Course Blog

Course Blog

Sunday, April 11, 2010

Week 14 - Clear



This week's topic was about "Enterprise Computing". It included a discussion of Advanced Storage, Enterprise Storage, Virtualization, and Thin Client Computing, all of which I found really interesting. In the last topic, thin client computing, the lecture started with an explanation of a thick client, which I found very interesting as this is basically the opposite of the thin client and I have never heard this expression before. When I researched about thick clients, I found some information that they are actually increasingly used in the business environment. But let me first explain what a thick client is:
A thick client is also known as a fat client or rich client. It is a "a computer in a client server configuration that can function independent of the server". This stands in contrast to the thin client, which heavily depends on the server's applications and has to access the server anytime it wants to process or validate input data. What I now found very interesting is, that after the lecture, I thought that thin clients would be the best thing for an organization to use. However, on the two resources I cite below, it seems as if thick clients provide many potential advantages that can also be quite beneficial for companies.
  1. Independence -> Probably the biggest advantage of thick clients over thin ones is that they can operate independently from the central server. Hence, as the thick client is performing a lot of tasks itself and consequently reduces the processing requirements of a central server, an organization may only need to buy a cheaper central server with less capacity.
  2. Speed -> Furthermore, a thick client works faster than a thin one, since it is running applications and the like on the individual computer and hence is not influenced by other users processing data at the same time on the centralized server.
  3. Offline working -> Since the applications and the like are stored on each thick client, it is possible to work and process data without being connected to the central server at all times.
  4. More flexibility
  5. Ability to utilize existing infrastructure -> Many people nowadays already have fast local computers, so they can be used as thick clients at no extra costs.
Thick clients have many other additional advantages, that I do not list here, as I think that these are the most important ones to be mentioned. However, because of these advantages over thin clients, fat clients are being used increasingly in today's business environment. Just think about the concept of a corporate laptop. They can be disconnected from the centralized server, you can take them anywhere you want to, and you can still perform your work (assuming that you downloaded all necessary information from the centralized server BEFORE you disconnect your corporate-laptop-thick-client).

I consider this an important topic for today's business environment, as all companies nowadays have to run large servers to store data in order to successfully compete in their industries. They have to thoroughly understand the advantages and disadvantages of having a centralized server and the access methods of it. Also they have to understand what kind of clients they want their employees to use: a thick or a thin client, as this can have tremendous effects on costs, speed, reliability of the whole system and the like.


Project - Secure Email

The Secure-Email Project I did this week, was a very interesting one for me, as I was not aware of the fact that sending secured e-mails would be so easy!
I found an interesting article, which was published on March 26, 2010 on www.infolawgroup.com. It deals with the current lawsuits against "Dave & Buster's", which is a restaurant chain, concerning the theft of important customer data, which resulted in large financial damage for consumers. The article describes the data security breach that dates back to the time span from April 30 to August 28, 2007, where hackers exploited vulnerabilities in the restaurant chain's system, installed unauthorized software on its system, and got access to about 130,000 credit and debit card information. Dave & Buster's collected several highly important and sensitive information from its customers, amongst which were "credit card account number, expiration date, and an electronic security code for payment card authorization". This data has been collected and stored on the in-store servers of the restaurants and was then send to a third-party credit card processing company. Hence, a lot of communication and shifting of customer information happened there. As came out later, these communications of data and information was not secured at all:
No limitation of IP addresses that can have access to the restaurants' servers, no network security at all, no authorization identification was requested for seeing and sending sensible information, no firewalls or separation of the payment card system from the rest of the company's network, and so on.
Dave & Buster's even failed to apply readily available security means, like requiring a user password before being able to get access to a wireless network, which the majority of home users today applies. Consequently, it was almost an invitation for the hackers to access Dave & Buster's system and steal customer information from its servers. Currently, the FTC required Dave and Buster's to "establish and maintain a comprehensive information security program and obtain independent audits by a qualified person", for example, a CISSP, which is a Certified Information System Security Professional. Hence, amongst other things, the restaurant chain is required to: designate an employee to oversee and coordinate the information system security; conduct risk assessments and identify possible threats to data security; apply certain means to guarantee the security of customer data; guarantee the security of customer data also in the communication and collaboration with a third-party service provider; regularly test and measure the effectiveness and update the security system.

