Tuesday, December 17, 2013

Personal Learning Network

I have created a PowerPoint presentation using Google Docs to present my Personal Learning Network and have also created a sound cloud to go along with the presentation.



https://docs.google.com/presentation/d/1brH3bclQ09cUImPEga469l61jKYFhrxmQNKfPoyclsQ/present#slide=id.p

https://soundcloud.com/farr4342/personal-learning-network-1

Sunday, December 1, 2013

Communicating Online

With today's technology and fast paced society, more and more people are communicating with one another via online.  E-mail is one of the most popular online communication tools.  Benefits of using e-mail to communicate include the fast delivery of messages, low cost, easy access, convenience, and ease of management.  An e-mail address consists of a user ID, host name, and top level domain. 
There are four main steps involved in sending and receiving an e-mail message.  First, the sender creates and sends a message using an e-mail client.  An e-mail client is any program used to create, send, and receive e-mail messages.  Some examples of e-mail clients include Microsoft Outlook, Gmail, and Yahoo.  Next, a Simple Mail Transfer Protocol (SMPT) server determines the best route to the message's destination.  The third step routes the message through multiple Internet routers.  Internet service provider's incoming mail server contains recipient's mailbox.  The forth and final step is when the recipient receives the message using an e-mail client.  The make-up of an e-mail address includes a to line, a courtesy copy line, a subject line, an attach line, message body, and a signature file.  The first four components of an e-mail make-up are all parts of the message header.

Monday, November 11, 2013

Mobile Devices

I recently came across an advertisement supplement of Buffalo Business First newspaper called the Business of Technology that gave a look at Western New York's tech sector and ways businesses are using mobile devices within their company.  One of the advertisements within the insert promoted ShoreTel Mobility Solution.  This system integrates existing enterprise communication applications and infrastructure with leading smartphones and tablets securely, simply, and cost effectively.  This system makes it easy for the workforce to communicate on any device, whether it be a cell phone or tablet, from any location within any network device.  With mobility, work is no longer a location.  Instead it is an activity.  Tablets are transforming the nature of work as companies are turning to mobile applications to enable worker to be productive anywhere. 

Also within the Business of Technology, was an article about the growing security concerns with more people accessing corporate information from personal devices.  A rise in popularity among clients makes it difficult to troubleshoot where a problem is coming from.  It can be challenging to manage and secure a device where the user has total independent freedom to access data wherever and however.  Companies should create a guest network for visitors to use without accessing shared files and folders.  Also companies should create firewalls and secure passwords that can be changed regularly.




Bertola, David.  “Array of Devices Elevate Data Security Concerns.”  Business First: The Business of  Technology 20 Sept. 2013: 11. Print. 11 Nov. 2013.

Personal Learning Network

I've decide to focus my personal learning networking on Accounting. After finishing school, I hope to work within the accounting field as a Certified Fraud Examiner.  I have been networking on Facebook and Twitter but I most recently have joined the Young CPA network through Facebook and LinkedIn.  The goal of the Young CPA network is to create a community in which young CPAs can seek answers and advice regarding career challenges and opportunities while also building a professional relationships.  The AICPA website has been very helpful and informing with guiding me towards my designated career choice.

Tuesday, November 5, 2013

Chapter 3 Searching the Web - Search Tools

Specialized Web based search tools are used to locate Web pages, businesses, people, multimedia files, documents, databases, and more.  The three main search tools are directories, search engines, and metasearch engines.  Directories are a human-compiled hierarchical list of Web pages organized by category.  You can drill down the directory categories by clicking a number of links to move from a general category through additional subcategories, to the main Web page line, and finally to the main Web site.  

Search engines help to enable users to research the directory's index by keywords instead of drilling down through categories and subcategories.  They include general-purpose search tools, such as Google, and use software called a Web crawler that browses the Web automatically adding the URL's and other information about Web pages to a searchable index.  The Web page information retrieved by a Web crawler is stored in a database on one or more servers.  This creates an index.  The search engine compares the keywords with its index and complies a list of Web pages for which the keywords are relevant and arranges the list in a specific order.

The third main search tool, metasearch engine, is a special type of search tool that compiles the search results from multiple search engines into a single search results list.  This allows one to perform multiple search engines at once.  Examples of metasearch engines are MetaCrawler, Dogpile, KartOO, and Ixquick.  A good metasearch engine should eliminate duplicate entries, categorize the hits based on topic, order the hits by relevance, and indicate which search engines provided the search results.

Chapter 3 Searching the Web - The Search Process


One of the most useful features of the Web is being able to search for information.  To begin the search process, you must choose a search tool such as Yahoo, Bing, or Google.  I myself use Google as my personal preference for a search tool.  The next step is to formulate a search query or question with a keyword that defines the information you are interested in.  The more words entered will allow a more specific search.  Perform the search by pressing the ENTER key on the keyboard or by clicking a button depending on the search tool being used.  Next examine the search results that your question or keyword has formulated.  Usually the more relevant hits will be at the top of the search results.  Evaluating the credibility of search results is a key step in the search process.  There is no guarantee that all the search results will contain useful or accurate information.  To assess the credibility of a Web page, you should look at the authority of the source, the objectivity of the text, the scope and quality of the content, and Web site's design and functionality. View this GoAnimate video to review the search process http://goanimate.com/videos/0BYXSQt2i4RM

Monday, October 21, 2013

Symbaloo!

