Search This Blog

Wednesday 30 January 2013

Advantages/Disadvantages and potential problems of technologies


Benefits and problems with different types of technologies

Wi-Fi

Advantages:

Allows flexible computing, is a low cost of implementation and is efficient.

One of the most obvious advantages of Wi-Fi is the flexibility that it offers. Everyone can just meet in a conference room, connect to the wireless network and get productive.

Wireless networks, of course, do not require network wiring. It is also easier and less expensive to grow a wireless network.

Ad hoc networking, a function of wireless networking, allows the construction and deconstruction of a network within a few minutes. This ability to quickly connect allows for collaboration, which would be difficult to achieve without Wi-Fi technology. Students working on projects, engineers constructing buildings or health professionals saving lives all can connect and collaborate quickly and efficiently using Wi-Fi technology.

Disadvantages:

Has weak security, interference occurs and there can be a limited range.

One big disadvantage of Wi-Fi involves security. By definition, free Wi-Fi hotspots are not secured. These open networks attract hackers who are broadcasting their own network id, very similar to that of the particular establishment. Many times customers connect to the hacker's network ID and become victims of identity theft. Wireless network can be secured for homes and offices, but it does take some work and some expertise, but you should never conduct confidential business on a free Wi-Fi network.

Wi-Fi operates in the 2.4GHz frequency, along with cordless phones, microwaves and even baby monitors. Many times these devices interfere with the wireless signal and cause problems with the network. The actual damage may be noticed immediately with degraded network performance or much later when you discover that a file has been corrupted.

Wi-Fi networks have limited range, especially in buildings. In an office building or home the signal has a range of about a hundred and fifty feet. Outside, where there are no walls, the signal may travel as far as several hundred feet. You must place the wireless access point in a location that is central so that all computers can attach to the network.


3 and 4G

Advantages of 3G:

High bandwidth, the measure of transmission capacity, is one of the selling points of 3G. This allows you quick and easy access to all of your favourite on-line multimedia and Internet tools, just like you were at home on a computer. You can pay your bills, book dinner reservations, update social networking pages and check e-mails, all on-the-go. While the maximum bandwidth for a stationary 3G device, according to Silicon Press, is 2.05 megabytes (MB), when you are moving slowly (such as walking), this drops to 384 kilobytes (KB). When you and your device are moving at high speeds (such as in a car), the maximum bandwidth drops to 128 KB. However, Silicon Press notes that this is still 10 times faster than the maximum bandwidth of moving 2G devices.

Another advantage of 3G technology is that is can utilise packet-based Internet protocol connectivity. This means your mobile device will always be on-line and ready for Internet access. However, you will not actually pay for the connection until you start sending or receiving data packets, such as sending an e-mail or looking a a webpage. Some 3G devices are also designed to automatically pick up the closest, free-to-access WI-FI signals, in which case, you won't have to pay anything for the Internet. 

Advantages of 4G:

The most obvious advantage of the 4G mobile network is its amazing speed. Increased bandwidth leads to much faster data transfer speed, which is especially advantageous for mobile devices. Users of the 4G network get the advantage of superior, uninterrupted connectivity, especially for advanced tasks such as video chats and conferences. Considering the younger generation of mobile device users, they can stream music, videos and movies at a much faster rate than ever before and can also easily share information on-line.
4G networks offer much more coverage than other systems such as WI-FI, which forces users to depend upon hotspots in each area you visit. Since 4G offers a coverage of 30 miles and more, as also overlapping network ranges, users would be assured of complete connectivity at all times.

One of the biggest problems with WiFi networks is that of on-line security. This is especially true for mobile devices. 4G networks offer complete privacy, security and safety. This is especially beneficial for corporate establishments and business persons, who hold sensitive information on their respective mobile devices.

4G networks are quite affordable these days, what with pricing schemes being considerably slashed to fit users’ budgets. Of course, this type of connectivity is more expensive than traditional WiFi networks, but it also has a lot more advantages to offer to users.

Disadvantages of 3G:

To support 3G technology, updates needs to be made to the current cellular infrastructure. According to 3G Internet, this means installing new 3G equipment at, ideally, every current cellular base station and acquiring new frequencies for 3G transmissions. Both of these undertakings are extremely expensive and could take a long time to complete fully. In addition, in order to utilise all of the features 3G technology has to offer, customers must purchase 3G-compatible handsets, which are generally more expensive than their 2G counterparts.

In addition to being more expensive, 3G handsets also require more power than most 2G models. According to Silcon Press, this extra power requirement can translate to larger batteries, shortage usage periods between recharging and more bulky handsets overall.

