Enterprise Computing Preliminary Course Unit 2: Network… — Transcript

Unit 2 covers networking systems, social computing, graph theory, IoT, apps, and enterprise workflows in enterprise computing.

Key Takeaways

  • Networking systems are essential for creating human-centric, efficient online interactions.
  • Graph and network theory help visualize and manage social media user connections and information flow.
  • Apps enhance social networking platforms by adding new functionalities and sharing capabilities.
  • Enterprise systems require robust hardware, software protocols, data backup, and cybersecurity measures.
  • Remote working and cloud-based collaboration tools have transformed traditional workplace workflows.

Summary

  • Introduction to human-centric computing focusing on systems designed for efficient human interaction.
  • Effects of disruptive technology on personal and work-related communication and system development.
  • Application of graph and network theory in social networking to map user interactions and information flow.
  • Influence of apps on social networking platforms to expand functionality and user engagement.
  • Hardware and software impact on the Internet of Things (IoT) and Internet of Me (IoMe), including identity and reputation management.
  • Importance of protocols, data backup, regulation, compliance, and cybersecurity in enterprise networks.
  • Characteristics and support for startups using online platforms to build networks and grow brands.
  • Storage and workflow in enterprise systems, including benefits and limitations of digital workflows.
  • Developments in network connectivity enabling remote work, video conferencing, and collaborative file sharing.
  • Tools supporting workflows with task delegation and shared calendars to enhance team productivity.

