Monday, January 31, 2011

Information Security (The CIA)

To protect the confidentiality, security, and availability of information:

Security is the freedom from any danger or risk. All protection measures are established and maintained.
Information security describes the tasks involved to protect information that is in digital format.



3 Things Information Security is intended to protect

Confidentiality, Security, and Availability of Information:
click image to enlarge

Sunday, January 30, 2011

“There are only 10 types of people in the world: Those who understand binary and those who don’t.”

The Binary number system is simply another way of describing an amount.
The binary number system is also called base 2. This is because it only offers the possibility of using two numerals to describe an amount.
Binary numbers are made of 0's and 1's.

A computer understands bits.
A bit in our computer language is defined as one binary digit.
A binary digit represents a measurement of a thing. Each digit has only two possibilities: 0 or 1.
Each binary digit is made from Character data composed of letters, symbols, and numerals that are not used in arithmetic operations, such as your name, address or your hair color.

Just like Morse code uses dashes and dots to represent letters of the alphabet, computers use a series of bits to represent letters, numerals and other characters.

Digital devices employ several types of code to represent character data, such as ASCII, EBCDIC, and Unicode.
The codes follow protocol using the binary number system also understood by the computers.

The Decimal numbers system uses 10 symbols to represent numbers: 0,1,2,3,4,5,6,7,8,9.
The binary system like mentioned above uses only two symbols 0 and 1.

A formula that explains how to convert
Decimal numbers into Binary numbers:

Binary numbers are read a byte at a time and one byte equals to eight bits.
Start with 8 digits to represent a binary number (byte).
Binary stands for bi which stands for 2. (base2)
2°=1
2¹=2
2²=4
2³=8 and so forth to the 7th power.

128
64
32
16
8
4
2
1
0
0
1
1
0
1
1
0
Let's look at decimal number 54, to convert numeral 54 into a binary number you need to start by seeing if the number 128 can fit into the number 54?
No it cannot so I added a 0 (zero) under the 128 (8th digit)
Can you fit 64 into the number 54?
No it cannot, so I placed a 0 under the 7th digit (64)
Can 32 fit into 54?
Yes so I placed a 1 (one) under the 6th digit (32)
64-32=22
Can you fit 16 into 22?
Yes so I placed a 1 under the 5th digit (16)
22-16=6
Can you fit 8 into 6?
No, so I added a 0 under the 4th digit (8)
Can you fit 4 into 6?
Yes, so I place a 1 under the 3rd digit (4)
6-4=2
Can I fit 2 into 2?
Yes, added a 1 under the 2nd digit (2)
2-2=0
Can I fit 1 into 0?
No, so I added a 0 to the 1st digit (1)
The zeros before the first 1 can be removed.
The decimal number 54 converts to binary 110110.

More examples are shown in the tables below.

Decimal Number
Binary Number
8
1000
25
11001
136
10001000
1492
10111010100

Decimal Number
Binary Number
25
11001
26
11010
27
11011
28
11100
29
11101
30
11110


"There are only 10 types of people in the world: Those who understand binary and those who don't."

If you see a group of individuals wearing the T-shirt "There are only 10 types of people in the world: Those who understand binary and those who don't"
You will only wonder where to get your own awesome T-shirt like that, because in binary we all know that 1 and 0 is 2. And it looks like decimal #10 to the type of people who do not know binary.

Social Policies and Statistics

Social policies are created in an attempt to solve social problems that exist in our society.
Social policies are often open for hot debates. People on every side offer different methods to provide statistics to back up their point of view. The job of the sociologist is to know if these statistics have equal weight.

Statistics
Five Pitfalls of Statistical Analysis
Secondary  Data Analysis
The process of obtaining data from reliable sources that others have collected.
Be cautious of headlines:
Many times publishers will publish content that will offer faulty information in an attempt to form concise reports. These faulty reports consist of misleading titles and information that will try to get you to take their side on the issue. The sociologist must do further research to make sure that the headline may be taken at face value or not.

Double check the definition of terms:
Be cautious of terms that can be interpenetrated in several different ways.
An example that comes from my Contemporary American Society book, "Think Social Problems", says that Barack Obama's mother was a white woman of English decent, and his father was a black man from Kenya. Even with these factors he is considered the first African American to be elected president. Obama lives up to that label however some might dispute it's accuracy.

Investigate the source:
It is important to know the source of the information that you are researching because the agencies that fund many projects will most likely pay to fund their project research to produce an outcome favoring the values of the agency itself. They do this in order to provide statistics to back up their point of view.

Beware of selective causes:
Make sure that the results of your research contain all of the proper variables necessary to obtain the results that you need that contain data for your outlining cause.

Watch out for hidden agendas:
Politicians and policymakers have time tables and deadlines. Be cautious of false claims that may have been made to benefit the  person with an agenda. The data results could of been adjusted with manipulation to benefit themselves.

Sociologist can really only obtain so much data through studies, surveys, and experiments. Sometimes the best way to  understand  society is to study it in action. to really live it.
Example: Go out and hang out with the homeless for a week or more.
This is called Participant Observation or Ethnographies (Research aimed at a particular group of people)

Where to start your research paper:
Learn more about social policy:

OSI model TCP/IP

OSI (Open Source Interconnection)
TCP/IP (Transmission Control Protocol/ Internet Protocol

The OSI model consists of seven layers and is part of the networking vocabulary.
The TCP/IP works in the first 3 layers of the OSI model.

Protocols provide all the rules necessary to carry out all the duties within the OSI model.

I was taught that an easy way to remember the seven layers in the OSI model is:
All    -    Application
People    -    Presentation
Seem    -    Session
To    -    Transport
Need    -    Network
Data    -    Data Link
Processing    -    Physical


 I was given the following videos to use. I uploaded theses video's from Youtube.com and intend to use them for my studies  in Web Development.

 

Some things that I have noted from class.
The physical layer deals with 0's and 1's from the ASCI code converting between binary and numbers.The physical layer is also used to connect your cables.

The physical layer deals with hardware, no software. example: hubs,and physical parts to the network.
 



Saturday, January 29, 2011

Virtual Machine

I will be learning and using from a program VM= virtual Machine

vSphere Web Access streamlines remote desktop deployment by allowing you to organize and share virtual machines using ordinary web browser URLs.

Use your web browser to find and download files (for example, virtual machine and virtual disk files).

The vSphere Web Services SDK package contains interface definitions, detailed documentation and sample code to help you write your own management programs.

Download

https://appcc.fvtc.edu/

Association of Information Technology Professionals

The AITP Association of Informational Professionals.
http://www.aitp.org/

AITP is the professional association comprised of career minded individuals who seek to expand their potential -- employers, employees, managers, programmers, and many others. The organization seeks to provide avenues for all their members to be teachers as well as students and to make contacts with other members in the IS field, all in an effort to become more marketable in rapidly changing, technological careers.