星期三, 7月 28, 2010

大量電腦文件備份

如果擔心電腦出現問題而導致資料流失,文件備份無疑是較好的方法。


備份檔案有很多方法,例如使用部份檔案伺服器的Time machine功能、使用windows內置的「製作備份」精靈等等。而本文介紹的,是 xcopy 系統指令。


首先要知道需要備份的文件位置在那裏,例如:

  Windows XP Windows 7
我的最愛 C:\Documents and Settings\healthy\Favorites 待更新
我的文件 C:\Documents and Settings\healthy\My Documents C:\Users\healthy\Documents
我的音樂 C:\Documents and Settings\healthy\My Documents\My Music 待更新
我的圖片 C:\Documents and Settings\healthy\My Documents\My Pictures 待更新
桌面 C:\Documents and Settings\healthy\桌面 待更新


在上面的例子中,healthy 應該改為閣下的使用者名稱。


backup files in C Drive to Protable Harddisk Drive:
假設閣下的 external HDD 為 E:

如果要複製所有 C 磁碟機的檔案至 E 磁碟機,可以:
xcopy c:\*.* D:\ /e /g /h /r /y

==================================================

複製檔案和樹狀目錄。

XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
                           [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
                           [/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z]\r\r
                           [/EXCLUDE:file1[+file2][+file3]...]

  source       指定要複製的檔案。
  destination  指定位置或者/以及新檔案的名稱。
  /A           只複製設定成保存屬性的檔案,不要改變屬性的設定。
  /M           只複製設定成保存屬性的檔案,並清除保存屬性。
  /D:m-d-y     複製在指定日期當天或之後發生變更的檔案。如果沒有給日期,
               只複製那些來源檔案日期比目的檔案日期為新的檔案。
  /EXCLUDE:file1[+file2][+file3]...
               指定檔案清單字串。每個字串
               應該在檔案中的不同行。如果有字串對應到要進行複製的檔案絕
               對路徑的任何部分,這個檔案會被排除複製。例如,指定字串
               \obj\ 或 .obj 的話,會排除所有在 obj 目錄下副檔名是
               .obj 的檔案複製。
  /P           在建立每個目的檔案時顯示提示。
  /S           複製每個目錄及其包含的子目錄,不複製空目錄。
  /E           複製每個目錄及其包含的子目錄,也複製空目錄。/S 與 /E
               相同,能夠用來修改 /T。
  /V           驗證每個新檔案。
  /W           在複製之前提示您按鍵繼續。
  /C           如果錯誤發生時也繼續複製。
  /I           如果目的不存在且複製一個以上的檔案的話,就假設指定的
               目的一定是目錄。
  /Q           在複製時不要顯示檔名。
  /F           在複製時顯示來源及目的檔案的全部檔名。
  /L           顯示要複製的檔案。
  /G           允許加密檔案複製到不支援加密的
               目的地。
  /H           時複製隱藏檔和系統檔。
  /R           覆蓋唯讀檔案。
  /T           建立目錄結構,但不複製其中的檔案。不包括空目錄及子目錄。
               /T /E 會包括空目錄及子目錄。
  /U           只複製已經存在目的位置的檔案。
  /K           複製檔案屬性。通常 Xcopy 會重設唯讀的屬性。
  /N           用所產生的短檔名來進行複製。
  /O           複製檔案所有權及 ACL 資訊。
  /X           複製檔案審查設定 (包含 /O)。
  /Y           不要提示您確認是否要覆蓋一個已經存在的檔案。
  /-Y          示您確認是否要覆蓋一個已經存在的檔案。
  /Z           在可重新開始的模式中複製網路檔案。

參數 /Y 可以在 COPYCMD 環境變數中預先設定。但可以在命令列中用 /-Y 參數
來覆蓋原有設定。

星期三, 7月 14, 2010

3HK 上網手指設定方法

使用插有3台 SIM 卡的上網手指, 便可以在没有提供 WIFI 上網的地方任意使用 3G 手指上網.

疑難排解:

如果未能成功連線,可參考以下設定.












星期二, 7月 13, 2010

Impact of Multimedia and Information Technology on Communications and Privacy.

Activities:

  1. Identify, if you can, four different government departments that you expect would have a “file” on most people.


Note
This may depend on the students’ nationality, but likely to include the following government departments:
- Birth, Marriage, Death register
- Health/ Hospital/ Medicare record
- Education history
- Taxation history (personal income details)
- Drivers license (and history of cancellations).

There will be others that exist for “most” people….and lots that are specific to just some people (such as passport office, jail detention)…but these do not count for this question.



  1. Do you think some people would have concerns if such files were to be amalgamated and cross checked? Why?


Note
In principle…when ever a person has given different information to two or more such government departments, then there is scope for such differences in information to be identified, and the person to be held to account for misinformation.

