Posts

Showing posts from January 27, 2013

Online Mail Order Business

Model the data processing that might take place in an on-line mail order business. Assume that consumers can order and pay on-line.

Please download my article from Google Drive: https://docs.google.com/file/d/0BwDOMMh5fpHJT2ZmQ3FMQ2FScHM/edit

Elad Shalom,
CTO at ITweetLive.com

Cloud Computing Advantages and Disadvantages

Cloud computing was introduced this week as a giant client server environment. Analyze the advantages and disadvantages of computing on the Internet.

Cloud computing refers to anything that is involved in delivering host-based services on the Internet. The services are of three types: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service). The term ‘cloud computing’ is derived from the symbol of the cloud that often describes the Internet in flowcharts and diagrams. 
Recently, cloud computing has become one of the most hyped information technology topics of the decade (Enslin 2012). With cloud computing one can access documents and applications from any part of the world. This frees you from being bound to your computer at home. Miller says that cloud computing is definitely not for everyone (Miller 2009). There are advantages and disadvantages to this type of internet computing.
While analyzing the advantages, Miller says computing on the…

The Logical View of Architecture Documentation

Architectures can be documented from several different perspectives. Some of these are conceptual view, logical view, process view, development view, and physical view. Choose one of these. Explain the primary documented approach (i.e. how is it represented). Discuss the advantages and disadvantages
There are several perspectives and methods for documenting architectures. The need for documentation arises throughout the life time of a system and it is used for specific purposes such as using the architecture as the basis for downstream design or implementation; checking to see if design or implementation conforms to the architecture; seeing if the architecture is ready to support a formal evaluation for fitness of purpose; and using it to support project planning (Nord, Clements, Emery, & Hillard 2009).
Phillippe Krutchen’s recent paper describes four main views of software architectures that can be utilized in system building, plus a special fifth view that ties all the other f…

Privacy and security issues in terms of ownership of data

Privacy and/or security issues are inherent in large databases. Who owns the data about a particular person: medical, credit, personal, financial, consumer information, etc.? Support your position.

Television Looking Beyond the Idiot Box

Select a technology, such as electricity, the internal combustion engine, television, the telephone, etc., and describe how the invention and widespread adoption of this technology changed society. Who benefited or lost out due to the adoption of the technology?

The invention of the television is a momentous landmark in the much trodden path of technological advancements that have changed and shaped the ways in which individuals, communities and cultures interact and relate to each other.

Though scientific and technological research led to the invention of the television, it soon emerged as a powerful medium of communication that not only had tremendous impact on news media and entertainment but also challenged the structure of family, cultural and social life. In 1962 Malvina Reynolds composed a song about “little boxes” kept inside the other little boxes made of “ticky tacky” and in the blink of an eye the television became a powerful symbol associated with middle-class conformity. …

Discovery of Customer Malfeasance

Read the short case “Discovery of Customer Malfeasance” in Chapter 10 of the textbook and answer these questions:
How far should you be willing to push the ethical case that you should not be aiding and abetting tax fraud? Would you personally and/or your company be criminally liable if you did? This answer may vary based on the laws in your country.What does due diligence require in this case?In general, what responsibilities do computing professionals have in situations like this? Is it enough to produce (as employees and as companies) what the client requests?
Please download my article from Google Drive: https://docs.google.com/file/d/0BwDOMMh5fpHJVjhfZUlocnhnb2M/edit
Elad Shalom,
CTO at ITweetLive.com