Five most common threats
1) Viruses
2) Outside intruders
3) Natural disasters
4) Employee/consultants
5) Links to outside business
With these 5 most common threats our company can be threatened by them all. Viruses can come in at any time through our website just from employees that may open emails that have something attached, which could be a virus and we wouldn't know. Employees and consultants may leave things up and other people would be able to hack into the system. The most common one is natural disasters, that can happen at any time and we would not be ready. We could lose our power and then we would lose our information that we have keyed in. Some employees may give out their ID and password and people can use that to get information that is not for them and they can talk about it and the word would get out and then people from other businesses would be able to hack in or find ways to get into our system. All of these can be very harmful to our business. The only way that we can prevent these things from happening to to make sure that these things don't happen is to make sure all of our employees have their own ID and password and they don't give it out, to make sure that when a manager is not in the office that all of in payroll information and other important data is closed before they leave the room. We can also have an identification device, such as a finger print scanner, so we know that this is one of our employees using a certain ID and password and not someone else who may have gained that information from someone else.
Sunday, November 14, 2010
6.1 Web Pillars
Four Pillars:
1) Utilizing the web as a platform - where software can be provided as a continually updated service. Creates an equalizer and have to have a web browser
2) Harnessing collective intelligence - allows users to contribute something; input
3) Leveraging the data - using databases to make decisions
4) Implementing Innovative Web capabilities - learning from user's behavior to improve products and services.
With the Ferrum Cinema we will be able to use these pillars in different ways. These pillars will allow us to make the schedules for our employees and also let the employees comment about issues that need to be addressed. We will have an area for blogging for our customers so they can tell us how our sservices are and how we can improve. These pillars will also help us make the schedules for when each movie is playing and when they will be coming to our cinema.
1) Utilizing the web as a platform - where software can be provided as a continually updated service. Creates an equalizer and have to have a web browser
2) Harnessing collective intelligence - allows users to contribute something; input
3) Leveraging the data - using databases to make decisions
4) Implementing Innovative Web capabilities - learning from user's behavior to improve products and services.
With the Ferrum Cinema we will be able to use these pillars in different ways. These pillars will allow us to make the schedules for our employees and also let the employees comment about issues that need to be addressed. We will have an area for blogging for our customers so they can tell us how our sservices are and how we can improve. These pillars will also help us make the schedules for when each movie is playing and when they will be coming to our cinema.
Wednesday, October 27, 2010
5.1 Critique your competitor
We used http://www.cinemark.com/
Rules: rating 1-5
1) unique - 5
2) easy to use and fast - 4
3) pleasing - 4
4) Motivating - 3.5
5) advertising - 4
6) learn from your website - 5
We ranked these this way because the site was unique and pleasing, it had color. It was easy to get to the other tabs such as the movies that were playing and we could get back with in a good amount of time. The website was not too motivating for people to use. It kind of seemed dull. Then on http://www.alexa.com/ we found out that the site is 67% faster than the other movie websites that are being used and that there are 896 other sites that are linked to it as well.
Rules: rating 1-5
1) unique - 5
2) easy to use and fast - 4
3) pleasing - 4
4) Motivating - 3.5
5) advertising - 4
6) learn from your website - 5
We ranked these this way because the site was unique and pleasing, it had color. It was easy to get to the other tabs such as the movies that were playing and we could get back with in a good amount of time. The website was not too motivating for people to use. It kind of seemed dull. Then on http://www.alexa.com/ we found out that the site is 67% faster than the other movie websites that are being used and that there are 896 other sites that are linked to it as well.
Friday, October 22, 2010
5.2 Extranet Diagram
extranet enables 2 or more firms to use the internet to do business through the use of VPN and firewall. This is when the client is sending for information from the server and then the server transmits it trough the VPN and the firewall as well.
5.3 Intanet Diagram
intranet is when you are taking something within the company. like an employee, and giving them the access to schedules and paychecks. VPN is what ensures the secured information, basically it is what encrypts the information. firewall is what we call authentic because it is used to let us know that the employee loging in is actually the right person. , clients are on the outside and the inside, they are the ones that are using the information to get to the schedule so they know when they are going to work.The server is what is being used to get the info from the outside employee and then is related to the client on the inside and internet is what we are using as the communication.
