jnielsen's blog

Individual Blog - Wireless 4

Worked on the usibility report and added a title page to the documenation.  Also scanned all of the surveys connducnted by our group to include with the final documentation.

Individual Blog - Wireless 3

I reviewed the documentatin and worked through it.  I fixed a few problems and clarified a few items and subitted the rought draft during class.

Individual Blog - Wireless 2

I completed a rough draft of the documentation.  I also reviewed the storyboard and added some items to it.  I am currently working on schedualing usibitlity test with subjects to test the rough draft documentation.

 

Individual Blog - Wireless 1

I compelted the gant chart as well as make changes to the memo.  I submitted both items and am currently working on some very rough directions that can be used to create a story board.

Individual Blog - Gaming Pirates 4

I created a very short introduction and helped create a title page.  I added a table of contents to the left margin.  I also trimmed about 200 words from the SecurRom section since the paper was 300 words over the max paper limit.

Individual Blog - Gaming Pirates 3

I completed my research on gaming piracy.  I chose CD keys, Microsoft XBOX, and SecuROM.  I wrote about these soultions and how they prevent video game piracy.  I then discussed the problems that each solution has.  I also took what group work was done and complied it all into something that looks like a white paper format.

Individual Blog - Gaming Pirates 2

I have continuted research and have found seveal different methods that are currently employed by the gaming industry to cut down on pirating.  I am still sifting through all of the material and deciding on three solutions to write about.  By monday, i hope to have a very rough rough draft develped that covers three current solutions and the problems with those solutions.

Individual Blog - Gaming Pirates

I started to do basic reseach on currently techniques used to prevent video game piracy.  I  discovered that Star-Force is a decent protection method used to protect the actual game media it self. I have also reasearched how CD/DVD keys have been used to provide basic protection.  Doing research I also discovered online distribution methods such as Steam by VALVE can be used to make pirating difficult.

Topic Proposal: Google becoming too powerful

Google has become an excessively large company and is trying to compete in just about every technological sector that exists today.  Unfortunately this can have some severe security repercussions in all of the areas that Google is currently a part of.  Google is trying to implement services that can be used everywhere by anyone at every time.  This co

expierence of the awesome variety

I have worked for my dads computer company for the past several years.  I was required to build, setup, and repair computers both at our office as well as at the customers sites.  Through this expierence I have hone both my computer skills as well as my problem solving skill.  In addition to those skills I also learned how to explain complex computer concepts to customers in a way they could clearly understand.