Hi everyone :-)
I completely forgot about the SoundCloud assignment!! Man is this thing cool!! I can't wait to learn more about the program and I am looking forward to sharing music with friends and family on Facebook too!! Here is my first attempt at Sound Cloud.. I hope you like :-)
Karin's Blogging Spot
Saturday, April 21, 2012
I Just Have To Say...
As my last and final blog post for this class, I have to say that I am happy to have met all of you and I wish you all the best in your future endeavors.
Social Networking For Business is one class that has opened my eyes to a whole new world of things and in a way, I wish I was continuing on with my schooling so I could take other courses offered by Professor Ferree.
Unfortunately, I had to delete my Twitter account because some unknown, random person was posting some really bad things about me and I have no idea why. I guess it just goes to show that are some really bad people out there in this world.
I hope that deleting my Twitter account does not affect my grade :-(
Social Networking For Business is one class that has opened my eyes to a whole new world of things and in a way, I wish I was continuing on with my schooling so I could take other courses offered by Professor Ferree.
Unfortunately, I had to delete my Twitter account because some unknown, random person was posting some really bad things about me and I have no idea why. I guess it just goes to show that are some really bad people out there in this world.
I hope that deleting my Twitter account does not affect my grade :-(
Chapter 7: E-Business.. The new BEST thing!!
In this day and age, with life being as busy as it is, how
many of us actually enjoy getting out to go shopping for something we may need
for our home or even for a birthday present?
I, for one, LOVE to shop, but do not always have the time or the means
to hit up the mall to find something.
Therefore, I turn to the computer to make my purchase and then live my
life until the package is delivered to my doorstep J
Having the ability to pay bills, do banking and shop online
are 3 key factors to E-Businesses. When
paying a bill, you can log on to your account using the company’s website and
pay the bill using checking account # or a debit card #. Time and money are saved by the consumer as
you no longer need to write out a check, purchase a stamp and take it out to
the mailbox. Banking online is another
great necessity as you are able to transfer money from one account to another,
pay bills directly from your bank account, pay loans, pay a mortgage, and apply
for a loan and the list goes on.
Shopping online has become one of the most popular pastimes of
today. Christmas time is the “hottest”
time of the year to shop online. Why get
up at 3:00 A.M. to go to a store to find a gift for mom when you can lounge in
your pajamas, drink some coffee and search the internet for the product you
need, at the best price?
What I am trying to get at here is that E-Businesses
capitalize on the interactive nature of web sites and the customization aspect
of web sites. If they make it easy for
the customer, the customer may spend more money. E-Businesses have 5 different business
models. In no particular order, those
business models are:Business to Consumer (B2C) – Walmart, Old Navy, Aeropostale
Consumer to Business (C2B) – e-Bay
Consumer to Consumer (C2C) - Craigslist
Business to Business (B2B) – Staples, Office Depot
Business to Government (B2G) – Onvia
Does anyone out there believe it is possible that someday, in the near
future, E-Business will completely take over and retail stores will diminish?
Chapter 6: IT and SECURITY… How Fast Can It All Go Away??
If you ask a victim of identity theft “How did this happen?”,
most will answer with “The internet”.
Many people are very skeptical about giving out their personal
information over the internet and honestly, who can blame them? I, myself, have never been a victim of
identity theft (knocking on wood as I type this) but I do know a quite a few
people who have. The reasons this
happened to them was because:
1)
They were not accessing websites with a secure
connection
2)
They did not have the proper amount of security
on their home/work computer
It is important to learn a little bit about the internet
technology which safeguards a computer against viruses and threats. A Local Area Network (LAN) is a computer
network that supports users in a small geographical area. This might be a home, school, business,
library or several buildings on a college campus. A Metropolitan Area Network (MAN) is one that
connects a much larger region, such as a borough in New York City. A Wide Area Network (WAN) covers a very wide
geographical area. A WAN could be a
variety of smaller LAN’s that are connected.
Most businesses have a WAN network as they must have the ability to
connect to other computers in the company, whether local or abroad. Last but not least, the wireless networks
which connect you with the rest of the world are called Wireless Personal Area
Networks or (WPAN’s) and Wireless Local Area Network (WLAN’s). These networks allow you to connect to the
internet using radio frequency transmissions in lieu of being connected to an
Ethernet cable.
Having all different types of networking options allows a
user to branch out and do things never before thought possible. You can be sitting in a meeting at work, here
in Buffalo and connect to a group of people who are having a meeting in
China. This is called a web meeting or
virtual conferencing. I have attended
many meetings of this nature and it is very interesting to see technology at
its best.
However, not all internet connections are secure, nor can
they be trusted. Unfortunately, there
are people out there who have figured out how to “hack” someone’s IP address
and get all of their personal information off of their computer. This is 9 times out of 10 used for identity
theft purposes. These “hackers” also
know how to exploit security vulnerabilities in networks and use them to send
out destructive programs knows as “viruses”, “worms” and “Trojan horses”. One way to prevent this from happening is to
install a firewall into your computer.