Full Transcript — Download SRT & Markdown

00:00
Speaker A
Enterprise Computing Preliminary Course Unit 2, Networking Systems and Social Computing.
00:06
Speaker A
So, as the name suggests for this unit, we are taking a look at network systems and the infrastructure that kind of sets up different types of networks, whether it be local or through the internet.
00:18
Speaker A
But with a focus on social computing, that of the social media and the fact that we are trying to encourage networks that bring people together, have interaction and set up virtual communities for people to interact through online platforms.
00:34
Speaker A
So, you can see a bit of connection here to what was already learned with Unit 1, but this unit gets a lot more technical and is probably has contains the most terminology out of all three preliminary units.
00:47
Speaker A
So, there's a lot to learn here and it leads to a very messy mind map.
00:51
Speaker A
So, let's see if we can follow along.
00:52
Speaker A
The first area is that of the introduction to human-centric computing, that we are developing systems with individuals, humans in mind.
01:04
Speaker A
And their efficiency to get on the system and engage in their work.
01:06
Speaker A
So, areas related to this is the effects of disruptive technology.
01:12
Speaker A
So, how when we have new technology being invented or improved communication, it changes everything.
01:23
Speaker A
It changes how we work.
01:25
Speaker A
It means we can do work in different ways.
01:27
Speaker A
So, it has that effect on individuals in both a personal and work-related manner.
01:34
Speaker A
The innovations push change, so when a new technology comes out.
01:40
Speaker A
It means new systems can be built with this new technology.
01:43
Speaker A
And based on trends and what people are using, that becomes kind of new foundations for what systems need to include.
01:49
Speaker A
In order to support users, in order to make systems human-centric for them.
01:53
Speaker A
The next area then is that of graph and network theory, and in particular in relation to social networking.
01:58
Speaker A
So, with that in social networking, the graph theory relates to different users, pages and groups that they might be accessing and tries to map that out and portray a kind of picture of what users go to what pages and what kinds of groups do they set up and all that.
02:10
Speaker A
So, it kind of displays that in graph theory.
02:12
Speaker A
And then from there is the network theory, which shows the flow of information through all these elements.
02:18
Speaker A
All right, so there are the two theories in place there.
02:22
Speaker A
And trying to map that out in social media.
02:25
Speaker A
Obviously, it's very important in social media, if in particular if you're a platform, for managing the success of getting users, getting them interested.
02:33
Speaker A
And allowing for people to grow and information to go through.
02:37
Speaker A
As to expand their brands.
02:39
Speaker A
Okay, for specific users.
02:42
Speaker A
The next area then is the influence on apps on social networking.
02:45
Speaker A
As with social networking and outside of social networking.
02:50
Speaker A
Apps build on functionality.
02:52
Speaker A
So, when we include an app on within social networking, it expands what we can do, whether it can be we can embed a game into the social media platform.
03:02
Speaker A
Or it could be a new element that can be that will create and that can be shared through social networking.
03:08
Speaker A
So, the apps build upon this and probably the easiest way you can see that is through your phone.
03:14
Speaker A
Every time you download a new app onto your phone, you have a new function, something you can do.
03:20
Speaker A
Okay, but we're talking about this in a social media platform type of way, where you can share that element with your networks and the people who you've been set up with through your social media.
03:29
Speaker A
The next area here is then hardware and software influence on the IoT and IoMe.
03:33
Speaker A
Those two acronyms stand for the Internet of Things, which relates to all the information available on the internet that we can access and view.
03:40
Speaker A
And then the IoMe, the Internet of Me, things out there on the internet about myself.
03:45
Speaker A
So, there's a lot of categories related to this.
03:47
Speaker A
Specifically, the impact on the individual with this data that is out there, as well as the impact on enterprises.
03:54
Speaker A
We develop an identity and a reputation online.
04:00
Speaker A
Okay, whether it be ourselves or our business.
04:02
Speaker A
What we do, there's info out there.
04:06
Speaker A
And that will influence how people see us or our business.
04:11
Speaker A
Now, the other side of this too is what's going on in the background.
04:15
Speaker A
The hardware infrastructure that allows us to connect with these networks.
04:20
Speaker A
So, what technologies running behind the scenes.
04:22