Disadvantages of 4G:


Though the concept of 4G mobile networks is steadily gaining popularity, connectivity is still limited to certain specified carriers and regions. Of course, the number of cities that have 4G coverage is increasing by the day. However, it would take its own time for this network to be available in all the major cities of the world.

Though the hardware compatible with 4G networks is available at much cheaper rates today than earlier, the fact remains that this new equipment would necessarily have to be installed in order to supply these services. This would prove to be a cumbersome process for most mobile carries planning to launch these services.

Since 4G mobile technology is still fairly new, it will most likely have its initial glitches and bugs, which could be quite annoying for the user. Needless to say, these teething troubles would be sorted out in due course of time, as well as with increase in network coverage.

4G mobile networks use multiple antennae and transmitters and hence, users would experience much poorer battery life on their mobile devices, while on this network. This would mean that they would have to use larger mobile devices with more battery power, in order to be able to stay on-line for longer periods of time.

Users would be forced to make do with 3G or Wi-Fi connectivity in the areas that do not yet have 4G mobile network coverage. While this is a problem in itself, the worse issue is that they would still have to pay the same amount as specified by the 4G network plan. This loophole has already resulted in many disgruntled customers. This situation can only be resolved once mobile carriers expand their 4G network coverage to include more regions.

Smart phones

Advantages:

Has personal connection and endless information

Smartphone's allow the consumer to always be connected to her circle of friends. The Internet capabilities allows her to update her Facebook page, check her e-mail account, and take advantage of the many social networking programs that keep us connected. However, this can add to social stresses, depending on ho connected the consumer really wants to be. Always being able to be contacted sounds ideal for some but sounds like a nightmare for others. Of course, you can limit your availability by simply turning your Smartphone off, or leaving it at home when you venture out.

The Smartphone allows the consumer to have all of the information the Internet supplies in the palm of his hand. This is a great advantage to have, especially if you are visiting a place you've never been before. For example, if you've just arrived in Santa Barbara, California, you can use your Smartphone to locate the restaurants, attractions and hotels in the area. Since the Smartphone is also a phone, you can make reservations while driving up. However, this can also lead to a lack of adventuring on the trip. While some wish to know everything about a location before they arrive, others still prefer the element of surprise.

Cell phones have become just about indispensable, with many people using them on a daily basis. Personal digital assistants have also grown in prominence, especially with professionals in need of a tool to help them organise, message and manage on the go. And of course, who doesn't like bringing their MP3 player with them so they can have their favourite tunes any time? But carrying three gadgets around is a hassle, not to mention a real cramp on pocket-space. Enter the Smartphone. Smartphone’s act as the all-in-one, offering cell phone service with the tools, applications and even games of the average PDA. Throw in that almost all Smartphone’s also function as portable media players, and you can kiss those crammed pockets goodbye.

Disadvantages:

Can be too useful at work (Distraction) and the battery charge.

Business minded people can always stay in touch with their clients, bosses and employees with the use of a Smartphone. These devices have the ability to store personal documents, contact lists, e-mail addresses and more. In short, the Smartphone can double as a mini-workspace, or office, in the palm of your hand. Of course, this will make getting away from work more difficult. Those who wish to leave their office, and their work duties, behind when they travel or go home may find the Smartphone more of a problem than a solution.


Smartphone’s are battery operated, and as soon as that battery runs out the phone itself needs to be recharged. The life of the battery depends on the type of phone you purchase, and how often it is used. Those who use their Smartphone’s in abundance will need to recharge the battery every few hours. Those who use it on a moderate level can have battery power throughout the day. However, if the user is not near a power outlet when the battery dies, the Smartphone is rendered useless.



VOIP (Voice over IP)

Advantages:

The main advantage of VoIP broadband phone service is the cost.  VoIP broadband phone providers charge you a much lower monthly fee for local, long distance and international than traditional phone service.

VoIP service is usually bundled with free features (such as caller ID with name, call waiting, conference calls, call forwarding) which are charged for additional cost by traditional phone companies. Even if you already have a regular phone line, VoIP is a good low cost alternative to add an additional phone line with extra features and low long distance and international rates. 

Mobility and portability. You can use the VoIP service anywhere with broadband connection. All you need are a laptop and a headset or just a VoIP phone adaptor. Even if you are travelling, you can still enjoy the cheap calling rates of VoIP service.



Disadvantages:

Some VoIP services do not work during power outages or when the internet connection is down. It is a good idea to install a backup power supply or have a mobile phone as a backup.
Call quality is affected by the quality of broadband connection and the performance of your PC.

So make sure you have good internet connection and both your computer hardware and software are running properly.

Cloud Services

Advantages:

It’s important to look at the benefits of Cloud computing against the security concerns before deciding if it is something you want to use for your company.

