Wednesday, November 16, 2011
7.1 IS Security
While creating a business the owner should always be aware of their information system security. They should also know that when they build things or create things they should always prepare for a threat. The movie theater Commonwealth 10 is well prepared, but here is a list of our company 5 most threats to imformation system security. The first one consist of natural disasters. Their is nothing we can do about mother nature, but the most common disaster we go through is power outages and we have to always have back up files so our business can keep on running. The second disaster is outsiders and intruders. Due to the fact that our business is so large in nature and sometimes employees make mistakes, but we try to keep all of our private documents and data secured so we require for when to log off when ever they sign in and to never share their username and password with anybody so we can prevent this. The third disaster consist of email attachments with virsus. Since we open our web site to the public sometimes customers attach virsuses on the website or in a blog so Commonwelath 10 clears all saved memory on the websites twice a day and also every two weeks we have a mandatory virsus scan. The fourth disaster is links to business associates. In order to run our business we have to buy our products from different companies. So we set up a secure plan with our business partner not to share any of our private information with them. Meaning no one shares their private and public keys with anybody else. Lastly, the fifth disaster that can occur in Commonwealth 10 is our employees or consultants slipping up. We must make sure that our employees understand the importance and security of our private key so they will never share them with anybody else so we can continue with our encryption message to one employer to another. If Commonwealth 10 acknowledge and perform all of these rules then our company will be safe and secure with no worries in hand.
Tuesday, November 15, 2011
6.1- Web 2.0
The new and improve movie, Commonwealth 10, have now upgraded our system to an enhancing collaboration using the web 2.0 pillars. Our goal is to manage the digital world and modify how our information is being delivered. Commonwealth 10 uses the pillar harness collective intelligence by connecting its foundation to the web. It is availble to our customers and which they can add users, add new content, and new sites that they believe that will help make Commonwealth 10 website a success. Commonwealth 10 also uses the pillar leveraging the data. It essentially means that if the customer comes to visit our theater, the computer remembers their name and what genre of movies they have seen before and will categorized them into the customers favorite movie list. When the customer logs into their page a list of movies and the genre that they have seen will show up and whatever their favorite genre is then all of the movies of the genre will show up along with the times and dates. Commonwealth 10 uses the pillar implementing innovative web capabilities by showing the customer their mashups and widgets on their personal page. Lastly, Commonwealth 10 utilizes the web as a platform by using peer to peer technology, which enables our customers to share their helpful ideas to us through the use of our online blogging system and our easy 10 question questionairre that will help our customers have a exciting experience at Commonwealth 10. We hope that by using these pillars we will provide an easy and helpful experience on our web site.
Monday, October 24, 2011
5.3 B2E Electronic Commerce
In the picture diagram shown above is the use of intranet diagram connecting to an mobile electronic device through our movie theater company Commonwealth 10. Commonwealth 10 begins by connecting to the internet and using the server to communicate to an client that has a mobile device. In order to do so we have to go through a secure firewall so information will only be confined to them. This process is called VPN (virtual private network) which ensures secured transmission of proprietary information.
5.2 B2B electronic commerce
In the picture shown above is an extranet diagram that the movie theater Commonwealth 10 uses. It essentially explains how Commenwealth 10 works with our client Jargo. Our 2 firewalls ensure that both business have an established security system so when we send information through the use of internet from our server to their server we both are protected. This process is called VPN (virtual private network).
4.4 Entity Relationship Diagram
The picture shown above is a graphical representation of database table entities and their relationships to each other, which are typically used in organizations of data within databases or information systems. An entity is a piece of data-an object or concept about which data is stored. A relationship is how the data is shared between entities. Each entity that is being shared contains data types that are called records. Within the records are specific characteristic describing the entities which are called attributes. Different attribute types generally consist of a name and their social security number.
Sunday, October 23, 2011
5.1 Critique your competitors E-commerce website
http://www.bowtiecinemas.com/movieland-blvdsq.html
Bowtie cinemas
Rule 1: The website should offer something unique. Rate-4 This movie theater is very classy and elagance versus other theaters. It also is built off of an train station and the kept the train station setting on the inside also.
Rule 2: The website should be aesthetically pleasing. Rate-4 The background catches the eye and their overall page setup draws the viewer into wanting to see more.
Rule 3:The website must be easy to use and fast. Rate-4 This website is easy to use and fast. All of the navigational tools are easy to access and very minimal link connected.
Rule 4: The website must motivate people to visit Rate-4 Since it is very easy to acces and the webpage is appealing, this website is very motivating to come back and use it again.
Rule 5: You must advertise your presence on the web rate. Rate-4 The Color scheme and background on the webpage reminds you of a ballroom. Since their motto is practing style and elegance it suits their theme. They also have high quality images of the theater on their home page on the website.
Rule 6: You should learn from your website. Rate-4 On alex.com bowtie cinemas has a lot of great staticts and comments on. They recommend you attend their and that the service is excellent, the theater is really clean and the showing of their movie was terrific. A lot of people navigate through the webpage.
Bowtie cinemas
Rule 1: The website should offer something unique. Rate-4 This movie theater is very classy and elagance versus other theaters. It also is built off of an train station and the kept the train station setting on the inside also.
Rule 2: The website should be aesthetically pleasing. Rate-4 The background catches the eye and their overall page setup draws the viewer into wanting to see more.
Rule 3:The website must be easy to use and fast. Rate-4 This website is easy to use and fast. All of the navigational tools are easy to access and very minimal link connected.
Rule 4: The website must motivate people to visit Rate-4 Since it is very easy to acces and the webpage is appealing, this website is very motivating to come back and use it again.
Rule 5: You must advertise your presence on the web rate. Rate-4 The Color scheme and background on the webpage reminds you of a ballroom. Since their motto is practing style and elegance it suits their theme. They also have high quality images of the theater on their home page on the website.
Rule 6: You should learn from your website. Rate-4 On alex.com bowtie cinemas has a lot of great staticts and comments on. They recommend you attend their and that the service is excellent, the theater is really clean and the showing of their movie was terrific. A lot of people navigate through the webpage.
4.2 Packet Switching Technology
Packet Switching Technology is the process of breaking information into small chunks called data packets and the managing the transfer of those packets from computer to computer via the internet. This picture can illustrate different companies. Company server A is trying to send a data packet to their client Company server C. In order to do so the TCP breaks down the information and manages thr transfer. The IP defines how a packet must be formed to where a router (device used to connect 2 networks) must foward each packet. Each data packet also has their own IP datagram or specifications that gets sends to their own unique IP address. Lastly, the packets get send down a wire that is connected to several users, this is called concurrent data transmission.
Subscribe to:
Posts (Atom)