My Blogs
This section will house the Blogs for my ITGS class and will contain my deepest and darkest secrets; Caution is advised.
Today in ITGS, we were given a seemingly simple assignment, we had to give directions on how to make a peanut butter and jelly sandwich. The assignment had a few parameters I had to follow: give good directions, assume the audience knew nothing, complete the task in five minutes, and work with a partner. I partnered with Sydney Stine, and wrote down eighteen steps to make a peanut butter and jelly sandwich. We thought that we gave good and in depth instructions, however we too many assumptions about the audience. Our biggest assumption was that the audience already had the materials available to them, so we forgot to have them purchase the materials necessary. This activity helped me understand the importance of being direct and detailed with instructions, this skill will be handy when I begin the process of writing my IA.
Blog 2: Spreadsheet vs. Data Base
I wil begin by giving brief definitions of a Database and a Spreadsheet. A database is a collection of information organized in such a way that it is easily accessible to anyone trying to access. A spreadsheet is a document with information organized through rows and columns. There are a few differences between the two, firstly databases are generally larger and made to hold more data than a spreadsheet. Secondly they are used in different ways, databases are used to hold a large amount of data on a source, like a website. Spreadsheets are usually used for organizing paperwork and accounting. Databases can be used by many people at a time, you can also search by subject.
Sources:
http://whatis.techtarget.com/definition/spreadsheet
http://www.differencebetween.net/technology/difference-between-spreadsheet-and-database/
Sources:
http://whatis.techtarget.com/definition/spreadsheet
http://www.differencebetween.net/technology/difference-between-spreadsheet-and-database/
Blog 3: Cell Phone Communication System
Whenever a cell phone is in use, it is using either voice or data. When using voice, the cell phone is sending long sections of audio. When using data, your phone is only sending out short sections of data at a time, usually through text or social media. Cell phones are constantly connected to a base station, usually a satellite station. When voice or data is sent, the base station transmit the signal to a mobile switching center. From that center the signal is sent to the base station connected to the receiver phone. That base station then send the message to the receiver phone. Every serviced phone is assigned a unique identifier. "UIDs make it possible to address that entity, so that it can be accessed and interacted with." (WhatIs)
https://pongcase.com/blog/cell-phones-work/
http://internetofthingsagenda.techtarget.com/definition/unique-identifier-UID
https://pongcase.com/blog/cell-phones-work/
http://internetofthingsagenda.techtarget.com/definition/unique-identifier-UID
Blog 4: Making the World a Better Place
In high school, my favorite class was Theory of Knowledge in junior year. In this class we discussed current events, and evaluated the different way we as humans learn and absorb information. Currently I am interested in running a business or being a CEO of a company when I get older. So I wondered what I could do with these two ideas to make the world a better place. I would combine the two by using my company to create a product that helps people absorb knowledge easier.
The idea of the project is relatively simple, it would be a product that would help people absorb and understand knowledge easier and more efficiently. For example, the product would help a student studying the night before the final. It would allow the student to learn everything he needs to and store the information in his brain. This could help not only students, but other based on data and the spread of information. It could help doctors remember every disease or potential illness.
The goal of the the product itself would be to make the human brain more susceptible to
The idea of the project is relatively simple, it would be a product that would help people absorb and understand knowledge easier and more efficiently. For example, the product would help a student studying the night before the final. It would allow the student to learn everything he needs to and store the information in his brain. This could help not only students, but other based on data and the spread of information. It could help doctors remember every disease or potential illness.
The goal of the the product itself would be to make the human brain more susceptible to
Blog 5: My $600 Computer
Sydney Stine & Andrew Kaplan
Build Your Own Computer
Our Computer Budget: $600
Every product is hyperlinked to where it was found.
