Thursday, December 15, 2011

Systems Development Life Cycle Research T13.2

Systems Development Life Cycle Research

Information systems store the key to all business processes in the 21st century. Ensuring these systems coincide with an organization’s business strategy is crucial to receiving the most returns on your investment. Understanding how the system development life cycle is the determining factor if an organization succeeds.

The system development life cycles (SDLC) are composed of the following: Analysis, Design, Implementation, Testing and Evaluation. The “SDLC” is a process known to system professionals as a development tool for creating information systems. Using the knowledge attained from SDLC one can create an efficient and high performing system that exceeds their customer expectations. In other words, creating a system that will cut, costs, and works efficiently in a high risk environment. Most of these systems are complicated pieces of software but with technology moving forward usability is greatly enhanced.

System analysis
The objective of system analysis is to find any outstanding issues within an information system and apply solutions to positively enhance efficiency. This step is composed of breaking apart the information into small increments and analyzes the data, and determines what needs to be done to ensure the system is running in accordance to the organizations requirements. Upon, receiving requirements from the client or organization; the team analysis can confirm the system is running error free under their guidelines.

Design
The role of system design describes the new information system as either a compilation of knowledge. On this step the design functions are described in complete detail such as the organizations screen layouts, rules, diagrams, and other company information. The design component uses the list of requirements identified by the client or organization. Each requirement has its own sets of design components. The design elements can be considered as software features in detail, business diagrams, business rules (similar to what we had in our expert systems task). These design elements are intended to describe the software in sufficient detail that skilled programmers may develop the software with minimal additional input design.

Implementation
Once in the implementation cycle, the client or organization can adjust and enable system features, installations, and receive a formal greeting ensuring the user that the system is operating accordingly. Usually the design and system tests are done prior to implementation to make sure that all the requirements are met and security is in accordance to their business specifications. At this time new applications can be added to the information system.

Testing and Evaluation
During this time the system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures.

Thursday, December 8, 2011

T12.3 EXPERT SYSTEM

My expert system pushes the boundaries on Career & Personality Assessments. This system compiles the users decisions to formulate a career based on their choices and personality. Inputting years of knowledge, I was able to create a fully functional STAR WARS theme personality career tool. Enjoy


BEGIN
DISPLAY "

STAR WARS

WHAT CAREER BEST SUITES YOU?

PRESS ANY KEY TO BEGIN YOUR JOURNEY."~
FIND THE_JOB
CLS
DISPLAY "

THE MOST APPLICABLE CAREER BASED ON YOUR DECISIONS
IS {the_job}

WITH THE OPPORTUNITY {complement}."


END

RULE A1:
IF COMPLEMENT = "OF BECOMING A SITH LORD" AND
PREF1 = YES AND
PREF2 = YES AND
PREF3 = YES AND
PREF4 = "DESTROY HIM"
THEN THE_JOB = "A SITH APPRENTICE";

RULE A2:
IF COMPLEMENT = "OF BECOMING AN EWOK EMBASSADOR" AND
PREF1 = YES AND
PREF2 = YES AND
PREF3 = YES AND
PREF4 = "HUG HIM"
THEN THE_JOB = "AN EWOK CHIEF";

RULE A3:
IF COMPLEMENT = "OF BECOMING AN EWOK MINISTER" AND
PREF1 = YES AND
PREF2 = YES AND
PREF3 = NO AND
PREF5 = YES
THEN THE_JOB = "AN EWOK CHIEF";

RULE A3B:
IF COMPLEMENT = "OF COMING INTO THE LIGHTSIDE!" AND
PREF1 = YES AND
PREF2 = YES AND
PREF3 = NO AND
PREF5 = NO
THEN THE_JOB = "A JEDI APPRENTICE";

RULE A4:
IF COMPLEMENT = "OF BECOMING A JEDI KNIGHT" AND
PREF1 = YES AND
PREF2 = NO
AND PREF6 = NO
AND PREF5 = NO
THEN THE_JOB = "A PALADIN";

RULE A5:
IF COMPLEMENT = "OF BECOMING AN IMPERIAL SCOUT TROOPER" AND
PREF1 = YES AND
PREF2 = NO AND
PREF6 = YES AND
PREF8 = NO
THEN THE_JOB = "A TROOPER";

RULE A5B:
IF COMPLEMENT = "OF BECOMING AN EWOK SCOUT" AND
PREF1 = YES AND
PREF2 = NO AND
PREF6 = NO AND
PREF5 = YES
THEN THE_JOB = "AN EWOK FRY-COOK";

RULE A6:
IF COMPLEMENT = "OF BECOMING A DEATH STAR CAPTAIN" AND
PREF1 = YES AND
PREF2 = NO AND
PREF6 = YES AND
PREF8 = YES
THEN THE_JOB = "A DEATH STAR LASER OPERATOR";

