LarsNicole
Thursday, November 15, 2012
Summary Post
When I first told people about what the idea for my blog was, I simply got blank stares and confused stuttering "but...but...but how..?" And I get it: the idea of having a website based on cats is initially a laughing matter; it seems like a joke. But honestly, I have proved that it can be so much more.
Throughout this semester so far, as this idea has evolved, I have actually seen that this idea has legitimate promise. Agreed, it's a little far-fetched in the long run, but I know at least 10 women off the top of my head that would jump at the chance to participate in my website idea--and that's just the beginning."Rent-a-cat" is a wild idea, but it's not impossible.
I'm not saying it's something that I'll ever really take further than IST class, but what if it did? With the right people, the right planning, and the right road-map, this idea could be a million dollar idea. and I'll look at all the people who laughed at me and say, "Who's laughing meow?"
Blog Review Post
I have chosen to research blogger Jane Aldridge for my blog. I actually learned about her when I was at my internship this summer (it was for a fashion PR company in NYC) and I was sending out newsletters to the top fashion bloggers in America. Among the fashion world, she is incredible well known and very well respected.
Blogger turned fashion-insider, she launched her blog "Sea of Shoes" as simply a hobby in 2007. Since then, she has gone from every day high school girl to serious fashion guru. Her site serves as a photo archive of her skillfully styled clothing choices paired with the most covetable shoes known to woman.
Jane Aldridge has directly influenced the sales for various designers and has gotten her own opportunity to design with Urban Outfitters footwear. Through her fashion experience and goals, she has taught the power of a good blog. Well done Jane.
Wednesday, November 14, 2012
11/14/12--Digital Media
When you log onto a website, the first thing you want to see is that it has things that attract and interest you. For most people, that appeal comes from bright colors and pictures. While the color scheme of the website will be light blues and pinks, the pictures on the website are the colors that really count.
Just like with audio files, large image files need to be compressed for transmission and storage. When it comes to compression, two types of compression are available. There is "lossless" and "lossy". Lossless is where the decompression process can restore the image data identical to its original form. Lossy is where original data cannot be restored, but the image, to varying degrees, looks much like the original (e.g. jpeg compression).
On "rent-a-cat", the type of compression we will use is "lossy" compression. By use of a Jpeg, we will upload the photos for easy internet streaming of pictures. Jpeg is incredibly popular for computer and internet applications because of variable compression. The compression is on a scale of 100 on down; starting at 99, there is very high quality with little compression. It still causes a slight, though usually unnoticeable degradation over the uncompressed image. When the image is at 25 or lower, it is very low quality, but it is highly compressed.
While admittedly the JPEG has problems, it seems to do the trick for the website. By using an easy, effective method to compress photos, "rent-a-cat" will have no issues publicizing photos to the public.
Just like with audio files, large image files need to be compressed for transmission and storage. When it comes to compression, two types of compression are available. There is "lossless" and "lossy". Lossless is where the decompression process can restore the image data identical to its original form. Lossy is where original data cannot be restored, but the image, to varying degrees, looks much like the original (e.g. jpeg compression).
On "rent-a-cat", the type of compression we will use is "lossy" compression. By use of a Jpeg, we will upload the photos for easy internet streaming of pictures. Jpeg is incredibly popular for computer and internet applications because of variable compression. The compression is on a scale of 100 on down; starting at 99, there is very high quality with little compression. It still causes a slight, though usually unnoticeable degradation over the uncompressed image. When the image is at 25 or lower, it is very low quality, but it is highly compressed.
While admittedly the JPEG has problems, it seems to do the trick for the website. By using an easy, effective method to compress photos, "rent-a-cat" will have no issues publicizing photos to the public.
11/14/12--Security 2
Protection is a huge concern among the internet community. So many people randomly click on links nowadays that computers can easily be infiltrated by viruses, spam, and unidentified software. While it may be up to the individual who owns the computer whether or not he or she wants to have an anti-virus program on their computer, many websites could easily help out by implementing things to avoid any viruses.
Malware, or "MALicious sofWARE" are bad programs that try to do bad things to a computer, network, or the server. Viruses and worms are among some of the worst types of malware that have the capacity to infect. The Malware usually gets onto a specific machine because of something that the user does, like clicking a button on a pop-up winder, installing a software package, or agreeing to add functionality to the web browser. These applications often use trickery to get the user to install them, often times from fake system alert messages to buttons that say "cancel", when they really do the opposite.
Because of the sensitive nature of "rent-a-cat", the website has to be extra careful when allowing users onto the site. They put most of their personal information on the website, which is a significant reason why hackers would want to put viruses on there and steal their information.
The only way to avoid harmful links and computer viruses is to remain alert and aware on the internet. Also, a little anti-virus wouldn't hurt. Anti-virus prevents both worm and virus infection by detecting the malware and removing it. "rent-a-cat" will have built-in anti-virus programs that detect if any falsity is using any attempting upload onto the site, and remove it immediately.
