Saturday, September 29, 2007

News 4 - Database Security

1. I learned that there are three types of databases in the most recent class- hierarchal, relational, and object oriented database. Another concept from class that I learned is that normalization is a technique to design tables in a relational database to optimize performance and prevent errors when retrieving the data.

2. This article is about how database security is often overlooked:
http://www.eweek.com/article2/0,1895,2186652,00.asp

3. I agree with the author that security for databases is being overlooked. Recently, there has been news that many major retailers’ customer information has been compromised through hacking into the retailers’ database. In fact, I was one of the people whose credit card was affected by one such incident.

The author attributes this lack of database security to the database administrator’s inability to use sufficient time to meeting database security needs and also to lack of security training. It makes sense for the people who create and maintain these databases to be responsible for controlling access to this information. However, this indicates a more major issue that companies are not allocating enough money or attention to protecting customer’s information. The company should be responsible for hiring people who will be able to protect the information that the company acquires from customers.

The article suggests that a possible solution is to have the database administrator train with the IT security team. However, according to the article, one of the common reasons that the database administrator could not perform the security measures is lack of time. I think the author should explore more possible solutions such as using protective software, using an external database security consulting group, hiring more security savvy workers, or hiring more workers so that sufficient time can be allocated to security measures.

Saturday, September 22, 2007

News 3 - Peer to Peer Network

1. One thing I learned in class is that nodes are computers or users and links are what connect the nodes to each other to form a network.

2. Also, I learned that there are different ways computers can connect to each other to form a network. One is client-server and the other is peer-to-peer. There are also hybrids of the two.

3. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9009143

4. The article from earlier this year talks about Microsoft’s release of Window’s Vista. Before the version for individuals was released, pirated versions of the software were already available for download using BitTorrent, a peer-to-peer service.

I agree with the author this peer-to-peer file-sharing network is threatening Microsoft’s profit and no amount of consumer education will stop people from using the pirated software. Some readers of the article suggest that Microsoft should lower its prices on the software. Although I believe that it will alleviate the situation, people will still prefer the free version of the software if it is available through BitTorrent. In order for Microsoft to achieve the goal of anti-piracy, it will need technical solutions or to threaten lawsuits to reduce piracy.

BitTorrent is a fast and efficient way for users to exchange files between computers in a network. However, although there has been regulation on peer to peer services in the past, some file sharing networks continually fail to monitor the file-sharing, so there have been many pirated versions of music, video, and now software distributed this way. This technology is beneficial to the users. However, for certain businesses, this is not good because the value of their intellectual property is being chipped away.

Found another interesting article:
http://www.news.com/Congress-P2P-networks-harm-national-security/2100-1029_3-6198585.html

Saturday, September 15, 2007

News 2 - Object Oriented Programming

1. This week we learned about the different types of computer languages in the class, such as, assembly language, machine language, procedural language and object oriented language.

Machine language is the lowest level of computer language, and it’s all in numbers. It manipulates the computer hardware by instructions translated from assembly language.

Object oriented programming language (OOP) is a high level computer language. The essential characteristic of object oriented language is uses of object. An object is a module that contains one or more routine functions. The programmer can create relationship between one object and another. The new object can inherit the basic functions from the existing object. It increases the reusability and modifiability of the program.

2. I found an interesting article about object oriented programming:
http://www.devx.com/opinion/Article/26776

3. The author in this article believes that OOP is good in theory, but it’s not so good in practice. He thinks OOP leads to programmers not understanding each other’s code. The author suggests that simply copying and pasting codes can replace the OOP’s concept of code reusability.

I don’t agree with the author’s point of view. The ideas of reusability and modifiability must take into consideration the business concept- OOP allows software companies to sell their code packages to another company, or pass the packages to another developer without revealing their codes. There will be security issues if all written objects’ codes were readily accessible by anyone. Also, the author’s idea of copying and pasting codes is not practical because it will generate more errors and compatibility issues. He did not suggest any viable alternative to OOP that would simplify the programming experience and improving efficiency.

Tuesday, September 11, 2007

Indiv 1 - Programs for Actuarial Analysis

1. What computer programs do you use to predict the future of a certain insurance plan?

There is a client server which the employee can access through a user terminal called Mocha. There are many subprograms here in which I can input or extract data. Access to those subprograms is restricted according to employee’s job function. In addition, the FTP program allows a computer to connect to the client server to download client data into the computer. Using Norton Commander, an orthodox file management program, I can edit certain variables (such as which mortality tables to use) in a data analysis program and then run the programs. The actuarial programs then manipulate and analyze the data files obtained from the client server in a way to serve the purpose. The programs produce useful output which can allow an actuary to draw conclusions about the health of the retirement benefit plan or estimate/predict some events will likely happen in a given plan.

2. Which one do you find most useful and which one least useful?

I would say the most useful programs are the actuarial data manipulation programs which are particular to the actuarial department and which we can edit variables and run through Norton Commander. I find that the least useful program is Norton Commander in that it involves extensive keyboard use.

3. What additional features do you wish that these programs have?

I wish that Norton Commander was more user-friendly so that we can use the mouse to drag and edit the data instead of only being able to use the keyboard.

4. Can these programs be customized by using a computer language? Which one?

I believe the programs can be customized by using an object oriented computer language such as C++.

Saturday, September 8, 2007

News 1 - Apple iphones for IT staff?

1. I learned about different type of computers in class. Specifically, I was interested in what a server was so I looked into it and found that computer servers can control, manage or monitor other computers and devices on the network. Also, that there are other types of servers such as printer servers and web servers.

Another concept I learned from class this week was how a company's website reflects its business strategy. From Dell’s website, I learned that Dell had a conflicting strategy on its website where it was targeting both sophisticated and beginner computer users.


2. I found an interesting article from the internet relating to our class on hardware. This article offers tips about how iphones can be used to help IT staff at work:

http://www.infoworld.com/article/07/07/24/What-to-do-if-the-CEO-gets-an-iPhone_1.html

3. The author implies that companies should provide IT with Apple iphones that work on the company's computer network by suggesting several features of iphone that supports this use. I don't agree this implication because the iphone may be sufficient for personal entertainment, but may not be as suitable as a laptop or desktop would be for IT work. The iphone uses only Mac OS/software applications, is solely compatible with AT&T service, has restrictions on speed, and is more easily hackable. Also, the article does not mention technical plans or specifications for connecting the iphone to a company's network. However, I think an IT manager might still be interested in this article because using new PDA devices in the work environment may be a way to better productivity if the restrictions imposed by use of this particular PDA device could be overcome.