Академический Документы
Профессиональный Документы
Культура Документы
The Advantages (Benefits) of Networking You have undoubtedly heard the “the
whole is greater than the sum of its parts”. This phrase describes networking very
well, and explains why it has become so popular. A network isn't just a bunch of
computers with wires running between them. Properly implemented, a network is a
system that provides its users with unique capabilities, above and beyond what the
individual machines and their software applications can provide.
Most of the benefits of networking can be divided into two generic categories:
connectivity and sharing. Networks allow computers, and hence their users, to be
connected together. They also allow for the easy sharing of information and
resources, and cooperation between the devices in other ways. Since modern
business depends so much on the intelligent flow and management of information,
this tells you a lot about why networking is so valuable.
Here, in no particular order, are some of the specific advantages generally associated
with networking:
Connectivity and Communication: Networks connect computers and the users of
those computers. Individuals within a building or work group can be connected into
local area networks (LANs); LANs in distant locations can be interconnected into
larger wide area networks (WANs). Once connected, it is possible for network users
to communicate with each other using technologies such as electronic mail. This
makes the transmission of business (or non-business) information easier, more
efficient and less expensive than it would be without the network.
Data Sharing: One of the most important uses of networking is to allow the sharing of
data. Before networking was common, an accounting employee who wanted to
prepare a report for her manager would have to produce it on his PC, put it on a
floppy disk, and then walk it over to the manager, who would transfer the data to her
PC's hard disk. (This sort of “shoe-based network” was sometimes sarcastically
called a “sneakernet”.)
True networking allows thousands of employees to share data much more easily and
quickly than this. More so, it makes possible applications that rely on the ability of
many people to access and share the same data, such as databases, group software
development, and much more. Intranets and extranets can be used to distribute
corporate information between sites and to business partners.
- If Sever develops a fault then users may not be able to run the application
programs.
- A fault in the network can cause user to lose the data.
-If the network stops operating then it may not be possible to access to various
computers.
- It is difficult to make the system secure from hackers, novices or industrial
espionage.
- Decisions on resource planning tend to become centralized.
- Networks that have grown with little thought can be inefficient in the long
term.
-As traffic increases on a network the performance degrades unless it is
designed properly.
- The larger the network becomes difficult to manage.
State any laws and the punishment of the crime enforce by
the law makers
The phrase that I hear often from many investigators who feel that technology
is being forced upon them is, "But this is the way we've always done it and it's
always worked. Why change?" We all tend to resist change and we all fear the
unknown.
Now I realize that anyone who has arrived at this page and is reading this article
probably does not fall into this category, but we are the ones who must help
educate our fellow investigators and assist them and be patient with them and
do whatever we can to ease them into the twenty-first century!
We owe it to ourselves and to the people we protect to use whatever
tools we can to enhance our chances of a successful investigation.
This is not to say that old fashioned police work is out-dated. On the
contrary, modern technology can help give investigators that elusive
starting point, from whence we can use our investigative skills to
identify, track down, interview and interrogate witnesses and
suspects.
These are some of the tools from the realm of computer technology
that we should be educating ourselves about and using:
Computer Databases
In any investigative unit, especially units that specialize in pattern crime, unit-
level databases can be utilized for:
Case management
Identification of trends and patterns
Suspect MO files
Statistical analysis
Major case lead control
Equipment inventory
Track parolees
as well as many other uses limited only by one's imagination.
The Internet
The internet not only opens us up to a world of information (the life blood of the
investigator), but allows us to see what is going on in other locales, police
departments, organizations, etc. Surveillance photos can be posted for the
public to see. Contacts can be developed with members of other police
organizations world-wide and discussions of any subject conducted.
Information can be transmitted, exchanged or obtained. The internet is so wide
open that we would do ourselves a disservice to not learn everything we can
about it. And, of course, the internet opens many new worlds to the criminal. We
must stay up with him, if not ahead.