Sunday, January 29, 2012

Week 3: clear- New meaning to the term IronKey!

    Personal Data has never been more at risk. Now more than ever measures should be put in place by everyone to prevent the breaching and loss of data.  Web encryption and security has advanced immensely since it first began. WEP, which was the first form of network encryption was easily broken in to and compromised and as a result has led to more secure forms of security/encryption being put to use. The more common and secure form of network encryption used today which proceeded WEP, is WPA.WPA is a much more secure form of encryption and allows longer character passwords along with multiple keys for extra verification.



One new security feature i learned about while discussing material for the course this week is the IronKey USB. Ironkey is a new piece of hardware that takes the shape of the standard USB flash drive but with significant additional features. The IronKey can be used to
IronKey Basic as D200 & S200 (black & silver) store data like a normal flash drive. Where it differs from others though is in the extra safety provided to the end user. If the USB is lost it can be remotely sent a signal which then wipes the data on the drive and therefore eliminates the risk of data being compromised. The iron key is made out of an extremely durable metal casing and is even water proof! Talk about technology reaching new places! Where and what will they be capable of next?!




SSD drive technology is a new form of data storage which uses no moving parts and as such results in much faster response and data read times measured in the millisecond range. Below is a very informative video from newegg about SSD and the other relevant hard drive formats.

Sunday, January 22, 2012

Week 02- Clear: Hardware, a means to an end

Hardware is to a computer what the wheels are to a car, with out them they just cant work. Hardware is the means to the end on computers. The end being the end users purpose or problem being addressed. Software works on your computer because there is hardware inside it built to handle and manage the software.

Hardware spans from a vast variety of products such as RAM Memory, Storage Drives like hard drives or flash thumb drives, Graphic Processing units and much much more. Hardware allows our computers to push the software they are capable of running to extremes. Technology is growing at an exponential rate also which allows out software to do things we could not imagine prior. Just about 1 year ago 1 gigayte of DDR3 Ram memory cost roughly 100 bucks when today you can get about 16 for 80 dollars!

With technology growing so rapidly pretty soon we will be able to handle massive loads of information such as augmented reality and virtual reality programs. What will we live to see in our lifetime? I can only anxiously wait and see!

Below is another good link for hardware information
http://www.karbosguide.com/

--------------------------------------------------------------------------------------personal computing is practically my specialty,  I love dealing with hardware and know computers inside out. The muddiest topic for me though when it comes to personal computing is the manufacturing of the hardware. As good as i am with computers and how they work i actually don't have much of any idea of how there constructed. I am looking forward to learning how the hardware is built because i have plans for inventions that would need the construction of hardware inside and the more knowledgeable i am of them the better it will be for me when the time comes to invent my device. Software is very easy for me to adapt to but ultimately hardware is what i really want to master.

Week 01- Clear: Netiquette

The internet is a place for everyone on earth to communicate with each other. As time has passed and the internet has become the primary form of human interaction, a common net etiquette has evolved and been set in place that now acts as an unwritten rule of sorts.

One example of netiquette is the use of capital letters. TYPING LIKE THIS implies your are shouting and typically should not be done online. Since there are no real indicators of a verbal tone when typing, one should use respectful language and read over what they have typed to make sure you wrote what you actually meant to say. Another example is the proper use of intellectual property. Unless a piece of work has been placed in a public domain or you have been granted use by the owner, you should not be using their work.

Also when offering others information, check your facts and make sure your not putting false information in to the web. In that same manner, one should always look online for any questions they may have before bothering others with it. There are very few questions that others may not have tried to ask first.

Below i will add a great link to more netiquette information for those of you who are interested in seeking further information, and as a fellow web user you should, after all "everyone could use a little netiquette!"

http://www.networketiquette.net/

Here's a video of proper netiquette at school!

Wednesday, January 18, 2012