As this article shows, data security is a highly important and sensitive topic in today's world. However, when a company even fails at the very basic data security level, like controlling the access to its wireless network, by requesting a password or the like, it is very doubtful that this company can get a step further and implement secure communication methods, like secure e-mail or the like. Consequently, preventing unauthorized access to your network and then securing the ways you communicate highly sensitive information of customers, should be a basic for conducting business in today's world.

Sunday, April 4, 2010

Week 13 - Clear



The content of this week was about Computer Security, Ethics, and Privacy. The concept I found particularly interesting this week was that about biometric devices used for identification authentication. The concept simply means that a computer system stores certain attributes of a person and translates it into a digital code. As an example imagine that a fingerprint of person A is being scanned into a computer and stored on its user database in form of a digital code. Then, in order to get access to certain information or buildings, or the like, the person presses her finger on a screen that reads her fingerprint, compares it to the digital code, then validates the identity of the person and consequently gives access to the requested things. Currently, such a method is planned to also be used for payments, travel-purposes and so on.
On June 17, 2008, supermarket giant Albert Heijn (Netherlands) introduced a payment system linked to the customers' fingerprints, debit card information, as well as their loyalty cards. However, only weeks after its initial introduction, the fingerprint system has been cracked by a security researcher, who crafted a copy of a fingerprint out of rubber, which was accepted by the authentication devices Albert Heijn used. The retailer first did not react on this detection but rather remained positive about a full rollout of the fingerprint-as-payment program. Nevertheless, after a renewed analysis of this concept, the devices, and customer feedback, Albert Heijn discovered that this program would not be worth pursuing as its customers were too concerned about the security of their data.

Recently however, the German retailer Rewe announced a pilot test of some of its stores in and around Cologne for the cash- and cardless payment method with a fingerprint as personal identification. There is a positive example of a more secure fingerprint technology used by the German retailer Edeka that already implemented and currently also uses fingerprints as payment methods in some of its stores in southern Germany. Edeka uses machines that detect blood circulation and hence, is said to be able to differ between a fake and a real fingerprint. In spite of this claim by Edeka and the collaborating biometric firm, there is a large debate about the accuracy and security of this system.

I deem biometric devices as proof of identification a highly interesting and important topic, as in our world today, more and more transactions are being made over the Internet, credit cards and so on, and hence many more opportunities have been opened up to criminals to betray, steal, and rob people. In our digitalized world, it is of utmost importance to provide the highest security as is possible to reduce the amount of fraud, robbery and protect people from identification theft and the like. So, though these systems with fingerprints as identification means might sound great at the beginning, also with this technology it is easy for criminals to conduct their evil works.

Sources:

Tuesday, March 30, 2010

Week 12 - Clear

This week's content dealt with Information System Development. Within this topic, Change Management has been discussed, which I encountered in one of my prior courses "Management of Information Systems" at my home university "Maastricht University" already. I think this is a very interesting as well as highly important concept.

Change Management describes a process to coordinate and control the transitions of individuals, teams, and organizations from a current to a desired future state. You can look at it from two different points of view: on the one hand, there are the people, who implement the change, namely the managers. Their task is to effectively communicate the intent and necessity of the planned change and ensure, that processes, users and the organization in general, understands and implements the needed changes. On the other hand, there are the individuals, who receive the change and have to implement it and work with the changed processes, technologies, or the like. It is critical that they understand why the change is needed how it is being implemented, and in what way it affects their day-to-day operations.

I deem this concept as highly interesting and important in a world that is constantly changing and where technological advancements are being developed and applied in an incredibly high speed. Without effectively changing and adjusting to the rapid advancements in the business world today, companies risk loosing their competitive advantages in the sense that they become way less efficient than their competitors. Additionally, if the change is necessary to fulfill customer's needs and wants, they may loose any foothold in the market, which eventually results in the force to go out of business.

Friday, March 26, 2010

Week 11 - Clear

This week's topic dealt with databases and its management. Additionally we had to create a database on our own using Microsoft Access. In the chapter we had to prepare for this week, "data mining" was introduced. The book defines it as a "process to find patterns and relationships among data". I already encountered this concept several times in prior courses and think it is especially valuable, as well as important, to successfully compete in today's business environment.