Case - Encloses all of the components of the computer, it keeps everything together and in one place
Our Case: Rosewill - Micro ATX Mini Tower Computer Case with Dual Fans - FBM-01
$25
Motherboard - A circuit board that allows communication between the computer software and components
Our Motherboard: Dell FR933 Motherboard PowerEdge 6950 System Board
$97.50
CPU (central processing unit) - Sends signals/instructions to the components of the computer, similar to the brain in the human body
Our CPU: Intel Core i5 6600K 3.50 GHz Quad Core Skylake Desktop Processor, Socket LGA 1151, 6MB Cache (BX80662I56600K)
$229
RAM (random access memory) - Flash based memory, A place where information is stored temporarily
Our RAM: Corsair Vengeance 8GB (1x8GB) DDR3 1600 MHz (PC3 12800) Desktop Memory 1.5V
$62
Power Supply - Converts AC power to DC power, converts power from the outlet into usable power that can run the computer
Our Power Supply: Corsair CX Series 500 Watt 80 Plus Bronze Certified Non-Modular Power Supply (CP-9020047-US)
$57
Graphics Card - Converts video data into electrical signals so that your monitor can process and show media such as videos or games
Our card: ASUS GeForce GTX 750 Ti DirectX 11 GTX750TI-OC-2GD5 2GB 128-Bit GDDR5 PCI Express 3.0 HDCP Ready Video Card
$110
Total: $580.50
Bibliography
http://smallbusiness.chron.com/purpose-graphics-card-55327.html
https://www.lifewire.com/what-is-a-computer-case-2618149
http://www.ebuyer.com/blog/2013/12/what-does-a-motherboard-do/
http://www.bbc.co.uk/schools/gcsebitesize/ict/hardware/0inputandoutputdevicesrev3.shtml
http://www.crucial.com/usa/en/support-what-does-computer-memory-dram-do
https://www.lifewire.com/power-supply-unit-2618158
http://smallbusiness.chron.com/purpose-graphics-card-55327.html
Build Your Own Computer
Our Computer Budget: $600
Every product is hyperlinked to where it was found.
Case - Encloses all of the components of the computer, it keeps everything together and in one place
Our Case: Rosewill - Micro ATX Mini Tower Computer Case with Dual Fans - FBM-01
$25
Motherboard - A circuit board that allows communication between the computer software and components
Our Motherboard: Dell FR933 Motherboard PowerEdge 6950 System Board
$97.50
CPU (central processing unit) - Sends signals/instructions to the components of the computer, similar to the brain in the human body
Our CPU: Intel Core i5 6600K 3.50 GHz Quad Core Skylake Desktop Processor, Socket LGA 1151, 6MB Cache (BX80662I56600K)
$229
RAM (random access memory) - Flash based memory, A place where information is stored temporarily
Our RAM: Corsair Vengeance 8GB (1x8GB) DDR3 1600 MHz (PC3 12800) Desktop Memory 1.5V
$62
Power Supply - Converts AC power to DC power, converts power from the outlet into usable power that can run the computer
Our Power Supply: Corsair CX Series 500 Watt 80 Plus Bronze Certified Non-Modular Power Supply (CP-9020047-US)
$57
Graphics Card - Converts video data into electrical signals so that your monitor can process and show media such as videos or games
Our card: ASUS GeForce GTX 750 Ti DirectX 11 GTX750TI-OC-2GD5 2GB 128-Bit GDDR5 PCI Express 3.0 HDCP Ready Video Card
$110
Total: $580.50
Bibliography
http://smallbusiness.chron.com/purpose-graphics-card-55327.html
https://www.lifewire.com/what-is-a-computer-case-2618149
http://www.ebuyer.com/blog/2013/12/what-does-a-motherboard-do/
http://www.bbc.co.uk/schools/gcsebitesize/ict/hardware/0inputandoutputdevicesrev3.shtml
http://www.crucial.com/usa/en/support-what-does-computer-memory-dram-do
https://www.lifewire.com/power-supply-unit-2618158
http://smallbusiness.chron.com/purpose-graphics-card-55327.html
Blog 6: Hardware Chapter Review Questions
Exercise 2-9:
(a) (i) The speed a CPU works at is measured in Hertz (Hz) for faster processors gigahertz (GHz) is used.
(ii) Hard disk capacity is described in bytes, but there are different kind of bytes. ex: gigabyte and terabyte
(b)You can either use a USB or Firewire
(c)Primary storage is usually Ram, whereas Secondary storage is in the hard drive.
(d) Approximately 433 photographs
Exercise 2-10:
(a) "Computer system that is part of a larger system and performs only peripheral functions (such as guidance or security) but no data processing function." (Business Insider) Basically a small computer that is part of a larger system that performs limited roles.
(b) Alternate keyboard or voice recognition.
