Cabin Rental Blog
Wednesday, November 17, 2010
Blog Entry 7.1
The five most common security threats to a computer system are accidents and natural disasters, employees and consultants, links to outside businesses, outside intruders, and viruses. For the cabin rental company accidents and natural disasters may be common so in the case of a power outage or any other disaster the constant backing up of information will take place within the company and the storage of important databases will be stored off site away from any disaster that may take place at the company. Employees and consultants will sometimes try and share information with rival companies so in order to prevent this from happening in the cabins, the use of biometrics will be used and employee ID cards for authorized access to any information that may be important to prevent unauthorized access of data. The info shared with links to outside businesses will be conducted using secure firewalls and the virtual private network using the internet to share data, these firewalls and VPNs will prevent the access of data from other rival companies trying to access the info of the cabins. Outside intruders can harm a computer system and the biometrics will be used after hours of the company and photo ID badges will be used and the cabins with security cameras and gate access to the information building in order to keep secure data from being accessed. Viruses will really harm a computer system. In order for the cabins to keep this from happening Norton Anti-virus software will be installed on every computer in the system and emails that may contain viruses will not be access to open the files.
Blog Entry 6.1
There are four pillars of Web 2.0. The first pillar is utilizing the web as a platform which uses peer to peer technology. The second pillar is harnessing collective intelligence and an example of that would be reviewers of a product on a website. The third pillar is leveraging the data which uses knowledge of the customer to accommodate them better. The last pillar is implementing innovative web capabilities which uses knowledge of the web to perform a service.
These pillars of Web 2.0 can fit into the cabin rental company as follows. First utilizing the web as a platform would help the cabin company in peer to peer technology by spreading the word of the company over the web as a great place to vacation. Harnessing collective data would be very helpful to the cabin company by allowing users of the web to go onto the cabin company website and sit up a review board so that customers of the cabins could express over the web how their experience was while staying at the cabins by giving positive reviews to the company. Leveraging the data would be very helpful in serving the customer better by storing data in the systems of the company databases for returning customers and this would allow the cabins to already have returning customers information on file in the database and allow the customer to return to the cabins with ease. The final pillar of implementing innovative web capabilities would be helpful to the cabins in the way that they can use the knowledge of the web to check with sister companies if the cabins are full on days that a customer would like to stay at the cabins and find the customer another place to stay that is close to the cabin rentals.
These pillars of Web 2.0 can fit into the cabin rental company as follows. First utilizing the web as a platform would help the cabin company in peer to peer technology by spreading the word of the company over the web as a great place to vacation. Harnessing collective data would be very helpful to the cabin company by allowing users of the web to go onto the cabin company website and sit up a review board so that customers of the cabins could express over the web how their experience was while staying at the cabins by giving positive reviews to the company. Leveraging the data would be very helpful in serving the customer better by storing data in the systems of the company databases for returning customers and this would allow the cabins to already have returning customers information on file in the database and allow the customer to return to the cabins with ease. The final pillar of implementing innovative web capabilities would be helpful to the cabins in the way that they can use the knowledge of the web to check with sister companies if the cabins are full on days that a customer would like to stay at the cabins and find the customer another place to stay that is close to the cabin rentals.
Tuesday, October 26, 2010
Blog Entry 5.3
The cabin company would use and extranet network with the intranet network to provide their services to their customers. The internet would be used to by the inside network of the company to order supplies or other items with the firewall protecting the information being sent or received over the two networks. The server inside the company network provides service to the client computers on the network. The outside network client gets service just from the internet.
Blog Entry 5.1
The competing website I chose was Holiday Inn Express in Rocky Mount VA. Their business to consumer relationship involved in their website takes travelers and provides them with the service of finding accommodations to stay at their location while they are on a trip. The website is in a good state of E-Commerce and serves a good relationship with consumers. Holiday Inn uses the consumer comes first strategy to run their web page.
Rules
1.The Website Should Offer Something Unique
The rating for Holiday Inn for this rule is a 3. It does not offer anything very unique that other websites do not offer.
2. The Website Should be aesthetically pleasing
The rating for this rule is a 5. The layout of the site and use of color is very appealing and the photos displayed of the place are of high quality.
3. The Website Must be easy to use and fast
The rating for this rule is a 5. The website is very easy to use and anything done on the site is fast.
4. The Website must motivate people to visit
The rating for this rule is a 3. The website does not provide any features that cannot be found anywhere else.
5. You must advertise your presence on the web
The rating for this rule is a 4. The layout and schemes stand out on the site and you know that you have visited the site when you are there.
6. You should learn from your website
The rating for this rule is a 5. The Holiday Inn site has a 95% traffic rating according to alexa. Monday, October 25, 2010
Blog Entry 5.2
The cabin rental company would use an extranet to perform business with other businesses over the web. For example they may work with Priceline or other accommodation websites to rent out there cabin space. Both the cabin company and the cabin supplier use the internet to do this, with a firewall on each end of the connection to keep personal information contained. The supplier is the server of the internet in this situation and the cabin vendor is the client on this network.
Wednesday, October 20, 2010
Blog Entry 4.4
Entities are something you can create data about. In this entity relationship diagram, the entities are broken down into customer, product, and invoice. Attributes are what go into an entity that are used to record the data. Name is an example of an attribute under the customer entity. All three of these entities share the relationship of being information needed to record the data that is stored in the records for a cabin rental company. They are all related as the attributes are all recorded on an invoice but are then broken down into three entities. The entities and attributes are all recorded in these three tables showing the relationship to each type of attribute.
Blog Entry 4.3
On this shared network there are several users. The problem with this is that data being transmitted over the network has to be broken down into packets and sent to different places using the TCP which prepares the messages to be sent. The IP uses routers to send the messages using an IP address, which is assigned to every computer and router on the network. The IP uses these addresses to format the messages back into their proper format in order for delivery. The receiving network computer places the message back into format so it can be read once the TCP and IP have performed their job of breaking it down and sending it over the network.
Subscribe to:
Posts (Atom)