Saturday, November 20, 2010

Week 7 EOC: The Scary Internet

Since the advent of the solid-state microprocessors our lives have become easier to manage. Through the use of computers, smart phones and the internet I think that we are starting to take things for granted. For example if I want to find a recipe that uses bacon, Google and other search engines can and do make the assumption that I am male. And then the next search that I do might include ads at the side that are meant for a man. That might be fine and dandy and can also be convenient. But the one thing that scares me the most about this is when anyone can use this same technology to find out if I am not home and then come over and rob me. Or a future employer might be able to have access to some of my past through pictures of me past out drunk at a party and then decide to not hire me because of that. The list goes on and on and can get even scarier.

Week 7 BOC: Privacy Issues on the Web

When it comes to my privacy and yours, I think that we are all screwed. This last week in the news the story about Google and their “street view” cars has resurfaced. As one of these vehicles drive down the street they would harvest any data off of anyone’s home network that was not secure. Not to mention what was captured by the cameras. “Google insists that the data sweeps were “unintentional” and that they were only viewed a very limited number of times.”(http://www.newsreview.com/sacramento/content?oid=1876720) The thing that I find interesting is that that is exactly what Google is in the business of?
Also Microsoft is guilty of doing the same thing. Microsoft just released their product “Kinect”. What it does is enables multiple video games participators to interact with their Xbox without the use of any controllers. It captures your movments via a special web cam that sits on top of your TV. The issue is that it sends pictures back to Microsoft. You can only imagine what they are doing with those pics, right! “Xbox 360 and Xbox LIVE do not use any information captured by Kinect for advertising targeting purposes.”(Microsoft) We can only hope.

Friday, November 19, 2010

Saturday, November 13, 2010

Week 6 EOC: Video Challenge Tentative Plans

I think that for this new and exciting video challenge, I will need to produce something a lot of people are interested in. The first thought that comes to mind is something artsy. You know something with music that I created in my little, modest studio. I really like stop motion and I have seen some really interesting videos done in that style that I like. As a child, growing up I really liked these short films or videos that where done in stop motion on “Sesame Street” and then music placed on top. And as the beats or melodies played in the music the video responded to that sound, I guess you could say it’s kind of like a “Video Jock” does in a nightclub on video screens hung around the nightclub.

Week 6 BOC: There's an App for that!

After looking at many at many resources across the web, it is in fact true that there is an application that will allow you to check to see if you have a sexually transmitted disease. Doctors in the United Kingdom are developing the app. It will allow you to submit a sample of saliva or urine to a microchip. Plug it into your computer or smart phone and you get a diagnosis within minutes

This is after a brief journey across the internet looking for the other apps that were in question. Those being a “Ring-a-ding” app that just opens your default phone app. And also the nonexistence of an IQ app that I could find nowhere.

Saturday, November 6, 2010

Week 5 Midterm: What is IPv6?

What is IPv6 and what does it do? When I think of the internet and its components, I think of a cluster of streets and neighborhoods. And every house that resides on those streets needs to have an address. IPv6 is much like each one of those distinct street addresses with maybe some slight differences. “Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network.”(http://whatismyipaddress.com/ip-v6)

Also known as the backbone to the internet IPv6 is the newest version of the protocol. It is actually not widely used yet today and industry professionals are just now starting to get concerned about the limited number of distinct IP addresses that are still available. Before IPv6 and what we use more commonly today is IPv4. You might say “hey what about IPv5, what happened to that standard?”  IPv5 ended up being implemented by a lot of private industry like Apple, IBM and NeXT. Another reason that the industry is moving to IPv6 is it increased the number of bytes used in addressing from 4 bytes to 16 bytes. That can and will increase the available number of IP addresses for people and organizations to use. With all of the new devices and appliances now coming out on the market like smart phones, video game consoles, and new internet TVs the need for more distinct IP addresses is greater than ever. One bad thing to note about this unfortunate circumstance is that a lot of the internet’s routers and switches in both the home and throughout the rest of the web will need to be updated.

Week 5 Midterm: What is the octet?

When we talk about the word “Octet” it actually has several meanings. Of which there are octets in music, engineering and chemistry. But the one that I am talking about pertains to computing. The word’s root “octo” means eight. There are eight bits inside of an octet. So in a way you could say that an octet is the same as 8-bit and if you think about it a megabyte is also called a mega-octet. But the difference between a byte and octet is the number of digits in an octet is 8.“Computer networking standards almost exclusively use "octet". It is prominently used in Request for Comments (RFCs) published by the Internet Engineering Task Force.” (http://en.academic.ru/dic.nsf/enwiki/2060979) An octet commonly is used in a numeric value form, although it can be used in a variety of ways like hexadecimal, decimal, and other number systems. It can also be used as a string which uses only letters instead of numbers.“The OCTET STRING type is used to specify octets of binary or textual information. There is no limit to the maximum number of octets in a value of this type specified in SMI v1.”( http://www.webnms.com/net-snmp/help/developing_management_applications/datatypes/smi_datatypes/octetstring_datatype.html) Octets are use in across the internet and even on your home network. “Octets most commonly refers to any of the four bytes of an IPv4 address. In dotted-decimal notation, an IP address appears as follows - [ octet ] . [ octet ] . [ octet ] . [ octet ] “ (http://compnetworking.about.com/od/workingwithipaddresses/g/bldef_octet.htm) Each one of the octet in a IP address should and do add up to a total of 256, that being a number anywhere between 0 and 255. So as you can see this complicated use of a combination of numbers can provide many different possibilities.
You can actually identify, based upon the first or the last octet whether it represents a “Net” or a “Host/Node”. A “Net” is always contained in the first octete while a “Node/Host” is always contained in the last. So just by looking at computer or a device on the internet or network we kind of can tell what type of a system it is and what it does. As you can see this important when looking at “Class A” networks. “In the “classful” IP addressing scheme, a Class A network contains addresses for about 16 million network interfaces; a Class B about 65,000; and a Class C, 254.” (http://www.tcpipguide.com/free/t_IPAddressClassABandCNetworkandHostCapacities.htm)
If we take a look at other aspects of computing we can see pretty much the same thing, for instance, file compression. One popular form of file compression is MIME attachment.“A MIME attachment with the content type "application/octet-stream" is a binary file. Typically, it will be an application or a document that must be opened in an application, such as a spreadsheet or word processor.”( http://kb.iu.edu/data/agtj.html) In order for file compression to work both the sender and the receiver must use the same type of compression. The algorithms on both ends have to be the same meaning each octet in the algorithms should line up.