Sunday, November 14, 2010

7.1 Threats to our company

Five most common threats

1) Viruses
2) Outside intruders
3) Natural disasters
4) Employee/consultants
5) Links to outside business

With these 5 most common threats our company can be threatened by them all. Viruses can come in at any time through our website just from employees that may open emails that have something attached, which could be a virus and we wouldn't know. Employees and consultants may leave things up and other people would be able to hack into the system. The most common one is natural disasters, that can happen at any time and we would not be ready. We could lose our power and then we would lose our information that we have keyed in. Some employees may give out their ID and password and people can use that to get information that is not for them and they can talk about it and the word would get out and then people from other businesses would be able to hack in or find ways to get into our system. All of these can be very harmful to our business. The only way that we can prevent these things from happening to to make sure that these things don't happen is to make sure all of our employees have their own ID and password and they don't give it out, to make sure that when a manager is not in the office that all of in payroll information and other important data is closed before they leave the room. We can also have an identification device, such as a finger print scanner, so we know that this is one of our employees using a certain ID and password and not someone else who may have gained that information from someone else.

6.1 Web Pillars

Four Pillars:

1) Utilizing the web as a platform - where software can be provided as a continually updated service. Creates an equalizer and have to have a web browser

2) Harnessing collective intelligence - allows users to contribute something; input

3) Leveraging the data - using databases to make decisions

4) Implementing Innovative Web capabilities - learning from user's behavior to improve products and services.

With the Ferrum Cinema we will be able to use these pillars in different ways. These pillars will allow us to make the schedules for our employees and also let the employees comment about issues that need to be addressed. We will have an area for blogging for our customers so they can tell us how our sservices are and how we can improve. These pillars will also help us make the schedules for when each movie is playing and when they will be coming to our cinema.

Wednesday, October 27, 2010

5.1 Critique your competitor

We used http://www.cinemark.com/
Rules: rating 1-5
1) unique - 5
2) easy to use and fast - 4
3) pleasing - 4
4) Motivating - 3.5
5) advertising - 4
6) learn from your website - 5

We ranked these this way because the site was unique and pleasing, it had color. It was easy to get to the other tabs such as the movies that were playing and we could get back with in a good amount of time. The website was not too motivating for people to use. It kind of seemed dull. Then on http://www.alexa.com/ we found out that the site is 67% faster than the other movie websites that are being used and that there are 896 other sites that are linked to it as well.

Friday, October 22, 2010

5.2 Extranet Diagram

extranet enables 2 or more firms to use the internet to do business through the use of VPN and firewall. This is when the client is sending for information from the server and then the server transmits it trough the VPN and the firewall as well.

5.3 Intanet Diagram

intranet is when you are taking something within the company. like an employee, and giving them the access to schedules and paychecks. VPN is what ensures the secured information, basically it is what encrypts the information. firewall is what we call authentic because it is used to let us know that the employee loging in is actually the right person. , clients are on the outside and the inside, they are the ones that are using the information to get to the schedule so they know when they are going to work.The server is what is being used to get the info from the outside employee and then is related to the client on the inside and internet is what we are using as the communication.

Saturday, October 9, 2010

4.3 Packing-switching technology

the client is A and B while the server is C and D. The client is getting information from the server. IP address is where all the information is going and IP datagram is the data packet that conforms to the IP specifications. packets is what holds the information and concurrent data transmission is the problems that the packet-switching technology is taking care of and the TCP is what breaks the information into packets and the IP is what forwards packets from node to node also known as the routers. Packet-Switching Technology is how the information is broklen down into different packages and the distributed to the apropraite places.

4.2 Basic Network


server is the place that is going to provide the service to the client who is looking for the information. The transmission medium is when the client request information that has to come from the receiver. protocols are the rules that have to be set and followed. digitizing is when you convert information into bits,  wireless media comes from many devices such as blue tooth and GPS. cable median is made up of many wires that connect computers to  and bandwidth is transmission capacity.