Ina Fried basically says that complains made by customers regarding Windows Vista lead Microsoft to a new product designing approach. Where they sought the input of PC manufactures like HP, Dell, and Acer etc. Morbello, an Acer Vice president, said, “Until Vista, Microsoft was fully thinking on there own and implanting their own ideas and then releasing it. The PC manufactures didn’t really know what to expect or how it would function in there PC hence all the problems that PC users experience.
Microsoft had to change their method of design in part because of Apple strong customer satisfaction. They held meeting and discussed how certain PC components were functioning with the Windows program and also how pre-installed non-Microsoft programs would affect the function of the PC. A few of the decisions made were the addition of an XP mode to allow users to use a free virtualization copy of Windows XP in order to run older applications not compatible with the new version; and they also cut out all the “Crapware” (preinstalled non-Microsoft software) that was slowing down the PCs.
This article relates to the chapter because it used all the information obtained from complains surrounding Windows Vista. Microsoft took this information obtained from customers and got to the “root cause”! Rather than continuing to develop their product in the same fashion they took their customers complains into consideration and developed a software program with the help of the PC manufactures in order to eliminate possible future consumer problems.
BY: Ina Fried
http://news.cnet.com/8301-13860_3-10380296-56.html
Wednesday, December 16, 2009
Verizon, Motorola unveil the Droid correlated with chapter 7
This article highlight the Motorola Droid, a new phone offered exclusively By Verizon wireless. It was designed for people seeking an alternative to the iPhone and shows that while the iPhone has standard it is not immune to threat or rather “not untouchable” as stated by Straton (www.cnn.com). The Droid offers many similar features and runs on the Android OS. The Droid offers voice activated search feature for music photos and contacts, Google maps turn by turn GPS directions, it also offers a 5-megapixel camera, Wi-Fi, and Bluetooth. It has a Webkit HTML 5 browser, and it's powered by a 550MHz processor and a removable lithium ion battery offering 6.4 hours talk time and up to 11 days of standby time.
This correlates with Chapter seven, Networks, Telecommunication, and mobile Technology, because it describes yet another gadget in the assistance of mobile technology. The Droid would be classified as a Smartphone because it offers both PDA and phone function. It also shows how we are integrating more and more mobile technology in that it also offers a GPS system, WI-FI and Bluetooth. I am quite excited about this phone because it provides a powerful tool as great service. While researching and reading some blogs comparing the droid I came to the conclusion that the Droid was more Business oriented, while the iPhone was more multi-media orientated.
By Marguerite Reardon
http://www.cnn.com/2009/TECH/10/29/cnet.verizon.motorola.droid/index.html?iref=allsearch
This correlates with Chapter seven, Networks, Telecommunication, and mobile Technology, because it describes yet another gadget in the assistance of mobile technology. The Droid would be classified as a Smartphone because it offers both PDA and phone function. It also shows how we are integrating more and more mobile technology in that it also offers a GPS system, WI-FI and Bluetooth. I am quite excited about this phone because it provides a powerful tool as great service. While researching and reading some blogs comparing the droid I came to the conclusion that the Droid was more Business oriented, while the iPhone was more multi-media orientated.
By Marguerite Reardon
http://www.cnn.com/2009/TECH/10/29/cnet.verizon.motorola.droid/index.html?iref=allsearch
Chapter 2 correlation with Robot parking: the blindfold idiot test
This article described discussed and compared new technology that was offer in a few vehicles (the VW Touran, the Toyota Prius Spirit, and the Lexus LS460 to be specific). This technology is called the intelligent parking assistant, and it does what it implies (Parks your vehicle). This feature was put to the blind fold test and exerted varied results in usability and performance. The VW Touran was the easiest to use and passed the blind fold test it allowed the driver to pick a parking spot on the street and took control of the steering wheel. The driver however, still had control of the power exerted (gas pedal) and if it reached a certain speed it would automatically shut off this feature. The Lexus and the Toyota differed from the VW in that the Lexus and Toyota use on screen control to plot out the vehicles path and the VW does that on its own. Also all systems had a shut off that was engaged if the driver began to accelerate to fast. Nicholas Rufford and Jason Dawe concluded that these systems where good but still required some improvements and that "the system still couldn't beat a competent driver" (www.timesonline.co.uk).
This article correlates with chapter two because it involves the use of artificial intelligent. The Text describes four types of artificial intelligent: Expert systems, neural networks, genetic algorithm, and intelligent agents. I believe this is an intelligent agent system because it performs a certain task, I think also exhibits traits of a genetic algorithm AI system in that it optimizes a repeated tasks at least in the VW system. I wonder if both system of AI where used and if anymore systems will be integrated to form other tasks.