For example, information about income, place of residence, medical conditions.

There may also be concern that information that is considered personal and private should only be disclosed on an as-need basis. For example, a personal history of adoption, or a medical history that indicates treatment for cancer, should not be disclosed in the context of Education, or to the people who the person needs to deal with in such educational institutions.




  1. Identify, if you can, four different businesses that you think may have a “file” on you.


Note
This will vary for each student, but may include the following business types:
- Groceries or supermarket (food, drink, toilet paper, pet food, cigarettes)
- Bottle shop (beer, spirits, wine)
- Garage (type of car or motor bike, repair history)
- Computer store (software and hardware)
- Electronics goods store (TV, stereo)
- Chemist (medications, prescription drugs)

You may or may not also consider:
- Banks (account types, wealth, mortgages)
- Insurance (possessions, locations, value)



  1. Do you think some people would have concerns if such files were to be amalgamated and provided to the public domain? Why?....and of what use is such information to other businesses…  and who OWNS such information?


Note
Some people – yes….but perhaps not all.

Essentially, ones’ consumer habits may be considered to be ones’ own business. Whether a person consumes excessive amounts of soft drink (or alcohol), cigarettes, needs their car repaired “often” due to crashes, owns lots of expensive computer hardware and plasma televisions, or is required to take a specified prescription drug, may all be the source of embarrassment for many. It may also offer an increased risk to the chance of burglary since the likely contents of their home are now disclosed.

Remember too, that some businesses may pertain to aspects of sexuality (brothel), religion (church sponsorship), or ethnicity (restaurant type… such as Indian, Chinese, Thai, Mongolian… or any other ethnic food type).

All of the above information is considered valuable in the context of direct marketing. Knowing the types of products purchased, the brands purchased and the relative volumes purchased, may encourage a manufacturer of a competing product to target a specified individual because they believe that the person is a likely potential customer.

The issue of ownership of such information is…”tricky”. Each individual owns the information about themselves. Information freely given for a specified purpose must not be used outside of that purpose. Information given freely by an individual, but who does not realise the range of purposes that it could be used for, may be open to use as the fault can be argued to lie with the consumer for failing to fully inform themselves. Others may argue that there is a need to ensure consumers fully understand the intent of use before such consent may be granted.

Consider the in-house purchase cards (store specific credit cards) used by many large chains of grocery stores. Such cards are argued to provide convenience to the consumer, and may also offer benefit by way of discounts….but the cards also explicitly identify the user, the purchases, the dates, the amounts spent…and so on. Over time this enables a profile of the customer to be defined….and this information may be a valuable item that, depending upon the circumstances, could then be on-sold to a third party.


  1. Do you think that banks, medical centers and lawyers are suitable examples of businesses that could be considered above in Question 3 and Question 4? Explain your reasoning. What differences do you think exist between these businesses and those that typically sell grocery items or newspapers?


Note
Students are free to see businesses such as banks, medical centers and lawyers as appropriate (or inappropriate) to their answers to Question 3 and Question 4 above. It depends on personalised point of view.

The point here is that governments (and society) have historically considered personalised information about finances, medical conditions and legal records to be protected by law and to represent areas of a moral-right to privacy. It is generally illegal to pass such information to anyone who does not hold a legal right to access it. The individual in question will often be required to authorise such disclosure by signing a release form.

Release of such personal information (finances, medical, legal) to the public domain may clearly be harmful to the individual in question.

The changing market place means that lots of data is now often collected about a wide range of purchases (both goods and services) that an individual may make. Such benign information as grocery items purchased may lead to personal implications not realised as achievable, by techniques such as data mining.

The whole area of “privacy” needs to be re-evaluated in the context of data about individual consumer behavior.



  1. In undertaking the discussions above ….is it possible that anyone’s privacy has been breached? Explain your reasoning.


Note
The top of this tutorial question sheet specified to students to:
“Only provide information about yourself that you are comfortable providing in a public domain.”

I am trying to ensure that no participant finds themselves in the situation where he or she has disclosed information about their consumer habits (shops used, products purchased) that may result in embarrassment, harassment, or vilification.

It is important to note, however, that in principal there are people who may experience embarrassment, harassment, or vilification if details of their purchasing habits were to be provided to the public domain. These are some of the specific risks that arise from data mining and direct marketing.



