Sunday, April 17, 2011

Tutorial Blog 4: RAID & HSM

We recently were explained the differences between each RAID as well as the difference between thin and thick client computing as well as what Hierarchical Storage Management is.
I am very disappointed that this class is almost over because I have had such a great time learning about all the different types of computers and different software and hard drives that are available.
                                              Created By Shannon DuQuesnay, Copyright 2011
 
 
RAID 1 – Mirroring uses a pair of drives
each block of data is written to both drives
block – basic unit of data read/written to storage
single drive failure à
no data is
lost, system still runs at full speed, replace failed drive and re-mirror
50% overhead – cost per GB is doubled
“Hot spare” disk – replaces dead disk drive

RAID 0 – Striping 2 or more drives
no extra copies-blocks of data spread across all drives
multiple disks simultaneously working on both read and write requests
the more disks, the faster RAID 0 works
no redundancy à
single drive failure à entire RAID 0
fails, all data lost, crashes, replace drive, rebuild array, reinstall OS and
restore data
less reliable than single disk drive
cost per GB is unaffected

RAID 5 3 or more drives
data blocks spread across all drives except one
parity – calculated and then store on remaining drive – used to protect data
parity = 1 if sum of data bits is odd
parity = 0 if sum of data bits is even
fast reads, moderate write speed (must compute parity)
single drive failure
à
no data lost,
still running but reduced speed
à
replace failed drive and allow
system to reconstruct the data on the new drive before another failure
hot spare disk – replaces immediately
(N-1) drivers usable for data
common in network servers

RAID 6 any form of raid than can continue to execute in the presence of 2 concurrent
disk failures
capacity = (N-2) disks
fast reads, writes slower, needs hardware support
1TB+ disk
HSM: Hierarchical Storage Mgmtsome data used regularly
some data rarely touched
automated, rules-based system allows us to take rarely used from expensive
storage to cheap (unknown to user)
Benefits: expensive high speed storage used for small “working set” and rarely
used data stored to SATA disk or tape

Thin Client Computing
Thick clienthardware – standard Desktop PC
powerful CPU and Lots of RAM
NIC
storage: hard drive, optical, USB
IO: screen, keyboard, mouse, sounds
software: OS, utilities and applications
Thin Clienthardware – specialized device, very small
modest CPU and RAM
NIC
No Internal hard drive, might have optical or USB
IO: screen, keyboard, mouse , sound
like a terminal: processing and storage occur elsewhere
Created by Shannon DuQuesnay, Copyright2011
Actioncentralized CPU, RAM, Storage
use terminal server approach: server OS, terminal server application shares the
servers resources and installed applications among multiple users
application issues – licensing, different
 versions
virtualization: each user has own VM with OS and applications à standard, unmodified
OS and apps; more flexible, resources are pooled
VM features – deploy from templates, snapshots
Why Thin?more efficient use of HW resources
typical end user PC is underutilized: CPU idling, much unused RAM, vast unused
disk space
centralized CPU, RAM, storage more fully utilized
dynamic allocation of CPU and RAM to users as needed
allocate only necessary amount of storage
allocate resources in nonstandard increments
improved management/support
hardware upgrades: nonstandard increments, less inconvenience to user
centralized backup: data, entire machine (image backup, snapshot)
linked clones: rapid deployment, disk space savings, fast patching, software
updates, pooled computer (retain personality but still fresh daily)

Sunday, April 10, 2011

encrypted email

In my ISM3004 class we were just taught how to acquire a personal e-mail certificate.  We were also taught step by step how to send a digitally signed and encrypted e-mail message.  We were first told to download Mozilla Thunderbird.  We set it up through our UFL webmail account.  Mozilla Thunderbird was very new and interesting.  It was fun to learn a new way to receive email that I did not even know existed before this class. 
I then downloaded and exported my certificate from VeriSign where I sent a digitally signed email to a professor and then received an email with the professor's public key which I used to send an encrypted email.
Here are both screen captures after I sent and received both emails from the professor


Sending encrypted emails is very important.  Below is a link explaining a situation where NASA failed to secure their Computer System Security.  It ended up endangering the space missions but could have been easily avoided with only a few simple steps.  This failure to secure their computer system could have jeopardized the lives of many innocent people.

