1.1movietheaterkelseyfrazier
Wednesday, November 16, 2011
7.1 IS security
Commonwealth 10 can be threatened by 5 very common threats to our information systems. 1. Our company needs to be very aware of natural disasters such as poweroutages, these are very common so we make sure we have back up files for all possible outages.2. Virus, this very likely with the web pages and events we have online, commonwealth 10 makes sure that monthly we have a scan for any potential viruses. 3. Hackers, there are not to many we have ran across in the past but we want to make sure our private documents and data stay private so usernames and passwords are mandatory. 4 Employees, we must make sure that we the employees take good caution on our private keys, which we use with our encryption messages from one employer to the next. and lastly the denial of service attacks this is where the Attackers prevent legitimate users from accessing services. so its very important for us employees to be cautious for such problems for the better of the company.
Monday, November 14, 2011
6.1 Web 2.0 Pillars
Commonwealth 10 Takes advantage of these Web 2.0 pillars. Common wealth 10 harnesses collective intelligence by hyperlinking it is the foundation of the web. One can add users, add new content, and new sites that will help make our Common wealth 10 site a success. We also use the pilliar leveraging the data, which means our website has knowledge of our customers and the type of movies he/her enjoy. When one logs into the website there personal page will show upcoming events of the movies they normally enjoy watching. ex. If one likes comedy, all the upcoming comedy movies will present show times and dates . Each viewers websites show their personal widgets and mashups for there page we use this to implement innovative web capabilities. Finally Commonwealth10 utilizies the web as a platform using peer to peer technologies, being able to share ideas and comments through our online blogging and questionares. Commonwealth 10 hopes these pilliars will help provide a rich internet experience.
Sunday, October 23, 2011
5.2 B2B electronic commerce
Commonwealth 10 uses this extranet digram to explain how our business works with Jargo another business. We have 2 firewalls to make sure of security and each business has its own server where we send the infromation to and from each business computer otherwise known as the client. the internet plays a big part in our business, we can send orders and updates through the VPN and have it instantly at the other business.
Thursday, October 20, 2011
5.1 Critique your competitors E-Commerce website
RICHMOND MOVIES.
Rule 1 : The Website Should Offer Something Unique : Rate :3 because this website states it has been the number one movie theater in Richmond since 1998.
Rule 2 : The Website Should be aesthetically pleasing: Rate :2 because this website has very small print for the text and there is too much going on, the page is very clustered and not appealing to the eye.
Rule 3 : The Website Must be easy to use and fast : Rate: 3.5 This website is easy to use but not as fast as I was hopeing for, you can find the movies you are intrested in as well as the times but the web page has to many links and takes a long time to load.
Rule 4: The Website must motivate people to visit Rate: 2 The webpage is not appealing, the page doesnt present the movie theater as motiviating as it could possibly be, although the headling " #1 movie theater in richmond since 1998 is somewhat motivating.
Rule 5: You must advertise your presence on the web Rate: :2 This webpage is very blan, white background and black text as well as small text, nothing to appealing about the web page.
Rule 6: You should learn from your website Rate : 2 This webpage does not have alot of satistics on Alexa, and the few that are on the page does not have good stats. Many people do not navigate through the webpage. Needs more appealing sites and information.
Tuesday, October 4, 2011
4.2 Packet Switching Technology
Packet Switching is a digital networking communications system that assemblies all transmitted data, regardless of content, type, or construction into properly sized blocks, called packets. Packet switching structures sending variable sequences of packets over a shared network. When crossing network adapters, switches, routers and other network nodes, packets are safeguarded and lined up, resulting in flexible delay and put through depending on the traffic load in the network. In this picture the data for packet A to C is being directed straight to the packet for its size and length of data, this is a shared network system.
4.1 IFS INFRASTRUCTURE
To explain this picture, You first need to understand that any information you type in a computer on a keyboard or scan into the computer is called Input Techonologies. The next step to this process is called the Processing Techonlogies. This is where it transforms all your information you just enter into outputs this is done in your CPU (the brain of the computer).This occursso that it can be prepared for the changeing of letters and characters to binary code ,which in another words its translating information to machine launguage. In most cases its for letters and characters which we call bits. The final step is what one would call the Output techonlogies, this is where it delievers the information back to you in a usable format such as a printer or computer monitor.
Tuesday, September 20, 2011
3.1
The purpose of our chain is to help explain how our theater operates. We have a very competitive advantage over many theaters and being that we sell tickets online , its a guarnted seat in the desired movie. Our business process is to make customers happy and make sure they have everything they desire in a movie. Our atomating is our great ticket boxes so that our customers can move smoothly through the lines.
Subscribe to:
Comments (Atom)




