Sunday, December 16, 2012

ITE 221 - Fall 2012 - Chapter 14

PURPOSE:

This chapter describes system administration responsibilities and tasks. It explains the process of acquiring computer hardware and system software.


ITE 221 – Chapter 14 – Blog

 

Types of Biometric Security

 


 

There are various types of biometric security in use today.  Some of these are listed below:

 

·         Fingerprint Identification – this type of biometric security is based on the ridges on a person’s finger.  These ridges are created in the womb and the actual fingerprints are created by the fourth month of fetal development. As people get older the fingers do get larger but the relationship between the ridges stays the same.

·         Hand Geometry – this is the measurement and comparison of the different physical characteristics of the hand. This type is still in use today.

·         Palm Vein Authentication – this system uses an infrared beam to penetrate the person’s hand as it is waved over the system; the veins in the palm are returned as black lines. This sytem has a high level of authentication accuracy.  It’s pretty hard to fake.  Is used in public places.

·         Retina Scan – this method provides an analysis of the capillary blood vessels in the back of the eye. This pattern remains the same throughout life.

·         Iris Scan – this provides an analysis of the rings, furrows and freckles in the colored ring that surrounds the eye. There are more than 200 points used for comparison.

 

Some of the other types of biometric security is use today include: facial recognition, signature and voice analysis.

ITE 221 - Fall 2012 - Chapter 13

PURPOSE:

The chapter describes client-server and multi-user application architecture and discusses their advantages compared to centralized applications. It explains how operating systems and network protocol stacks cooperate so users and programs can access remote resources.


ITE 221 – Chapter 13 – Blog

 

Difference between LDAP and Active Directory

 


 

LDAP is a protocol for accessing information from directory services.  Active Directory is Microsoft’s propritery directory service. LDAP can be conformed to so that Active Directory can understand and respond to its requests.

 

LDAP was created as a product of cooperation between telecom companies to create a protocol that could be used to pull data from a server across TCP/IP.  Active Directory was created by Microsoft that is based on LDAP. Originally it was meant to provide data via LDAP but has gone on to include other services.

 

In conclusion, here are some of the differences between LDAP and Active Directory:

 

·         LDAP is a protocol for retrieving information from directory services like Active Directory.

·         LDAP is older than Active Directory.

·         LDAP is an industry wide creation while Active Directory is a proprietary Microsoft product.

·         Active Directory is primarily a Windows based program.

·         Active Directory also provides services outside of the scope of LDAP.

Saturday, December 15, 2012

ITE 221 - Fall 2012 - Chapter 12

PURPOSE:

The chapter describes the components and functions of a file management system. It compares the logical and physical organization of files and directories. It explains how secondary storage locations are allocated to files and describes the data structures used to record those allocations. Security, backup, recovery and fault tolerance methods and procedures are covered.


ITE 221 – Chapter 12 Blog – Gabor

 

The Difference between Linux and Windows Files

 


 

Both Windows and Linux have file management systems.  They differentiate in how they deal with files.

 

One area they differentiate is with they way they handle hidden files.  In Linux, hidden files are always preceeded by a period.  i.e. “.home”. In Windows, in order to give hidden attributes to a file, a user will right-click on the file name and select the Hidden check box. When a user refreshes the directory listings the file will not appear.  How do you get it back?

 

File extensions is another area of differentation.  In Windows, file extensions are what tells the OS which program to use to open the file.  Linux does not use file extensions. With Linux, a user can create a text file named try.doc file and a text file named try and both will open in a word processing program and their will be no differences between the context of both files.

ITE 221 - Fall 2012 - Chapter 11

PURPOSE:

The chapter describes the functions and layers of an operating system, lists the resources allocated by the operating system and describes how the operating system manages memory. It describes how an operating system manages programs, processes and threads and how signals and pipes are used to coordinate threads and processes. The alternate CPU scheduling methods are compared and contrasted.


ITE 221 – Chapter 11 Blog – Gabor


8 Great Windows 8 Features for Business


 

Microsoft’s latest release of Windows, Windows 8 has arrived.  I have purchased a copy of Windows 8 myself and have wondered what improvements it has for me and the company I work at.

One of the areas I am concerned about is security.  With Windows 8, Microsoft has upgraded Defender, its spyware program.  The previous versions lacked protection against trojans, worms and bot-net attempts.  The version that comes with Windows 8 fixes that.  Because Defender comes with a basic anti-virus defense, IT managers will be able to save money by not having to install third-party anti-virus programs.  Combined with the new SmartScreen technology which is used to verify downloads against a list of reputable files, it will make it harder for viruses, worms and the like to get in.

Microsoft finally added BitLocker to the Windows 8 professional version.  BitLocker is an encryption program for files, etc.  I personally have been waiting for this to happen! And they enhanced it too!