RULE A7:
IF COMPLEMENT = "OF BECOMING A HONORARY EWOK" AND
PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = NO AND
PREF5 = YES
THEN THE_JOB = "AN EWOK SERVANT";

RULE A7B:
IF COMPLEMENT = "OF BECOMING A JEDI APPRENTICE" AND
PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = NO AND
PREF5 = NO
THEN THE_JOB = "NOT BEING JABBA THE HUT'S FOOD";

Rule A7C:
IF COMPLEMENT = "OF BECOMING A SITH LORD" AND
PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = Yes
THEN THE_JOB = "A SITH APPRENTICE";

RULE A8:
IF COMPLEMENT = "OF BECOMING A JEDI KNIGHT" AND
PREF1 = NO AND
PREF7 = SOMETIMES AND
PREF8 = NO
THEN THE_JOB = "A PALADIN";

RULE A9:
IF COMPLEMENT = "OF BECOMING A DEATH STAR LASER OPERATOR" AND
PREF1 = NO AND
PREF7 = SOMETIMES AND
PREF8 = YES
THEN THE_JOB = "A DEATH STAR JANITOR";

RULE A10:
IF COMPLEMENT = "NOT BEING EATEN BY JABBA" AND
PREF1 = NO AND
PREF7 = ALWAYS AND
PREF9 = YES
THEN THE_JOB = "A JABBA THE HUT DANCING SLAVE";

RULE A11:
IF COMPLEMENT = "OF BECOMING AN IMPERIAL STORM TROOPER" AND
PREF1 = NO AND
PREF7 = ALWAYS AND
PREF9 = NO
THEN THE_JOB = "A DEATH STAR SOLDIER";

RULE A12:
IF PREF1 = YES AND
PREF2 = YES AND
PREF3 = YES AND
PREF4 = "DESTROY HIM"
THEN COMPLEMENT = "OF BECOMING A SITH LORD";

RULE A13:
IF PREF1 = YES AND
PREF2 = YES AND
PREF3 = YES AND
PREF4 = "HUG HIM"
THEN COMPLEMENT = "OF BECOMING AN EWOK EMBASSADOR";

RULE A14:
IF PREF1 = YES AND
PREF2 = YES AND
PREF3 = NO AND
PREF5 = YES
THEN COMPLEMENT = "OF BECOMING AN EWOK MINISTER";

RULE A14B:
IF PREF1 = YES AND
PREF2 = YES AND
PREF3 = NO AND
PREF5 = NO
THEN COMPLEMENT = "OF COMING INTO THE LIGHTSIDE!";

RULE A15:
IF PREF1 = YES AND
PREF2 = NO AND
PREF6 = NO AND
PREF5 = NO
THEN COMPLEMENT = "OF BECOMING A JEDI KNIGHT";

RULE A15B:
IF PREF1 = YES AND
PREF2 = NO AND
PREF6 = NO AND
PREF5 = YES
THEN COMPLEMENT = "OF BECOMING AN EWOK SCOUT";

RULE A16:
IF PREF1 = YES AND
PREF2 = NO AND
PREF6 = YES AND
PREF8 = NO
THEN COMPLEMENT = "OF BECOMING AN IMPERIAL SCOUT TROOPER";

RULE A17:
IF PREF1 = YES AND
PREF2 = NO AND
PREF6 = YES AND
PREF8 = YES
THEN COMPLEMENT = "OF BECOMING A DEATH STAR CAPTAIN";

RULE A18:
IF PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = NO AND
PREF5 = YES
THEN COMPLEMENT = "OF BECOMING A HONORARY EWOK";

RULE A18B:
IF PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = NO AND
PREF5 = NO
THEN COMPLEMENT = "OF BECOMING A JEDI APPRENTICE";

RULE A18C:
IF PREF1 = NO AND
PREF7 = "Only if my life depends on it" AND
PREF6 = Yes
THEN COMPLEMENT = "OF BECOMING A SITH LORD";

RULE A19:
IF PREF1 = NO AND
PREF7 = SOMETIMES AND
PREF8 = NO
THEN COMPLEMENT = "OF BECOMING A JEDI KNIGHT";

RULE A20:
IF PREF1 = NO AND
PREF7 = SOMETIMES AND
PREF8 = YES
THEN COMPLEMENT = "OF BECOMING A DEATH STAR LASER OPERATOR";

RULE A21:
IF PREF1 = NO AND
PREF7 = ALWAYS AND
PREF9 = YES
THEN COMPLEMENT = "NOT BEING EATEN BY JABBA";

RULE A22:
IF PREF1 = NO AND
PREF7 = ALWAYS AND
PREF9 = NO
THEN COMPLEMENT = "OF BECOMING AN IMPERIAL STORM TROOPER";

ASK PREF1 "
DO YOU CONSIDER YOURSELF A REBEL?"

