Wednesday, November 24, 2004

WWW vs Internet

The Internet and WWW are two different things often misunderstood. The Internet is a collection of networked devices using a common protocol (i.e. TCP/IP) over a wide global area. WWW or World Wide Web utilizes a single protocol called HTTP (Hyper Text Transfer Protocol) that runs across TCP/IP using the common port 80 on a web server that transmits to a Browser HTML code. This is one protocol of hundreds that use the internet.

HTTP was developed by Tim Berners-Lee so he could format the plain text coming from a legacy system. This single protocol coupled with the ability for business to be able use the internet (which was limited only to Universities) made the Internet usage explode.

The internet is often thought of as your web browsers, but that is just one application that uses the internet. Others are FTP port 21, Email (SMTP port 25 / POP3 port 110), NNTP 119/433 (these newsgroups) and Telnet port 23 are a few. One old protocol no longer used is Gopher, which was a text menuing systems that allows different system to connected and was the old way of browsing. The University of Minnesota used to the mother gopher where most people began their browser via text. These are just a few examples.

Links:
Inventor of WWW:
http://www.w3.org/People/all#timbl

Web History:
http://www.w3.org/History.html

Tuesday, November 23, 2004

Why you should Protect Yourself

Q: Exactly what are we trying to protect? It has a lot to do with our culture and the fact that they named rogue programs viruses.

As a practicing tech support guy I can give you real world examples as to why you should care and worry:

Scenario One: Imagine it is 11:50 pm, you just finished typing up a paper for this class that was 16 pages in the APA format. Now imagine that you have saved your document, only to realize that your document has just been deleted by a virus and the virus flashed the BIOS of your motherboard, and the firmware on the hard drive with corrupted data. Now not only have you lost your document that can not be replaced but your motherboard has been permanently be destroyed as well as the hard drive.

Scenario Two: A simple spyware program gets on to your pc via a popup and steals your bank account and credit card info. You monthly statement comes with a 100 or more monthly statements from other credit cards companies that you did not setup accounts yourself and now your owe $100,000 in debt legally.

Everyone needs to take defensive measures for safe computing. Otherwise you may find yourself at the wrong end of someone else's evil.


Q: To answer the question posed, we should blame Microsoft for all of the viruses. If they hadn't gone around making people angry, these mad computer scientists would never have created these things.

Blaming Microsoft for all the viruses is like blaming god who created us for all our problems. Individual people are the responsible ones not Microsoft. If someone takes a butter knife and kills someone, is the person that did the killing or the butter knifes manufactures fault.

If you read the department of homelands security's web site you will see that there are just as many holes and security issues with Linux and a ton of others software and devices.

http://www.us-cert.gov/

As for the mad computer scientist his motive is profit and there is no profit in a virus. It is a well known documented fact that the vast majority of viruses are written by teens with virus writing tool kits freely available for download. The guys are known as script kiddies.

Don't get me wrong, I am not defending Microsoft, as there IS a lot they could do to help curb the issues too.

Monday, November 22, 2004

Information Systems Explained

Q: What is an information system? What are the components? In your work environment, describe the information system you utilize. (i.e. hardware, number and type of users, advantages/disadvantages).

What is an information system?

An information system is an ever evolving concept that involves a number of things both physical and abstract. The reading material defines an information system as a collection of 5 components (hardware, software, stored data, personnel and procedures). Having evolved with technology as it evolved I disagree with this definition of an information system.

An information system is broken down into to basic elements hardware (the physical) and software (the logical abstract).

The hardware element is all of things referred to in the text that are used to process, store and transmitted data via some type of medium either wired or wireless. The text does not give the new student to technology a clear picture of what the hardware layer looks like. Below I have attached a common small business hardware configuration. A big business diagram would look much the same but with more devices and connections.

The software layer is the non tangible logical abstract. It is a series of bits arranged in a manner that information can be manipulated and stored. It is stored in a machine readable format and displayed in a human readable format. This logical layer uses the hardware layer to transmit and receive data. You can review the software layer diagram below.

What are the components?

The provided reading material states that there are 5 major components (hardware, software, stored data, personnel and procedures). I argue against this as I have already defined hardware and software.

The reason I do not consider stored data as part of the overall is it is a hardware device that provides yet one function. It is part of the hardware layer.

The reason I do not consider people as part of the equation is an information system does run without people. People are the users of the system are not a direct component of the system. In order to qualify as a component I used this process; if the component is removed will the system stop? If a person dies the system will still continue to function.

I do not consider procedures as a part of the component as that is an element of software. The text has you to believe that it is part of explaining how to use the information system. If that were true then we would spend our entire life understanding how the information system works. A person does not need to know how a watch works in order to tell time. Nor does a person need to understand how an internal combustion engine works in order to drive a car. A person is a user of the watch, not a component of the watch that makes it work. The human procedure component as the text states, is a very tiny part that does not hold enough weight.

