Thursday, March 24, 2011

Microsoft Access Database Project

     Having used an Access Database through work for the last few years, I am very familiar with using a database that is already put together. However, this is the first time I have had any option to actually build my own database.  I didn’t realize how much work actually goes into the creation of a database. Nearly everything that we were instructed to do in this project was new to me. I had not created queries, reports, or forms until this project, but now I think I have the knowledge to keep using the Access Database! I particularly like the query function, I definitely think that it is the most useful and is what makes Access different from the rest of the programs in the Office suite. I also learned why Access is used for databases so frequently. It makes it very easy to organize and find data.

     I thought the database seemed pretty functional to begin with, but I believe it to be quite slack on the amount of data. If it is to be used to keep track of information about the customers, I believe it should contain more fields of data than name, address, begin and end date, birthdates, and gender.  I think that the database should also include the amount paid for membership depending on if it was an individual or family account, as well as phone numbers and email addresses.  By including email addresses the gym would be able to send special offers to their customers, and possibly have the ability to recruit new customers through referrals.





Saturday, March 19, 2011

Tutorial 3: Internet Protocol Addresses

     I’m sure everyone has heard of the term IP Address, but does everyone really understand what that term means? I know that I had no clue what an IP Address was, or why it was even necessary until Week 9. After realizing that an IP Address is actually important, I thought it would be interesting to find out more about the concept.

(This is a free use image: Permission can be found on http://www.weblogcartoons.com/about/)

     I plan to share with you some of the most interesting information I found along the way. This includes the basic understanding of what an IP Address is, as well as the problems that the Internet Corporation for Assigned Names and Numbers (Icann) are currently facing in regards to IP Addresses. I will also include how to find out what your own IP Address is!


What is an IP Address?

     IP Addresses, otherwise known as Internet Protocol Addresses, are unique numbers that are used to identify a computer. Each computer has a different IP Address, and that allows each computer to talk to one another. The current version of IP Addresses, known as IPv4, look like this: 192.0.2.53 
http://www.icann.org/en/factsheets/factsheet-ipv6-03feb11-en.pdf

     These numbers are normally assigned to ISP (Internet Service Providers) within region-based blocks. That way an IP Address can often be used to give a general location to where a computer is located, basically what region or country it is in.   http://whatismyipaddress.com/


Problems Facing Icann?

     IPv4 was started in 1976 by the Icann. One of the creators Vint Cerf, and his colleagues in the Defense Department were told to decide how many network address space should be given to an experiment connecting computers in an advanced data network. After a year, they decided on 4.3 billion separate network addresses! Of course, each one represents a different device that connects to the internet.

     Unfortunately, within the next 12 to 18 months, they are predicting that each of the 4.3 billion internet addresses will be used! That means the internet as it exists today will have reached full capacity.


     In order to counteract the capacity problem, IPv6, (a new version of the method IPv4 which is currently in place), is in trials. Comcast began these trials almost 6 years ago. IPv6 has a 128-bit address space, which is 340 undecillion (or 10^36) addresses, according to Wikipedia. http://en.wikipedia.org/wiki/Names_of_large_numbers

     To give an idea of the scale, if all existing 4.3 billion Internet addresses were contained inside a single Blackberry phone, the new system would fill a container the size of the Earth with Blackberry's each containing 4.3 billion IP Addresses. Comcast has begun customer trials, and is distributing dual mode cable modems that are able to support IPv4 and IPv6.



(Icann gives permission to use their photos as long as credit is given to the work. The permission can be found at this address: http://www.icann.org/photos/ ) 


     IPv6 has addresses that look like this: 2001:0db8::53, which are written in hexadecimal.

      Hexadecimal is a bit hard to comprehend, but here goes:
      In mathematics and computer science, hexadecimal (also base 16, or hex) is a positional numeral system with a base of 16. It uses sixteen distinct symbols, most often the symbols 0–9 to represent values zero to nine, and A, B, C, D, E, F to represent values ten to fifteen. For example, the hexadecimal number 2AF3 is equal, in decimal, to (2 × 163) + (10 × 162) + (15 × 161) + (3 × 160) , or 10,995. http://en.wikipedia.org/wiki/Hexadecimal


What is My IP Address?

     If you are wondering what your IP Address looks like, feel free to visit www.WhatIsMyIPAddress.com. When you log onto this website, it shows a map with your general location, as well as displaying your IP Address, City, Region, Country, Connection type, and Internet Service Provider (ISP).

