Thursday, December 8, 2016

Jobshadowing

On Tuesday, I went to International Business Machines in hopes of learning about management and interactions inside of teams in corporate America. I wanted to learn how large businesses operate and manage people all around the world and how coworkers in different continents managed to get work completed. I shadowed Rob Suerwalt, as a Manager of Cloud Initiatives. The day looked something like this:
Ø  Arrive and get settled/quick email check and check to-do list
      Read the first paragraph of a document emailed to Mr. Sauerwalt. It stated how IBM wanted to move toward more simplistic approaches and interactions. 15-page document on simplicity…
Ø  First call
o   With Steve Robinson and Wendy Toh
§  Talk about moving people should budget and divisions get altered
Ø  Second Call
o   Wendy Won, Randy Johnson and Rauhl
§  Talk about code development for Kaiser project. 
·       Talked in circles! Status: Not finished. When was it supposed to be finished? A week ago. This is where I learned my frustration for people who make excuses for incomplete work. Do your work, if you don't get it done, own up to the fact you were not able to complete it.
         “I have no interest being the best-looking deckchair on the Titanic.” ~Andrew Koopetz
      “IBM does a lot more discussing and planning than doing.” -Rob Sauerwalt
Ø  Education Call
o   Technology enablement (1,000+) people
·       Projected slides so I could follow along. Discussed programs and options available with IBM. BMaas (provide hardware), Iaas (provide virtual machine), Paas (provide entire environment). To help me understand these concepts better, Rob showed me the pizza making comparison chart.
Ø  Lunch
§  Pasta Salad for me and Broccoli Cheddar soup and grilled chicken burger with cheese and fries for him.
     Talked about simplicity and saying what you mean as well as people skills
Ø  Moved to Building 500
·       Jumped in a car to move from building 002 to the 500 complex (the red complex)
      Discussed the efficiency epiphany on our walk
Ø  Meeting
o   Jane and Wendy Toh
§  Organizational structure
Six Hours of Job Shadowing Ended Here
Ø  Phone call
o   Out of room
S   Stayed with Mrs. Jane. Drew a mushroom on the board while she answered emails. It is almost impossible to shade sketches with dry-erase markers.
Ø  Phone call
o   Sara Reger
§  Current Assignment (Sales program)
§  Switching to a closer-to-the-clients occupation within IBM 
·       Rob to speak to Jane about moving her
Ø  Phone call
o   John Easton
§  Wanted to know strategic direction end of quarter four moving into the new year
Ø  Final Meeting
o   Jane and Wendy Toh, Steve Robinson joined later.
§  Organizational structure (again)
     Asked about Graphic design interest. Jokingly (it sounded) asked to help design a logo if needed.




L13 - Operating Systems

Statement: An operating system is a type of software

  • True

Statement: Operating systems control the loading of software applications onto a computer

  • True

Statement: All OS's offer user preferences allowing you to customize your computer

  • True
Statement: An operating system prioritizes the tasks that a CPU does
  • True
Statement: The following devices have an operating system: An apple IPod, a Dell laptop computer, and a Nintendo Wii.
  • True

Thursday, December 1, 2016

Lesson 11 - The Internet

How the Internet Works: 
What is the internet?
            The internet is a Wide Area Network made by a connection of millions of smaller networks. It was first created when researchers for the Advanced Research Project Agency (ARPA) needed to connect their computers in California and Boston. On October 29, 1969, the ARPANET was created and it linked four small computers to two large mainframe computers. In 1983 Transmission Control Protocol and Internet Protocol (TCP/IP) were developed and are the standard internet protocol today. They define how data packets look on the internet and how they are sent and received. Another protocol used is HyperText Transfer Protocol (HTTP) which controls more specific messages and data formats the network uses. The internet hit a global use in the mid 1980’s. The internet connects smaller networks that all use the same protocols, which allows them to communicate freely. A huge part of the Internet is the World Wide Web (WWW) which is a huge set of documents linked together by URLs and hyperlinks.

What is a protocol?
           A network protocol is a rule that controls how computers on the network communicate with each other. Protocols control the connection, communication and data transfer between two computers. APRANET created the first set of network protocols in 1969.In 1973 File Transfer Protocol (FTP) was developed and allowed computers to share files. In 1983 the standard internet protocol TCP/IP was created and allowed computers to exchange messages at the information packet and Internet levels.

What is DNS?
            A Domain Name Server (DNS) is a way of sorting IP addresses that allows you to find and communicate with the right IP address. A DNS looks up a host name and returns an IP address, or it can return a host name when you search an IP address. A DNS server only has information for a limited number of IP addresses and host names, if it doesn’t have information on the domain you search, it queries other DNS servers in the network. The request for a search is called a DNS lookup. The DNS lookup goes on until the DNS name is found on a DNS server and then “resolves” the name the IP address your computer needs to application with the right computer.

Explain what an ISP is and what it does?
            An internet service providers (ISP) is a method of stat transfer for the internet. ISPs connect to Local Area Networks (LANs) and Wide Area Networks (WANs) through routers. Routers determine where to send information between two computers. The data moves from its start location to its final destination by “hopping” through routers. If a user wants to trace how their information moved through the internet, they can use a utility called Traceroute. An ISP help individuals access the internet.

What is a PING and Firewall?
            PINGs are used to check network connections and Firewalls can protect a user and computer from internet threats. A ping utility sends test packets to a machine to evaluate if the machine they were intended to reach receives them. A PING can whether the user’s connection to the machine is functional. Firewalls block unauthorized access to while allowing communication to other machines. A Firewall can be either software or hardware based.


