Week 3

Standard

Q1.  Which of these two laptops gives the best performance?

Depend on different kinds of  user, there have so many ways to evaluate which of these two laptops gives the best performance.

So if  you are the gamer or IT person that you definitely need a high-end performance . If you just need a laptop for office that you just need a net book.

Q2.  Are virtual worlds like Second Life useful for teaching?

Q3.  Why don’t many school students (16-18yrs old) choose to study IT at Polytechnic or University?

We can get the answers form those students’ feedback…..

so I need to go to school do some survey

Q4.  Which ISP in NZ gives the best value for money?

I will to go down the store and ask around or search  info form internet

Q5.  How do I feel about trying to work with slow internet speeds?

Q6. What are the main security issues associated with ‘cloud computing’

We can find the answer form www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

1. Privileged user access. Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the “physical, logical and personnel controls” IT shops exert over in-house programs. Get as much information as you can about the people who manage your data. “Ask providers to supply specific information on the hiring and oversight of privileged administrators, and the controls over their access,” Gartner says.

2. Regulatory compliance. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Traditional service providers are subjected to external audits and security certifications. Cloud computing providers who refuse to undergo this scrutiny are “signaling that customers can only use them for the most trivial functions,” according to Gartner.

3. Data location. When you use the cloud, you probably won’t know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. Ask providers if they will commit to storing and processing data in specific jurisdictions, and whether they will make a contractual commitment to obey local privacy requirements on behalf of their customers, Gartner advises.
4. Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn’t a cure-all. “Find out what is done to segregate data at rest,” Gartner advises. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists. “Encryption accidents can make data totally unusable, and even normal encryption can complicate availability,” Gartner says.

The rational use of Internet will make your work more easier.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s