Speaker A
And that will come up a bit later in this unit.
04:25
Speaker A
Okay, and the software protocols that need to be used, okay, for specific types of communication.
04:34
Speaker A
Whether it be through accessing websites, accessing social media, accessing email, there are protocols in place.
04:42
Speaker A
So that all the different types of technology that are being used to access the networks, mobile devices, computers, game consoles, are all still speaking the same language when online together.
04:50
Speaker A
Data obviously needs to be backed up.
04:53
Speaker A
Because if something happens to a particular server on a network, data could potentially be lost.
04:58
Speaker A
And we still want that data, so we need backup.
05:02
Speaker A
Making secondary copies of data in place to protect data, whether it means storing it offline or storing it at a different server in a secondary location.
05:10
Speaker A
Okay, just that it's somewhere else.
05:13
Speaker A
So that if anything happens to our primary source, we can get it again.
05:18
Speaker A
And then obviously, things need to be in place with regulation, compliance and cybersecurity.
05:23
Speaker A
And cybersecurity is actually the third unit of enterprise computing's preliminary course.
05:28
Speaker A
Okay, but the fact that things are set up to make sure that businesses are bound by some sort of rules for their ethical use, as well as the protection of data.
05:40
Speaker A
And then finally, characteristics related to the startup and success of startup groups.
05:45
Speaker A
Okay, people want to start businesses online.
05:50
Speaker A
And we want to create systems that people want to use.
05:53
Speaker A
There are platforms available out there that give people the tools they need to have a network without having all the network infrastructure ready.
06:04
Speaker A
They can start it from their home and connect to their website.
06:08
Speaker A
Of the actual platform.
06:10
Speaker A
Giving them network capabilities, the chance to find users for their businesses.
06:15
Speaker A
And allow their brands to grow.
06:17
Speaker A
Whether it be through some sort of specific platform or through social media.
06:23
Speaker A
They can share their ideas, they can share their business and find customers.
06:28
Speaker A
The next area of this unit is of storage and workflow in enterprise systems.
06:32
Speaker A
And here we're going through a lot of the technical components.
06:35
Speaker A
So, that are the benefits and limitations of digital workflows.
06:40
Speaker A
So, data is digital, so we can share it quite easily.
06:45
Speaker A
Okay, through a variety of platforms and through obviously making posts online.
06:50
Speaker A
Okay, but then obviously there's limitations too and potential consequences too in the areas of protecting our data, protecting our ownership of data.
06:57
Speaker A
That we need to be mindful of and obviously.
07:01
Speaker A
Think where we're going to be sharing our data.
07:05
Speaker A
We then got developments in network connectivity.
07:08
Speaker A
And obviously, a lot has happened in recent years.
07:12
Speaker A
Where we can do a lot of our work that traditionally we need to go into our workplace for, from home.
07:18
Speaker A
So, obviously that first point there is of remote working.
07:23
Speaker A
We can use video conferencing software to have meetings now, and then after those meetings, we can do our work at home.
07:32
Speaker A
Okay, and still have all my team members faces on screen.
07:38
Speaker A
So, we can still speak as if we're in the same office.
07:42
Speaker A
Another layer to this is of file sharing.
07:44
Speaker A
There are now cloud platforms such as Dropbox, iCloud, um and even um Microsoft too have their OneDrive.
07:56
Speaker A
Okay, where multiple users can access um shared drives online.
08:03
Speaker A
And be working on the same documents in those drives.
08:08
Speaker A
Okay, to collaboratively develop their work.
08:10
Speaker A
Depending on whatever their workplace is.
08:12
Speaker A
Okay, these items are set up.
08:14
Speaker A
Once again to allow users to work remotely.
08:18
Speaker A
And then obviously, tools that support workflows with task delegation.
08:22
Speaker A
Who's going to be doing what?
08:23
Speaker A
So, we do have our once again, face-to-face through video conferencing.
08:28
Speaker A
But then we'll also goes got specific uh items and apps that can be downloaded.
08:34
Speaker A
Where we can share schedules through calendars.
08:37
Speaker A
And allow people to know when things will take place, because we aren't in the workplace together.
08:44
Speaker A
We are at home, we are off site.
08:46
Speaker A
That communication still needs to take place.
08:50
Speaker A
So, that can be automatically logged into calendars.
08:53
Speaker A
So, people know when things going to happen.
08:57
Speaker A
Okay, but obviously these things also support the the changing nature of work.
09:00
Speaker A
That moving away from the workplace and now more so working from home.
