Latoya Stoudmire
Forum Replies Created
-
AuthorPosts
-
Latoya Stoudmire
ParticipantVirtualization allows for devices to run multiple operating systems on the same host. This allows more scalability and efficiency. Virtualization also reduces the amount of hardware needed. When using virtualization, you can create servers, networks, and storage. There are several types of virtualization technologies. Some of the main types of virtual technology are application virtualization, network virtualization, server virtualization, each playing a specific role.
Application personalization is a technique that isolates software applications from the underlying operating system and hardware. Using this technique applications can perform in isolated spaces that prevents application interference. Some of the pros of application virtualization is Isolation and compatibility, simplified deployment, and enhanced security. This virtualization also consists of cons. Some of the cons of application virtualization is complexity, licensing and costs and performance overhead.
Another virtualization technology is server virtualization. Server virtualization is the most well-known form of virtualization. It involves partitioning a physical server into multiple virtual machines (VMs), each running its operating system and applications. (Computing, 2023b). Server virtualization is a virtual machine that acts as a physical server but does so using software. (Spectrumwise, 2022) The pros of server virtualization are efficient use of hardware, Scalability and Fast backup and disaster recovery. The cons are costly hardware, Slower performance, and Compliance problems.
Spectrumwise. (2022, December 29). Pros and cons of server virtualization | Spectrumwise. Spectrumwise. https://www.spectrumwise.com/2022/05/virtual-servers-pros-and-cons/
Computing, S. (2023c, November 20). What is Virtualization Technology? Scale Computing. https://www.scalecomputing.com/resources/what-is-virtualization-technology#:~:text=Virtualization%20is%20the%20process%20of,independently%20of%20the%20physical%20resource.
Latoya Stoudmire
ParticipantWindows has a wide array of troubleshooting methods. Due to windows being such a large system various parts of the system require different trouble shooting techniques. These troubleshooting issues can range from device connections in the matter of Bluetooth or printer connectivity. Windows can sometimes have issues installing updates, which requires a separate set of rules to troubleshoot the issue. When navigating windows and troubleshooting it is imperative to understand the underlying issue prior to attempting to solve it.
Some trouble shooting methods like task manager are popular and used when there is an issue with a specific application. The task manager gives a list of all running applications you to close any app running on the windows system. This function is typically used when an application is not responding. Task manager allows you to terminate an app with extreme prejudice if that app starts misbehaving. (Bott, 2023)
Another trouble shooting method is powercfg. This trouble shooting tool is used to assess the battery life of your device. The feature can also track which application is utilizing more power than it should from the battery. Powercfg will issue a detailed report on the selected device. Each battery report includes tables and charts showing recent usage, usage history, battery capacity over time, and battery life estimates. (Bott, 2023)
Bott, E. (2023b, August 7). 3 essential Windows tools for troubleshooting (and how to use them). ZDNET. https://www.zdnet.com/article/3-essential-windows-tools-for-troubleshooting-and-how-to-use-them
Latoya Stoudmire
ParticipantThere are several diverse types of encryptions used to protect our information yet, each type of encryption should be used for specific scenarios. Some of the most common types of encryptions are asymmetric encryption, symmetric encryption, Data encryption standard and advanced encryption standard. These encryptions alongside algorithm’s facilitate the protection of our data.
When trying to encrypt large bulks of data or protecting payment information in the form of credit cards, companies typically use symmetrical encryptions. symmetric encryption allows the system to move faster than asymmetric when trying to process information at higher speeds. This type of encryption also allows safety of the data using a one key encryption. Symmetric encryption requires the same key used to encrypt the message also be used to decrypt the message. The message is sent using permutations. Using the same key for encrypting and decrypting can cause potential security risk as explained in article from Key Factor “people (or technology) who want to correspond via symmetric encryption must share the key to do so, and if the channel used to share the key gets compromised, so does the entire system for sharing secure messages since anyone with the key can encrypt or decrypt those communications.” When to use symmetric encryption vs. asymmetric encryption (2023)
When security is a top priority and time constraints are not as huge of an issue asymmetric encryption is used. Asymmetric encryption provides more security than symmetric. With asymmetric encryption two distinct types of permutations are used whereas with symmetrical encryption only one type of permutation is used. Asymmetric encryption is used for things like digital signatures, block chains, and public key infrastructures.
