HL+Paper+3+Actual+Research

2009 Exams Case Study Research


 * Overview:**
 * N&Q Investments is an investment company which has operated from Adelaide since 1979.****It deals with the financial affairs of numerous clients ranging from individuals and small****businesses to multinational companies. With the rapid advances in information technology,****it found it was able to expand beyond Australia, opening a second office in Los Angeles in 1988.****Currently N&Q Investments has additional offices in London and Toronto, employing a current**
 * total of 60 staff, many of whom travel extensively.**

[|General Information] [|Ways it's done] [|Examples of services] [|An open-source look] [|IBM makes an investment] [|Google Doc bug]
 * Cloud Computing** - General info/articles

I know they're all from the same website, but its good info. Have fun readin, boys. user:roddeh

- Networks: WAN, remote access servers (e.g. VPN), network servers ([]) ([|LAN/WAN Ethernet Overcurrent And Overvoltage Protection]) ([|The impact of server virtualization])
 * I] Relevant IT systems in a social context**

- Databases: Client's records, stored on network servers accessible via WAN [|10 Largest Databases in the World]

- Internet: Wi-Fi Hotspots, wireless internet access, wireless networks ([|Wireless deadzones in universities])

- Encryption: SSL, PGP, etc. ([|The key to strong encryption])

- Hardware: PDA, Laptop, Cellphone, PC ([|The PDA/Cell Phone Convergence Issue]) -> also a solution

- Business and Employment --> The expansion of wireless technologies has greatly increased the efficiency of business all around the world. Also, since investment companies are able to be more productive, the "small businesses" and "multinational companies" will also be able to expand with a higher amount of investment. ([|Symantec issues latest Internet Security Threat Report] )
 * II] Both local and global areas of impact**

- Science and the Environment --> N&Q believes that the use of technology can help reduce travel costs and hence, the impact on the environment [|(Using technology to reduce travel costs])

- Policies and Standards [|(Tufts Uni Using Network Policies])
 * III] Social and ethical impacts on individuals and societies**

- Security [|Database of Large Company Hacked] [|Top 10 IT Security Companies] [|Protecting Wi-Fi]

- Reliability ([|Phishing these days] )

- Lack of face-to-face interaction --> The lack of such interactions can greatly impact a business, since face-to-face meetings are much more effective than communication tools on the Internet. (Solution -> Video conferencing)
 * IV] Current challenges and solutions**

- Compatibility --> Some software may not be compatible with some laptops used in the company (Solution -> Policies and standards) [|The Problems With Vista]

- Different versions of the same file --> This can lead to the final document not including some of the edits that some members may have made. If a document is copied many times and sent via email, it can easily miss out on edits and changes that some members make. Also, with such a large number of copies of the file, it is very easy to have it stolen by outsiders. (Solution -> Google Docs? Central file)

- Security of home networks --> The networks established in tele-commutting, which contain confidential information, are not as safe as those established in the company. Therefore, outsiders can hack and access the files on the home network, thus jeopardizing the firm itself. (Solution -> Security measures, e.g., firewalls) [|(Dangers of a Home Network and How to Protect It])

-Improved security: How to Secure Wireless Connection []
 * V] Future developments**

-Environmental-friendly: Joint Statement by a Group of Companies []

-Better compatibility: Bettwen Mac and PC []

-Easier use when traveling: Dial-up via Cellphone []

Additional Terminology to the Guide: -**Antenna**: A device for transmitting and/or receiving signals. -**Bluetooth**:an open wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area networks -**Cell phone**/**mobile phone**: A portable, wireless telephone, which changes antenna connections seamlessly during travel from one radio reception cell to another without losing the party-to-party call connection -**DHCP**: Dynamic Host Control Protocol (DHCP) is a method for automating the assignment of IP addresses and other networking information. It is used on campus in residence halls and libraries, as well as over the wireless network. -**Hotspot**: an area of an image which acts as a hyperlink to another location. -**Https**: HyperText Transfer Protocol Secure, is a secure version of HTTP, with secure socket layer or ssl encryption for security. -**IP address:** An Internet Protocol (IP) address is a unique numerical identification that is assigned to each computer on a network -**ISP:** An Internet service provider is a company which primarily offers access to the internet -**MAC address:** a Media Access Control address, typically made up of numbers and letters-- assigned to your hardware that uniquely identifies it’s place on the network -**Modem:** electronic equipment consisting of a device used to connect computers by a telephone line -**Radio channels:** Sound channel which is broad-casted through radio waves -**Router:** a device that forwards data packets between computer networks **-Virtual learning environment (VLE):** A software program designed to support teaching and learning in an educational setting.
 * -Spam/spyware protection:** Programs whose purpose is to prevent or remove spyware from infecting a computer, or filter spam out of emails.
 * -SSID**: Service set identifier, or SSID, is a name used to I.D. the particular 802.11 wireless LANs. (IEEE 802.11 is a set of standards carrying out wireless local area network (WLAN) computer communications.)
 * -Switch**: A decide that improves network performance by segmenting the network and reducing competition for bandwidth. Similar to software routers, but faster and less flexible.
 * -USB hub**: A decide that allows many USB devices to be connected to a single USB port on the host computer or another hub.
 * -Web conferencing environment:** Used to conduct live meetings or presentations over the internet. The term refers to the applications or packages involved in the usage or web conferencing.
 * -Virus protection:** An anti-virus software program such as Norton Antivirus that is designed to detect computer viruses and cure them.
 * -WiFi:** A trademark of the Wi-Fi Alliance for certified products based on the IEEE 802.11 standards.
 * -Wi-Max:** Worldwide Interoperability for Microwave Access, Wi-Max, is a telecommunications technology that provides wireless transmission of data. It is based on the IEEE 802.16 standard.
 * -WEP/WPA/WPA2:** Wired Equivalent Privacy/Wi-Fi Protected Area/Wi-Fi Protected Area 2. WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. WPA was created in response to weaknesses in WEP.