(c) Supercomputers do a large amount of calculations extremely fast. Mainframes are more useful for issues with a lot of input and output.
(d) i. Infrared Grid
ii. Community Surveys
iii. Shopping
iv. Computer Mouse
(a) (i) The speed a CPU works at is measured in Hertz (Hz) for faster processors gigahertz (GHz) is used.
(ii) Hard disk capacity is described in bytes, but there are different kind of bytes. ex: gigabyte and terabyte
(b)You can either use a USB or Firewire
(c)Primary storage is usually Ram, whereas Secondary storage is in the hard drive.
(d) Approximately 433 photographs
Exercise 2-10:
(a) "Computer system that is part of a larger system and performs only peripheral functions (such as guidance or security) but no data processing function." (Business Insider) Basically a small computer that is part of a larger system that performs limited roles.
(b) Alternate keyboard or voice recognition.
(c) Supercomputers do a large amount of calculations extremely fast. Mainframes are more useful for issues with a lot of input and output.
(d) i. Infrared Grid
ii. Community Surveys
iii. Shopping
iv. Computer Mouse
Blog 7: Network Chapter Review Question
Exercise 4-9:
(a) Net neutrality is the idea that all governments and corporations must treat all internet data the same. They can't discriminate based on user, content, website, platform, application, type of attached equipment, or method of communication. For stakeholder, this idea would mean that they would get more users, however they would not be able to research certain groups, or be exclusive. Two-tier internet is a concept that would allow telecommunications companies and internet service providers to divide the traffic on their lines into different tiers or groups. This would allow stakeholders more control of the internet usage, and would make the usage easier to manage.
(b) For the two tiered system to work there would be two tiers of sites, ISP and URL. The ISP sites would be the preferred sites, and they would run better and faster than the average URL. The service providers would have to pay more for an ISP site, to make it more valuable than an average site.
(c) Network Neutrality has a variety of benefits and drawbacks. The first benefit is that telecom companies cannot differentiate between groups. Net neutrality ensures equal opportunity for all sites, not benefitting any site more than another. It will ensure freedom of speech on the internet. Some disadvantages are that big servers for companies like youtube and Netflixes data speed will be forced to be the same as everyone. Companies that work extremely hard like google have the same opportunities as all other sites. Restriction is best for the general use of internet. Neutrality does not prevent illegal use of internet. Overall, neutrality will remain the same to ensure equal opportunity for all.
(a) Net neutrality is the idea that all governments and corporations must treat all internet data the same. They can't discriminate based on user, content, website, platform, application, type of attached equipment, or method of communication. For stakeholder, this idea would mean that they would get more users, however they would not be able to research certain groups, or be exclusive. Two-tier internet is a concept that would allow telecommunications companies and internet service providers to divide the traffic on their lines into different tiers or groups. This would allow stakeholders more control of the internet usage, and would make the usage easier to manage.
(b) For the two tiered system to work there would be two tiers of sites, ISP and URL. The ISP sites would be the preferred sites, and they would run better and faster than the average URL. The service providers would have to pay more for an ISP site, to make it more valuable than an average site.
(c) Network Neutrality has a variety of benefits and drawbacks. The first benefit is that telecom companies cannot differentiate between groups. Net neutrality ensures equal opportunity for all sites, not benefitting any site more than another. It will ensure freedom of speech on the internet. Some disadvantages are that big servers for companies like youtube and Netflixes data speed will be forced to be the same as everyone. Companies that work extremely hard like google have the same opportunities as all other sites. Restriction is best for the general use of internet. Neutrality does not prevent illegal use of internet. Overall, neutrality will remain the same to ensure equal opportunity for all.
Blog 8: Chapter 5 Review
Exercise 5-4:a) 210 = 1024 seconds
b) 5210 seconds
c) 13210 seconds
Exercise 5-7:
1) The customer submits his credit card for payment.
2) Authorize.Net manages the complex routing of the data on behalf of the merchant through the following steps/entities.
3) Authorize.Net passes the secure transaction information via a secure connection to the Processor. The Merchant Bank's Processor submits the transaction to the credit card network (like Visa or MasterCard). The credit card network routes the transaction to the bank that issued the credit card to the customer.
4) The issuing bank approves or declines the transaction based on the customer's available funds and passes the transaction results back to the credit card network.