     Included is a screenshot of what I found when I visited this site:
(I have crossed out part of my IP Address)

Screenshots are original by Chelsea Wiseman


     Hopefully now you are able to see the necessity of an IP Address. Being able to see the necessity of an IP Address leads you to see the complexity of the problem facing Icann and IPv4. I was also hoping to make understanding what an IP Address is and how it is important to the future of the internet a little easier to see than what one normally encounters when researching a topic. I hope you enjoyed learning about one of the basic functions of the internet! :)




Secure E-Mail Project

     After receiving the two replies from our professor, I saved a screencapture of my Thunderbird Inbox to show that I successfully completed the project.


All screenshots are original by Chelsea Wiseman


     After researching for companies that use secure email to protect their data, I came across a company that is very successful at providing services to companies that are in need of protecting their data. This company is Zix Corp, and they have numerous customers. I found an article concerning the partnership between ZixCorp and Lockton, INC which is a insurance broker. The two have teamed up with healthcare organizations to provide them with secure data exchange.


     ZixCorp and Locton, INC provide healthcare organizations that have cyber liability insurance coverage with ZixAuditor®, which shows organizations' exposures to data breaches and outsourced risks. This helps heathcare organizations comply with the Health Information Technology for Economic and Clinical Health Act (also known as the HITECH Act).

     Any breaches of personal healthcare information can damage a company’s reputation, as well as their financial well being. With ZixAuditor organizations are able to identify vulnerabilities in their email, as well as implement better procedures and monitor outgoing communications to determine compliance effectiveness.  The ZixAuditor service helps manage risks that companies might encounter with sensitive email exchanges.

     According to Lockton’s employee Emily Freeman, “The HITECH Act places huge responsibilities for cyber liability on healthcare companies, even if a data breach does not occur on their premises or is not caused by their own employees…(http://www.lockton.com/News-Releases/Lockton-and-Zixcorp-Help-Healthcare-Industry-with-Cyber-Liability) The need for secure email and data exchange is ever growing, and ZixCorp is always there to help companies in need of protection. 


     Knowing very little about secure email exchanges, and their importance in the business world, I was pleased to be able to do this project! Now that I know how to secure my emails, I don't think I will have to worry anymore about sending data to people and having it compromised. I think this project is very handy for any up and coming business student! :)

     

Friday, March 4, 2011

Presentation Project: Goliath and Bebe's World

     Being an animal lover, I chose to do my project on the nonprofit company Goliath and Bebe’s World which is a dedicated no kill animal shelter. I really enjoyed this topic because it gave me an opportunity to discover more about the company. Enjoy! http://www.slideboom.com/presentations/313898/Goliath-and-Bebe%27s-World

     In my self-critique, I will admit to being very honest with myself. I believe the flow and sequence of content was very organized, and moved logically from one topic to the next so that the presentation was easy to follow. I included quite a bit of information, which I believe helped to answer questions before they were asked. After reviewing my presentation numerous times, I believe that I was able to answer most question people would have.  Most people are attracted by the site of cute animals, and I used that in my presentation. By including numerous pictures of dogs and other animals that are in need of help at the shelter, I believe the viewer’s attention is grabbed successfully in the first 30-60 seconds.

     I didn’t seem to ask many questions throughout the presentation, but I believe I included a significant amount of information so that the viewer knew everything that was important. I believe I was able to spark the viewer’s curiosity by incorporating pictures, and very real facts of the danger the shelter is in. I validated all my information and media by including all the links to where the information can be found.

     After proofreading my presentation, I was able to successfully avoid inconsistencies and errors, as well as typos and unbelievable claims due to the fact that all my information had cited resources. On avoiding clutter, I was not as successful. I believe my slides are in fact a little cluttered, but I felt the information included was very important and needed to be there. To ensure readability, I made sure the font was large and evenly spaced, and in colors that stood out among the background. Unfortunately, my computer is quite old, and therefore it doesn’t have a microphone. Therefore, all the information has to be read off the slides except for the video I included made by the shelter.

     By critiquing someone else’s presentation, I was able to better see what needed to be fixed in my presentation. I noticed small errors in my presentation I wouldn’t have originally caught. I thought it was a great opportunity to allow us to critique a peer’s presentation because both the author and the peer critiquing the presentation were able to improve on their own project.

     In business, presentations are very common. Getting up in front of a group of executives and giving a horrible presentation makes you and your company look bad.  Having the tools for creating appropriate presentations is priceless for an employee who is looking to make an impact in the business world.  This project, including the self evaluation, taught me that making clear, concise, and interesting projects is a must in order to present information clearly. Doing a self evaluation for the first time, I realized that looking at my presentation from an outsider’s point of view gives me a much better perspective on how my presentation will be seen, which will save me much embarrassment at go time!