March 2, 2023

  COMPUTER: SCALE AND SCOPE

This post was about price point comparisons for two laptops from different manufacturers. We were given a scenario of being employed in the IT department of a mid-sized company. We were given a budget with some specifications and asked to make what we considered the best choice.  Class text (Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks) had more than prepared us to objectively look at hardware and software specifications to make an informed decision.


WEB/MOBILE APPS

This post required us to research and document Applications that we use. This was a great discussion because of my familiarity with this App.  It is like allowing a narcissist to wax poetic about himself. When you come upon a good thing, you want to tell people about it without appearing overbearing or pushy. This discussion forum allowed me to share the beauty of the SNKRS App and its ugliness.


RANDOMLY ACCESSING MEMORY & HARD DRIVES

This post was a dive into the nuts and bolts of a computer system. Hard Drives (HDD), Solid State Drives (SDD), and backing up your system. I am willing to wager a few dollars that most computer users never stop to consider what is going on under the hood. Most care nothing about the intangibles that make their lives easier, just that this computer has simplified things for them, and kudos to the ingenuity of intelligent men and women. This discussion forum was a reminder that something as innocuous as hard drives and RAM speed has always been significant in the grand scheme of things.


PING & TRACE ROUTE COMMANDS

This post was about the importance of Ping and Trace Routes. These contingency plans are implemented as a way to diagnose issues within a network. Essentially, they are the breadcrumb trails that allow IT specialists to find their way through what would surely be a maze without these commands. We were asked to document our findings to Ping/Trace Route, a company locally and internationally. What was presented was the first line of defense for IT security specialists policing a network. With cyber criminals forever on the prowl for compromised networks, the Ping and Trace Route commands are the way to stay vigilant. 


NETWORK SECURITY

This post was a continuation of the network and how to protect it. Technology moves at a breakneck speed in both directions. There are those looking to enhance networks like the evolution of 5G. Then there are those looking to exploit networks for monetary gain, like Ransomware.  We were tasked to select two network menaces and shed some light on how they work. I chose social engineering and phishing. These two tools of the cybercriminal remain ever-relevant and ever-evolving. 

No comments:

Post a Comment

Featured Post

Newbie to Newbie: Algorithmic Design and Data Structure Techniques

  Are some algorithms and data structure designs better than others? Newbie to Newbie, I would like to offer this: the "better" ...