09:04
Speaker A
Which is a bargaining chip people now use when going for jobs that they want to work from home X amount of days per week.
09:10
Speaker A
The next area is data storage requirements.
09:13
Speaker A
Okay, and look it's twofold.
09:16
Speaker A
It depends if we're going to be storing our data locally.
09:21
Speaker A
Okay, in our own drives.
09:22
Speaker A
But more so these days online.
09:24
Speaker A
So, what capacity do we need, okay, of storage?
09:30
Speaker A
Do I need one terabyte of online storage or more to support all my businesses data?
09:34
Speaker A
We've got to think of that capacity there.
09:37
Speaker A
And then accessibility.
09:39
Speaker A
How will users access the data stored on our cloud platform?
09:47
Speaker A
Or on our local platform.
09:50
Speaker A
And then based on logging procedures.
09:54
Speaker A
What data within our storage can each user access to, because we've also got to protect privacy and factor in not all users within my enterprise need to have access to all work.
10:05
Speaker A
Okay, but then also on the other side of that too.
10:07
Speaker A
Through making it accessible, the fact that people who might have impairments or disabilities.
10:14
Speaker A
Okay, all of that is kind of broken right down.
10:20
Speaker A
Because they don't have to travel into the workplace anymore.
10:23
Speaker A
So, having our data stored on network drive supports accessibility, because people can be just be seeing a computer at home.
10:30
Speaker A
And getting to the data they need quite easily.
10:34
Speaker A
We've got to think of the location of where this data is going to be stored.
10:37
Speaker A
It's going to be logical.
10:39
Speaker A
So, in the cloud, that's usually self-managed by the platform we're using.
10:43
Speaker A
But locally, how is it a centralized drive?
10:46
Speaker A
Is it going to be a single centralized drive or maybe a distributed model if we've got a larger enterprise?
10:52
Speaker A
And then obviously, as alluded to with accessibility, security measures that are going to be put in place.
10:58
Speaker A
And we'll get to that in a bit later within this unit too, in order to protect data.
11:05
Speaker A
And ensure that the user viewing the data have a reason and right to be viewing that data.
11:09
Speaker A
As per their task.
11:12
Speaker A
The next area is of cloud computing services.
11:15
Speaker A
And really it is what is the foundations of the services?
11:19
Speaker A
So, whether it be infrastructure as service, which is IaaS, software as service, SaaS, and platform as service.
11:29
Speaker A
These all help set up our cloud services.
11:33
Speaker A
In how we're going to use them, how people will access them.
11:37
Speaker A
Okay, when we want to use these.
11:40
Speaker A
And then we've got the different types of cloud-based data storage.
11:44
Speaker A
And it basically relates to how it's going to be used.
11:48
Speaker A
And the restrictions in place.
11:50
Speaker A
So, will it just be a public cloud where anyone can access and share data and work on information?
11:56
Speaker A
Is it going to be a private cloud, which is more of an intranet, where uh actual users need to log in and be specifically a part of an organization?
12:04
Speaker A
Okay, to view the data within the cloud.
12:06
Speaker A
And then in these days, most of these cloud services may be hybrid.
12:11
Speaker A
We can have general customers coming in and viewing our data through our sites.
12:16
Speaker A
But there is a portion within our cloud that is restricted to only authenticated users and only they can access it to do their work.
12:25
Speaker A
And then we also have non-cloud on premises.
12:29
Speaker A
Okay, where we don't use cloud technology.
12:33
Speaker A
It's pretty much just the data we've stored on local hard drives there.
12:36
Speaker A
So, cloud technology can be used in a variety of ways to support our business based on what we are doing.
12:44
Speaker A
Okay, the third area then relates to network architecture and infrastructure.
12:47
Speaker A
And now we're getting into the technical nitty-gritty of the actual networking systems.
12:52
Speaker A
So, the key components of IT required, the network technologies.
12:56
Speaker A
Hub, switch, routers, gateways, bridges, all of that.
13:00
Speaker A
Okay, the on-premise stuff we need in order to connect to the internet or to our customers.
13:07
Speaker A
Okay, what infrastructure do we need?
13:10
Speaker A
Is it just a router that is connected to our phone line or NBN that gets us to that network connection we need?
13:16
Speaker A
Or are we managing a lot of the network ourselves?
13:20
Speaker A
From our business's location.
13:23
Speaker A
And then how does that connect to cloud computing?
13:26
Speaker A
This is supported by transmission media.
13:28
Speaker A
Okay, and I already said NBN just before.
13:31
Speaker A
What is connecting our devices together, both locally and through the internet to get to our data that is online?