  1. Identify three (possible) advantages in using email compared to phone conversations.


Note
This will vary between students, but advantages of email over phone conversations may include:
- provides a hard copy record of what was said or what advice was given
- enables one to consider carefully their wording in comments, questions, argument, or complaint…to thus avoid “speaking in the heat of the moment”
- enables one to pen their thoughts at any time of day….even if the person to whom it is directed is absent or asleep.
- can write, send and receive emails without causing disruption (or at least minimal disruption) to those around them. (NOTE: I am not suggesting that you should attend to emails during a class)



  1. Identify three (potential) disadvantages in using email compared to phone conversations.


Note
This will vary between students, but disadvantages of use of email over phone conversations may include:
- much less personal to communicate in writing than by conversation
- absence of intonations indicating excitement or confusion, laughter and other verbal cues that do not translate easily to text.
- does not generally provide immediate (real-time) feedback, ensuring that one “knows” the message has been received.
- generally takes longer to write material than to speak it.



  1. To what extent do you use email and phones (including SMS) differently?


Note
This will vary between students.

All options are acceptable here because the question is capturing personal habits.

In general, however, I anticipate that phones are used more with ones’ close network of friends (contained within their phone listing), while Emails are used more for “formal” communications with institutions such as universities, and government departments.

Emails are also likely to be used between close friends when there is a need to “document” the conversation (such as a collaborative assignment, or preparing to book plane tickets for a shared holiday) or when there may be large cost implications for phone usage (due to being in different locations on the globe)….though applications such as Skype will impact upon this.



  1. Are there practical alternatives to written signatures to demonstrate that you agree to something, such as a contract, provided by Information Technology?


Note
Some forms of alternative contract agreements are already in use, such as:
- audio dialogue capture to demonstrate agreement to a contract presented by phone conversation (these are popular with phone companies undertaking direct marketing)
- video capture of interviews, such as police interrogation. Note that these are “better” than a signature on paper because they more clearly indicate the dynamics of the situation to demonstrate if coercion is present, or the extent to which the words presented are or are not those of the person being interviewed.
- mobile camera phones; these offer the potential for dedicated video capture available to the broad population, and have already been used to “document” events such as accidents, physical attacks or verbal abuse.



星期五, 7月 09, 2010

Cybertechnology in Industry, Manufacturing, Business and Commerce.

Activities:

  1. Provide an example of how Cybertechnology (such as computers, robots, automated machinery) may be used in heavy industry (such as mining). What benefits do you think derive from such use?

Note
Some aspects of underground mining may be conducted by automated equipment, such as drilling. Such machines can undertake at least some of the hazardous tasks, thus reducing the risk of injury to human workers.

Over the last few months there has been much in the media of potential negative consequences when things go wrong with oil wells tapped deep in the ocean (BP in USA). Although such drilling is done remotely and the response to the “leak” has been using robot submersibles, it is likely that the errors made leading to these event will lie with the decisions people made and how they executed them, not in the use of cybertechnology per se.

  1. Provide an example of how Cybertechnology (such as computers, robots, automated machinery) may be used in manufacturing (such as automobile production or electronics). What benefits do you think derive from such use? What negative effects may be associated with this use?

    To what extent are the “negative” effects aligned to factors of social change?

Note
Some aspects of manufacturing may be conducted by automated equipment, such as robotic assembly lines. Examples include both “large” item manufacturing such as motor vehicles and “small” item manufacturing such as electronic goods or “micro” item manufacturing such as computer chips.

Such machines can perform repetitive tasks with both a high degree of accuracy, and at a relatively high speed compared to human operators.

One of the negative effects of such cybertechnology is the general loss of manual labouring jobs. The people who are made redundant from such positions need to be re-skilled in other tasks, which could include the operation and maintenance of such robotic assembly lines. Typically this results in many people who hold unskilled jobs needing to move towards higher skilled jobs.


  1. Provide an example of how Cybertechnology may be used in business. What benefits can be demonstrated to derive from such use?

    How, if at all, do you think the use of this technology has impacted upon “redesigning” jobs?

Note
Almost all medium and large businesses today have the capacity to accept EFTPOS (Electronic Funds Transfer at Point of Sale). This facilitates more effective and more efficient management of financial transactions for both business and customers.

Also, virtually all aspects of product inventory, stores, and ordering are now managed using information technology, such as a data base. Such tools add to the effectiveness (accuracy) and efficiency (less time required) of managing information.

Due to the inroads that cybertechnology has made into the business world, most jobs in this sector have needed to be redesigned to incorporate use of computers into the structure of the tasks performed and general skill sets required, such as computer literacy. The vast majority of people employed in modern business contexts operate computers as part of their job, many having their own dedicated workstation.


  1. Provide an example of how Cybertechnology may be used in commerce. What benefits can be demonstrated to derive from such use?

    What risks, if any, accrue from enabling “computer systems” to make “decisions” about the finance markets?


Note
Stock markets operate in real time with markets not only fluctuating day by day, but also throughout the day, sometimes quite dramatically in the space of minutes, and the effects can be at a global level.

The advent of cybertechnology incorporating aspects of both computing and communication enable stock markets to operate efficiently and effectively at a global level. As the price of both commodities and the relevant exchange rates vary, opportunities are created for financial gain for those who have best utilized aspects of information and communication technology. Small shifts in markets can be leveraged by the purchase or selling literally billions of dollars in shares, stock, gold or international currencies.