CHOICES PREF1 (YES, NO)

ASK PREF2 "
COULD YOU HANDLE THE STRESS

OF A LIGHTSABER BATTLE?"

CHOICES PREF2 (YES, NO)

ASK PREF3 "
DO YOU CRAVE EXTREME POWER?"

CHOICES PREF3 (YES, NO)

ASK PREF4 "
WHAT IF JAR JAR FORCEFULLY

JOINED YOUR SOCIAL CIRCLE?"

CHOICES PREF4 ("DESTROY HIM", "HUG HIM")

ASK PREF5 "
ARE YOU COMFORTABLE CAPTURING

PEOPLE/ALIENS FOR MONEY?"

CHOICES PREF5 (YES, NO)

ASK PREF6 "
WOULD YOU BE COMFORTABLE

DESTROYING AN ENTIRE PLANET?"

CHOICES PREF6 (YES, NO)

ASK PREF7 "
DO YOU LIKE TO DANCE?"

CHOICES PREF7 ("Only if my life depends on it", SOMETIMES, ALWAYS)

ASK PREF8 "
DO YOU ENJOY SITTING FOR

LONG PERIODS OF TIME?"

CHOICES PREF8 (YES, NO)

ASK PREF9 "
WOULD YOU LET JABBA

THE HUT DRESS YOU UP?"

CHOICES PREF9 (YES, NO)

T11.2

Decision support systems have been developed by Information Systems for the past 40 years to create an efficient system to facilitate precise computerized decision making processes. This paper explores the developments of DSS in different types of organizations.

The new group Trading Decision Support Systems was developed as a resource for consumer, institutional traders and investors. “TDSS” focuses on an interface to share ideas, initiate and contribute to discussions, and to expand your social network. For example a few benefits are:

Trading systems: algorithms, methods, technologies, human factor, and statistics.
Software tools to support traders decisions: forecast methods, simulations, back-testing, and optimization.
Technical Analysis: indicators and chart patterns.
Fundamental Analysis: financial ratios and predictive models.

Trading Decision support systems create new ways to lead an organization to prosperity. If systems are automated, it is easy and fast to test them, collect and analyze back-testing and live statistics, and then make necessary improvements. [1]

Another great example of a Decision Support System is IEM Defense solutions. This company created a system to help protect, support, and improve the performance of combatants and military leaders in their homeland or at the battlefield. IEM DSS uses both science and technological-based methods to deliver innovative solutions that can result from a victory or a defeat in our war driven world. IEM Decision Support System is widely known for their safe and realistic training environment that prepares soldiers with on-site decision support making on both chemical warfare and counter-action of a Weapon of Mass Destruction (WMD). Using IEM decision support systems, military leaders can assess threats, calculate risks, and mitigate dangerous situations for force, installation, and critical infrastructure protection. [2]

The computational technologies are changing. Systems empowered by Artificial Intelligence have self-learning abilities that enable them to adapt to market changes. [3] The purpose of this paper is to expose and understand why these developers of decision support software work diligently to create these decision support systems. It may one day save our lives!

References:

1. "Decision Support Systems - Elsevier." Journals - Elsevier. Web. 16 Nov. 2011. .

2. "New Trading Decision Support Systems Group on LinkedIn « Stock Forecast Methods." Stock Forecast Methods. Web. 16 Nov. 2011. .

3. "Defense Solutions, Mixed Reality Training for Soldiers, Counterinsurgency Training, Decision Support Systems - IEM Inc." IEM- Disaster & Emergency Management, Homeland Security, Bioterrorism Preparedness, IT and Software Engineering Solutions - IEM Inc. Web. 16 Nov. 2011. .

T10.4

T10.2 DECISION MAKING

To be or not to be? That is the question! We act and form opinions from mental processes in our brain. These processes are influenced by biases, reason, emotions, and experiences in our lives. Decision making is a vast topic which encompasses various components. One specific type of decision making shared universally amongst humans is cognitive decision making.

Scientifically, cognitive decision making refers to the mental processes used to make decisions. These processes include attention, remembering, producing and understanding language, solving problems, and decision making.[1] In a business aspect, cognitive decision-making can be considered the primary activity for both management and their employees. Managers are responsible to make the right choices and the coworkers are responsible to do things correctly. As leaders, managers must work efficiently to reduce or eliminate mistakes and waste.[2]

The human decision maker is considered similar to a computer information system. For example data must be compiled and processed into the system to create information. The most important issue for a decision maker is the outcome of decisions. Obviously, what we think or feel is not relevant to the physical world, but they influence our perspective and value judgments.

Decision making is an essential part of life, whether it’s business or personal. One must learn how to make timely, well-considered decisions to be successful in this day in age.

