Nt1310 Unit 1 Data Analysis

Improved Essays
1. What did you learn from these chapters & additional materials? (Use of "I" statements are a great way to answer this question. Please don 't review or outline chapters, articles, or other media. This is about what you learned!
One of the things that I have learned from this section was about the Indian Government and its undertaking to register its 1.2 billion residents within a universal citizen ID system. When I first read that I thought that was pretty impressive. The fact that it cost more than $4 billion is insane to think the least. After they have completed this, it will be the world’s LARGEST database of biometric data. This includes retina scans, fingerprints, and multiple facial images for not one but each individual. This to me
…show more content…
In the first part of the section they start off by talking about Hardware. Within this they cover the Input, Processing, Output, and Storage Devices. While I was reading this, one of these things really came out to me and that was storage devices. Storage is such as big thing and this especially goes for bigger companies. Data used to be very small back in the day. 1Gb used to be HUGE in modern terms, and now 1Gb is the size of the pea for most people. I am at the point where I am using Terabytes without even thinking about it. This might not be the case for most people but for me at work a majority of the time I am filling up drives like to tomorrow just from Surveillance Video Footage. I haven’t even started on shared drives through our network and even our backups. I personally believe having the knowledge about Storage Devices is a huge deal, more than ever within a big industry. Lastly I wanted to talk about was the overall software that we use. While reading over the chapters, I noticed that they were talking about operating systems such as, Linux, Windows, and MAC OS. These are all big things that we should know about and even the history behind it. Even though most company’s probably use Windows, or even Mac, it is still important to know about things such as Linux considering everything was build up from it. Even today at work I still use a couple of Linux boxes …show more content…
The part that I had comprehended was “Computer Systems: Integrating the Power of Technology”. Here they talked about how people that are involved in any way with the type of organization they may be in must clearly understand the current and future business requirement. The reason that they say this is so they can make informed and acquisition decisions. One of the examples that they gave was how Facebook needed new data centers, and rather than buy brand computers bye custom build their own as well as a new data center. Now the reason that this applies to me and how I have used this is at work right now. I decided in a lot of ways our company’s requirements, especially when it comes to computer hardware related items. One of the bigger things we have decided was during big events we would rent out computers instead of using all of our equipment. The main reason we would do something like this was because of computer licensing. Instead of using all of our licensing and equipment it was more beneficial to rent out computers, and in the long run saving money. The other thing was instead of renting printers we went to buy our own. After calculating it all out, it was much more cost efficient already within 2 years. This is the reason I picked this example and how it relates to me at work. This information if very useful and really comes in handy during times

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The following data is received from a real-time measuring device and is stored at memory location Data1. You are required to write an assembly language program segment with the corresponding data definition directives that would extract the data items and store them at memory locations Day, Month, Year, Temperature and Pressure. [10 points] 5 bits 4 bits 7 bits 8 bits 8 bits Day Month Year Temperature Pressure Write an assembly language program for the following HLL code: [10 Points] unsigned int crc32(const char* data, size_t length) { const unsigned int POLY = 0xEDB88320; unsigned int reminder = 0xFFFFFFFF; for(size_t i = 0; i < length; i++){ reminder ^= (unsigned char)data[i]; // must be zero extended for(size_t bit = 0; bit…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Part 1 Different data types and their uses - The different data types that is available for creating or developing a program on software. An example of programming software would be Microsoft Visual Studio. With this software, many data types are used which can drive an event. -…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Cybersecurity is vital to improving the security and reliability of the Western Interconnection power grid. As one of the most complex and critical infrastructures, the importance of prioritizing the continued security of the power grid should be at the top of the list. There are many different options that can improve security levels of both a physical and logical nature, such as disk drive encryption, digital certificates, Transport Layer Security (TLS), and Virtual Private Networks. Recommendation: Implement Full Disk Encryption Full disk encryption is the ability to convert data into unreadable code that can only be deciphered by authorized people. The encryption can include almost everything on the system such as temporary files and swap files.…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Roles of Core Technologies in an Effective IT System Technology permeates all aspects of modern civilization. It is woven into the fabric of our daily lives. What was once barriers to knowledge and communication have been stripped down as we are now connected, in an instant, to the farthest reaches of the globe. With every new advancement comes an opportunity to usher in a revolution in how societies live, work, and play. The major players that make it all possible are the men and women who create and manage the technology we use today.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    The next best practice is information management. The author believes that technology is not the answer but an enabler for companies to manage their information as an asset. The main purpose of managing information as an asset is to benefit the customer. "There has to be a sustained commitment to change attitudes and behavior if technology is going to help in leveraging information assets for the benefit of the customer." (Unruh, 1997)…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    Technological: Cloud computing is becoming more popular among individuals and organizations. Apple can offer cloud-friendly devices and apps to exploit this opportunity. Apple has iCloud which is very useful for iPhone users. In addition, the apps market is growing.…

    • 1243 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    We are constantly building new innovations. We always rely on simple but not on complex things. We assume that we require to possess and control the essential innovations behind the administrations and items that we make and share just into business sectors where we can make a vital offer. We share into saying no to thousands of projects, hence that we can actually focus on some that are truly significant and valuable to us (your dictionary, 2015).” IT Mission: Apple 's Mac, the best (PC) in the globe, alongside iWork, and OS X programming.…

    • 905 Words
    • 4 Pages
    Improved Essays