Cloud computing allows users to store files instead of on a hard drive or server at the office, in turn this means; no system failure, no office dependency and no extra IT infrastructure. There is nothing worse than coming into the office on a Monday morning and not being able to access your files because the server has gone down.

Cloud computing has also shown to be cost effective for companies that use it because there is no need to buy and install expensive software as it is already installed on-line  There is also the added benefit of no longer needing specialist IT staff to maintain and upgrade software. It is now possible for companies to access their own private cloud which can be tailored to include specific services and only accessible to the staff of that company. However, problems come with this private cloud that we will discuss later.

Cloud computing is especially beneficial to International companies as it offers the flexibility for its staff to gain access to company files wherever they are; they do not need to have access to the server.

The problem is that there are still some worrying security issues with Cloud computing; many companies have noticed Clouds benefits but are still reluctant to put secure data onto Cloud, especially a public Cloud, can we really blame them?

Disadvantages:

With the media highlighting all the security issues over the last few years it is no wonder people are reluctant, an example of a security breach that was highlighted was the attack on Sony PlayStation’s Cloud network, where many gaming user’s card details were stolen.
There are security concerns over the loss of control over sensitive data and the complexity of security is greatly increased when data is spread over a large number of devices and resources being shared by unrelated users. Not knowing where your data sits is also a continuing worry and if you want to take data back or destroy it, how do you know that it has been erased?
If a Cloud system is breached the amount of information lost will be far greater than if it is on a single computer and although it may have better defences if it is attacked more data will be lost.

Monday 28 January 2013

The security implications and the best methods for ensuring your business and information remain secure


Viruses and Trojans
1. Virus spread themselves across computers by infecting other programs while trojans rely on the users to download or copy them.
2. Virus are complex programs that can hide themselves in other programs while trojans are very simplistic and only uses an enticing file name to disguise itself.
3. Virus can be detected in advance by heuristics due to its behavior while trojans can easily pass through since it does not exhibit any suspicious behavior.

My advise on the best methods for ensuring your business and information remain secure such as firewalls
Anti-Virus

The powerful iolo AntiVirus engine detects, blocks and removes computer viruses, worms and other malicious infections.With active protection, integrated email scanning and hourly updates, your computer is effectively shielded from danger.

Invisible real-time protection. Provides an impervious shield for your PC that's always working. It instantly detects and blocks dangerous programs, stopping threats before they occur without impacting system performance.

Integrated email protection. Automatically scans and disinfects email messages sent and received by your PC as they are being transmitted, not only protecting your own PC from harm, but also preventing you from accidentally infecting people you know.

Periodic system inspections. When your PC is on but not being used, System Shield will perform periodic inspections as a second level of protection, combing your system for any dangerous and suspicious programs that may cause harm.

Convenient on-demand scanning. If a file, program, folder or other part of your PC is ever suspected of infection, you can perform a comprehensive scan that will disable any threats and provide you with a full security analysis report.

Daily updates. Virus signatures are updated automatically every day, ensuring continual protection from the latest threats.
Anti-Spyware

Spyware silently installs itself on your PC and then begins collecting and sending your personal and financial information back to its source. Your passwords, shopping habits and even credit card or banking details can be compromised, resulting in identity theft, credit card fraud and worse. In addition, spyware commonly causes system conflicts and errors and wastes valuable memory, leading to overall sluggish performance, freeze-ups, crashes and even data loss.

Complete protection. Eliminate annoying stubborn and offensive pop-up windows and other unwanted ad content, tracking mechanisms that monitor internet browsing, backdoors that enable covert control, keyloggers that can record keyboard and mouse activity and more.
Types of Data Back-up
 
Full backups

A full backup is exactly what the name implies. It is a full copy of your entire data set. Although full backups arguably provide the best protection, most organizations only use them on a periodic basis because they are time consuming, and often require a large number of tapes or disk.

Incremental backups

Because full backups are so time consuming, incremental backups were introduced as a way of decreasing the amount of time that it takes to do a backup. Incremental backups only backup the data that has changed since the previous backup.

Differential backup

A differential backup is similar to an incremental backup in that it starts with a full backup, and subsequent backups only contain data that has changed. The difference is that while an incremental backup only includes the data that has changed since the previous backup, a differential backup contains all of the data that has changed since the last full backup.

Synthetic full backup

A synthetic full backup is a variation of an incremental backup. Like any other incremental backup, the actual backup process involves taking a full backup, followed by a series of incremental backups. But synthetic backups take things one step further.

Incremental-forever backups

Incremental-forever backups are often used by disk-to-disk-to-tape backup systems. The basic idea is that like an incremental backup, and incremental-forever backup begins by taking a full backup of the data set. After that point, only incremental backups are taken.