In this article Famida Rashid explains how the Office of the Inspector General found vulnerabilities on six servers.  These vulnerabilities were connected to the National Aeronautics Space Agency. This could have caused ineligibility to Space Shuttle, International Space Station and even Hubble Telescope missions.  People claimed they had taken in account for vulnerabilities such as the ones that happened however Inspector General Paul K. Martin states how NASA failed to have a security program finding these problems as soon as they arose.  NASA has known about this for over a year and has still failed to enforce this.

This is such a simple task that someone would have to perform to avoid all of these insecurities and vulnerabilities NASA has been faced with.

NASA was also not properly disposing hard drives which exposed sensitive data.  They were not taking the precautionary steps necessary when dealing with the important information and data that NASA sends and receives every day.  They did not properly verify sanitation procedures.

Sunday, April 3, 2011

Creating an Avatar

This week in ISM3004 we were assigned to create an Avatar.  I have been putting of this project thinking it was quite difficult.  Surprisingly it was not and ended up being one of the most entertaining assignments.  We were given a couple different places to make our Avatar.  I tried out a couple of them and DoppelMe was my favorite.


It was very easy to create an Avatar on http://www.doppelme.com because they gave you step my step instructions.  You started off choosing the gender and then went on to choose the hair and eye color.  It did not stop there, you could choose from a variety of different clothing options and change the color of each article of clothing. I went on to choose the type of shoe as well as any accessories I wanted to add.  Here is the Avatar I created on DoppelMe


Sunday, March 27, 2011

Database Project

ISM3004 Database Project

This week in ISM3004 we created a Database Project.  We were given an overview of a local gym that we work for and had to create a database to store important information about the members that go to this gym.  The boss of this gym that I work for wanted a greater data management and reporting power of a DBMS.
This project caused me a lot of stress because I am one hundred percent a PC user.  Unfortunately my computer decided to stop working a couple days ago and I was forced to restart the project using my roommates Mac.  In order to start the project you must download the free 30 day trial of FileMaker Pro 11 database software.  After following step by step to download this program I then had to download the "members.csv" file from the course website.  This file contained all the data necessary to create the database project.
Step #1 was to create the Data Table.  Step #2 was to change the form.  The membership data was in the default tabular format and we were told to change it to a custom form that would make it more user-friendly.  In step #3 I created a "Find".  This allows you to automatically select only the records that meet the specified set of criteria, for example the Individual MemberType for this specific project.  The last and final step was step #4 where I created The Report.  The Report consisted of the reasons why certain gym members left and I had to create a convincing way to get the to return.

Copyright © 2010 FileMaker, Inc. All rights reserved 


Enhancements
The main enhancement for this database project would be to expand on whether or not the customers stay or leave and why they choose to stay with the gym, no longer go to the gym, or switch to a different gym. Something else would be to show how much time a member stayed with the gym, from the time they signed up to the time they left.  I would also look into those who left after a small amount of time and those who left after a long amount of time and compare it to the reason why they left.  This would increase customer satisfaction because we would no when and why each customer left and what their future plan is, whether they plan to continue going to the gym, choose another gym or no longer be a member of any gym.

Tutorial Blog 3: Information System Devlopment

System Development
System is a set of components that interact to achieve a common goal.  An information system is a collection of hardware, software, data, people and procedures that work together to produce quality information.  An information system supports daily, short and long term activities.  System development is a set of activities used to build an information system.

System Development life cycle
The System Development Life Cycle consists of planning, analysis, design, implementation and operation, support and security.  Planning is to review and prioritize project requests as well as to form teams.  Conducting investigation and perform detailed analysis of activities is part of analysis.  Design requires you to acquire hardware and software and to also develop details of the system.  Implementation is clearly an important part of the life cycle and is when you develop the programs, install and test the program, train the users to use the program and convert to the new system.  There are different ways to converting to the new system such as diving right into it or doing it gradually and piece by piece.  Monitoring system performance and assessing system security is part of the last part of the system development life cycle.  

There are many different participants involved in system development.  A system analyst is responsible for designing and developing an information system.  The steering committee is the decision making body and vendors install and maintain the operating system software as well as deal with technical support.  Application and system programmers convert the system design into the appropriate programming language.  The organizations website and web application are created and maintained by the webmaster and web developers.  The organization's resources are controlled by the database administrators and the network administrators install and maintain the network.

Project management is the process of planning, scheduling and controlling activities during system development.  They create a goal which is to deliver an acceptable system to the user in an agreed time frame while maintaining costs.

