Innovation, IT and Cybersecurity Posts

NOTE: A lot of these posts are from my computer science, information security, and cybersecurity classes. I reposted them here (There is no reason others can't benefit from my studies). They are mostly the ones with a lot of references listed at the bottom of the posts. If I got information somewhere else on the internet, I will post the article reference at the bottom of the posts.

iT and Cybersecurity Blog

Interface Design Principles

Usability testing is an important part of designing a user interface. To ensure the interface is fully effective, the usability testing is best done throughout the whole designing process as well as during implementation. During the software life cycle, designers can go back at any time to make corrections.  It’s very important to perform testing, because it prevents major errors, and makes the software run smoothly (Edrington, 1999). There are four principles for usability testing: Efficiency, accuracy, recall and emotional response. The best way to describe the benefits of usability testing is to explain how each of the four principles work.

Read more »

Software Requirements Elicitation

 It is vital to use the software requirements elicitation process when developing a system, because if it’s not followed the end product will not be right for a client and the end-user. That is a waste of the client’s money and resources, and the software development team’s time, not to mention, aggravate the customer. It would be bad if this happens. Using the software requirements elicitation process eliminates errors, and inadequate software. That’s why it’s so important.

Read more »

Software Design

The biggest contrast, and comparison, between Structured Design programming and Object Orientated programming is that Structured Design programming works by breaking down big problems into small ones. Then it breaks down the small ones into even smaller ones and so forth, until they are small and simple enough that a programmer recognizes it and is able to work with it. OO programming works by grouping codes with data that it operates with. It then operates independently of the rest of the system. The interesting thing is that Structured Design and Object Orientated programming are not exclusive mutually, because you can structure coding in an object and use objects to implement modules of code in a structured program.

Read more »

Implement the Operating Model via Enterprise Architecture

The impact of retailing online has been significantly large. As far back as in 2008, a retailer’s sales were increased by 20% just from online purchases (Charlesworth, 2013). It has been noted that the percentage has climbed even higher in the past couple of years. It is anticipated that it will climb even higher in the years to come. This high impact on retailing online is due to the fact that retailers are able to reach hundreds (sometimes thousands) of customers across the web and the availability of many more products than most traditional (physical store) retailers can offer in one place. It’s also because products online are more convenient for users as they don’t have to physically go get the product (Vannier, 2013). It can just be mailed to them. Also, online retailers seem to have the advantage of cheaper prices. The availability of many products, along with cheaper prices, allows internet retailing to have a huge impact.

Read more »

Enterprise Data Management Concepts

Enterprise Content Management (ECM) is organizing and collecting information to be used by a certain audience such as customers or business executives (Aiim, 2015). It isn’t a single methodology or technology. But what it is, is a combination of them that can be used as a tool to manage, preserve, capture and deliver information that can support key organizational processes through its lifecycle.

Read more »

Concepts and Characteristics of Cloud Services and Databases

Cloud computing in simple terms is computing services that include storage, databases, software, networking, and analytics delivered over the internet which is also known as "the cloud" (Ranger, 2022). Cloud services are when organizations rent applications, storage, and other services from cloud service providers instead of having their own infrastructure and data centers. Cloud computing is quickly becoming the default option for applications and software vendors offer their products and services over the internet now instead of standalone products.

Read more »

The Web and Database Management Systems

The Web (World Wide Web) is known in the information technology field as a subset of the internet with pages that are accessed by web browsers (Techopedia, 2022). This is not the same as what is defined as the Internet. The Internet is defined as the global network of servers that make it possible for users to share information over the Web. The Web is a large part of the Internet, but it is not the same thing. The question now would be where is the data stored that is accessed by users to share over the Web? This would be where the web-based database management system would come into play.

Read more »

Transaction Processing - Database Theory and Practice

Simply put, database theory is database study. A database is a set of digital data that is stored and accessed in several ways. Database theory covers different aspects that has to do with databases including database management and several level of abstraction of data (USFHealth, 2021). A database is used to enforce standards and maintain data integrity. It is a repository of data which is stored in tables and made up of a lot of data that has some connection to each other. The data in the database is structured in a way that is easily accessible to computer programs and users.

Read more »

Database Security Research

Over the last several years data breaches have risen considerably. Organizations have become more aware that database security is essential. Database security involves protecting databases and their management system, their web applications, and the data the database contains (Database security, n.d.). It is an organization’s responsibility to ensure its database is protected from external and internal threats. Internet-based attacks are one of the biggest challenges to database security. Cybercriminals are constantly devising new ways to infiltrate databases to steal, delete, or modify data by attacking web applications to get to the organization’s database. The motivation of this research is to find the two topmost critical vulnerabilities so organizations can devise ways to minimize them if not eliminate them.