References:

1."Cognitive Decision-Making." Meta-Knowledge Engineering and Management Server for Intelligent Socio-Cognitive Systems (updated Edition). Web. 09 Nov. 2011. .

2."Overcoming Serious Indecisiveness." University of Baltimore Home Page Web Services. 25 Feb. 1994. Web. 09 Nov. 2011. .

T8 IS DESIGN

IS design from Web Applications

Web-applications are essential in producing effective and consistent business practices to compete in our current economic state. They allow users to perform a variety of functions through secure remote locations and provide the necessary tools to process and compile information within a database. Implementation of such applications offer competitive advantages to traditional software based systems.

Understanding Web 2.0:

To understand web-applications one must first understand Web 2.0. The term Web 2.0 is associated with web applications that facilitate participation information sharing, interoperability, user-centered design, (1) and collaboration on the World Wide Web. The history of Web 2.0 "Bandwidth and power. Faster than the very costly T1 lines used in the enterprise, cable and DSL hookups have extended high-speed connections to individuals and small businesses. Browsing Web pages full of images and video as well as downloading multimedia files have become routine." 9? A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators (prosumers) of user-generated content in a virtual environment, in contrast to websites where users (consumers) are limited to the passive viewing of content that was created for them. Web applications are dynamic, allowing users to complete tasks and perform specific functions. Web application users need a higher level of skill to navigate than the average users who browse the internet. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, mashups and folksonom.
The term "Web 2.0" was coined in January 1999 by Darcy DiNucci?? , a consultant on electronic information design. This is opposed to Web 1.0 or web, refers to the first stage of the World Wide Web linking webpages with hyperlinks. Hyperlinks between webpages began with the release of the WWW to the public in 1993,1? and describe the Web before the "bursting of the Dot-com bubble" in 2001. Since 2004, Web 2.0 has been the term used to describe social web, especially the current business models of sites on the World Wide Web.2?

Development and Implementation of Web Applications:

The goal of developing a system that fulfill the business of an organization is to gather the information necessary to develop the system, defining the objectives of the site, gathering information about its users and their needs, its content and the way in which it be presented. Four Important elements to the analysis of a web based information system is the problem domain, users, content and the presentation. 3?

A clear definition and understanding of the problem domain, and how it relates to the organization and its users' goals, is a prerequisite for achieving accurate system requirements. Although users of a WIS have various attributes that increase the challenges of requirement elicitation and analysis, requirement analysis is still an essential phase of the development process. 3?

Web applications present designers, and developers with many challenges. The stateless nature of HTTP means that tracking per-user session state becomes the responsibility of the application. As a precursor to this, the application must be able to identify the user by using some form of authentication. Given that all subsequent authorization divisions are based on the user's identity, it is essential that the authentication process is secure and that the session handling mechanism used to track authenticated users is equally well protected. Designing secure authentication and session management mechanisms are just a couple of the issues facing Web application designers and developers. Other challenges occur because input and output data passes over public networks. Preventing parameter manipulation and the disclosure of sensitive data are other top issues 1? . For example, encrypting is a way of protecting the work of designers and developers. Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.4

One form of design for an information system is User Centered-Design. This a design philosophy and a process in which the needs, wants, and limitations of end users of a product are given extensive attention at each stage of the design process. User-centered design can be characterized as a multi-stage problem solving process that not only requires designers to analyze and foresee how users are likely to use a product, but also to test the validity of their assumptions with regards to user behaviour in real world tests with actual users. User Centered-Design (UCD) is a philosophy and a process. It is a philosophy that places the user at the center; it is a process that focuses on cognitive as they come into play during peoples' interactions with things. UCD seeks to answer questions about users and their tasks and goals, then use the findings to drive development and design.
UCD seeks to answer questions such as: Who are the users of this 'thing'? What are the users’ tasks and goals? What are the users’ experience levels with this thing, and things like it? What functions do the users need from this thing? What information might the users need, and in what form do they need it? How do users think this 'thing' should work? And How can the design of this ‘thing’ facilitate users' cognitive processes?

Thoughts & Analysis of Applications:

“In the early days of the web, web sites consisted of static pages, which severely limited interaction with the user. “ 5? Now websites provide us with interaction between many people all over the world and now we can do things on the web that we only were able to do in person. Ramapo College Self-Service, a password protected application, provides students with the ability to register for classes and add/drop classes. Many colleges use the same system too. This web based application provides a faster easier way for college students to register for classes without having to wait online at the registrar’s office all day. The self-service application is more than just a registration tool but a way for the college to communicate important information with the students as well. Many of these applications exist for schools and companies in order to stay connected and make certain tasks easier for all.