Saturday, October 9, 2010
4.3 Packing-switching technology
the client is A and B while the server is C and D. The client is getting information from the server. IP address is where all the information is going and IP datagram is the data packet that conforms to the IP specifications. packets is what holds the information and concurrent data transmission is the problems that the packet-switching technology is taking care of and the TCP is what breaks the information into packets and the IP is what forwards packets from node to node also known as the routers. Packet-Switching Technology is how the information is broklen down into different packages and the distributed to the apropraite places.
4.2 Basic Network
server is the place that is going to provide the service to the client who is looking for the information. The transmission medium is when the client request information that has to come from the receiver. protocols are the rules that have to be set and followed. digitizing is when you convert information into bits, wireless media comes from many devices such as blue tooth and GPS. cable median is made up of many wires that connect computers to and bandwidth is transmission capacity.
4.4 ERD
Entity, attribute, attribute types, record, data types, database tables and relatiosnhips.
The enity is the tables. Attribute are the fields in the table and the information that is in that table are called the attribute types. A record makes up a row in the table of information. The database tables are each entity in the dadtabse so here it is the customer, invoice and product that will be in the database. And then the relatiosnhips that are here is the customer and the product come together as the invoice and they make up the keys for each and then the quantity the customer is getting.
The enity is the tables. Attribute are the fields in the table and the information that is in that table are called the attribute types. A record makes up a row in the table of information. The database tables are each entity in the dadtabse so here it is the customer, invoice and product that will be in the database. And then the relatiosnhips that are here is the customer and the product come together as the invoice and they make up the keys for each and then the quantity the customer is getting.
Thursday, October 7, 2010
4.1 IFS H/W infrastructure
In this imagine we are seeing how the computer transfer the data we enter into the language it understands. The input technologies that being inputed are the letters that spell out HELLO. The processing technologies is being used when the data that is being entered is being transfered over to the output. So by using the keyboard to type in Hello we are able to see it on the screen by the processing technologies. The output technologies are what is for the data to be usable. The machine language is the only thing that the computer can understand and that is on and off or 1 and 0. The bits are one number that is in the set of bytes. So it takes 8 buts to make a byte. And in the picture that is all the 1 and 0's that make up one letter. The ACSII binary code is also the 8 bits that are seen in the image. The ALU is where the computer does the math information, the CPU is the central processing unit and the control unit is the in CPU.
Monday, September 20, 2010
3.2 buiding a business case
Customer Relationship Management -
- Faith: We believe that this system will serve all customers the same and have an influence on why the customers want to come to our Cinema and not the others. You just have to take it on faith.
- Fear: If this system is not working the proper way then we will go out of business at the worse point becasue our competition will take us over. So we need to stay on top or we are system-free and fall to our competitors.
- Fact: As our analysis shows, implementing the functional area information system will improve the work quality of our employees by 45%. The facts show that with this system the training and work production is of a higher value quality. Errors will be significantly reduced as the stats have shown. They have dropped from 60% down to 12%. So in the long run, the systems will pay for itself within the next year.
Friday, September 17, 2010
Thursday, September 2, 2010
All Data
TICKETS EMPLOYEE MOST PURCHASED ITEM
DATA INFORMATION KNOWLEDGE WISDOM
247831965 247-831-965 Tickets ticket code
child or adult
payment method
movie, date and time
cost
12345 12-345 Employee employee #
sex
address
name
age
position
678910 678-910 Most purchased item item #
product name
payment method
size
- Ticket code Employee # item #
- child or adult sex product name
- payment method address payment method
- movie name size
- date age
- time position
- cost
DATA INFORMATION KNOWLEDGE WISDOM
247831965 247-831-965 Tickets ticket code
child or adult
payment method
movie, date and time
cost
12345 12-345 Employee employee #
sex
address
name
age
position
678910 678-910 Most purchased item item #
product name
payment method
size
Tuesday, August 31, 2010
Movie Theatre
Name: Ferrum Cinema
Location: Ferrum
Size: small - 7 employees
How will we make money?
1) Sell tickets
2) have a concession area
Location: Ferrum
Size: small - 7 employees
How will we make money?
1) Sell tickets
2) have a concession area
Subscribe to:
Posts (Atom)