Other Windows 8 features for business include improved performance and better backups, more efficient wireless connection management and better support for virtualized systems and remote desktop support.

Saturday, December 1, 2012

ITE 221 - Fall 2012 - Chapter 10

PURPOSE:

The chapter describes the application development process and the role of methodologies, models and tools. It compares and contrasts programming language generations and explains the function and operation of program translation software and integrated application development software.


Copyrighting Source Code

 


 

 

Many programmers and software developers wonder what the requirements for copyrighting their programs are and does the government get to see the whole source code for the program. Source code is the instructions or statements in a high level programming language that form the basis of the particular program that is being developed. 

 

For entirely new programs the U.S. Copyright Office requires the following: 

 

            First 25 and last 25 pages of source code with portions

            containing trade secrets blocked out, or

 

            • First 10 and last 10 pages of source code alone, with no

            blocked out portions, or

 

            • First 25 and last 25 pages of object code plus any 10 or

            more consecutive pages of source code, with no blockedout

            portions, or

 

            • For programs 50 pages or less in length, entire source

            code with trade secret portions blocked out

 

For revised programs the U.S. Copyright Office requires the following: 

 

            If the revisions are present in the first 25 and last 25 pages,

            any one of the four options above, as appropriate, or if the

            revisions are not present in the first 25 and the last 25 pages:

 

            • 20 pages of source code containing the revisions with no

            blocked out portions, or

 

            • any 50 pages of source code containing the revisions with

            some portions blocked out

 

            note: Whenever portions of code are blocked out, the following

                requirements must be met:

 

                1. the blocked out portions must be proportionately less than the

                material remaining; and

 

                2. the visible portion must represent an appreciable amount of

                original computer code.

 

So what does the Copyright Office say about copyrighting websites?

Here’s their answer:

 

            note: Registration of html or other formatting code for a

                website does not automatically cover any visible or audible

                copyrightable elements that are generated by the code. To

                register those portions of an online work, the entire copyrightable

                content must be deposited. It is possible to register the

                computer program together with the online work, but the

                deposit requirements for both the program and the online

                work must be fulfilled. See Circular 66, Copyright Registration

                for Online Works, for important information on the required

                deposit and how to complete the application when registering

                online works.

Thursday, November 29, 2012

ITE 221 - Fall 2012 - Chapter 9

PURPOSE:

The chapter compares and contrasts the bus, ring and star network topologies. It describes packet routing across local and wide area networks. The methods of data passing are described. Nework hardware devices are described and the OSI Network model is covered.


Megaco/H.248: Media Gateway Control Protocol

 


 

 

Megaco/H.248, the Media Gateway Control Protocol is used for the control of elements in a physically decomposed multimedia gateway. 

 

This protocol describes the relationship between the Media Gateway (MG) and the Media Gateway Controller (MGC and also known as the call agent). The Media Gateway converts circuit-switched voice to packet-based traffic.

 

Terminations and contexts are the two vital components of the protocol.  Streams of data entering or leaving the Media Gateway are terminations while contexts are when two or more termination streams are mixed and combined together.  Under command from the MGC, the MG creates and releases the contexts.  More than one stream can appear in a termination and contexts can be considered to be multistreamed contexts.  Audio, video and data streams may exist in a context made up of multiple terminations. 

 

Messages are sent in the ASN.1 format.  These are text messages.  These are the commands used in the protocol:  Add, Modify, Subtract, Move, AuditValue, AuditCapabilities, Notify and ServiceChange.

ITE 221 - Fall 2012 - Chapter 8

PURPOSE:

The chapter describes the signals and media used to transmit digital signals and the methods of encoding and transmitting data using analog and digital signals. It describes the methods for detecting and correcting data transmission errors and the methods for efficiency using communication channels.


How ML-IP Can Increase Bandwith

 


 

 

One of the major issues facing Internet Service Providers today is how to increase bandwith with the technology we have today.  With more people connecting to the Internet and with many different types of devices (tablets, smartphones, laptops, etc.) that have the capability to connect to the internet, ISPs are finding their systems bandwith availability reaching its capacity.

 

ML-IP is one way in which ISPs can increase their bandwith.  ML-IP (MultiLink-IP) is multilinking of IP data streams. What ML-IP does is allow traffic traveling across different network paths between two ML-IP gateways to be aggregated so that it increases the bandwidth. Since the aggregation is achieved end-to-end between the gateways the ISPs do not need to support the ML-IP technology because ML-IP can aggregate at the network layer and not at the physical layer. This allows the ISP to increase bandwith and increase the networks reliability.  It also is a very cost effective way to increase bandwith because not much if any new infrastructure is needed.