Sunday, April 17, 2011

Tutorial Blog 4: Video Conferencing

Video Conferencing is an excellent tool for businesses to communicate with one another face to face while not having the hassle of traveling to the exact geographical location of the other business. It is a convenient tool to have and removes the stress of commuting to and from meetings. Now that video conferencing hardware and software has become so affordable many companies use it.
In order to engage in a video conference with someone you must have a computer, video conferencing software or web application like skype, microphone, speakers, and a built in or attached video camera.
An example of a video conferencing software is Cisco's WebEx which allows the user to invite multiple users to view their live video stream from their desktop, laptop, or mobile device. You can also record your video sessions to review for later use.
WebEx business meeting

WebEx is great for businesses to communicate but another online video conferencing tool thats is more for social networking is Skype. Skype is available for your desktop, laptop, mobile device, and tv.
Skype
I personally use Skype and enjoy the face to face interaction you can have with someone without leaving your home! Its a great way to connect with family members or friends that may live out of town.
Its easy to download and they offer a free trial to try it out! Just go to www.skype.com to get started!

Saturday, April 9, 2011

Secure Email Project





Big Brother: Being Watched at Work and the Truth about Email Security at the Office

The article above is warns employees, or anyone that uses email as a means of communication, to use secure emails because anyone can access your message and tamper with it. A list of potential threats if your email is not secure are : Eavesdropping, Identity theft, Invasion of Privacy, False messages and message modification, unprotected backups, and Repudiation. To avoid these threats you should make sure all of your incoming and outgoing emails are secure from unwanted readers by using encryption.