There are a few ways how the applications track per-user sessions. One program is the Universal User Tracking. It incorporates multiple tracking mechanisms to identify the accountable end user for every database transaction, even in connection pooling environments. Universal User Tracking methods include:
Web Application User Tracking,Web to Database User Tracking,SQL Connection User Tracking and Direct User Tracking. These four tracking methods enable SecureSphere? to audit end users regardless of how they connect to the database, enabling complete accountability. By tracking end users, SecureSphere? can display user IDs in database security alerts, audit logs, and reports. In addition, database security policies can be created to restrict access by user ID. Universal User Tracking provides greater visibility into database activity, more granular security controls, and adherence to today's stringent regulatory requirements. Through using programs like this, websites can easily keep track of their users.6?

Method of developing an IS using web applications:

One method of developing an IS using web applications is inventory control. The use of a web application along with an identifier (bar code, vin number, product number, etc.) can help a company track and identify its inventory. Inputting or scanning the identifier into the web app will produce a list of information on the product. This can include price, cost, product information, production date, expiration date, total in inventory, suggested order amount, selling trends, photos and much more. An example of this system that is used in the automotive industry is an application called Dealer Specialties. The technicians for the Dealer Specialties will view and collect data on a stores’ current inventory. The detailed vehicle data, photographs and videos are sent electronically to dealers' own websites and partner destination sites including Cars.com, eBay, Craigslist, AutoTrader?.com and many others.(8) This application gives the dealer a tool to improve both the efficiency and the ease of use of its information system.

The Future of Web Applications:

Most web applications are based on the client-server architecture where the client enters information while the server stores and retrieves information. Internet mail is an example of this, with companies like Yahoo and Gmail offering web-based email clients. The new push for web applications is crossing the line into those applications that do not normally need a server to store the information. Your word processor, for example, stores documents on your computer, and doesn't need a server. Web applications can provide the same functionality and gain the benefit of working across multiple platforms. For example, a web application can act as a word processor, storing information and allowing you to 'download' the document onto your personal hard drive. If you have seen the new Gmail or Yahoo mail clients, you have seen how sophisticated web applications have become in the past few years. Much of that sophistication is because of AJAX, which is a programming model for creating more responsive web applications. Google Apps, Microsoft Office Live are examples of the newest generation of web applications.

The iPhone SDK is an application that allows users to create apps for the iPhone. The app can be downloaded and used for free. If a user wants to distribute the app or use it on an iPhone the fee is only $99. The application is designed to be used on a computer but can be used on the iPhone for a fee. iPhone is a powerful tool that even begginers can use to created applications. This allows for a wide variey of apps to be created and improved upon. (7) Applications for smart phones are surging in popularity. As of October 24, 2011, the Android Market, a store for apps, has surpassed 500,000 different applications. It gained 42,000 new applications in September alone. 2? The only market that android apps trail behind is of course Apple. Between Ipods, Iphones, and IPads, Apple doesn’t seem like it will be letting go of the lead any time soon.10?

So what is the future of web apps? They will tell us who we are, where we are, what we can spend and what we can spend it on. In effect, they can become the ultimate view nannies, always remembering the fact that the user will have set up the guidelines themselves.

The only question is not how far can the future development of web applications take us, but how far do we want it to go? 11?

The future of web applications has the potential too be huge. Having a web application “handle day to day tasks,” will save tons of money for companies support costs. Web applications will continue to get more “sophisticated” and will eventually eliminate the way Internet works today. Web 2.0 has already taken control of some of the most popular websites on the internet today just imagine what the future of web applications has to offer. (12)


1- http://www.w3.org/standards/webdesign/htmlcss

2 http://msdn.microsoft.com/en-us/library/ff648647.aspx

3 http://en.wikipedia.org/wiki/Encryption

4 https://www.owasp.org/index.php/What_are_web_applications%3F

5 http://www.umsl.edu/~sauterv/analysis/analysis_links.html

6 http://www.imperva.com/products/ssp_technology-universal-user-tracking.html

7 http://www.switchonthecode.com/tutorials/an-absolute-beginners-guide-to-iphone-development

8. http://dealerspecialties.com/about-us

9. http://www.answers.com/topic/web-2-0#ixzz1bw2HCW9k

10. http://www.informationweek.com/news/personal-tech/mobile-apps/231901537
11. http://thinkvitamin.com/code/the-future-of-web-apps-in-an-integrated-world/

12. http://webtrends.about.com/od/webapplications/a/future_webapps.htm

T8.2 Web Applications

Web-applications are essential in producing effective and consistent business practices to compete in our competitive economy. Organizations develop web application keeping in mind the vast advantages; they can connect to various computers, transmit information and can support multiple devices simultaneously. This research will focus on the history and future of web applications developed by leading organizations in our online world.