Nicholas Rufford and Jason Dawe
http://www.timesonline.co.uk/tol/driving/features/article2068943.ece
This article correlates with chapter two because it involves the use of artificial intelligent. The Text describes four types of artificial intelligent: Expert systems, neural networks, genetic algorithm, and intelligent agents. I believe this is an intelligent agent system because it performs a certain task, I think also exhibits traits of a genetic algorithm AI system in that it optimizes a repeated tasks at least in the VW system. I wonder if both system of AI where used and if anymore systems will be integrated to form other tasks.
Nicholas Rufford and Jason Dawe
http://www.timesonline.co.uk/tol/driving/features/article2068943.ece
Chapter 6 correlation with IBM Adds Informix Data Warehouse Feature
The articles is about IBM has improved the Informix Dynamic Server. According to Kevin Brown, IBM’s Lead Architect for Informix Database, “the new tools allow [customers] to transform their data into Star Schema for efficient warehouse workloads, With this offering, we are providing the necessary tools to make their jobs that much easier" (www.eweek.com). Prior to this enhancement users would need to create manuscript and trigger to create schemas, schematic or preliminary plan. According to Brian Prince the new feature provides a visual representation of the user’s current database design and can be used to transform data into a star schema without writing a single line of code. According to brown this converts weeks of effort into just a few hours of work. Informix Dynamic Server is typically used for OLTP environment (online transaction processing) and DB2 for a database warehouse the new feature consolidates both tasks into one system. This was done in efforts to increase customer satisfaction rather that provide an edge on IBM competitors.
This correlates with chapter 6 because as noted the new feature increase productivity or rather simplifies it. The text explains that databases were implemented in order to access relevant data quickly and efficiently an attribute that today’s developer continues to improve as seen by this article.
By: Brian Prince
http://www.eweek.com/c/a/Database/IBM-Adds-Informix-Data-Warhouse-Feature-to-Bolster-Database-Software
This correlates with chapter 6 because as noted the new feature increase productivity or rather simplifies it. The text explains that databases were implemented in order to access relevant data quickly and efficiently an attribute that today’s developer continues to improve as seen by this article.
By: Brian Prince
http://www.eweek.com/c/a/Database/IBM-Adds-Informix-Data-Warhouse-Feature-to-Bolster-Database-Software
Thursday, October 15, 2009
Review of the article “Disney debuts do-it-yourself thrill ride” and a correlation to the Chapter 8
Much like the Sims City amusement park video game where one can run and design an amusement park, Disney has developed a new ride in where customers are able to customize a ride to their specifications. The new ride is called The Sum of all Thrills and it allows its customers to choose the curves loops and how fast the ride goes. Furthermore one cannot create a roller coaster that is not realistic meaning that if it can actually be built then they have to choose a different path. After one is done they climb onto a seat held by a robotic arm which simulates the movement of the customized ride while a virtual scene of the ride is being displayed. Furthermore fans are also incorporated to simulate the speed of the roller coaster. “Shawn McCoy, vice-president of marketing and business development at Jack Rouse Associates, another amusement-park design firm, said this desire for interactivity in amusement parks takes its cues from video games”(CNN.com, 1) he also added that the amusement park industry is competing the video game industry because it allows users to have complete control over the characters. The idea has also spread to other amusements park such as Universal Studios where a customer has the option to pick a soundtrack for the ride.
This directly correlates with chapter eight because Disney used information from the video game industry, indicating that customers like to customize their experience. Operation Management was able implement a strategy to start designing new rides in an effort add-value to their product/service.
By John D. Sutter
October 15, 2009
E:\Disney debuts do-it-yourself thrill ride - CNN_com.mht
This directly correlates with chapter eight because Disney used information from the video game industry, indicating that customers like to customize their experience. Operation Management was able implement a strategy to start designing new rides in an effort add-value to their product/service.
By John D. Sutter
October 15, 2009
E:\Disney debuts do-it-yourself thrill ride - CNN_com.mht
Thursday, September 24, 2009
“Google apologizes, explains Gmail outage”
On Tuesday September 1, 2009 Gmail, the email service provided the Google search engine, experience a widespread outage. Ben Treynor, a Google vise president said, "it was a big deal and that Google is working identifying and correcting the errors that lead to the outage." The immediate cause for the outage was that a few servers were taken offline for routine maintenance and while they were offline Google experienced experience an unexpected surge in internet traffic.
Eric Kuhn goes on to mention that at one time users would consider that the problem was stemming from their own internet connection but with social network such as Twitter that old ideology went out the door. People knew exactly why they weren’t getting any serve. According to Kuhn “Gmail problems were a top trend topic on Twitter” (cnn.com, 1)
This article directly correlates with this week’s chapter, chapter five, because two of the main topics in chapter five were backup and recovery. An organization needs to plan how often to backup information and those they also need to plan when and how minimize down time and improve recovery time. One particular method was fault tolerance in which a system has a component embedded in the system that takes over the main system in the event of an outage. Another method is failovers in which a separate duplicate system takes over while the main system is down. According to Treynor, “Google plans to increase router capacity well beyond peak demand to provide headroom” (cnn.com, 1) with 36 million users in the US alone Google should have planned better maintenance schedules.