The credit card network relays the transaction results to the merchant bank's processor. The processor relays the transaction results to Authorize.Net
5) Authorize.Net stores the transaction results and sends them to the website for the customer and merchant to see.
6) The merchant delivers goods or services to the buyer.
7) The issuing bank sends the appropriate funds for the transaction to the credit card network, which passes the funds to the merchant's bank. The bank then deposits the funds into the merchant's bank account. This is called 'settlement', and typically the transaction funds are deposited into the merchant's primary bank account within two to four business days.
https://www.authorize.net/resources/howitworksdiagram/
Exercise 5-8:
The solution proposed would be a major inconvenience for everyone that uses email on a regular or nonregular process. Establishing a universally recognized software to connect money payments would be an unrealistic and intricate process. Also many new questions would arise from this, does it cost money to send and recieve or just send emails (in the case of spam)? If you have multiple email accounts can you link those account to the same payment accounts? Etc. This would not be an effective solution.
Exercise 5-13:
a) Identity theft is a noun means the fraudulent acquisition and use of a person's
private identifying information, usually for financial gain.
b) Pharming is the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
c) There are many steps the average person can take to secure the data on their laptop. You can add a password to limit access, disable booting from a usb, encrypt your hard drive or use vpn (virtual private network).
Exercise 5-15:
a) Some characteristics commonly used by biometric systems are fingerprint and face recognition.
b) False Negative- the term used to describe a network intrusion device's inability to detect true security events under certain circumstances. In other words, malicious activity is not detected and alerted.
False Positive- when you think you have a specific vulnerability in your program but in fact you don't. Many security scanners such as Nessus scan an application (or service/daemon) and attempt to find a vulnerability in it.
C) Biometric Authentication is a method of accessing a product or service through the use of identification using biometric information, such as eyeprint, faces, fingerprints or voice. ... So the actual biometric identification works by using a unique identifier.
Sources:
Sousps.com
Cgisecurity.com
wikipedia.com
b) 5210 seconds
c) 13210 seconds
Exercise 5-7:
1) The customer submits his credit card for payment.
2) Authorize.Net manages the complex routing of the data on behalf of the merchant through the following steps/entities.
3) Authorize.Net passes the secure transaction information via a secure connection to the Processor. The Merchant Bank's Processor submits the transaction to the credit card network (like Visa or MasterCard). The credit card network routes the transaction to the bank that issued the credit card to the customer.
4) The issuing bank approves or declines the transaction based on the customer's available funds and passes the transaction results back to the credit card network.
The credit card network relays the transaction results to the merchant bank's processor. The processor relays the transaction results to Authorize.Net
5) Authorize.Net stores the transaction results and sends them to the website for the customer and merchant to see.
6) The merchant delivers goods or services to the buyer.
7) The issuing bank sends the appropriate funds for the transaction to the credit card network, which passes the funds to the merchant's bank. The bank then deposits the funds into the merchant's bank account. This is called 'settlement', and typically the transaction funds are deposited into the merchant's primary bank account within two to four business days.
https://www.authorize.net/resources/howitworksdiagram/
Exercise 5-8:
The solution proposed would be a major inconvenience for everyone that uses email on a regular or nonregular process. Establishing a universally recognized software to connect money payments would be an unrealistic and intricate process. Also many new questions would arise from this, does it cost money to send and recieve or just send emails (in the case of spam)? If you have multiple email accounts can you link those account to the same payment accounts? Etc. This would not be an effective solution.
Exercise 5-13:
a) Identity theft is a noun means the fraudulent acquisition and use of a person's
private identifying information, usually for financial gain.
b) Pharming is the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
c) There are many steps the average person can take to secure the data on their laptop. You can add a password to limit access, disable booting from a usb, encrypt your hard drive or use vpn (virtual private network).
Exercise 5-15:
a) Some characteristics commonly used by biometric systems are fingerprint and face recognition.
b) False Negative- the term used to describe a network intrusion device's inability to detect true security events under certain circumstances. In other words, malicious activity is not detected and alerted.
False Positive- when you think you have a specific vulnerability in your program but in fact you don't. Many security scanners such as Nessus scan an application (or service/daemon) and attempt to find a vulnerability in it.