Feasibility Assessment measures how suitable the development of a system will be to the organization.  There are many different types of feasibility assessments including: operation, schedule, technical and economic.  Operational feasibility measures how well the proposed information system will work.  Schedule feasibility measures whether the established deadlines for the project are reasonable.  Determining whether the organization has or can obtain the hardware, software and people need to deliver them is technical feasibility and economic feasibility, also called cost/benefit is whether the lifetime benefits of the proposed information system will be greater that its lifetime costs. 

Created by Shannon DuQuesnay, Copyright 2011

Sunday, March 6, 2011

Presentations Project Web 2.0

This week in ISM3004 we had to finish the assignment we started a couple weeks ago.  I chose coming up with an entrepreneurial idea and then presented it using author stream.  My idea was taking a fast food restaurant such as McDonalds and turning it into a healthier version of fast food while keeping a similar taste.  For the most part, people can't taste the difference between whole wheat and white, fat or low far, sodium or reduced sodium, so why eat all this unhealthy food and clog your arteries when u could eat the same food thats alittle healthier?

About Skinny Joint:
The burgers would have whole wheat bread and we would serve veggie and lean burgers.  Fried chicken would be fried in whole grain flour using very little oil and grease.  Cheese and milk would be fat free and salads would be made with fat free dressing.  Fries are one of the most popular foods from fast food places.  Sweet potato fries taste even better and have more nutritional value and instead of being fried in oil they would be baked. Sandwiches would be made with turkey sausage and bacon and we would use egg whites instead of whole eggs.

All of this food would have the same delicious taste of fast food without the unnecessary fat and calories.  People who love fast food but also care about their health will love "Skinny Joint".  Your fingers won't be covered in grease after taking a bite out of your burger however you will still have that satisfying feeling in your mouth and stomach after finishing it and be able to eat more throughout the day without going over your daily amount of calories and fat.  Multiple items on the menu of McDonalds are more than the amount of something allowed each day.  

Here is my presentation on a restaurant I created called "Skinny Joint"

What I Learned:
I tried to make talking about nutrition as exciting as possible by incorporating a very humorous movie which clearly emphasizes the importance of  eating healthy.  I didn't want to go on with to many nutrition facts so I chose the ones I believe are important and gave examples of two of McDonalds worst items on their menu and related it to how much fat you're supposed to consume in one day and how much is in one McDonalds meal.  I also tried to interest everyone within the first few seconds by posing an idea that most people dream of.

Sunday, February 20, 2011

Tutorial blog 2: Excel

Excel was introduced during week 5.  There are so many different things you can do within excel ranging from very easy to difficult.

We learned about the structure, data basics, creating formulas, and functions during the Excel lessons.
If you have a specific question about something on excel you can either use the excel help button in your excel document or click on the following link: Excel Help

Structure:
Columns are rows are labeled with numbers and letters.  Rows are number from 1 to 1,048,576 and columns are labeled with letter from A to XFD.
We were taught that to re-name a worksheet you must double-click on the "sheet" on the left bottom corner of the sheet you wish to re-name

Data Basics:
To record information as text data in a cell you click "single quote" or put an apostrophe before any information.  Excel stores data by using a serial number.  Excel can determine how many days have passed since January 1st, 1900.  A very large number that could take a while to come up with by hand is solved in seconds on my excel.
Adding rows and columns is easy on excel.  You right click on the cell that you want to add the new row to and click "insert row" and all the old data will move down a row.  Adding a column is the exact same concept except you have to right click on the cell that you wish to move to the right.


This is a brief video explaining how excel works and tricks to saving time by using excel instead of doing each mathematical equation one by one.  It explains great excel is with mathematics and how quickly it can adjust.  This video is from http://www.youtube.com/watch?v=XmSp2-Fa4rg and was created by Excellsfun

Formulas:
To begin a formula you must start with an equal sign (=)
The symbols for addition, subtraction, multiplication and division are +, -,  *, and / respectively.
PEMDAS is used to help remember Parentheses, exponetiation, multiplication, division, addition and subtraction

 This is the screen that will come up when you choose to insert a function.  It will explain step by step what to do and what cells to choose to create your function.  This is a picture of the screen on my computer when I was following the steps on how to create a function.

Functions:
The IF function works like a conditional statement.  It checks to see if a function is true and if it is true it returns one value.  If it is false it returns another value.  The syntax for an IF function is: IF(logical_test, [value_if_true], [value_if_false])
so if a student earns an S or U in the class based on their grades the function would be =IF(Total points > 120, if true they receive "S", if false and they don't earn 120 points, they will receive a "U".