Connecting to the Internet:
How Networks Link to the Internet
            A bunch of small network link together to form the internet. The smallest networks are the ones the users set up at home, they are then connected to a larger network run by their ISP. The ISP connects to other networks at internet access points. The internet is just an aggregate of these connections. Data is handled at the highest levels through backbones and routers which are responsible for moving data between networks.

What Is an Internet Service Provider?
            An Internet Service Provider (ISP) helps people and companies connect to the internet. Signing up with and ISP usually included and email address, some storage space on the servers and, occasionally, web hosting services. ISP’s allow the client to choose the service that will best accommodate their needs. Dial-up accounts (connections over telephone lines) were common not that long ago, however, we us Digital Subscriber Lines (DSLs) as the most common connection type now. Connections can be made through telephone wires made of copper, cable TV lines or another form of wiring like fiber-optic cables.

Connecting Your Computer to the Internet

              There is a variety of ways to connect a computer to the internet, but fundamentally, they are all the same, connect your computer to a modem, turn it on and make sure you have an ISP. If you have broadband, when you connect to a modem you don’t always have to connect to your ISP to get to the internet. DSL lines can “always be on” because they send data at a higher frequency as not to tie up the phone line. If you have a T1 connection, no one else can use your line. Like phone lines, T1 lines are connected with copper wires. If you have a dial-up modem, your modem uses a phone line to dial the back of other modems at you ISP every time you connect. You may also choose to connect wirelessly to the internet. Instead of the modem connecting to your computer, it connects to a hub or router. Once your computer connects to the ISP, it is assigned an IP address, the number that will be used to identify your machine on the internet.

Thursday, November 17, 2016

Lesson 8 - Making Presentation

3 goals of presentations

  • Inform
  • Educate
  • Persuade
3 ways audiences learn
  • Seeing
  • Hearing
  • Doing
Visual:
Big fonts, easily read
Pictures

Auditory:
Speaks clearly
Explain/elaborate on the slides

Tactile:
Advise audience to take notes
Asking Questions

PowerPoint is great for:
  • Charts and Graphs
  • Photos and graphics
  • Audio
  • Video
  • Text
Rules for a good presentation:
  • Keep slides simple and easy to read
  • State your point
  • Add images that support your points
  • Relax and use a friendly tone
  • Don't just read the slides, talk to your audience
Make slides easy to read
Light background, dark text
Dark background, light text
Make your fonts bigger according to how far back your audience is seated
7-7 Rule: no more than 7 lines, 7 words per line

Peripherals: devices users add to their systems to make them easier to use
Keyboards
Mice
Game controllers

Organize your presentation:
State your Purpose - Tip: use section breaks
Present information in multiple ways
End with a summary 

Add a picture:
Keep people interested
Reinforce key messages
Help visual learners
Avoid Cluttering
Don't use too many colors
Boarders

Be Relaxed and Friendly:
Avoid:
    • Reading your slides directly
    • Talking too fast
Be sure to:
    • Add information and examples in your own words
    • Allow time for note-taking
    • Answer audience questions
    • Practice your presentation
The Best Presentations Have:
  • Easy-to-read slides that support what is being said
  • A clearly stated purpose
  • Graphics, photos, and other visual objects uses judiciously
  • A speaker who is relaxed and confident


Friday, November 4, 2016

POIT Lesson 6 Peripherals

Notes:

-Peripherals are devices used for computer input or output.
Input:

  • Keyboard - reports each key and gives commands to the operating system
  • Mouse - many different types, main are Laser or Optical.
  • Scanner- takes a picture of a document and saves it as a file that you can manipulate

Both:

  • Drives - Drives can be both input and output devices. A CD reader is an example of an input device  but if your CD reader can also write, it is an output device. Example: 3 1/2 Floppy drive, CD-ROM drive, DVD drive, and Blu-Ray drive.

Output:

  • Printers - Make a hard copy of a document from your computer
  • Monitor - LCD (flat screen), CRT (tubes in the back) *monitors can be inputs when they are touchscreen.
- A Pixel is the smallest colored dot that can be displayed on a screen.
-External devices provide more storage.
  Always back things up if they are important to you. Many things could easily go wrong, so back up important information.
- Tower Cases have expansion bays. It makes your computer more powerful because you have the ability to add stuff like hard drives or optical drives in.

Monday, October 31, 2016

First Nine Weeks of High School

What is your impression of the first 9-weeks of high school?
 The work was a bit easier than I expected. The work isn't easy, but it's interesting so I don't dread doing homework.

What has been difficult about the transition from middle school?
The most difficult change was to go from having the friends I was closest with go to a different high school. Finding people who actually are the same inside as they present them self outside is actually quite difficult.

What has been easy about the transition?
The easiest part of the transition would probably be my classes. The teachers I have are interesting and I like the topics we are learning about.

What have you learned about yourself?
 Music is a huge part of my life, I don't think I could live without it and now that I can't take band I'm learning how much I really want to be in band. 

Tuesday, October 25, 2016

ID Theft Face Off


  • If the stolen information includes ID and other government information, creating a facsimile is not the only thing you need to do.
  • Do not use your mother's maiden name or any part of your social security number are not safe passwords.
  • Immediately contact someone if you notice your credit cards have been stolen.
  • No longer receiving bills from your Creditor after being a victim of identity theft does not mean your identity has been restored.
  • If your social security number is stolen, place and "initial fraud alert by contacting a nationwide consumer reporting company.
  • Filing a Freedom of Information Act Request is not the best way to receive a free copy of your credit score.