By: Eric Kuhn
http://www.cnn.com/2009/TECH/09/01/gmail.outage/index.html
Eric Kuhn goes on to mention that at one time users would consider that the problem was stemming from their own internet connection but with social network such as Twitter that old ideology went out the door. People knew exactly why they weren’t getting any serve. According to Kuhn “Gmail problems were a top trend topic on Twitter” (cnn.com, 1)
This article directly correlates with this week’s chapter, chapter five, because two of the main topics in chapter five were backup and recovery. An organization needs to plan how often to backup information and those they also need to plan when and how minimize down time and improve recovery time. One particular method was fault tolerance in which a system has a component embedded in the system that takes over the main system in the event of an outage. Another method is failovers in which a separate duplicate system takes over while the main system is down. According to Treynor, “Google plans to increase router capacity well beyond peak demand to provide headroom” (cnn.com, 1) with 36 million users in the US alone Google should have planned better maintenance schedules.
By: Eric Kuhn
http://www.cnn.com/2009/TECH/09/01/gmail.outage/index.html
Thursday, September 17, 2009
"Cybercrime: A Secret Under Ground Economy" in correlation with information security
"Cybercrime: a secret underground economy"
This article denounces the stereotype of geeks creating and sending out viruses and maintains that it is a growing industry. Cyber criminals steal one’s personal information such as credit card numbers or bank account numbers by way of malware, spyware viruses, Trojan horses etc. And then sell that information online to a third party. David Goldman describes this as a “multi-billion dollar business” and goes on to that if every stolen credit card was wiped clean last year that would have totaled some 8 billion dollars.
One must ask so what is the government doing to prevent these crimes? Well the FBI is currently going undercover in IRC (internet relay chat rooms) and posing as cyber criminal. Once a criminal is caught they offered deals in order to get them to help turn over more cyber criminals although Goldman cites Albert Gonzalez in saying that doesn’t always work one can always look at the TJ Max situation. A situation where a cyber criminal was working for the FBI in order to get vital information that helped his friends evade detection (cnn.com, 1). According to eh article Rowan Trollope the senior vice president of product development at Symantec the current anti-virus technology is not enough one must perform personal step to educate oneself in order to say safe from cyber criminals.
This directly correlates with this week’s text because it involves the technological aspect of protecting vital information but also states that one must also encompass an educational aspect to the technology in order to have information lost due to human error. In a discussion with one of my co-worker I discovered that Norton and McAfee antivirus systems were not that great because they are the most popular antivirus programs used and thus make it more attractive for hackers to get breach. My co-worker a computer technician recommended AVG and various other antivirus programs as alternative.
David Goldman, CNNMoney.com staff writer
http://money.cnn.com/2009/09/16/technology/cybercrime/index.htm?postversion=2009091613
This article denounces the stereotype of geeks creating and sending out viruses and maintains that it is a growing industry. Cyber criminals steal one’s personal information such as credit card numbers or bank account numbers by way of malware, spyware viruses, Trojan horses etc. And then sell that information online to a third party. David Goldman describes this as a “multi-billion dollar business” and goes on to that if every stolen credit card was wiped clean last year that would have totaled some 8 billion dollars.
One must ask so what is the government doing to prevent these crimes? Well the FBI is currently going undercover in IRC (internet relay chat rooms) and posing as cyber criminal. Once a criminal is caught they offered deals in order to get them to help turn over more cyber criminals although Goldman cites Albert Gonzalez in saying that doesn’t always work one can always look at the TJ Max situation. A situation where a cyber criminal was working for the FBI in order to get vital information that helped his friends evade detection (cnn.com, 1). According to eh article Rowan Trollope the senior vice president of product development at Symantec the current anti-virus technology is not enough one must perform personal step to educate oneself in order to say safe from cyber criminals.
This directly correlates with this week’s text because it involves the technological aspect of protecting vital information but also states that one must also encompass an educational aspect to the technology in order to have information lost due to human error. In a discussion with one of my co-worker I discovered that Norton and McAfee antivirus systems were not that great because they are the most popular antivirus programs used and thus make it more attractive for hackers to get breach. My co-worker a computer technician recommended AVG and various other antivirus programs as alternative.
David Goldman, CNNMoney.com staff writer
http://money.cnn.com/2009/09/16/technology/cybercrime/index.htm?postversion=2009091613
Subscribe to:
Posts (Atom)