Showing posts from January 27, 2013

Online Mail Order Business

Model the data processing that might take place in an on-line mail order business. Assume that consumers can order and pay on-line.   Please download my article from Google Drive: Elad Shalom, CTO at

Cloud Computing Advantages and Disadvantages

Cloud computing was introduced this week as a giant client server environment. Analyze the advantages and disadvantages of computing on the Internet. Cloud computing refers to anything that is involved in delivering host-based services on the Internet. The services are of three types: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service). The term ‘cloud computing’ is derived from the symbol of the cloud that often describes the Internet in flowcharts and diagrams.  Recently, cloud computing has become one of the most hyped information technology topics of the decade (Enslin 2012). With cloud computing one can access documents and applications from any part of the world. This frees you from being bound to your computer at home. Miller says that cloud computing is definitely not for everyone (Miller 2009). There are advantages and disadvantages to this type of internet computing. While analyzing the advantages, Miller says compu

The Logical View of Architecture Documentation

Architectures can be documented from several different perspectives. Some of these are conceptual view, logical view, process view, development view, and physical view. Choose one of these. Explain the primary documented approach (i.e. how is it represented). Discuss the advantages and disadvantages   There are several perspectives and methods for documenting architectures. The need for documentation arises throughout the life time of a system and it is used for specific purposes such as using the architecture as the basis for downstream design or implementation; checking to see if design or implementation conforms to the architecture; seeing if the architecture is ready to support a formal evaluation for fitness of purpose; and using it to support project planning (Nord, Clements, Emery, & Hillard 2009). Phillippe Krutchen’s recent paper describes four main views of software architectures that can be utilized in system building, plus a special fifth view that ties all t

Privacy and security issues in terms of ownership of data

Privacy and/or security issues are inherent in large databases. Who owns the data about a particular person: medical, credit, personal, financial, consumer information, etc.? Support your position. A database is specialized to manage and handle data in a computer application system. Data can be stored in many forms, like text, symbols, digital, images, graphics, and even sound. Various sectors like government, public security, finance, medical, energy, business, taxation, transportation, social, education, corporate and other sectors have formed their own databases application systems to store large amounts of information in the database, to handle and use, in order to lead the society into this information era. With the advance in internet applications, databases have a greater role to play (Ji 2011). Ji further goes on to say that while development of these database applications systems has brought about social development and progress, it has also created issues of secur

Television Looking Beyond the Idiot Box

Select a technology, such as electricity, the internal combustion engine, television, the telephone, etc., and describe how the invention and widespread adoption of this technology changed society. Who benefited or lost out due to the adoption of the technology? The invention of the television is a momentous landmark in the much trodden path of technological advancements that have changed and shaped the ways in which individuals, communities and cultures interact and relate to each other. Though scientific and technological research led to the invention of the television, it soon emerged as a powerful medium of communication that not only had tremendous impact on news media and entertainment but also challenged the structure of family, cultural and social life. In 1962 Malvina Reynolds composed a song about “little boxes” kept inside the other little boxes made of “ticky tacky” and in the blink of an eye the television became a powerful symbol associated with middle-class con

Discovery of Customer Malfeasance

Read the short case “Discovery of Customer Malfeasance” in Chapter 10 of the textbook and answer these questions:   How far should you be willing to push the ethical case that you should not be aiding and abetting tax fraud? Would you personally and/or your company be criminally liable if you did? This answer may vary based on the laws in your country. What does due diligence require in this case? In general, what responsibilities do computing professionals have in situations like this? Is it enough to produce (as employees and as companies) what the client requests? Please download my article from Google Drive: Elad Shalom, CTO at