13:40
Speaker A
So, our wide mediums of twisted pair, Ethernet, um our coaxial cabling.
13:46
Speaker A
And then obviously optical fiber, which is the main infrastructure in Australia now.
13:51
Speaker A
Okay, within the roads of the NBN.
13:53
Speaker A
And then our wireless mediums too.
13:56
Speaker A
Our microwaves, our satellites and radio signals that allow for wider area communication without the need for wires.
14:05
Speaker A
Okay, and obviously expanding upon the data.
14:09
Speaker A
In order to connect to services that are a lot further away without needing a physical connection.
14:13
Speaker A
The next area is the transmission interference.
14:15
Speaker A
We are using these mediums, but what can affect our data while being transmitted?
14:20
Speaker A
So, things such as distance between the nodes that are communicating between each other.
14:27
Speaker A
And the topography, how specific nodes and mediums are laid out on a network.
14:30
Speaker A
Okay, the mountain ranges, the height and the the valleys.
14:36
Speaker A
All of that will impact on how the data is sent between our devices through our transmission mediums.
14:43
Speaker A
And that obviously needs to be factored into our network infrastructure.
14:47
Speaker A
Okay, we want to improve the data flow in the sense.
14:50
Speaker A
So, based on what we just said about interference.
14:53
Speaker A
We need to think about our antenna power, our actual traffic filtering by how many users are accessing our network.
15:00
Speaker A
And then how is that being dispersed among our technology that we're using on our network?
15:05
Speaker A
To support that flow and give users a good experience interacting and getting to the data they need.
15:10
Speaker A
And getting it back to them as information.
15:13
Speaker A
And the things that can support that is flow scheduling and traffic monitoring.
15:16
Speaker A
Which obviously a network administrator needs to use.
15:20
Speaker A
But we are also talking about smart systems too.
15:22
Speaker A
And we have AI supporting this as well.
15:25
Speaker A
That is monitoring this and then moving users down different pathways to support their work on a network.
15:34
Speaker A
Okay, once again, we're talking about graph and network theory.
15:37
Speaker A
But how can we optimize this for users?
15:42
Speaker A
Okay, so we said that social media needs this stuff.
15:45
Speaker A
But we want to optimize it if our enterprise is going to maximize its success.
15:51
Speaker A
So, the adjacency and centrality of the actual network.
15:57
Speaker A
How are people getting to the data they want?
16:01
Speaker A
How is that information flowing and being shared through the actual graph theory?
16:07
Speaker A
Okay, and how it's all set up.
16:09
Speaker A
How does it give users that feeling of connectedness to their data?
16:16
Speaker A
Okay, and allowing them to expand through their social networks.
16:19
Speaker A
And then what are the things that actually weighted on these graphs?
16:23
Speaker A
Okay, so obviously an area that needs to be optimized for an enterprise to maximize their success.
16:29
Speaker A
Okay, and then we've got to talk about specific devices that support the Internet of Things.
16:33
Speaker A
So, once again, getting users onto the internet.
16:36
Speaker A
And knowing specific protocols, HTTP, HTTPS, that's incorporates SSL, SMTP.
16:45
Speaker A
All of that that is required to access certain systems and services online.
16:51
Speaker A
Okay, we then look talk about machine learning, ML, in conjunction with the Internet of Things.
16:56
Speaker A
As I said before with managing networks.
17:00
Speaker A
A lot of these are run by smart AI systems.
17:03
Speaker A
That will help map users on a network through specific routes of mediums and devices to control the flow of a network for their user experience on the network.
17:13
Speaker A
So, they don't get too much lag or get dropped off an actual platform.
17:17
Speaker A
Okay.
17:19
Speaker A
ML, the machine learning is data driven.
17:21
Speaker A
So, it will read numbers of traffic and um bits per second and bottlenecking and bandwidth and all of that.
17:30
Speaker A
And try to control this traffic.
17:33
Speaker A
Okay, it will report any types of diagnosis going place on the network.
17:36
Speaker A
And then try to respond to this.
17:39
Speaker A
At this stage, we still want a physical human network administrator there to support the AI managing it with its machine learning.
17:46
Speaker A
Okay, but a key area here is automation.
17:50
Speaker A
These these types of tasks are being taken over by AI.
17:55
Speaker A
Because they can, it is numbers based, they can make the diagnostic decisions and respond to them.
18:02
Speaker A
Okay, and they can operate 24 hours.
18:05
Speaker A
Where humans traditionally can't.
18:07
Speaker A
So, we're developing smart systems to allow these network systems to function for users all over the world.
18:14
Speaker A
And control the flows of traffic.