In the beginning of the twenty first century, the emergence of web applications was new to the World Wide Web community. Most web applications were not optimized for speed or efficiency one that comes up quite often is “Odd Post”. Odd Post was a subscriber based web client, whom set forth the use of JavaScript to render a desktop mail application. This was one of the early forms of an online application created head way to software giant Google. Web applications became more popular and as the market saturated with various blue chip companies combating for market share. Apps for navigation released by Google, Microsoft, Yahoo and first public document processing apps are only the beginning.

In June 2006, Google Writely was a web-based word processor created by the software company Upstartle and launched in August 2005. This milestone marked the dawn of a new technological era. Google launches Spreadsheets and Google Documents to the public. Google Spreadsheets which allowed real-time collaboration launched. Simple applications like apps for time management become competitive compared to their desktop counterparts. In addition to new web applications, major strides were made in improving the functionality of the resources used in creating and implementing web applications. In result, developer tools are released as open source; creating an eruption of new programs sparked by the online community. One application that really pushed the envelope is called Native Client.

Google developed a powerful developer tool called “Native Client,” a sandboxing technology which allows the user to run a native code from a web browser while keeping a high level of security. Theoretically, Native Client will allow web applications using it’s code to run at an above than average accelerated pace, whilst performing tasks in web and desktop applications.

Web applications are being released in a furious fashion in the past few years and this trend will continue expand exponentially. Web applications that were unthinkable in humans a few years ago are being bombarded with options and remapping the image of humanity as we know it.

Thursday, October 20, 2011

W7 T3.3 HTML LAB

Best Video Game in 2011


Xbox 360


Batman Arkham City





Batman Arkham City for the Xbox 360 system is by far the best game created in 2011.





Why is Batman Arkham City the best game available now? The graphics are great, the animation is superb, and the story is fascinating!!



    Best Games 2011
  • Mass Effect 2

  • Fallout Las Vegas

  • Forza Motorsports 3

  • La Noire

  • Gears of War 3

  • Rage

  • Deus Ex

  • Borderlands




    Worst Games 2011
  1. Barney Play Along

  2. Elmos fun house

  3. Kinnect Sports

  4. Billys newspaper

  5. Sesame Street Adventure





Visit for all your gaming needs!!!

Tuesday, October 4, 2011

Cloud Computing T4.4

Introduction

The cloud computing market is receiving plenty of attention from distinguished players in the computing industry; such as Microsoft Corp, Oracle, Google and Amazon to name a few. What is “Cloud Computing” and why is it so appealing as today’s emerging technology? A quick response would be the “bottom line.” More profit reported on their financial statements, which translates to greater dividends to investors. Cloud computing is compromised into the following categories: Infrastructure as a service, Platform as a service, Software as a service, and Communications as a service.

Types of Cloud Computing

The first class of cloud computing this research will touch upon is Infrastructure as a service (IaaS). “IaaS” is tailored to an organization which has decided to outsource the equipment utilized for supporting operations, storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, maintenance and performance of their assets. The business usually client pays a per-use fee for the services.

Software-as-a-service (SaaS) is a software distribution package in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. A great example of “SaaS” would be Direct2Drive.com, once in the website the user pays the suggested retail amount for a video game or software. The transaction gives user the right to download, install, and play the software on a single pc.

The third class is Platform-as-a-service (PaaS); this platform offers a quick and cost-effective standard for application innovation and transmission of information. “PaaS” offers the framework needed to run applications over the Internet. Users simply log in and allocate their needs bypassing complicated programs and system protocols. Platform as a service is based on per-usage or subscription and end-users ultimately only pay for what they use.

The fourth class of cloud computing is Communications as a service (CaaS), which is an outsourcing product, designed for business communication including over IP, contact center applications, and voice conferencing. “CaaS” shares the same benefit as the other classes of cloud computing such as the minimal amount of overhead costs, management and efficient delivery of the service to the end-user. Communications provider Mitel is a perfect example of a company using their real time voice applications for business to streamline their communication opportunities. [1]

Understanding Platform as a service (PaaS)

Platform as a service (PaaS) basically revolves on facilitating the execution of applications without inheriting the cost and elaborate purchasing and managing of hardware, software, hosting. “PaaS” is also provides all end-user branches with the required support needed to run the complete life cycle of building and delivering of web based applications and services. Platform as a service solutions are development packages in which the development tool itself is hosted in a cloud network and accessed through a browser. Developers can build web applications without installing any tools on their computer and apply those applications without any specialized systems administration skills.

Utilizing (PaaS)

A great example of an organization using “PaaS” would be the United States Department of Defense. The Defense Information System Agency is scheduled to release next year a Platform as a service package to a slew of cloud services. This new “PaaS” based on the Google App infrastructure and Microsoft Azure, is a platform on which applications and services can be executed, but does not burden the end-user with server complications, security protocols, and management. This form of “PaaS” streamlines the Defense Information System and projects government with thousands of dollars in savings. Major advantages of switching over to the new platform as a service module allows for new support for Red Hat’s servers and products. As well as efficient use of server bandwidth and widgets will be incorporated onto the dashboards to provide users with some insight into what's going on in the background with the underlying servers so that they can do initial triage for service problems. "We're hoping this will help with the resolution of problems more efficiently," Robinson [2] An advantage of implementing this system is the level of security of running a cloud based system would exceed their current standards. Additional research into finding what the Department of Defense uses as a primary security module in not shared publicly and an exact determination of how much secure a cloud based system is over their current program is unknown at this time.

