Monday, April 14, 2014

Week 8-The Future of Technology and You

o6/17/2040
Dear children,
I wanted to write this letter so that you may receive a glimpse into my past. The world has not always been exposed to awesome, new creations such as the ones that are available today. In the present year of 2040, there are inventions like floating cars, phones that are used like a glove, and other resources that prove to be very useful and beneficial. Back in my day, this type of technology was a mere thought, but had never been put into action. The future of technology can never be totally predicted. The truth is, is that we will always be creating new, and better advances in technology.  The sky is the limit for the future of technology. So, now let me inform you about the past so that you may appreciate how far technology has come, and how it has come to make our lives easier.
Back in the year 2014, the average citizen's vehicles never left the ground. Instead, they would use giant, flying machines that seated 100 people by the name of airplanes. The type of travel that consists of total strangers having to travel together, is no longer necessary because nowadays, the average person owns their own flying automobile. In addition, computers were much slower and far larger than what they are today. Large hardrives and other computer parts were necessary in order to operate; however, sometimes proved to be burdensome when they wouldn't work properly and take to slow. Rarely is this the case, in our present day. Never do you hear people complaining over their computer working to slowly. In addition, computers nowadays are more portable than ever before. Back then, big bags and suitcases were required in order to transport the average size laptop. Wearing your computers in a fashionable way via sunglasses, watches, or gloves is much more handy and effective, wouldn't you say? Another way technology has evolved, is through its use of cyberbullying. When I was a teen, cyberbullying posed as a serious problem that just about ever child had to face. At that time, legal consequences would soon follow as a repercussion for the bullying; however, laws were never as strongly implemented as they are in our modern age. At that time, suicide rates were soaring because of how many children felt as though there was no hope. Now, those numbers have dropped dramatically--this is something to be very proud of. With new technology, insulting and crude remarks are immediately picked up by the computers and inform adults set up on the program, exactly what the bully said, when he/she said it, and where they sent the message. As you can tell, this problem is now under much more control.
In conclusion, technology has come a far way thanks to those who decided to think a little creatively and not be afraid to put their thoughts into actions. Although the future of technology can never be guaranteed, we can always hope and dream of the great things that the future holds in store for technology.

Sunday, April 6, 2014

Digital Relationships and Respect--Week 7

To the Victims of Cyber bullying and Cyber bullies:
So what is cyber bullying exactly? Well, Cyber bullying is the act of bullying using electronic devices. Whether this be done via email, twitter, Facebook, through fake profiles, through mean comments, etc,..., cyber bullying is a form of bullying. Some people argue that cyber bullying is the most predominant way teens are harassed. It is truly shameful to say that those cyber bullying are often times the victims friends. Most kids cyber bully one another in an act of retaliation--for jealousy purposes. However, others bully because they have a lot of built up anger and frustration and unleash it on others. There are too many people who are cyber bullied, but even more people just sit back and watch the abuse go on, right before their very own eyes. Being a bystander and tolerating the bullying (also known as not speaking up for the victim) is just as bad as what the bully himself/herself is doing. One simple acts of kindness has a ripple effect and can impact the lives of many. Cyber bullying must stop now because no one should feel greater or less than any other human being.
To those of you who are being cyber bullied, the biggest advice anyone can give to you is that you need to realize that you are so special and that all those hurtful comments and messages that the bullies leave for you, are bogus. The most common driving force for the bullies is that they want you to feel less than them. By them putting you down, they feel superior to you, and every time that you succumb to their abuse, it feeds their evil thoughts. The truth is, is that they are insecure people who by putting others down, receive pleasure and recognition. By remaining strong and keeping your head held high, you are showing the bully that every human being is indeed a beautiful creature and that no one is entitled to make another person feel lower than them. You also want to make sure, to not retaliate to the bully. If they have sent something cruel and malicious to you, take a moment to cool off, instead of immediately, sending something mean back. It is only human to want to do onto others as they have done onto you, but it requires a strong individual to control their emotions, and to not react based off of them. In addition, do not delete the bullies comments to you. They maybe evidence for future needs. As soon as the bullying begins to get serious or hurtful, tell an adult you trust (like your parents) so that you can get them involved, and they will make a wise choice, in what to do next. Also, if you can, try to block the bully. When it comes to overcoming cyber bullying make sure to: get a parent/guardian involved, try to block the bully, but make sure to save the evidence of the bullying, don't retaliate or get back at them, and of course, know that you are so much more than what the bully is trying to make you out to be.
To those who are cyber bullying, there needs to be a stop. If you think that it is cool to sit behind a computer screen and insult others in attempts to make them feel horrible about themselves, think twice before you do so. What at first may seem to be harmless, may come down to a life or death situation. Many victims of cyber bullying have taken extreme measures such as suicide, because of the unceasing taunts. Cyber bullying is a serious matter and its totally not okay to do. Not only are you ruining a life and degrading a human spirit, but you may also suffer serious federal consequences such as being sentenced to jail or fined. Just as bullying in real life is detrimental, so is bullying online. Either form of bullying is making other people feel worse about themselves and can become something extremely grave. Please stop the cyber bullying and consider how others may be affected as a consequence of your actions. Remember that all humans are creatures of God and instead of bringing one another down, let us left one another up.
Your friend,
Anna
Some information and guides to help with cyber bullying:http://www.stopbullying.gov/cyberbullying/

