Doctors Office
Wednesday, November 17, 2010
Blog Entry 7.1 - IS Security
The five major threats to an Information System are Viruses/Worms, Hackers/Outside Intruders, Employees/Consultants, Links To Outside Businesses, and Natural Disasters/Accidents. Our Ferrum Medical Security System can attract many of the viruses that are out there in today's world. One way to prevent this from happening is by having a antivirus system that will track down and destroy viruses, worms or spyware that the site will attract. Hackers can simply hack into the system and steal customer information such as bank information, confidential medical information or just the system in general. We will have a safeguard that will make it close to impossible to have hackers hack into the system which will be updating the system every 30 minutes with a new password so that it would be harder for the hacker or outside intruder to hack into the system. Employees and Constultants will have the password to the system and can simply accidentally lose valuable information that could cost the company so to make this work we will make sure the employees only have access to the network only while at work which will cut down the risks. Natural disasters and accidents happen everyday, but a way we will have this down is to back up our entire network so that we wont have to worry about not having our information if an accident happens. A way to not have a problem between links to outside businesses is again only have access to the network when the employee is at work so that it would cut down ties.
Blog Entry 6.1 – Web 2.0
The four pillars of Web 2.0 are Utilizing the web as a platform, Harnessing collective intelligence, Leveraging the data, and Implementing innovation web capabilities. By using the 4th pillar which is Implementing innovation web capabilities, our business Ferrum Medical will be using the most up to date technology and will constantly monitor it so that we could compete with the leading Medical centers. By leveraging the data we will use the large databases to store the customer information, orders which will be helpful to doctors and other personnel that need to access the information quickly. By harnessing collective intelligence we will have a section on our site that will allow feedback to be posted so that we can improve our content. Utilizing the web as a platform which uses the network bandwidth of all users of the software to improve download performance we will make sure each customer has the same amount of viewing capability so that they are all on the same level.
Wednesday, October 27, 2010
5.3 - B2E Electronic Commerce
At Ferrum Medical, the Business to Employee function is when an employee or even a patient needs to access their information on our server. This can be accessed from a home office computer, a laptop or even through a mobile device, they can simply log onto our website and retrieve information that normal people couldn't. Then through the VPN or virtual private network accessed after establishing a connection to the internet, they can access anything they are given access to under their profile. The data that each employee accesses is on our server and set up through secure networks that make it available only to the certain employee.
Friday, October 22, 2010
Blog Entry 4.1 – IFS H/W Infrastructure
In the image above with the use of a keyboard you use input technology and type the data HELLO, the information then travels through the connected system unit. From the Central Processing Unit a Processing Technology interprets the data and translates it into binary codes. As you type on your keyboard it changes to binary data, the ALU and Control Unit use the ASCII code as a means to turn it into binary data and store it in secondary Storage. Theses electrical impulses of on and off data, before being stored is organized into bits and bytes. There are eight bits in a byte. So when you type the message the information is presented on the Output Technology which would be the monitor.
Blog 5.2 – B2B Electronic Commerce
Blog Entry 5.1 – Critique Your Competitor’s E-Commerce Website
As Ferrum Medical is a business, and all businesses have assets, so too does Ferrum Medical. We like our competitors have a web page, a way to get information out to our clients and inform them of their options. And like any good business we need an advantage, and to gain it we must see what it is that makes our competitors so profitable. So we must delve into their website and analyze it against the six rules of E Commerce. As one of our competitors we chose Centra Health.
www.centrahealth.com
Rule 1:The site doesn't really offer anything unique and looks like a typical medical website. [5/10]
Rule 2: The site uses high quality pictures and the colors compliment each other very well. [10/10]
Rule 3: The website refreshes fairly quickly and isn't too clustered. [9/10]
Rule 4: The website has true stories of what some people have been through during and before their time with centra health, i think that would motivate people to come back and see updates. [9/10]
Rule 5:They advertised their presence on the web very nicely, color scheme works fine also. [10/10]
Rule 6:There are many features on the centra health website that will help you learn. [10/10]
www.centrahealth.com
Rule 1:The site doesn't really offer anything unique and looks like a typical medical website. [5/10]
Rule 2: The site uses high quality pictures and the colors compliment each other very well. [10/10]
Rule 3: The website refreshes fairly quickly and isn't too clustered. [9/10]
Rule 4: The website has true stories of what some people have been through during and before their time with centra health, i think that would motivate people to come back and see updates. [9/10]
Rule 5:They advertised their presence on the web very nicely, color scheme works fine also. [10/10]
Rule 6:There are many features on the centra health website that will help you learn. [10/10]
Wednesday, October 13, 2010
Blog 4.4 - Entity Relationship Diagram
In this Entity Relationship Diagram, there are three main Entities : Customer, Invoice, and Product.
Within each entity there are different attribute types such as Name, but a specific name such as John Smith is an Attribute. Each entity can be described as a table each containing rows and columns, the rows being records and columns being attributes. Each attribute type has its own data type dependent upon the type of information, such as name being text. The customer entity, contains attribute types such as Name, Address, and gender. It also contains a customer key, and ID number that is specific to the individual, such that it can be referred to later. The Product entity contains attribute types such as the type of product, the price and the Product key. Like the customer key it is a reference key used to compare and correlate data in other entites.
Subscribe to:
Posts (Atom)