Summer Presentation 3

614 views

Published on

Topic 1: Telephone Applications
Topic 2: Security
Topic 3: Backup

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
614
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Summer Presentation 3

  1. 1. Summer Technology Series Week 3 Session 1: 10:00 – 10:25 “ Who’s There?” Skype and Google Voice Session 2: 10:30 – 10:55 (hands on) Computer Security:  Be Afraid, Be Very Afraid Session 3: 11:00 – 11:30 "What's Your Backup Plan?" Developing and Maintaining a Safe, Rational Backup Plan for Your Data WELCOME!
  2. 2. Website of the Week <ul><li>Classroom 2.0 </li></ul><ul><li>Social Network Site </li></ul><ul><li>www.Classroom20.com </li></ul>
  3. 3. Podcast of the Week <ul><li>Quick and Dirty Tips </li></ul><ul><li>quickanddirtytips.com </li></ul><ul><li>Also: Don’t forget the ToTechasJesusDid podcast on the website and itunes (new episode available!) </li></ul>
  4. 4. Phone Applications on the internet <ul><li>The Great Confluence </li></ul><ul><li>Skype </li></ul><ul><li>Google Voice </li></ul>
  5. 5. The Great Confluence Analog Phone Service Analog Audio Records/Tapes “ Analog” Writing Handwriting Typing Analog Pictures & Video Film Digital Phone Service VOIP Digital Recording .wav .mp3 Digital Documents Digital Images .jpeg .avi
  6. 6. The Great Confluence Analog Phone Service Analog Audio Records/Tapes “ Analog” Writing Handwriting Typing Analog Pictures & Video Film
  7. 7. The Great Confluence Analog Phone Service Analog Audio Records/Tapes “ Analog” Writing Handwriting Typing Analog Pictures & Video Film Digital Phone Service VOIP Digital Recording .wav .mp3 Digital Documents Digital Images .jpeg .avi Computer/Internet
  8. 8. Skype Free (well, mostly) Internet Phone <ul><li>VOIP (Voice Over Internet Protocol) Originates from a computer and travels over the Internet to another computer </li></ul><ul><li>Free calling from one Skype account to another </li></ul><ul><li>Calling regular phone lines (skypeout is charged </li></ul><ul><li>Also accessible to a mobile phone or device via a wi-fi connection </li></ul>
  9. 9. Other Free Skype Features <ul><li>Video Calls </li></ul><ul><li>Conference Calls </li></ul><ul><li>File Transfer </li></ul><ul><li>Instant Message Service </li></ul><ul><li>LIMITED EMERGENCY SERVICE </li></ul>
  10. 10. Google Voice Free Internet Phone Management System <ul><li>New service (currently in a closed beta) </li></ul><ul><li>Assigns a single number for all phones (your Google Voice Number) </li></ul><ul><li>You control how the service handles calls/callers </li></ul>
  11. 11. Google Voice Features <ul><li>Managed call forwarding </li></ul><ul><li>Call screening </li></ul><ul><li>Voicemail </li></ul><ul><li>Visual voicemail </li></ul><ul><li>Call Recording </li></ul><ul><li>Phone Changing </li></ul><ul><li>411 Service </li></ul>
  12. 12. Computer & Internet Security <ul><li>What Do They Want from Me? </li></ul><ul><li>Anti-Virus Hardware/Software </li></ul><ul><li>Your Behavior Is Key! </li></ul>
  13. 13. What do they want from me? Major Security Threats <ul><li>Malicious mischief </li></ul><ul><li>Identity/data theft (keystroke logging) </li></ul><ul><li>“ Zombified” computers (bot-nets) </li></ul>
  14. 14. Software/Hardware Solutions <ul><li>Firewall (hardware/software) </li></ul><ul><li>Anti-spyware </li></ul><ul><ul><li>Windows </li></ul></ul><ul><ul><li>Spybot </li></ul></ul><ul><li>Anti-virus </li></ul><ul><ul><li>Paid: Norton/McAffee </li></ul></ul><ul><ul><li>Free: AVG, Panda </li></ul></ul>
  15. 15. Your Behavior (and your kids’ behavior) Is The Key <ul><li>Good Strong Passwords </li></ul><ul><li>Windows Updates </li></ul><ul><li>Change email behavior </li></ul><ul><li>BitTorrent and other sharing sites </li></ul>
  16. 16. Data Backup <ul><li>Why Do It? </li></ul><ul><li>Methods of Backup </li></ul><ul><li>Backup Schedule </li></ul>
  17. 17. Why Do It? <ul><li>Because you aren’t an idiot </li></ul><ul><li>Hard drives crash/infected with viruses </li></ul><ul><li>Computers are lost/stolen </li></ul><ul><li>Data must be carried forward in a viable form </li></ul><ul><li>One copy = zero copies </li></ul>
  18. 18. Backup Media <ul><li>Removable Disks (cd, dvd, thumbdrive, etc) </li></ul><ul><li>External hard drive </li></ul><ul><li>On-line storage </li></ul><ul><li>Microsoft Skydrive </li></ul><ul><ul><li>Mozy </li></ul></ul><ul><ul><li>Carbonite (paid) </li></ul></ul><ul><ul><li>Amazon S3 (paid) </li></ul></ul>
  19. 19. Backup Plans <ul><li>Types of Backup </li></ul><ul><ul><li>Ghost </li></ul></ul><ul><ul><li>“ Big ball” </li></ul></ul><ul><ul><li>File backup </li></ul></ul><ul><li>Backup Programs </li></ul><ul><ul><li>Synctoy </li></ul></ul><ul><ul><li>Bonkey </li></ul></ul><ul><li>Backup Schedule </li></ul>

×