Friday, October 29, 2010

Blog 7: Operatng Systems and my Future.

Operating Systems and I have always had a bit of an on and off relationship. I was born a Windows Baby into a Windows world, learning the ins and outs of the operating system I thought clearly superior to anything else. Then came along my first Mac, since I was new to it, I couldn’t grasp it as well as windows, but the user-interface seemed much easier and stress free, Finally, open source operating systems, like Linux, logically appear to me as the best bet. No other operating system would allow me to code it and program it to my specifications.

For my company, the decision for what operating system to use would be a very tough one, since it’s a complete annoyance to switch from Windows to a Mac, Mac to Linux,etc etc. As much as I love the potential of Linux, I feel the everyday consumer and even employee would have a very tough time using an Open Source operating system. The Mac operating system appears to be trouble free, but if a Windows-based computer goes down, I believe I’ll have a much much easier time fixing that then I would with a Mac. Therefore, my pick would be Windows Vista (HAHAHA, No, Windows 7 Clearly)

Seeing someone whose been their/done that for the ischool is always a fun experience, especially since the reason I’m here is so I can one day be “That iSchool Guy.” It seems like a job in the IT Industry requires a lot of work, but the pay-off seems to be worth it. Learning this type of cutting edge computer information allows me to see my blog idea as a plausible idea rather then a dream I would have had a year ago.

Wednesday, October 27, 2010

Blog #6: Computer Forensics and Identity Theft

Identity theft is such a big issue in today’s society that I believe literally every single individual business must see this as an issue and deal with it. Identity theft could cause customers to completely lose faith in a product and stop buying it. A company who can be held responsible for not preventing identity theft would also be torn apart by the media and the public.
I would hope my application would use the official Apple App store, Verizon store, or the cell-phone carrier’s official store. These stores should be protected against identify fraud I’d think (and hope), so I’d expect this to help cut down on my worries on identify fraud. As a business owner, if I weren’t protected by the official store, would probably hire my own expert, since I find it to be that big of an issue.
Computer forensics I could only really see coming into play if my data was to all be lost. If my hard-drives/servers of customer data were to fail or get damaged, I’d most certainly need an expert to retrieve that data. The expert would hopefully be able to get the data back off the broken hard-drive so I wouldn’t lose any data.

Tuesday, October 26, 2010

Blog #5 (sorry for delay, rest on the way)

Since my idea is mainly formed in the cell-phone market, and with the high possibility of a phone using a .mp3 or .wav file for a ring-tone it is very good that I know this information. The application that I would have installed on these phones would need a ring-tone activation program in it, so the user could find their phone by sound. The program would have to lessen memory used as to save battery life.
This may be possible by converting the file if it’s .wav to .mp3, making the memory accessed and energy required to access that memory lower. As an added feature the application may have a built-in converter when just in regular use. I would have the application do the conversion between the two while the phone still had plenty of battery.
With all the business I “hope” to be doing, I’ll need a spot to store all my data. Using my knowledge of memory and computer storage I should be able to find a way to optimally and cost efficiently save all my data. Having basic knowledge of ASCII and UNICODE will also be beneficial when coding the website .