-
Jianhui Chen posted a new activity comment 7 years, 5 months ago
quiz 2 62%
-
Jianhui Chen posted a new activity comment 7 years, 5 months ago
quiz 1 42%
-
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 5 months ago
In my mind that google should be profitable from the map service. However, when I used it, it is free, so I want to figure out
is Google able to provide access to so many of its most powerful products for […]
-
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 5 months ago
Security experts are warning that the free viral selfie app will collect the information from users.
According to the officer of Meitu, this data is only being collected for identity protection, service […] -
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 5 months ago
Alibaba Group has announced it will use the big data technology to prevent counterfeiting product on the e-commerce giant’s online platform.
There are 20 heavyweights company including Huawei and Samsung join […]
-
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 5 months ago
Baidu, China’s largest internet search engine, has shown you that just what you can learn when you have access to enough location data.
The Big Data Lab of Baidu in Beijing stated that it has made use of b […]
-
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 6 months ago
As the result of the birth of the World Wide Web and the development of the Internet, a huge amount of data has been collected by various organizations all around the world. Analysis those data is vital for […]
-
Jianhui Chen changed their profile picture 7 years, 7 months ago
-
Jianhui Chen wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
My name is Jianhui Chen, the student of IT Auditing. This is my second semester on this program. I will finish my degree at July this year. Prior to I am in ITACS program, I majored in Finance NS interned in […]
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post, Yu Ming, today’s threats have substantially changed, creating a reality wherein Windows XP vulnerabilities can put an entire company and its data at risk. To protect against vulnerabilities for which software patches will no longer be made available, using a vulnerability protection solution such as Trend Micro™ OfficeScan™ Intru…[Read more]
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post, Shizhong,
I think the risk on the quality of the service provide by third party is the most important. If an outsourcer loses a customer because of poor service, it is much less excusable. Of course, the perception of poor service could be misguided, or service expectations may not have been realistic in the first place. However, SLAs…[Read more] -
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post, One of the main reasons to outsource is the expectation of receiving better service
from the outsourcer than from internal staff. This expectation is often based
on the knowledge that there will be an explicit SLA in place, which can be
enforced by the customer and which might bear remedies against the outsourcer
for nonperformance.…[Read more] -
Jianhui Chen posted a new activity comment 7 years, 10 months ago
good post, learn a lot from your comments.
The most common view of outsourcing appears to be that the concerns generated by giving up control override any sense of relief at not having the day to-day operational responsibilities. This trend may result from perceptions regarding the different goals and attitudes of internal and external staff…[Read more] -
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Agree with you, but I want to mention that there also have some drawbacks of outsourcing.
firstly, you will lose the managerial control. and there is some hidden cost when some legal issue come up due to the service or product provided by 3rd party. As well, some quality problem would come out. -
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post, I like the mnemonics you shared very much. Would you say that a part of the Operating system could be considered as a presentation layer ? one of my friends, seems to refuse to believe that the OS figured out the OSI model.
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Agree with you, VPN has many advantages, but it also provide some opportunities for bad guy to hide themselves from being investigated as VPN Allows people to access both web applications and websites anonymously.
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Agree with you Yulun,
The first layer of the seven layers of Open Systems Interconnection (OSI) network model is called the Physical layer.
The second layer of the seven layers of Open Systems Interconnection (OSI) network model is called the Datalink layer.
The third layer of the seven layers of Open Systems Interconnection (OSI) network…[Read more] -
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post Yu Ming, it is informative. have something want to add is about the disadvantage. ‘ve got a yearly subscription to a VPN service which is real quick and from the research I did at the time seems to be pretty legitimate, but are there any disadvantages or scenarios where you perhaps shouldn’t use a VPN?
I’m from the China and I…[Read more]
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Good post, after reading your post, I realize that how important operation systems are. An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
-
Jianhui Chen posted a new activity comment 7 years, 10 months ago
Agree with you,The mainframe computer are regarded as the machines that won’t die. Many airlines, banks, and governments began processing sensitive transactions using giant mainframe computers—and their descendants are still in use. Now it turns out these living dinosaurs of computing also have a very modern vice: they over share on the Internet.
- Load More
Nice post! And of course, the answer is advertising. There is really no other way Google could possibly find money in this source of information. Through their digital picture enhancement trucks that drive by every so often, sometimes a publicity stunt by the organization could work as well. I find it interesting looking at how Google Maps is used. Last year I believe a murder was solved based on an image a truck captured of someone dragging a body into a river. This was a good post as it expanded the ideas to what something like Google Maps can accomplish.