Red Hat, Inc. The worlds leading provider of open source solutions has created a product called “OpenShift,” a Platform as a service for developers who use open source. “Open source is the practice in production and development that promotes access to an end source product.” [3] Basically, an open source program allows the user/developer to work on existing code and work in peer productive collaboration, for the access of specifications, source material, and finally an end product at no cost to the public in some cases. The release of Red Hat’s Openshift allows a new level of choices in regards to languages, frameworks, and clouds for developers to build, experiment, and manage their applications. This allows users to choose the cloud provide upon which the application will run. The unique strength of this form of “PaaS” is giving developers access to a vast selection of middleware services. Middleware services is perfectly described by U.S. Research and Education Community as “the intersection of the stuff that network engineers don't want to do with the stuff that applications developers don't want to do." [4] The only improvements I would make with OpenShift would be enabling this powerful tool with a sort of perpetual rating system in which other users can quickly look at the program and provide real time information to struggling users.

Conclusion

To recap cloud based computing revolves around the following market characteristics cost effectiveness, operational simplicity and high availability. Offering these services allows a broad range of technology organizations to decide what information and processes they want to keep and which they rather outsource. Cloud based computing is an emerging technology that will continue to grow as time goes on and may in fact end of the “PC” program based era.







References

1. Shipley, G. (n.d.). Red Hat PaaS. Red Hat PaaS. Retrieved September 26, 2011, from https://www.redhat.com/openshift/blogs

2. TE. (n.d.). Defense Agency Plans Platform-As-A-Service Offering - Government - Cloud/SaaS - Informationweek. InformationWeek | Business Technology News, Reviews and Blogs. Retrieved September 27, 2011, from http://www.informationweek.com/news/government/cloud-saas/231500215

3. Shipley, G. (n.d.). Red Hat PaaS. Red Hat PaaS. Retrieved September 26, 2011, from https://www.redhat.com/openshift/blogs

4. Wagner, M. (n.d.). The Bright Future for Cloud Computing is Becoming Much Clearer - Money Morning. Investment News: Money Morning - Only the News You Can Profit From. Retrieved September 27, 2011, from http://moneymorning.com/2010/09/23/cloud-computing/

redhat.com | Red Hat Delivers the Platform-as-a-Service Cloud for Open Source Developers. redhat.com | The World's Open Source Leader. Retrieved September 27, 2011, from http://www.redhat.com/about/news/prarchive/2011/Red-Hat-Delivers-the-Platform-as-a-Service-Cloud-for-Open-Source-Developers

Monday, September 26, 2011

Hardware and Software

Every decade brings substantial advancements to both software and hardware, but in certain decades the strategic importance of one versus the other shifts dramatically in many segments. The following will give us a basic understanding how both work together to create the technological age we live in todays world.

Online mobile payment systems ensure payment of goods or services in a secure and efficient manner. Traditionally, payment is usually sent via check or money order to a central processing location. Utilizing specialized software consumers and businesses can send all payment related data to the merchant over the Internet, this process bypasses the need of an external party to interact with customer and merchant which drives down operation costs. Implementing an online payment software offers vast amount of advantages but the more pronounced advantages are customer satisfaction and low cost to manage, implement to a organization’s information system.

Analytics are a major part of business and even greater for a small business. Using a mobile analytical program a business can decide to create and publish marketing tools online. A small business can cater the specific application towards today’s current and popular operating platforms. Once implemented a small business can track mobile visitors to a website is an important tool that will help optimize sales.

PLS (Product Locating Service) Utilizing a mobile application that allows a product to be searched and located immediately. A product locating service application can centralize or distribute database containing information on products and services. A consumer or internal business associate could be able to find a precise location of stored products. A PLS program can make a small business more competitive by allowing the customer to search and shop their merchandise.

Mobile coupons, vouchers, and mobile gift card technology can also be used for the distribution of vouchers, coupons, and loyalty cards. These items are represented by a virtual token that is sent to the mobile phone. A customer presenting a mobile phone with one of these tokens at the “POS” (Point of Sale) receives the same benefits as if they had the traditional token. Stores may send coupons to customers using their demographic information to determine what type of products they may need.

Mobile Auctions is an upcoming technology that bills the customer’s phone each time they place a bid. Many mobile commerce infrastructures use a preliminary purchase or registration form to form a bond with an online client. Moible access of online auctions offer a high return for the small business as they need the end-user to make various transactions within a specific time frame.