This way, the users, the programs, and the cats all remain safe from any online harm.
Malware, or "MALicious sofWARE" are bad programs that try to do bad things to a computer, network, or the server. Viruses and worms are among some of the worst types of malware that have the capacity to infect. The Malware usually gets onto a specific machine because of something that the user does, like clicking a button on a pop-up winder, installing a software package, or agreeing to add functionality to the web browser. These applications often use trickery to get the user to install them, often times from fake system alert messages to buttons that say "cancel", when they really do the opposite.
Because of the sensitive nature of "rent-a-cat", the website has to be extra careful when allowing users onto the site. They put most of their personal information on the website, which is a significant reason why hackers would want to put viruses on there and steal their information.
The only way to avoid harmful links and computer viruses is to remain alert and aware on the internet. Also, a little anti-virus wouldn't hurt. Anti-virus prevents both worm and virus infection by detecting the malware and removing it. "rent-a-cat" will have built-in anti-virus programs that detect if any falsity is using any attempting upload onto the site, and remove it immediately.
This way, the users, the programs, and the cats all remain safe from any online harm.
Wednesday, October 31, 2012
10/31/12--Security 1
Everyone wants what's easiest, no matter the cost. Most people nowadays can be sneaky and slimy when trying to get what they desire most; people getting stepped on in the process doesn't matter. But sometimes, being sneaky isn't always a bad thing. In fact, it can be quite clever. For example, back in the day, the military used codes to get messages across without being intercepted. Two examples of codes used were cryptography and stenography. Cryptography were codes completely numbered and different, while stenography was a blatant message, but just hidden.
In IST 195 class we learned all about cryptography. In its basic form, it is the process of encoding and decoding information so that its contents can be hidden. It relies on algorithms that use “keys” to encrypt and decrypt the information. Asymmetric, or public key cryptography uses a system of two keys where one of the keys may be freely revealed.
While it is an intriguing process with plenty of uses on the web, it does not really have a place within my website. "Rent-a-cat" is fairly open and does not need to be encrypted or filled with any type of hidden message. The contents of the website remain open to all viewers who sign into the page, and there is no need for any type of block, or hidden code, within the site.
Monday, October 22, 2012
10/22/12--Databases
Now onto the nitty gritty stuff. Most web pages that provide access to data use the HTML “FORM” element to collect inquiries from the user. FORM is a particular set of HTML tags that produce interactive document elements in which browser users can enter data of various types.
The browser remembers every option and piece of text that a user provides in a form. The FORM has two ways of sending data: GET and POST. GET sends the data to some destination URL with the submission data encoded into the URL with a series of ?, =, &, and other punctuation. POST sends the data to the receiving URL’s “standard input” (a fancy way of saying it is all sent after the initial request for the new page goes through). POST requires some kind of receiving program to eat up the incoming data
To maximize both efficiency and simplicity, the website will use a POST to keep the web name easiest to access. The address of "www.rentacat.com" will be the universally known name. While the URL may actually be longer than that, using POST will keep the name short, sweet, and to the whiskery point.
The browser remembers every option and piece of text that a user provides in a form. The FORM has two ways of sending data: GET and POST. GET sends the data to some destination URL with the submission data encoded into the URL with a series of ?, =, &, and other punctuation. POST sends the data to the receiving URL’s “standard input” (a fancy way of saying it is all sent after the initial request for the new page goes through). POST requires some kind of receiving program to eat up the incoming data
To maximize both efficiency and simplicity, the website will use a POST to keep the web name easiest to access. The address of "www.rentacat.com" will be the universally known name. While the URL may actually be longer than that, using POST will keep the name short, sweet, and to the whiskery point.
Tuesday, October 16, 2012
10/16/12--Communication/Networks
With so many different modes of communication nowadays, which one is the best for reaching out to customers? Due to the fact that dating sights already draw in a high amount of visitors and users, Rent-a-Cat will pair with these sights to allow my website to send out a promotional email once a user registers.
But it won't stop there. Because relationships can be so fleeting, Rent-a-cat wants to make sure you stay informed of the fabulous opportunity that the sister website offers once your loved one has become a thing of the past. Due to the fact that Rent-a-cat already has your email address from when you registered to the dating site, it will continue to sent you monthly blasts promoting new kittens, full grown cats, and chances to receive discounts if you sign up for the site on a certain date.
All of the blasts and promotions will be sent out via email, and when you log onto the site and type in your information, you have the option of receiving text messages from Rent-a-cat as well. Due to the fact that email, chat, and other forms of text messaging require minimal media richness (or face to face contact), while the messages are clear and concise, there can sometimes be room for ambiguity and so the users need to head to the site to learn more. Each communication method (or more precisely the operative standard) has a characteristic maximum bandwidth, and due to the fact that text messaging and emailing use little, the media richness is lower.
Subscribe to:
Comments (Atom)