C) Biometric Authentication is a method of accessing a product or service through the use of identification using biometric information, such as eyeprint, faces, fingerprints or voice. ... So the actual biometric identification works by using a unique identifier.
Sources:
Sousps.com
Cgisecurity.com
wikipedia.com
Blog Post 9: Chapter 7 Review
7-17
(a)
(i) When you combine databases together to get more information about a topic, person, or group.
(ii) Two of the fields that can be included on the CAPPS database are what the passengers carry with them, and their destination.
(b)Data mining can be used in a CAPPS database because data mining is the process of searching through data for suspicious patterns. Data mining could be used to find suspicious items that people traveling bring, and finding suspicious people traveling.
(c)To what extent is the use of computer profiling system an appropriate way to fight terrorism?
To some extent computer profiling system is an appropriate way to fight terrorism. Data matching is used in order to build a profile of an individual by combining data about them from different databases. This is effective in fighting terrorism because you can gather as much data as possible on an individual. In contrast, data matching can lead to privacy issues. Innocent people need to be collected and processed in order to find the criminals. If someone is being investigated, a different person could be caught without doing anything to seem guilty. Some consider this an invasion of privacy.
7-18
(a)
(i) A Primary Key is a “field which contains a different value for every record in that table”. Or in layman's terms, a number or code that allows every section of table to be easily identified.
(ii) To create a query there are multiple aspects that must be addressed. You must limit your query to the location (Washington DC) and time that the offenders worked in. The time does not have to be specific, however you shouldn't have sex offenders from 1920. You would also have to limit your search to the kind of convicted offender that you are looking for, in this instance, assault.
(b) The data in the Sex Offender Registry could be verified in three ways:
- Entering data twice- this helps avoid typing mistakes that may have occurred when the data was entered originally
- Comparing with original documents- once data has been entered into a computer system, it can be compared with the original paper document
- Verifying with the data subject- simply ask a person if the date of birth stored in the computer is correct
Blog Post 10: Personal Privacy and Security in the Digital Age
I personally, do not care about my personal privacy in how it relates to Amazon Go. However, I do care about my online privacy, and social networking privacy. For Amazon Go, the service works by using scales on the products, camera's in the ceiling, and infrared technology to track what you buy without using cashiers (Washington Post). Although Amazon says it does not use facial scanning technology, many people are worried about Amazon spying on them and looking at their face. To that complaint I have two points, they said they didn't need facial scanning, so why would they use it unless they want to get sued by everyone. Secondly, who cares if some random Amazon employee knows what you look like. We walk past hundreds of security and other cameras a day without batting and eye. So I think Amazon Go is a great idea and don't worry about the privacy. The only online privacy I worry about is social network security. I don't want people I know breaching my private instagram account. But I could honestly care less about what my internet provider can see. The only people worried about security are the people who have something to hide.
https://www.washingtonpost.com/news/business/wp/2018/01/22/inside-amazon-go-the-camera-filled-convenience-store-that-watches-you-back/?utm_term=.6dfea166b9f7
https://www.washingtonpost.com/news/business/wp/2018/01/22/inside-amazon-go-the-camera-filled-convenience-store-that-watches-you-back/?utm_term=.6dfea166b9f7
Blog Post 11: Chapter 12 Review
12-10 To what extent can technological measures be effective in reducing mobile phone addiction?
Technological measures can to be a great extent be used to reduce mobile phone addiction. There are a variety of measures that can be taken this serious addiction. Firstly, limits can be set on phone use. Parents can use parental controls to limit what their children use and how much data they have available. If what they can access is limited they will be less attached, and if they run out of data that would greatly limit what their phones could be used for. they could also limit the phone usage to certain times of the day, so after their bedtime the phone could shut down or they could physically take it from them. Also other healthier technologies could be given to them as a replacement vice to the phone. Overall all of technological actions could be used to greatly reduce cell phone addiction.
12-11 To what extent are mobile phones an effective way of distributing health advice?
Due to the variety of ways to distribute information, cell phones can be an effective way of distributing health advice. Cell phones give anonymity to the user, which might make them more likely to contact doctors for 'embarrassing' issues like HIV/AIDs. South Africa used this technique and sent out information to all phones over text giving information on how to contact medical assistance. Games and quizzes can also be used as an entertaining way to educate the public. Online videos and advertisements have also been created to raise awareness. Lastly some websites give out free medical advice when given symptoms, people with cell phones could use these websites to diagnose themselves before seeing a doctor (unless the symptoms are serious then please see a doctor). All of these ways are how cell phones can effectively be used to widely share health advice.