Data mining is also known as "Knowledge-Discovery in Databases", since it employs algorithms to search large databases automatically to recognize patterns and connections among data points in these databases. These algorithms are based on statistical techniques and make it possible that we detect trends, relationships and the like, that we otherwise would not have detected, since the pool of data available to us is incredibly large and we could impossibly skim through all of it. Data mining is often utilized for a wide range of profiling practices, for example in marketing, where this process is commonly used to identify customers' current purchasing behavior and trends.

I consider this process very important in today's business environment because data mining is a powerful tool to more accurately forecast future sales and enables companies to be more responsive to its customers. Consequently, they can build a competitive advantage in their industry with the potential to become a sustainable one, if companies learn to utilize the data mining techniques effectively to build relationships with their customers.

Wednesday, March 24, 2010

Week 11 - Database Project

This week we had to create a database for a local gym with information about its members. This project was very value-adding to me since I learned the basic functions of Microsoft Access and how to individually create a database from scratch. Though I have never been in touch with this program, I now have the abilities to create tables; import and export data from different sources; perform different queries to display specific data I am interested in; create forms that conveniently show details about each member; and I can create reports, which display data according to different groups, sorted in a special way and the like. This makes me able to get the data I am interested in and view them in a way that is logical and structured to me. I am very sure that the knowledge I have acquired through this project will enhance my understanding of databases that are present in virtually every company today and make working with it easier for me in the future.

However, the steps I performed in this project were really basic. I think that this database needs to be a lot more comprehensive and more useful. MS Access offers the possibility to create relationships among different tables in the document, so that the maintenance would be even easier and consequently the validity of the data would be guaranteed. This would be important if the owner was to include the monthly membership fees in his database, to oversee the Members' IDs and who paid for them or who did not. This information could refer to another table that lists the Members' ID, as well as their addresses, so that the outstanding bills-reminder could then be sent to them. As I am really no expert in MS Access (yet), I can only vaguely suggest that there are many other improvements that could be made to this database, however, due to my limited knowledge I can not think of any other ones now.

Wednesday, March 3, 2010

Week 10 - Clear


This week's topic dealt with "Communication & Networks", which was especially interesting to me as I am a regular and convinced user of Skype. I am traveling a lot and during my 6 months stay in Australia it was unbelievable how complicated and expensive it was to call my family and friends back home. However, as soon as I returned to Germany (what a great timing...), I heard about this "Voice over IP" technology utilized by this program called "Skype". I downloaded Skype, started to use it, and I cannot imagine living without it anymore, to be honest. I used it during my studies in the Netherlands to stay in touch with my family and friends at home, to call my cousin, who lives in HongKong, and of course I frequently use it from the US to talk with my friends and relatives. And I can do this for free, if the persons I want to call have Skype and are online. If they also have a camera and a microphone, which are features of nearly every new computer or laptop, I can even see them when I call, because Skype also supports videoconferencing, which is really great. Additionally, I can also call landlines or mobile phones for very low costs using Skype, too. Another feature of Skype is, that I could request a Skype number, which is basically a regular landline number which friends etc. could call from their regular phones and then they would be connected to my computer or a mobile device, that is online at Skype. This is called "SkypeIn". All in all, Skype is a really great program, and as my grandma recently told me, it is way clearer than many other landline-phones and mobile devices.

As one can see, I know how to handle this program as I use it daily, and I am hence aware of the multiple advantages it provides. However, I researched a bit further because I was interested to find out, who actually invented Skype. As I found out, in 2003, it was developed in Europe, specifically in Luxembourg, by two Scandinavians: Niklas Zennström (Swedish) and Janus Friis (Danish). The name for the software program is derived from "Sky peer-to-peer", which was then abbreviated to "Skyper", but since no domain name with "Skyper" was available anymore, they dropped the last "r" and left was the name "Skype".
What was also interesting for me to know is how it is possible that this program can charge these really low prices (i.e. I call a regular landline in Germany for 1.7 Euro Cents). This happens, because the operators of Skype incur very low costs by operating on a peer-to-peer model instead of a usual client server model, which means that there is no centralized server but instead the user directories are stored on each user's computer.

All the features and benefits I listed above, make Skype a very important program for today's business world. I even had my final interview for my internship this summer over Skype and it would have not only been way more complicated to have this interview with only a regular landline, but also it would have been way more expensive. Thus, especially in this international business environment of the present, Skype provides significant cost saving opportunities and in my opinion it could also enhance understanding when communicating with business partners, as they can actually see you when talking, you can show them products or graphs or other things that may be important to your sale and so on.