Assignment T2.3- Value Chain

My company is called Alphanote and through extensive research on this subject. My value chain is described below my mission statement

AlphaNote.com
Entertainment is an art form and here at AlphaNote.com we strive to build a niche within the industry for our excellent customer service and aim to always deliver your favorite music at reasonably low prices.

Raw Materials
At Alphanote.com we survey used CD sales such as flea markets, garage sales, moving sales. In the tri-state area using criagslist or yardsalesearch.com. Search the Internet for used cd or dvds or inventory close-out sales such as Ebay, Craigslist, Half.com, and any other online faucets to find potential inventory. Receive potential inventory;from students or other other consumer outlets.

Warehouse and Storage
Partnering with Amazon’s Small Business Division provides Alphanote.com with innovative ecommerce on-site product storage with around the clock warehousing operation. Fast turn around for just in time deliveries and allows merchandise be received in a grand scale for customer satisfaction.

Production
Catalog received shipments of CDs by using Peoplesoft’s proprietary JD Edwards Inventory Management system. Includes Stock and non stock item management, cost and price controls, lot processing and serial number tracking, tag and cycle counts, and kit processing modules.

Finish Product Storage
Amazon’s Small business stores finished products and allocates them for quick retrieval for demanding customers. This service increases response time and add to customer satisfaction.

Outbound Logistics
Using various freight outlets Amazon Small business chooses the best way to ship to customers efficiently and cost effectively. Quick turnaround ensures quick delivery times and future sales.

Marketing and Sales
At Alphanote.com we understand that being a college student usually means having less amounts of disposable income. Alphanote.com offers students 5% discounts on all deliveries when registering with their school email address. On top of student incentives Alphanote.com reaches further client base by utilizing the following media marketing outlets such as Google Blogger, Facebook, Twitter, Craigslist, Amazon, flyers in college campuses, product placement ads and radio commercials on college campuses are a few examples of our marketing strategy. Sales are integrated within the website, which keeps both costs low and provide one on one communication with consumer.

Customer Service
At Alphanote.com we use an innovative customer relationship management program known as “CRM” to organize and align business processes to properly manage interactions from our customers, sales force, and prospect clients. Alphanote.com thrives to deliver unmatched customer service in selling quality products to hard working students and the world.

Assignment T2.1- Analyzing Value of an IS

Baseball players have bats and business men or women have Business Information Systems. In the major leagues with out the right tools you’re going to strike out. Business on the other hand works with far more innovative and precise tools such as systems. Understanding how these systems work enables the users to work more efficiently. Business Information Systems provides users an overview on computer hardware, software, procedures, systems, and human resources, and explores their integration and application in business. The component most valued in this study is Enterprise Systems such as Electronic and Mobile commerce.

Ecommerce involves any business transaction executed electronically between companies (business to business) companies to consumers, and consumers to consumers (C2C) business in the public sector. E –commerce offers businesses of all sizes to reach their targeted audience and sell their goods at low costs worldwide, which usually allows them to enter the global market.

Mobile marketplace or Mobilecommerce is the use of mobile, wireless device to place orders and conduct business. M-commerce relies on wireless communications that manages orders and conducts business with computers, handheld devices, laptops connected onto the internet. For example consumers can order from their favorite restaurants using a mobile application or website called “Grubhub”. This program pinpoints what the consumer is interested in eating, downloads the specific menu and allows them to order online. Orders placed with them are saved and can be reordered at a future time. Payment is automated as well. Paypal is one of the largest and leading internet payment providers. Paypal offers top notch security with all purchases. In addition to all the convenience a survey is taken after each order to make sure the customer enjoyed their experience using the mobile application or website. This is a clear example how the main system components work in business. First the consumer inputs their order, the system process the order, and the consumer receives their order (output). In the end of the process a feedback system is used to measure customer satisfaction.

In conclusion investigating and understanding the roles of a Business Information System in an organization can lead to success and expansion in an ever changing economy.

W7 T3.3 LAB

Best Video Game in 2011

Xbox 360

Batman Arkham City

Batman Arkham City for the Xbox 360 system is by far the best game created in 2011.

Why is Batman Arkham City the best game available now? The graphics are great, the animation is superb, and the story is fascinating!!

    Best Games 2011
  • Mass Effect 2
  • Fallout Las Vegas
  • Forza Motorsports 3
  • La Noire
  • Gears of War 3
  • Rage
  • Deus Ex
  • Borderlands
    Worst Games 2011
  1. Barney Play Along
  2. Elmos fun house
  3. Kinnect Sports
  4. Billys newspaper
  5. Sesame Street Adventure
Visit for all your gaming needs!!!

TASK T5.3

Task T3.4