Read more »

Innovation Blog

My Innovation Plan Video

           For this blog post, I am posting a video I made for my sociotechnical plan. The assignment for this video for my futuring and innovation class instructed us to make the video 30 seconds. The video is actually about 44 seconds long as 30 seconds was just too short. There are words in on the video slides that a couple of seconds just did not give enough time to read. There is a diagram included in the video of the actual device, or at least the idea of the device. That diagram was drawn by my 19 year old son as I have no drawing skills whatsoever. The diagram looks a bit out of place in the video, but that is because there is not an actual photo of it as it does not really exist yet. Anyway, I think the video shows well what I wish to show about the innovation device I came up with. Please enjoy!

Read more »

Impacts to My Innovation Idea

           For this post, I chose to talk about breathable mattresses for babies. These breathable mattresses are supposed to help prevent SIDS (Sudden Infant Death Syndrome). The breathable mattress has something to do with my innovation idea that my sociotechnical plan for the Unit 4 IP is based on. I was not able to find an organization that produces the breathable mattress where something went wrong beyond their control, but I have found an article that the breathable mattresses have not actually been proven to prevent SIDS (Callahan, 2016). It has been speculated in medical and scientific circles that SIDS is possibly caused by a defect in an infant’s brain located in the area that controls arousal from sleep and breathing.

Read more »

Serendipity, Error, and Exaptation

             For this blog post, I wanted to give some innovation examples, either from personal experience or from something we read, that was achieved through serendipity, error, and exaptation. As I could not think of something from personal experience, I had to read about things. The following is what I found:

Read more »

My Wishes, Ideas, and Ambitions

           I sat down and thought about things I wish to accomplish in the future. Some of those things might not be possible in this lifetime, but it didn’t hurt to dream. Below is a list of my wishes, wants, and desires for the future under five different categories:

Read more »

Thoughts on Scenario Planning

           For this blog post, I looked for an organization that did not use scenario planning in the past when it would have benefitted them, but instead they used traditional forecasting. That organization is Sony. Sony was famous for creating the Walkman that later became the portable CD player (Hernandez, 2018). Although the Walkman became famous in Sony’s name, Apple managed to surpass them in market shares due to the fact that Sony did not use scenario planning. One has to wonder if Sony had used scenario planning instead of traditional forecasting, would they have surpassed Apple in market shares?

Read more »

Innovative Think Tank Methods

            This post is about think tank methods. Think tanks are considered a form of collective intelligence consisting of a group of people that are knowledgeable about the think tank topic and usually are professionals that write, read, and research the topic or problem (Pope, 2019).  Sometimes think tanks may be independent or affiliated institutions that act like a bridge between policymaking and academic communities with the purpose of serving in the public interest. Think tanks consist of experts in their different professions who are not afraid to challenge each other. Each one has a different opinion to offer.

Read more »

Business Innovation Forecasting

             Business plans have become essential for any organization, and innovation forecasting has become a substantial part of it. It is important to establish alternatives and margins for any possible risk effects. The best way to start with innovative forecasting in business is to base it on dynamics that are easy to understand and manage (Güell, 2019). Asking questions such as what kind of innovation the organization is and what the characteristics are of any projects that need to be undertaken is a good place to begin the forecasting. There are three objectives of the innovation process that should be considered when business plans and forecasts are being devised, and those are to do it in the shortest time, use minimum resources, and launch the best solution you possible can to the market (Güell, 2019).

Read more »

Botox and Fireworks - Both Accidental Innovative Discoveries

         Botox (botulinum toxin) was discovered in 1987 by Alastair and Jean Carruthers and it began as a toxin that was to treat eyelid spasms and other eye-muscle disorders (Simmons, 2021). They discovered that Botox had an interesting side effect which is that it made wrinkles disappear. This discovery was to become one of the biggest discoveries in cosmetic procedures in the world.

Read more »

Group Decision-making Techniques

       For this blog post, I choose two types of group decision-making techniques to write about. During research I learned that group decision-making techniques are different approaches to making decisions in a group setting (Dagher, 2021). To get the best result of any group decision-making technique is to choose one that fits the specific situation, and one that fits well with the group. The technique is not supposed to make things too complicated and time-consuming and should allow each member of the group a voice to be heard. The two types of decision-making techniques I chose to write about are as follows (Dagher, 2021):

Read more »

About Pagan Tech Girl and Her Mission

         I wrote a page on this blog explaining who I am (feel free to click the link on this website "About Pagan Tech Girl"), but I will outline it in this blog post as well. I am an older woman and a cat lover that is a pagan/wiccan/spiritualist who also has a lot of interest and passion for technology. Most people when I tell them I am a pagan/wiccan/spiritualist they picture me as this woman that lives without electricity, technology and most likely in a hut in a forest. They say they can picture me wearing long dresses and reading my book of spells (yes, I have one) by candlelight. Well, witches did live like that centuries ago, but this is 2021 and I am very modern. I still practice healing and positive energy spells, but I am very much tied to my cybersecurity job and my electronics. My cell phone is always on me or right beside me wherever I am. 

Read more »