movie Inception, we will be going deeper but not Deep Throat deep as that would be too much for the younger readers. So where do we start? Well maybe we should look at the strategies of winning the single player game.
-
Internet Based Conferencing Security
Over the years, it has always been necessary for people to have meetings. These meetings generally happen face to face, and as businesses became more globalized, it became necessary for management to travel to have these meetings. This travel although necessary was a great expense for an organization. A five-person meeting conducted in-person (involving plane travel for four of the attendees) is over seven times more expensive than a meeting conducted by audio conference, and nearly three times as expensive as a videoconference (INFOCOM, 2014). Leading to cost saving measures, which initially toke the form of conference calls over the analog phone systems.
-
Municipal Wi-Fi, To Be or Not To Be
Today as many as 57 cities in the United States have municipal Wi-Fi (Springer, 2013). Nevertheless, these systems are little more than secondary internet connections to most people. Right now, 85% of Americans over the age of 18 have access to the internet and 70% of adults have high-speed internet in their homes. Of the portion of the population, that does not have internet in their home, nearly half claim that they simply do not want or need it. Thus, for the vast majority of the population, municipal Wi-Fi plans will only provide a supplement to household connections (Springer, 2013).
Continue reading Post ID 154
-
An Introduction to Database Technology and Database Management
What is a database? In basic terms, it is an organized collection of data. This data is typically organized to model relevant aspects of reality in a way that supports processes requiring this information (Wikipedia, 2014 ). Our modern life is inundated by their use to store and make usable the massive amounts of data that we now generate. A 2011 study by IBM estimated that our society creates about 2.5 quintillion (1018) bytes of data every day (StorageNewsletter, 2011). Databases allow humanity to use all that data that is generated.
-
Implementing Coordinated Information Technology
In todays complicated market some skills are still hard to come by. Especially when it comes to implementing Enterprise Resource Planning (ERP) systems that are on time and within budget. So the question that needs to be asked, is skill in implementing coordinated information technology really a competitive advantage for a firm? I believe that it can truly be a competitive advantage for a firm.
-
Skills required by a software development team lead
Today’s software development managers have to deal with a range of issues while trying to meet customer expatiations, time lines and the project cost window. What skills do they need to be successful in today’s competitive environment? I am going to paint out three skills I think are critical to successful project development in today’s fast pace environment. Continue reading Post ID 154
-
IT Ethics in Pursuit of Political Revolutions
Today we start with the question “Is it ethical for IT vendors such as Google to promote the use of their information technology products in pursuit of political revolutions in various countries?” We will look at some IT venders and how they support political revolutions in the world to include not only how but why they support or do not support them. Continue reading Post ID 154
-
Responsibility over violence in video games
Who is responsible for the violence in today’s video game and protecting our children from mental harm? Is it the video game makers or is it the governments responsibility, or should we just let the parents do their job in raising their kids and determine what is right or wrong? In the following paper I will try to put to you what I thing is right and wrong and who is responsible party in protecting the minds of young children.
-
Yahoo, Email and Justin Ellsworth
Once upon a time, there was a marine named Justin Ellsworth who by all accounts was a good guy, up till that day that he was killed in the line of duty. So all the normal things happened after his death like the funeral, mourning and going through his things to determine what to save or toss out. Well as these things were happening Justin parents wanted to also save his email so that they could know there son better. This is where things got complicated, as Justin did not leave his password to his yahoo.com account or presumably, a provision in his will for his email accounts. (Monitor, 2005)