Sunday, March 30, 2014

Creating Multimedia Productions

This week in our technology class I learned that copyright laws require people to give credit to the owner of an image, website, information, book, etc,... These productions are called multimedia productions. Copy-right laws permit people to not allow others to steal their ideas and thoughts as well as productions for others to use and claim as there own. Furthermore, Copyright information includes the information or date the photo was created and the owners name. Copyright laws for movies can be extended for many years after the movie was made--even past the owners death. For instance, Star Wars was made in 1977 but has copy right laws that protect it for about 95 years after the movie was made (until 2072). Creators of materials like art, books, pictures, etc,... are granted the power to manage and sell their products. Permission is required for people to use copyrighted information. However, creative commons allow people to use their work as long as attribution and non-commercial measures are taken. The owner of the product secures some rights of the material; however, her product can be seen by anyone at any time. In order to use information that is copyrighted you can contact the owner and ask for permission and if they accept your request than you receive a license fee. This is part of the fair use system. Both people benefit from this system--you get the information/picture you wanted and the owner is better able to navigate the kind of career they wanted from their production.
Here is a video I partook in about the consequences of plagiarism and that if information is copyrighted and you steal it, then you can suffer serious repercussions:https://www.youtube.com/watch?v=QAWD_mZV6mc
Other videos that I got information from:http://www.commoncraft.com/video/copyright-and-creative-commons
http://www.youtube.com/watch?v=tk862BbjWx4&feature=youtu.be&scrlybrkr=48103120
Just cause other people commit the act of piracy, doesn't mean you should:https://www.youtube.com/watch?v=kTuOjKh_DDM

Sunday, March 16, 2014

Credible Sources

Nowadays, the internet has tried to sell us just about everything it says. After studying this week's topic, credible sources, I have come to obtain the knowledge of discerning whether or not a source is credible. There are three major ways of differentiating the realness to the falseness of a cite (however, you can also break it down to five currency, relevance, accuracy, authority, and purpose). First, you want to make sure that the information isn't biased. For example, if you have a website that is trying to sell you a topic and all they mention is how good the topic is, they are imparting partial and biased information to its readers. The danger of using a cite that isn't credible is that, you may be getting "blinded information" or information that isn't true and is narrow minded. When authors write in a biased form, they are writing based on opinions rather than on facts. Another step, should be that web users check the author's biography. By seeing how experienced the author of the article or website is on the subject, it can give you a glimpse into how accurate the information he/she wrote about is. An author who is inexperienced and makes a lot of typing and grammatical errors, may have lead you to a shaky and unreliable source. For instance, if you come a cross an author who graduated from a college, has held professional jobs in the field you are researching, and seems to know what they are talking about, then I would establish that cite as credible and reliable. Lastly, in discerning the realness of a source you want to see how recent the cite has been updated. If the source was updated 10 years ago it may not have such valid information on it, as a source that has been updated recently that day. Newly found information is changing at rapid paces everyday. Therefore, if you are going to do an assignment on a certain subject for an important class of yours, you are going to want to verify that all your information is up to date. In other words, having a source that is updated frequently means that the information derived from it will be more likely in being reliable. After all, everybody want's the best grade on their assignments so in order to receive the best grades, they need to have the best quality of information.
Wikipedia, may perhaps be the world's biggest controversial source--Can I trust it or can I not? The truth of Wikipedia is that most of the sources it derives the information from are credible; however, because of the many unprofessional people that transmit the information on to the website, the information becomes warped and contorted, no longer making it reliable. However, strides have been made by Wikipedia's authors and founders to ensure the reliability of its information. More experienced and intellectual college students are being licensed to edit Wikipedia; hence, making it a more reliable source. In the end, Wikipedia is a great source to use when you want quick and easily attainable information, but the quality of that information may not be totally reliable for important projects. The most important thing is to really analyze the information presented on the source.
http://www.youtube.com/watch?v=EyMT08mD7Ds
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page346376

