Saturday, 17 November 2012

Blog Update 3+ Network Intelligence

Internet Security

I would classify myself as a libertarian conservative. I value privacy highly and do not enjoy my life being held to public scrutiny or discussion regardless of how these discussions or intrusions take place. I keep my life affairs and relationships quiet and do my best to not concern myself with the relationships and lives of others.

For this reason, I am very conservative with my use of Facebook and other tools.

I do not want any information that I would not share personally to an acquaintance to be shared in a way that is out of my control.

The network intelligence that concerns me the most is not classified by the information alone but who can buy the information. I understand that social networking sites that host my image have the right to sell said images to media outlets and other organizations. (http://zvulony.ca/2011/articles/intellectual-property-law/copyright-law/facebook-copyright/)

I do not like the regular public to be able to view my photos or communications between friends and I do not like mediums I use to communicate and share photos on to be able to sell my photos and communications.

Stay out of my business, I'll stay out of yours.

That's the libertarian part.

HOWEVER- I recognize that the internet is not secure and do not demand that it become secure, or that firms share my media for free without any benefit to themselves. That's unreasonable. Therefore, I make the personal decision to avoid publishing private communications, non professional personal information, or photos and videos onto Social Networking websites. If private communication needs to be made, I do it in more secure ways over email or telephone. Ham Radio is also a personal favorite. Of course, none of these methods guarantee safety or security.

I also refrain from leaving a digital footprint on incriminating materials and websites. By incriminating websites, I specifically mean pornography. Did you expect me to say it??? I do this to line up more with my own religious principles than personal online safety, but the security is an added benefit.

I recognize a corporations right to freely host information and therefore have the right to freely sell and distribute it. I think they should continue to have that right. If you want secure informational transfer online, you should have to pay for it.

And there's the Conservative.


Tuesday, 23 October 2012

Blog Update 2


Mac or PC?

The question has been asked by millions of people and on millions of recreational and professional websites, now petGro is asking and the answer is being given.

The three things I recommend considering before a decision is made are…

1. Total experience in market production
2. Available software and security systems for both systems
3. Overall cost of servicing and purchase

            1. The Macintosh system has achieved huge sales over the last 25 years. In the 3rd quarter of 2012, 4 million macintosh machines were sold, but over 15 times that many PC’s were produced and sold by different manufacturers. This continues a trend of many more PC’s being sold for business and consumer use over the last 25 years. (Fig1) PC’s have been around longer, have sold more units, and have had more firms competing to perform well with the windows operating system.

            2. Software available for businesses has been established for the windows operating system and has been being upgraded and made secure by thousands of competing firms for the last 25 years. Security systems are better established at dealing with malware threats on the PC system, even though there are more threats. SAP runs significantly better on the PC system than the Mac system.

            3. PC’s are substantially cheaper for purchase than are macs, there are millions of people in the workforce who are familiar with maintaining and servicing the machines, and upgrades can be made to PC’s (especially desktops) with much more efficiency and effectiveness. All parts of a PC can be upgraded more cheaply than the replacement cost of a new macintosh.

It is therefore my recommendation that petGro purchase new PC’s instead of new Macintosh system.

Tuesday, 16 October 2012

Article Presentation 1

Article Presentation 1

Link to articles discussed...

http://www.bbc.co.uk/news/magazine-19344978

http://www.npr.org/2012/10/08/162369606/piecing-together-the-worlds-largest-jigsaw-puzzle

Presentation given in class on October 16th.

Thursday, 27 September 2012

Individual Blog update #1


Busi 2400 is a course that is heavily reliant on computer systems and internet technology. One of the courses objectives is to teach students to use different types of software. This software is mostly available only at the university but there is a risk that the hardware available in the Sprott computer labs can be jeopardized by external factors such as power blackouts.

It is important than that the Busi2400 class have a BCP or Business Continuity Plan that can effectively respond to a campus wide power outage.

I put forward this organizational strategic plan.

The solution to this problem will vary due to the material being covered in disrupted labs. If the lab is showing students how to create webpages on NVU or data management on Access, the students may need to procure NVU software. It is assumable that all students have Microsoft Excel.

These are the steps that must be taken within the first 12 hours of the power outage

1. Within 4 hour of the power outage being known, the professors or TA’s should create a detailed set of instructions to explain the labs processes. This should be in supplement to the regular Lab guidelines so that students can learn the lab material on their own.

2. Within 7 hours of the power outage being known, an effective and well established system of communication over Skype should be already established for threat response purposes. It should have 2 Channels of communication that students can interact with to ask for specific instructions. Appropriate names could be “Busi2400Laboratory-helpcenter 1 & 2”. There should be 1 TA on the end of each skype channel 24 hours a day in order to receive questions from students.

3. Within 12 hours of the power outage being known, an email should be sent to all students in the busi2400 sections, explaining the situation with attached detailed instructions spoken of in Step 1 and contact information addresses of the two skype addresses mentioned in step 2.

Once the contingency lab structures have been set the Professor and TA’s should take these steps.
1.       Files stored in the busi2400.ssb.carleton.ca website portal should be transferred to CuLearn so that students are guaranteed access to files without having to download NVU. This would allow students to further study the class material from home, and would not require intensive labor on anyone’s part. This way students who are unable to access the portal site from campus can access it from home with no difficulty. This should be done within 24 hours and students notified.

2.       Continue to monitor the situation as emails and inquiries from students return and update students on how the situation progresses, making any changes necessary to the initial response. Schedule TAs to take shifts responding to inquiries.

These steps would ensure an effective response to the possibility of a blackout.

Tuesday, 25 September 2012

Welcome!

Good day!
Welcome to the Blog of Derek Beselt. If you are looking for the blog of Derek Tleseb, then you have also come to the right place.

This blog is associated with the student of the same name in busi2400 section D of the Sprott School of Business.

Enjoy