Tackling Data {5}

by Garcello D
This article spreads some knowledge about accumulation of data in businesses. There is so much digital data that if it was broken down into bits there would be more data particles then stars in the universe. The problem is that there is no real way for businesses to stop this data agglomeration so they are faced with the hideous task of having to analyze the data. The reason they would want to analyze data in their business is so that they can accurately calculate their profit and losses, but also the demographic information on their worst and most loyal customers. All this data can be complicated to manage, but most importantly it can cause performance issues on a network that is crucial to the business. Furthermore the article gives some ways of how IT managers tend to deal with this issue, yet all of them come with a negative side effect for the business. In conclusion it goes over that the best way to solve this issue is not to add more and more hardware, but instead to approach the way we store the data in a different database formats. read more...

Network database security {3}

by Robert Q
The article title “The Security Mechanism of Network Database”, covers most of the application that can be apply to protect network database. Some of the network threats that are listed in the article include, but not limited to, Replay, Trapdoor, Deny of Service or Modification of message. Such threats can be harmful to any network database that is affect by these viruses.  The author notes that administrator have to develop C2-level security standard to protect the network database. C2-level security standard is just another layer of security added on to the other 2 layers of security. Others ways to protect the network database that the author mentions is to have password tactics, audit tactics, encrypted data etc.  Planning during the system design processes can only get rid of some of the threats, only through consists improvement of the security in the database can an administrator protect the network database. read more...

Cisco Says Mobile Data Traffic Is Rising {Comments Off on Cisco Says Mobile Data Traffic Is Rising}

by Han C
According to a recent forecast, Cisco’s visual networking index has listed global mobile data traffic to increase by 18 fold within the next five years. The VNI forecast is an ongoing initiative to track the impact of visual networking applications on a global scale. By examining the trends of the last four years, the article is able to show that average smartphone usage nearly tripled in 2011 and that mobile video traffic exceeded 50% for the first time in 2011. In addition, Android data usage is actually higher than iPhone users. The crucial factor here is to promote the increase in mobile speeds such as 4G, which includes: WiMAX, and Long-Term Evolution. 4G only holds 0.2% of mobile connections but is already accounting for 6% of all mobile data traffic. As mobile data traffic continues to rise along with user demand, the article estimates that the number of mobile connected devices will exceed the world’s population sometime this year. read more...

The Cloud, Day 21: My Data Might Be Safer in the Cloud {1}

by Bach B
“30 days with the cloud” is a series of blogs of PCWorld magazine’s writer, Tony Bradley. By this, he is sharing his experience and also his concern during his 30 days journey using cloud-based products, such as Google Docs, Zoho Docs, Box.Net, etc. One of his concern is security. By using cloud-based storage, we can convinnently access our data everywhere as long as we have  a Web-enabled device and an Internet connection. However, it seems like an awful lot of faith to put in a third-party to expect it to protect our data. We  surely don’t want our data accessed by anyone but us and maybe a handful of authorized people that we designate. By placing it out on the Internet, even that the data is locked and protected by a third party, but “it feels like taking my valuable possessions, putting them in a box with a padlock, and leaving it in the middle of Times Square.”, Tony said. Nevertheless , there is a fallacy to this analogy. People usually think that keeping their possession at home is safer than it is in the middle of Times Square is based on an underlying belief that their home is more secluded, and less accessible to potential thieves than Times Square. But it is not neccessarily true that their personal computers is  safer places for their data than the cloud. The reason is no matter where we choose to store our data, in our personal computers and/or in the cloud, it is still ultimately our responsibility to secure it. While we might not have time, knowledge, or an entire IT department working on our behalf to make sure our data is protected, the service provider surely has that. By that, Tony concludes that the data might be safer in the cloud. read more...

Internet Capacity, Network Traffic and Net Neutrality {2}

by Marco M
“Internet Capacity, Network Traffic
And Net Neutrality”

Some of the challenges facing the Internet, users and providers, are the ability to improve and expand the current infrastructure. Studies have shown that the Internet is reaching a critical point where demand is out pacing supply; consequently, the service providers need to work harder and quicker to keep-up with Internet growth by implementing faster and more efficient equipment, such as routers and fiber optics just to mention a few, so Internet traffic can continue to flow adequately. Another very important issue, right now, is Net Neutrality; this concerns Internet usage for individuals and organizations of all types, “In 2007, Comcast tried to control traffic over their network”; however, “The Federal Communications commission (FCC), by a 3-2 vote, determined that the move by Comcast was illegal”. Large service providers such as AT&T, Verizon and Google, amongst others, are trying to unilaterally decide who they want to give preferential content treatment, just as Comcast did in 2007, therefore, that those companies would give traffic priority to those companies who pay more to the Service Providers and as a result of that practice, consumers would be force to limited choices and false advertisement. read more...