Sunday, March 9, 2014

Viruses, Identity Theft, and Strong Passwords

Just as humans can get sick, so can computers! When humans sneeze, the germs are transmitted by air; however, with computers, they contract viruses through computer programs.  Created by online criminals, viruses spread quickly and are designed to multiply. Once they are on a computer, viruses can erase files, send emails without the owners verification, or transport private information to criminals, like passwords and security numbers. There are three types of viruses: viruses, worms, or Trojans. First, viruses are transmitted as an attachment sent in an email or shared USB drive. As soon as the files with the viruses are opened, the mistake has been made, and the virus begins to multiply. Furthermore, they begin to search for other documents to attach to, and be transmitted to even more computers. In order to combat viruses, uploading and installing your computer with anti-virus software, which prevents the downloading of viruses and deletes them when they are found. Second, worms are even more dangerous because they spread to computers without the user doing anything. Worms are programmed to spread to computers that are connected in a network and spread immediately. The worms find "back doors" or "trick" the computer into letting them in and once they do it to one, they find similar "back doors" to other computers. By keeping computer software up to date at work and at home, you will prevent havoc and close "back doors". Last, Trojans are disguised as computer software or advertisements; however, hidden inside are viruses that can cause tremendous problems. They can open new "back doors" and send criminals private information like passwords and security numbers. Trojans can be avoided by only downloading software from credible cites. Finally, keeping your computer up to date, and getting anti-virus software will keep viruses out of computer. Only click on links and downloadable attachments and files that you know are safe.
Identity theft proves to be a big dilemma in our modern world. People who are hacked and receive illegal access of stranger's accounts. These criminals steal people's identity. With our modern day technology, retrieving people's passwords is not that complicated, especially since most people have a common password that they use for most of their accounts. Finding someone's password is quite simple, as long as that person know your personal information. To avoid being a victim of identity theft: watch out for skimmers, change your usernames and passwords frequently, don't respond to texts, emails, phone calls, etc... with personal information, monitor online account balances and transactions commonly, and obtain identity theft protection through insurance.
In conclusion, having strong passwords is one of the greatest precautions a person can take in order to decrease their chances of being impersonated. Knowing information about you can make finding passwords much easier for the criminal. In creating a strong password don't use easy to guess information like birthdays, pet names, or phone numbers. Moreover, your password should not include information about you. Taking the acronyms of a memorable phrase or expression is an easy way to start. By adding numbers, special characters, and capitalized letters the password gets even stronger. Never put your password in easily located areas or tell people your password via phone or by email. Remember to change your password often, and not have the same password for all your accounts. Finally, protect your computer from viruses using modern software, and have strong passwords so that you won't be susceptible to identity theft.
http://en.wikipedia.org/wiki/Computer_viruses

Thursday, February 27, 2014

Safety on Wireless Communication

Wireless communication may be one of the greatest inventions of all time. It incorporates the communication and transmission of information over long distances without the use of electronic conductors, like cables and wires. There are many modern day devices that carry out the functions of wireless communications, such as: smart phones, wireless computer parts, satellite televisions, GPS units, etc... . So why is wireless communication helpful? There are many benefits to this type of network. First, this advanced way of communication allows for immediate access to information-delivered in a matter of just a few minutes. Second, workers can receive information anywhere and at anytime without hauling big cable boxes or wires around them. Thirdly, urgent situations can be made aware of more quickly. Despite location or distance, people from near or far, can almost always connect with one another. Lastly, wireless devices are cheaper to set up and maintain.
With this new technology, there ensues tremendous responsibility. Many people have the misconception that what they post online is private and that no one will ever be admitted to see it. Unfortunately, this is not the case. Many teens and young people, especially, find themselves posting inappropriate comments, videos, and pictures. There are serious and even federal consequences that can be brought forth. Teens who text or send revealing photos, ask somebody else to send them inappropriate images or texts, or put themselves in a position of possible harassment over a revealing text, can all face serious repercussions. If anything like this should occur, it is important to act fast and get people to help and stop the spreading of this message. (One should consult a parent or teacher.)
Another important safety topic is texting while driving. This danger of this form of communication arises when people use it at an improper time and place. When one is driving they should be completely engaged on the road, and not have outside distractions, like their phone, occupying them. Thankfully, many teens choose not to text and drive because they are conscious of what may happen if they do. Severe, and sometimes, fatal events occur. In addition, 30 states have prohibited texting while driving and fine those who are caught. For instance, if your best friend is driving you home and they are texting on their phone, the best way to handle the problem is by calmly asking them to get off their phone. In the case where they refuse to give it up, it is important to inform them about the dangers of texting while driving. If you are the driver, it is important to consider the safety of those around the you and your own well being.
Furthermore, most people don't fully comprehend just how quickly viral messages can spread. The chance of people seeing what others post on the web is very likely. These people can be parents, siblings, friends, or even complete strangers. The dangers of living in a world where everyone is interconnected includes the idea that anyone at anytime can see information about you, without you realizing. This is why it is crucial to think twice before doing something on the web or sending something to someone else, because nowadays images, videos, and comments can go viral and spread quicker than ever before. Wireless communication is a great invention, but people should also know just how monitored worldwide communication can be. Depending on how one uses wireless communication, it can be a truly awesome way of communicating.
http://www.engineersgarage.com/articles/wireless_communication.