You can also purchase anti-virus software to stop malicious threats from
accessing your data.
Video was uploaded from YouTube April 21, 2012
Chapter 5: Can we possibly get MORE out of the Internet??
The internet is stocked FULL of information from various
sources. In my honest opinion, I would
have to say there isn’t anything out there that a person could not look up on
the internet. The internet is broken
down into what is known as “portals”. In
our Chapter 2 reading, we learned that a portal is “a special type of Web site
that offers a doorway to a cast range of content and services.”
Consumer portals offer content such as news, search tools,
weather, sports, shopping, reference tools and links to an e-mail account. Because this type of portal appeals to a very
large audience of people, this is the most common portal used. Personal portals are customized by the
user. You can create a portal that will
meet your specific needs and give you the information you pursue on a daily
basis, right at your fingertips. My
Yahoo! and My MSN are just two examples of internet portals that allow you to
customize them to fit your needs.
Vertical portals (also known as “vortals”) and Industry portals provide
the user with more specific interests with ways to access data.
Have you ever heard of a “sticky web site”? I never heard of one until I read Chapter
5. A “sticky web site” is one which is
visited often and browsed for long periods of time by the user. These web sites are often interactive with
the user, allowing them to contact staff, leave comments on stories, and may
even offer the user the opportunity to sign up for an e-mailing list.
I would have to say that my favorite thing to do on the
internet is to go to YouTube and watch music videos, movie trailers and funny
commercials. Streaming media is one of
the many ways that users can enjoy the internet. Many portals have audio/video content that
allows the user to watch a clip from a newscast, listen to a song, listen to a
commercial or watch a movie trailer.
Many would argue that one of the greatest things about the
internet is the ease at which you can pay bills, access your financial data and
balance your bank account. I say that
many would argue this because there are many people who are very skeptical
about giving out any of their financial information via the internet. Though it may be easy, cost efficient and
time efficient to go online to pay bills and balance a check book, most people
do not trust the security.
Wednesday, April 11, 2012
Chapter 4: Classy or Sassy? You decide!!
Chapter 4: MAIL TIME... MAIL TIME
E-mail and the US Postal Service by morkarin75 on GoAnimate
Make a video easily. Powered by GoAnimate Video Maker.
Communicating online is recognized by some as the "quick and easy way" to get a message across, while snail mail (known as mail sent via the U.S. Postal Service), is barely in existence anymore. Have you ever wondered how a message can get from one computer to another? Have you ever wondered how an e-mail can go from one country to another in a matter of minutes? An e-mail message has a unique delivery address that is made up of two components, a user ID and a host name. The user ID is the identifier of the recipient and the host name is the name of the server where the recipients e-mail address is located. In order to send an e-mail, you must have an e-mail client such as Yahoo, AOL, Microsoft Outlook or Google Mail. An e-mail client is the program that is used to create, send and receive e-mail. Once a message is created and the "send" button is pressed, the message is then sent to a server that will determine the best route to the recipient. Once the route is determined, the message is sent through many servers until it reaches the ISP (Internet Service Provider) of the recipient and the message is then delivered. With all of this being done electronically, who would want to use snail mail anymore?
Jing image was captured from the Huffington Post web site (April 21, 2012)
This is a VERY interesting article if anyone in class would be interested :-)
http://www.huffingtonpost.com/2012/04/17/postal-service-cuts-senate_n_1431714.html
Make a video easily. Powered by GoAnimate Video Maker.
Communicating online is recognized by some as the "quick and easy way" to get a message across, while snail mail (known as mail sent via the U.S. Postal Service), is barely in existence anymore. Have you ever wondered how a message can get from one computer to another? Have you ever wondered how an e-mail can go from one country to another in a matter of minutes? An e-mail message has a unique delivery address that is made up of two components, a user ID and a host name. The user ID is the identifier of the recipient and the host name is the name of the server where the recipients e-mail address is located. In order to send an e-mail, you must have an e-mail client such as Yahoo, AOL, Microsoft Outlook or Google Mail. An e-mail client is the program that is used to create, send and receive e-mail. Once a message is created and the "send" button is pressed, the message is then sent to a server that will determine the best route to the recipient. Once the route is determined, the message is sent through many servers until it reaches the ISP (Internet Service Provider) of the recipient and the message is then delivered. With all of this being done electronically, who would want to use snail mail anymore?
Jing image was captured from the Huffington Post web site (April 21, 2012)
This is a VERY interesting article if anyone in class would be interested :-)
http://www.huffingtonpost.com/2012/04/17/postal-service-cuts-senate_n_1431714.html
Subscribe to:
Posts (Atom)