COMPUTER: SCALE AND SCOPE
This post
was about price point comparisons for two laptops from different manufacturers.
We were given a scenario of being employed in the IT department of a mid-sized
company. We were given a budget with some specifications and asked to make what
we considered the best choice. Class
text (Vahid, F., & Lysecky, S. (2019). Computing technology for all.
zyBooks) had more than prepared us to objectively look at hardware and software
specifications to make an informed decision.
WEB/MOBILE APPS
This post
required us to research and document Applications that we use. This was a great
discussion because of my familiarity with this App. It is like allowing a narcissist to wax poetic
about himself. When you come upon a good thing, you want to tell people about
it without appearing overbearing or pushy. This discussion forum allowed me to
share the beauty of the SNKRS App and its ugliness.
RANDOMLY
ACCESSING MEMORY & HARD DRIVES
This post was
a dive into the nuts and bolts of a computer system. Hard Drives (HDD), Solid
State Drives (SDD), and backing up your system. I am willing to wager a few
dollars that most computer users never stop to consider what is going on under
the hood. Most care nothing about the intangibles that make their lives easier,
just that this computer has simplified things for them, and kudos to the
ingenuity of intelligent men and women. This discussion forum was a reminder
that something as innocuous as hard drives and RAM speed has always been
significant in the grand scheme of things.
PING &
TRACE ROUTE COMMANDS
This post
was about the importance of Ping and Trace Routes. These contingency plans are implemented
as a way to diagnose issues within a network. Essentially, they are the
breadcrumb trails that allow IT specialists to find their way through what
would surely be a maze without these commands. We were asked to document our
findings to Ping/Trace Route, a company locally and internationally. What was
presented was the first line of defense for IT security specialists policing a
network. With cyber criminals forever on the prowl for compromised networks,
the Ping and Trace Route commands are the way to stay vigilant.
NETWORK
SECURITY
This post
was a continuation of the network and how to protect it. Technology moves at a breakneck
speed in both directions. There are those looking to enhance networks like the
evolution of 5G. Then there are those looking to exploit networks for monetary
gain, like Ransomware. We were tasked to
select two network menaces and shed some light on how they work. I chose social
engineering and phishing. These two tools of the cybercriminal remain ever-relevant
and ever-evolving.
No comments:
Post a Comment