Saturday, February 22, 2014

022114 Choosing a Computer and Cloud Computing

Computers are taking the world by storm and are becoming a part of many people's lives. Many buyers nowadays must be informed about the parts and services of their computer in order to make a wise purchase. Although all computers come in different shapes and sizes their operating forces make them similar.  There are three major parts to the hardware of a computer. First, there is the hardrive. The hardrive stores all the photos, music, and software of a computer. Therefore, the bigger the hardrive, the more amount of storage in one's computer. However, some information in computers is difficult to operate rapidly, because of the limited amount of storage. (The hardrive "takes the long way" to access information.) Thus, RAM is needed. RAM, Random Access Memory, is an alternative, which makes information easy to administer-- "the short route" to accessing information. RAM makes computers run more swiftly and is cleaned every time the computer is reset. Lastly, the processor sends and receives information, executes duties, and sets the software operating. The faster the processor achieves its tasks, the faster the computer will be, overall. In choosing a computer it is crucial that the customer knows exactly what they are looking for, they need to have a set plan, and qualities for their future computer. For example, if a customer wanted to invest in a computer that was touch screen, had large amounts of storage, and a retina display, they are likely to find exactly what they are looking for. Compared to a person who is not educated in what kind of qualities their computer should have, a customer who knows what they want, will find what they are looking for quicker, and be more satisfied.
Modern computers no longer operate alone. Thanks to the wonders of internet, cloud computing has changed the way people operate their technology. Cloud computing is secure, accessible through the web, and upheld in a different location. There are many benefits of cloud computing. Some of advantages include: its cost efficiency, nearly limitless storage, back up and recovery programs, communication with all technological devices, easy access to information, and lastly, quick activity.  Cloud computing may be one of the most affordable and cost efficient forms of computing to use. Unlike traditional software companies, where users would have to licenses expensive fees, cloud computing allows and ensures users, one-time payments and therefore, can significantly lower expenses. Storage of information, music, pictures, and other software is practically unlimited. There is no worry on running out of storage space or having to upgrade. Also, the cloud is capable of restoring information and makes the process of backing up and restoring information much more simple. Software integration is something that occurs immediately in the cloud. Customers use their utilities with their personal preference and so, users simply choose which services and operations suit their needs best. Furthermore, cloud computing ensures easy access to information despite location. Geographical location and time zone issues are no longer a problem. Lastly, cloud computing  functions an entire system in a matter of just a few minutes. Although, there are many benefits of cloud computing there are disadvantages such as: technical issues, security, and like all software programs it can be prone to attack.
Just in the past few years there have been amazing advancements in technology and I feel as though the sky is the limit for future computers and software programs. I predict that in the near future, software programs will be able to reason like humans. They will be able to think, analyze, and possibly even communicate the way humans do. All modern day problems with computers will be solved, and although futuristic computers will not be perfect, they will operate more efficiently and quicker than the computers that we have nowadays. The software programs will be similar to cloud computing; however they will be free and all computers will be in sync with the program when first purchased. Perhaps one day there will be a computer that is built into to one's glasses--talk about portability! In conclusion, the future of computers and cloud computing is really endless. The possibilities go far beyond our wildest dreams.
http://www.bbc.com/future/story/20131119-computer-chips-that-think-like-us.