18:17
Speaker A
Okay.
18:19
Speaker A
We then and as mentioned before, need to focus on network access and security.
18:22
Speaker A
Now, we already know that we need logins and passwords to get onto the internet.
18:26
Speaker A
And that controls users, allowing them to identify who they are.
18:31
Speaker A
And what network rights they have to access information.
18:36
Speaker A
Okay, and that obviously passwords involves you typing in a string of characters.
18:40
Speaker A
But then these are also replaced with things such as biometrics.
18:44
Speaker A
Okay, in and you see it on your phone.
18:46
Speaker A
Your phone these days used to have to put in a pin code.
18:50
Speaker A
And you still do sometimes.
18:51
Speaker A
But you can also just do facial recognition.
18:54
Speaker A
Facial recognition, thumbprint recognition.
18:56
Speaker A
That's biometrics.
18:58
Speaker A
It's reading your biology in order to gain access into a system.
19:03
Speaker A
We also have a thing known as capture.
19:06
Speaker A
Okay, and that capture, that's used for detecting bots.
19:08
Speaker A
That's when you log into a website with your password, but you might get a prompt come on screen of an image.
19:16
Speaker A
And it might say, what does this word say?
19:20
Speaker A
And it might be in a more calligraphy style of writing with a graininess behind it.
19:25
Speaker A
And robots can't read that.
19:27
Speaker A
Because it's not in an OCR type of character that they can read off screen.
19:31
Speaker A
So, only humans can interpret that and it keeps the bots out.
19:34
Speaker A
Okay, same when you've got to uh click on the different squares on screen.
19:41
Speaker A
Saying where is the traffic lights or where are the mountains?
19:44
Speaker A
Okay, robots can't distinguish that from a multiple panel of images.
19:48
Speaker A
But humans can.
19:49
Speaker A
So, it ensures that only humans are getting into the system.
19:53
Speaker A
And then um what also might be on our systems too is that TPM.
19:57
Speaker A
The trusted platform modules.
20:00
Speaker A
Which is a chip that is used to support security measures.
20:05
Speaker A
So, support the booting of systems, making sure they are booting in a secure location.
20:10
Speaker A
As well as checking the signatures of users, their digital signatures that they're coming from trusted locations.
20:16
Speaker A
Okay, TPM supports that.
20:18
Speaker A
And then finally, software updates.
20:20
Speaker A
And you guys are updating software on your mobile phones and on your computers.
20:25
Speaker A
Software updates don't just uh update for uh compatibility and um efficiency.
20:32
Speaker A
They also update for security.
20:36
Speaker A
Okay, so when you update your software, it could be new protections are being put in place on your systems through the OS.
20:43
Speaker A
To protect you from um malicious software and unauthorized users.
20:49
Speaker A
Because they've picked up a pattern and then obviously, um platforms are trying to defend their users from this.
20:55
Speaker A
And they'll push that stuff out through software updates.
20:58
Speaker A
And then we've got the use of intelligent home networks.
21:02
Speaker A
Okay, and um you know, we've seen things such as Alexa.
21:04
Speaker A
Where we can speak out loud commands and things will happen in our home.
21:09
Speaker A
Switching lights on and off.
21:11
Speaker A
The ability to check your mobile phone to see internal security cameras within your house.
21:17
Speaker A
So, these internal intelligent home networks that are being established where digital data.
21:24
Speaker A
Is allowing us to do a lot of things from centralized devices.
21:30
Speaker A
From our mobile phone, from our computers.
21:32
Speaker A
And we can control functions within our house.
21:35
Speaker A
Wow, we're living in the future now, aren't we?
21:39
Speaker A
Okay.
21:41
Speaker A
So, the final area of this unit is creating a basic network.
21:44
Speaker A
Okay, so obviously a lot of the creativity here is happening in this portion of the unit.
21:48
Speaker A
So, we want to design and model a network.
21:51
Speaker A
We are setting up some sort of network.
21:54
Speaker A
Okay, and it mightn't be fully physical.
21:57
Speaker A
We're designing it, we're designing its logic, what nodes are we using to connect?
22:02
Speaker A
What devices and illustrating what mediums are we using to connect it all together?
22:07
Speaker A
We are going to apply project management tools in order to do this.
22:10
Speaker A
Okay, so what tools can we use, so the use of hardware and software to illustrate this here.
22:14
Speaker A
And map it out at how we're going to set up our network there.
22:20
Speaker A
Okay, we've got to have a bit of knowledge on how to configure network devices.
22:24
Speaker A
And that can be embedded into an assessment.
22:26
Speaker A
So, the logical naming of specific devices and then later on updating these devices.
22:32
Speaker A