Here are a few of the websites that I use most and have posted to my Symbaloo.

Twitter!

Here is the link to my new Twitter account.  I plan to use this account to stay up to date with news and updates on what is going on around the world and locally.  I am familiar with twitter and use it daily.  I believe it is a great social networking tool. https://twitter.com/emily_farr13

Wednesday, October 9, 2013

Chapter 2 - Browsing the Web



The World Wide Web consists of a vast collection of documents that feature text, pictures, sound, animation, and video.  These documents are called web pages.  A collection of web pages makes up a web site.  The primary web page of a web site is called a home page.  Usually web sites include multiple web pages.

A web browser must send a request for a copy of the web page to the web server before it can be displayed.  To do this, a web browser uses the domain name and URL to find the IP address.  This address is where the web page is stored.  An IP address or Internet Protocol address is a number that uniquely identifies each computer or device connected to the Internet.  It is similar to how a postal service relies on a mailing address to make sure that mail is delivered to the correct recipient.

IP addresses are difficult for people to remember therefore web servers typically are referenced by a domain name.  A domain name is a text alias for one or more IP addresses.  Domain names are grouped by top-level domain (TLD).  TLD is an abbreviation that identifies the type of organization associated with the domain.  For example, .edu is the TLD abbreviation for Educational Institutes and .gov is the TLD abbreviation for Government entities.  Each web page also has its own unique address called a Uniform Resource Locator (URL).  The URL is made up of 4 parts.  First the protocol, then the domain name, next the path, and lastly the file name.

Saturday, October 5, 2013

Net Neutrality

Personally, I am not familiar with net neutrality and all that it entails. Through Internet research I have found that net neutrality means that Internet service providers should not be allowed to block or charge extra for content and applications that run on the Internet. Net neutrality is the principle that protects our free and open Internet. I feel that net neutrality is important and should be initiated into enforceable law to keep Internet service providers from potentially charging user’s fees to access web sites. Larger companies want to charge more money for faster connections and smoother access to web sites. These companies believe that they can charge web site operators and application providers for the right to use the network. Those who are not willing to pay, without net neutrality, would experience discrimination as the network would not load their content as quickly as the other sites who are willing to pay and applications wouldn’t work as well. 

Net neutrality would not allow Internet service providers to decide what parts of the Internet that people can access and what parts are blocked. Without the idea of net neutrality, competition would be eliminated. Small entrepreneurs would be knocked out of the competition as larger corporations would be able to pay for a top spot on the web unlike the businesses just starting out. Net neutrality allows an even level of competition for all websites and Internet technologies. Through the pro’s and con’s of net neutrality, it can be seen how net neutrality favors the people over corporations. 

Thursday, September 19, 2013

Chapter One: Intro to the Internet

With technology quickly evolving, it is uncommon for one to go about their everyday life without using the Internet in one way or another.  The Internet allows one another to share information and communicate.  Internet provides opportunities such as online shopping, ways for students to get an education, and accessing business and personal information.  The Internet is used by all people in different stages of life.  I can say that I am a daily user of the Internet either doing schoolwork, shopping, or networking through e-mail and Facebook.  It is interesting to see the history of the Internet and how much it has changed.  Advanced Research Projects Agency, also known as ARPA, was created to initiate a push for scientific advances.  In 1966, ARPA was convinced to use packet switching.  This meant that data was separated from a sending computer and sent independently into smaller units called packets over cables and then reassembled them back on the receiving computer.  This network became known as ARPANET.  It was not until 1992 that the U.S opened the Internet to commercial users.  There are different methods to connect to the Internet such as dial-up by using a telephone line to connect to an Internet service provider.  Dial-up is much slower and has been overshadowed by faster methods including digital subscriber line (DSL), cable, fixed wireless, and mobile wireless.  All methods have there advantages and disadvantages and vary in costs.  I enjoy being able to connect to the Internet on the go through my smartphone.  It makes staying up to date with school assignments and in communication with others much easier.     

Friday, September 13, 2013

Hello!

Hi Everyone! 

My name is Emily and this is my third semester at Empire State.  I am pursuing a Bachelors degree in Business Management with a concentration in Accounting. I am 22 years old and currently working at small, local accounting firm as an office assistant.  It has been a great learning opportunity and wonderful experience for me to get comfortable with the career as an accountant.  Besides being enrolled in school and working, I enjoy spending time with my family and friends and almost any outdoor activity like camping, hiking, fishing and hunting.

Hope you enjoy my blog!