Q: In your work environment, describe the information system you utilize. (i.e. hardware, number and type of users, advantages/disadvantages).

Please see my diagram as a picture tells a 1,000 words for the hardware and software systems. The advantages are processing more information, from anywhere, anytime. The disadvantages are you are processing more information, from anywhere, anytime. It is a double edge sword that cuts both ways. The diagram below generically represent a company's information system.

Sunday, November 21, 2004

Systems Approach

Since I have been apart of technology for the last 22 years and have a great deal of experience in its use, deployment and I work the front lines of business technology daily. I am somewhat constructively critical.

Defining the Systems Approach

The systems approach is a collection of components that work together in order to share information. It is an abstract concept that is defining the way information is shared, stored and processed. It uses for basic functions, input, process, storage and output. These concepts do not correlate with the actual way an information system works. They are simple concepts being conveyed. These are the text book ways.

There are 5 major components of an information system. The provided reading material states that there are 5 major components (hardware, software, stored data, personnel and procedures).

A component is a part of a system that is needed in order for that system to work. The
hardware element is all of things referred to in the text that are used to process, store and transmitted data via some type of medium either wired or wireless.

The software layer is the non tangible logical abstract. It is a series of bits arranged in a manner that information can be manipulated and stored. It is stored in a machine readable format and displayed in a human readable format. This logical layer uses the hardware layer to transmit and receive data.

The reason I do not consider stored data as part of the overall, because it is a hardware device that provides yet one function. It is part of the hardware layer.

The reason I do not consider people as part of the equation is an information system does run without people. People are the users of the system are not a direct component of the system. In order to qualify as a component I used this process; if the component is removed will the system stop? If a person dies the system will still continue to function. People are used to build and maintain the system and users use the system, but the system does not require a human in order to perform its tasks.

I do not consider procedures as a part of the component as that is an element of software. The text has you to believe that it is part of explaining how to use the information system. If that were true then we would spend our entire life understanding how the information system works. A person does not need to know how a watch works in order to tell time. Nor does a person need to understand how an internal combustion engine works in order to drive a car. A person is a user of the watch, not a component of the watch that makes it work. The human procedure component as the text states is a very tiny part that does not hold enough weight to be a component of a system.


Explaining the Different Roles in Systems Development

Having been a systems analyst, a telecommunications analyst and now a certified systems engineer, I can clearly stated that the role called “systems analyst” is an old term used in large companies as a pay grade reference.

It no longer defines or is used as it is stated in the text. For a large company the roles for systems development are broken down in to categories not defined in the text. For big iron mainframe the groups are commonly called datacenter analyst, for server systems they are called systems engineers, for local area networks they are called network engineers, for connectivity they are called telecommunications engineers, for tech support they are called tech support specialist.

The names may vary from company to company, but the roles and areas are much the same and require a small army to support 1,000’s of people. For smaller company they typically depend on outside support and are called system engineers. That is what they do engineer, design, build and maintain information systems.

The text calls the roles just systems analysts, project teams, users and programmers. There is a ton of roles missing from the text. As a result I find it to be misleading for the new person learning about the roles for the first time.


Explaining and Defining Systems Development Life Cycle

The text explains that the system development life cycle (SDLC), yet another executive buzz word, is divided in five main phases.
  • System Planning
  • System Analysis
  • System Design
  • System Implementation
  • System Maintenance

Since there is no certifying agency that controls this definition from company to company the structure of the SDLC may vary greatly. I agree with the author that these are the main items. However the phases of a project most of the time do not correspond to the phases listed in the text. In a perfect world that would be nice. Due to geographical makeup, the organizational makeup, the financial makeup, the leadership skills of the project teams, the impact goals of the company, the presidential directives largely dictate how the phases of a project may break out. So of the items listed above may be in the same phase or span several phases.


Defining and Explaining What Comprises a Feasibility Study

A feasibility analysis is an excellent tool to determine the technical, operational, and economical feasibly of a new system. This is a step/phase that is often not done or not done properly in large companies. If this step was done more, large companies would save a lot more money. There are two scales to a feasibility analyses not mentioned in the text, and that is large scale and small scale. The end result of a feasibility study is to cost justify the project (a.k.a. from the text “cost/benefit analysis”)

On a large scale the analysis is long and can be drawn out. It is sometimes given to a person that does not have the knowledge in other areas of the information systems. They in turn spend a great deal of time collecting information about other systems.

On a small scale a systems engineer can evaluate a project based upon his past experiences and draw conclusions quickly without the formal process as described in the text.