Some of the benefits to setting up a businesss online

Advantages of setting up your business online
 
Reduced operating costs
 
To increase profits, businesses must do to things: boost revenue and reduce costs. The act of reducing costs can be painful, as it often means doing without something you would prefer to have. However, if a business is dangerously close to not being able to deal with its liabilities -- or if it is already past that point -- reducing costs can be an absolutely necessary way of changing a bad situation. While every business's circumstances are different, certain opportunities for cost reduction are common for most businesses.


It's estimated that each day around £1.2m is lost due to card fraud in the UK – which works out as one theft every nine seconds – and one in every three people has been a victim of card fraud.
The introduction of chip-and-Pin technology has helped to curb the problem, but debit and credit card fraud continues.
 

The various types of card fraud include:

 
Card-not-present (CNP) fraud

This includes fraud conducted over the internet, by telephone, fax and mail order and is perpetrated when criminals obtain debit and credit card details and use them to make fraudulent transactions.
It’s the largest type of card fraud in the UK.

Because neither the debit or credit card nor the cardholder is present, businesses can't check the physical security features of the card to determine if it’s genuine.


Card skimming

The most common type of cash machine fraud is known as ‘skimming’.

This is where thieves attach card readers and small cameras to cash machines. These capture your card details. At the same time the cameras film you keying in your Pin.
Another ploy is to use card readers to capture debit and credit card details elsewhere – for example, in restaurants and petrol stations. A corrupt employee puts your card through a device, without your knowledge, which electronically copies the data from your card's magnetic stripe.
With both types of fraud you'll often be unaware until your statement arrives, showing debit and credit card purchases that you didn't make.


Bank details phishing
Criminals send emails that appear to come from your bank to get you to enter passwords and account details on a fake version of your bank’s website.
The number of these ‘phishing’ emails being sent out has increased dramatically in the last few years.


Pharming
This relies on a computer virus that redirects you to a fake website when you attempt to access your online bank account.


Intercepting financial mail
Criminals steal new credit and debit cards and cheques from the mail and then use them to buy goods. At particular risk for this type of fraud are properties with communal letterboxes, such as flats and student residence halls.


General card fraud prevention tips

  • Don't let anyone else use your credit card.
  • Always take your receipt.
  • Keep your receipts and tear them up, or preferably shred them, before disposing of them.
  • Only shop from well-known websites that display a secure padlock logo, and have both a landline phone number and a real address (not a PO Box).
  • Don't give out your debit or credit card Pin. Avoid obvious Pins such as your birth year.
  • Keep your credit cards and cheque book safe.
  • Keep a note of contact details to use if your debit or credit card is lost or stolen. Carry them separately from your cards.


Click on the link below to see how card fraud can be used over the phone.

Monday 7 January 2013

The Internet and the World Wide Web!

The differences between the two and some of the operational and historical aspects
 
 
This post for my blog will help you to understand the differences of both the Internet and the World Wide Web. The Internet and the world wide web have a whole-to-part relationship. The Internet is the large container and the world wide web is a part within the container.

I bet you didn't know this ???

The “www” part of a web site is optional and is not required by any web policy or standard.

The Internet was called the ‘Galactic Network’ in memos written by MIT’s JCR Licklider in 1962.

Around 75 per cent of the music that is available for download has never been purchased and it is costing money just to be on the server.

Facts about the Internet and WWW

They are both commonly known as "The web" and "The net". In words to make you understand this easier, the net is like a restaurant and the web is like the most popular dish on the menu.

The initial idea is credited as being Leonard Kleinrock's after he published his first paper entitled "Information Flow in Large Communication Nets" on May 31, 1961.
In 1962 J.C.R. Licklider becomes the first Director of IPTO and gave his vision of a galactic network. In addition to the ideas from Licklider and Kleinrock, Robert Taylor helped create the idea of the network, which later became ARPANET.
 
One of the best and most common ways of finding information on the web is through the use of search engines such as Google and Bing. Google is currently the most popular search engine, receiving hundreds of millions of search queries every day.
 
The world wide web is a system of Internet servers that supports hypertext and multimedia to access several Internet protocols on a single interface. The World Wide Web is often abbreviated as the web or www. English physicist Sir Tim Berners-Lee is regarded as having invented the World Wide Web in 1989. Since then he has continued the development of web standards and other web related projects.

 
 
 
 An image of the Internet Explorer
 
 An image of the World Wide Web logo
 
How do they work???
 
An image of how the internet works
 
An image of how the World Wide Web works



If you want even more information about either the Internet or the World Wide Web, then the next post will contain it.