With their naming, with their properties and what they're connecting with.
22:36
Speaker A
How to configure specific protocols on a network.
22:40
Speaker A
And configuring our actual devices for connection to the internet.
22:46
Speaker A
So, that stuff is potentially accessible within this unit.
22:50
Speaker A
In relation to the preliminary course and your knowledge in enterprise computing.
22:56
Speaker A
Okay, also the implementation of security protocols that we just mentioned before.
23:00
Speaker A
The setting up of passwords.
23:02
Speaker A
The setting up of potentially biometrics if you've got cameras enabled and all of that.
23:07
Speaker A
What things need to be done in order to protect users on a network?
23:11
Speaker A
So, a working knowledge of how to do that.
23:14
Speaker A
We want to be able to optimize performance on a network.
23:18
Speaker A
So, knowing how to improve bandwidth.
23:21
Speaker A
So, mapping out the routing of pathways on a network.
23:27
Speaker A
The actual mediums we are using.
23:31
Speaker A
Okay, to distribute data.
23:34
Speaker A
So, as we know, optic fiber is the best wired medium, but it's expensive.
23:38
Speaker A
The actual nodes that are at our central nodes.
23:41
Speaker A
So, our uh routers and switches that might be centralized.
23:47
Speaker A
How have we placed them out on our network and how is our network traffic mapped through that?
23:52
Speaker A
All of that helps improve bandwidth.
23:55
Speaker A
But then also the other side of it too of updating drivers and firmware.
24:00
Speaker A
Okay, so pushing out updates to our devices.
24:03
Speaker A
Which manufacturers do for phones and computers all the time.
24:07
Speaker A
Okay, allowing the actual software to be updated so it can continue being optimized.
24:13
Speaker A
And compatible with new technology out there.
24:17
Speaker A
And then the final area of this unit.
24:21
Speaker A
Okay, evaluating the transmission IT.
24:24
Speaker A
Okay, how good is it?
24:26
Speaker A
Can it be improved?
24:27
Speaker A
How can we evaluate the IT?
24:30
Speaker A
So, looking at when data is unsecured.
24:33
Speaker A
What can we do about it there to ensure that it gets secured?
24:36
Speaker A
The use of encryption, the ability to scramble data prior to transmission.
24:40
Speaker A
So that when it is transmitted, okay, if it does get intercepted, it won't make sense.
24:45
Speaker A
It can't be read.
24:47
Speaker A
But ensuring that when the user gets it there in, they have the appropriate decryption key.
24:52
Speaker A
Okay, to translate that data back into readable form.
24:55
Speaker A
Okay, so that comes along with it so they can interpret the data there.
24:57
Speaker A
And then finally, just ensuring that our infrastructure is set up in a way that is logical and allows for data to flow through our network logically and efficient.
25:05
Speaker A
So, I hope this video has given you an understanding of the network systems and social computing unit of the enterprise computing preliminary course.
25:13
Speaker A
It is the most technologically heavy topic in relation to understanding content.
25:20
Speaker A
There is a lot here.
25:22
Speaker A
And as you can see with this mind map, it's a big mess.
25:25
Speaker A
But it is all terminology, so learning this terminology here and understanding the relationship between terminology.
25:32
Speaker A
Will allow you to be successful in understanding this unit.
25:37
Speaker A
Okay, and remember, we're not just learning about network technology and infrastructure, but how it is used to support social networking.
25:45
Speaker A
Okay, the fact that it allows for the efficient interaction between different users globally in many cases with these enterprise systems.
25:53
Speaker A
To allow them to share ideas and have a pleasant online experience.
25:59
Speaker A
Through their technology, so no lag and they can get to the data they want.
26:04
Speaker A
And that loads quickly, okay, based on the efficient setup of these network systems.
Topics:enterprise computingnetworking systemssocial computinggraph theorynetwork theoryInternet of ThingsInternet of Mesocial media appsremote workdigital workflows

Frequently Asked Questions

What is the focus of human-centric computing in this unit?

Human-centric computing focuses on designing systems that prioritize individual users' efficiency and engagement in their work and interactions.

How do graph and network theory relate to social networking?

Graph theory maps out users, pages, and groups, while network theory shows the flow of information among these elements, helping manage social media interactions.

What role do apps play in social networking platforms?

Apps expand social networking functionality by adding new features, such as games or sharing tools, enhancing user engagement within the platform.

Get More with the Söz AI App

Transcribe recordings, audio files, and YouTube videos — with AI summaries, speaker detection, and unlimited transcriptions.

Or transcribe another YouTube video here →