An advanced encryption standard is a form of symmetric encryption, yet it uses highly sophisticated encryption unlike a basic symmetric encryption. Advanced encryption standards are used with sensitive government data.
Latoya Stoudmire
ParticipantHi Addison,
I think that cloud computing is is very interesting as well. There are multiple avenues to inquire about when looking at cloud information. Once I began doing research on the cloud network I went down the rabbit hole and discovered cloud computing and security. Each level of cloud computing open the door to advanced technology like artificial intelligence.It appears that artificial technology will be a huge part of our future in tech, I believe its valuable to learn as much as we can about the subject.
Latoya Stoudmire
ParticipantThere are many types of network classifications, each plays a distinctive role in how information is sent and received. The networks also account for the number of devices connected and their locations. Some of the most common networks are PAN personal area networks, WAN wide area networks, and MAN metropolitan area networks.
While researching I noticed some networks that I was not familiar with. one of the networks being GAN global area network. Gan is considered the largest of all the network configurations. GAN allows users to connect to the internet regardless of wherever they are in the world. GAN consists of interconnecting networks like LAN and WAN which allows communication to flow efficiently. GAN is also used for networks like cloud and satellite which requires a global infrastructure. This allows offices that may be in different countries to share information without interruption.
Another network is cloud. A cloud network is a virtual network infrastructure composed of interconnected servers, VMs, storage, applications, and other resources. (Darah, 2024) Cloud networks use 4 main types of computing. The first is Hybrid cloud, this is a mix between public and private cloud. Then there is Virtual Private Cloud. The VPC allows restricted access to files and other information, the last of the cloud networks is multicloud. This network allows companies to use multiple cloud serves
Latoya Stoudmire
ParticipantHello Addison,
After reading your discussion I’m confused as to whether an operating system and an operating application are the same. I thought operating systems were like linux and mac and application were like word and media player. Your paper is very detailed and provides really good information.
Latoya Stoudmire
ParticipantHello Trae,
I noticed in your discussion you referred to TCP as the transport connection protocol, is that a second acronym outside of transmission control protocol? I think you find a creative way to explain TCP/IP I’ve never heard TCP/IP described in that way. I was under the impression that the data was transferred from one packet in sequential order to the next till it reaches its final destination.
Latoya Stoudmire
ParticipantTCP/IP is an acronym that stands for transmission control protocol/internet protocol. TCP/IP is a set of protocols that make up the bases of how data is transferred on the internet. TCP/IP can be mostly credited to Vinton Cerf and Bob Kahn for its development. TCP/IP was initially financed by the department of defense to connect research networks. (Yasar & Lutkevich, 2024).
More specifically the TCP sends information from one device to another in the form of packets. The packets are broken down into smaller packets in sequential order and sent to the recipient. This in turn allows the recipient to reassemble the packets in sequential order while checking for errors or corrupted files. TCP is used for web browsing, email, and FTP.
After the TCP sends out the data, the IP is responsible for addressing and routing the data to the correct device. IP comes in two main versions IPV4 (32-bit) and IPV6 (128 bit). TCP/IP operates using a four-layer system. The first layer is the link layer. The link layer provides data links between two devices. Next is the internet layer, this layer provides the routing for the data packets. The third layer is the transport layer. The transport layer ensures the packets are delivered efficiently from there the transport layer transmits data from one host to another this includes TCP and UPD. The final layer of the TCP/IP model is the application layer. This layer is what the user uses most. The application layer connects the applications to a network. The application model uses protocols HTTP, FTP, and SSH.
Latoya Stoudmire
ParticipantI was in a very toxic relationship where I was not only the victim but I found myself becoming a a abuser myself. During this time I thought I could never forgive my ex for some of the things that occured while we were together, yet each day I will pray for God to help me over come this type of resentment. I don’t want to be the person that harbors hate or the unwillingness to change so, I will pray and ask for other to pray for me to assist me with this challenge.
Latoya Stoudmire
ParticipantThere are many different types of operating applications. one that is very popular is word processors. This type of application allows you to create and save word documents. This application is used in most schools and work environments. Another application that is very popular in work and school is the E-Mail application. Email applications are used to communicate all over the world. email applications allow our servers to quickly communicate with others devices. Media player is another type of application. This software allows you to play audio files as well as view media such as pictures. Lastly a web browser such as safari and chrome are also types of operation applications. Unlike operating systems operating application with within the computer to complete a specific task while operating systems work with connecting the hardware and software
-
AuthorPosts