One risk to stock markets is over utilization of automated buy and sell prices. Should a rapid and dramatic rise or fall in the stock market occur, then there is scope for the automated computer systems to initiate trades over and above those that may have been deemed appropriate by a “live” (human) stock broker.


  1. In the global context, what trends in outsourcing are occurring in Information and Communication Technology? Where (globally) are such markets expanding?

    How does outsourcing of “project management” for IT and software design, differ (if at all) to outsourcing of the production of code?

Note
By their nature, information and communication technology tasks are highly suitable to being undertaken on a global market because many of the tasks are such that they can be performed anywhere on the globe, with the job request and the result (finished product or outcome) being submitted electronically via the internet.

India provides a relatively inexpensive labor force with many people skilled in IT who also have a good command of the English language. This has positioned India to work in IT within a global market.

China is also rapidly expanding its capabilities in information and communication technology and is anticipated to provide another large pool of cost effective IT professionals in due course.

While outsourcing of jobs in information and communication technology to India and China have been generally increasing, the focus is upon the production of code while much of the “project management” related tasks remain within the host country. This means that while a developed country such as USA, England or Australia may undertake the analysis and design aspects of a software design project, the actual production of code (or large portions of it) may be sent overseas to markets that provide relatively inexpensive IT expertise.


  1. If you where required to purchase four new tires for a car…what would you do in order to acquire three quotes for comparative products (i.e.….phone, on-line, visit). Why?

Note
This will depend on each students experience and views…but typically I anticipate that many students would drive the car into the tire shop so that they can receive quotes and see the tires that they would receive.

Once one quote had been obtained, and tire type desired identified, one could also then make use of a phone to obtain other quotes.

There is also scope to use the web, but this is not likely to be the immediate first choice.

The point of this question? To demonstrate that some purchases do not make much sense on-line. And with the tires…it starts getting silly to think that you may purchase them on-line and have them arrive a few days later in the mail for you to “install” yourself.


  1. List three products that you believe are sensible for people to purchase on-line. Justify your answers.

Note
Any digital material such as software, music CD and movie DVD, because no matter where it is obtained from, all are “identical”….assuming of course they are not pirated copies.

Similarly, books are an ideal item because once a specific title has been settled on (such as the textbook for this unit), then no matter where it is purchased from, the book will be the same.

Any product line that is manufactured to a set standard (for example, from a specific brand and gauge of guitar strings to a seat on an airplane) can, in principle, be purchased on-line without impacting upon the quality of the purchased item.


  1. List three products that you believe are not likely for people to purchase on-line. Justify your answers.

Note
Any piece of art work, be it a painting, ceramic pot, or mosaic, because there will be a strong desire to see the real object prior to purchase.

Any musical instrument, be it a guitar, cymbal or piano, because there will be a strong desire to hear and feel the real object prior to purchase.

Any new (untried) perfume, because there will be a strong desire to smell the real object prior to purchase.

Fresh fruit and meats, because there will be a strong desire to “inspect” the food prior to purchase. Note that bulk orders and/or “regular” customers may in time come to “trust” the quality of the food and so then shift towards a state of acceptance of on-line purchase from a tried and tested provider.

  1. Describe possible fears and risks people may hold with respect to purchasing items on-line. Provide some ways by which these risks may be minimised?

Note
People could have fear of personal credit details being misused to purchase additional items, or fear of personal details being misused to engage in identity theft for “other” purposes.

Fear that the purchased goods will never arrive, or that the goods received will not be as represented prior to purchase (i.e. they will arrive either damaged or of inferior quality).

To minimize risks options exist to:
- insist on forms of security such as encryption.
- use credit cards that have a relatively low limit
- use a third party transaction company to manage the exchange.


  1. Describe the relative advantages and disadvantages that you perceive in telecommuting. Do you have any strong preference for working from home verses an office? Note: this includes working as a student.

Note
Different people will have different views….but some ideas are:

Advantages:
No need to waste time and money on travel
Cheaper for food because can make use of own kitchen
Convenience of being able to work whenever the desire or ideas come
Flexibility of mixing work with domestic duties such as child care
No need to “dress up” for an office environment (such as in a suit).
          - Indeed, no need to be dressed at all
Peace and quiet without distractions.

Disadvantages:
Encroaching of work life into home life
Loss of space within the home, due to the need to dedicate a room as an office
Inability to escape distractions such as noisy children
Loss of social interactions with peers and colleagues

Some students will like the idea of telecommuting, but others will dislike the prospect. This may be an example of personal preferences being individualistic.

Telecommuting will continue to evolve towards a powerful and immersive option to real commuting and real office work.


推薦此文