Technological measures can to be a great extent be used to reduce mobile phone addiction. There are a variety of measures that can be taken this serious addiction. Firstly, limits can be set on phone use. Parents can use parental controls to limit what their children use and how much data they have available. If what they can access is limited they will be less attached, and if they run out of data that would greatly limit what their phones could be used for. they could also limit the phone usage to certain times of the day, so after their bedtime the phone could shut down or they could physically take it from them. Also other healthier technologies could be given to them as a replacement vice to the phone. Overall all of technological actions could be used to greatly reduce cell phone addiction.
12-11 To what extent are mobile phones an effective way of distributing health advice?
Due to the variety of ways to distribute information, cell phones can be an effective way of distributing health advice. Cell phones give anonymity to the user, which might make them more likely to contact doctors for 'embarrassing' issues like HIV/AIDs. South Africa used this technique and sent out information to all phones over text giving information on how to contact medical assistance. Games and quizzes can also be used as an entertaining way to educate the public. Online videos and advertisements have also been created to raise awareness. Lastly some websites give out free medical advice when given symptoms, people with cell phones could use these websites to diagnose themselves before seeing a doctor (unless the symptoms are serious then please see a doctor). All of these ways are how cell phones can effectively be used to widely share health advice.
Blog Post 12: Medical Technology
A. Health Issues: A health issue is any physical damage to the body caused by violence or accident or fracture etc. softness, unfitness. poor physical condition; being out of shape or out of condition (as from a life of ease and luxury) condition. an illness, disease, or other medical problem. In relation to ITGS there are multiple issues that can be derived from overuse of technology. Some common examples of these health issues is carpal tunnel syndrome, addiction, wrist and back pain, bad posture, eye strain, etc.
Pros: There are generally no pros associated with being in physical pain and poor shape because of computer use. However one pro of health issues is that it make deter people from spending too much time on computers.
Cons: One major con to these health issues is the importance of health in maintaining a long life and career. In the modern office, it is full of computers, and people spend most of their time working on labs. However if they get a health issue such as wrist pain, that could greatly limit their ability in the office. If a person gets wrist pain from typing, and they need to use computers to make a living, they will either further the pain, or be forced to find a new job.
https://www.betterhealth.vic.gov.au/health/healthyliving/computer-related-injuries
B. Medical/Personal Health Records
Medical health record: The terms medical record, health record, and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdiction
Pros:
https://en.wikipedia.org/wiki/Medical_record
C. Computer Modeling/Imaging - the use of image captures and creation of models in order to formulate various scans of the body to find signs of dysfunction.
Pros:
Source: Mr. Davis and my brain
D. Telemedicine/Telesurgery:
Telemedicine is the process of diagnosing and aiding a patient through electronic communication, . It does not involve face-to-face interactions between the patient and the doctor; therefore, there is no human interaction in telemedicine. Some pros of telemedicine include the fact that it is cost effective because all that is needed is an electronic device for communications. Another pro includes it is more accessible for patients, especially patients who are too ill to leave their houses. Cons of telemedicine include the lack of human interaction, possibly making it harder for doctors to correctly diagnose and cure illnesses. It also makes keeping medical and personal records up to date hard as it can be easier to forget to document telemedicine interactions.
Telesurgery, also sometimes known as robotic surgery, is performed by doctors operating electronic equipment, such as the davinci code, instead of directly on the patient. Pros of telesurgery include that fact that doctors can be hundreds of miles apart from the patient they are operating on, making it more accessible for the patient especially in crucial circumstances. Although telesurgery can lead to more precise and effective surgeries with faster recovery times, they often require much more time to complete and are often times more expensive. Another con includes the fact that telesurgery machinery is not always compatible with every patient. This means compatibility tests would have to be taken and adjustments to the machinery may need to be made before the surgery is performed.
https://evisit.com/10-pros-and-cons-of-telemedicine/
https://www.medicaid.gov/medicaid/benefits/telemed/index.html
https://healthresearchfunding.org/pros-cons-robotic-surgery/
Pros: There are generally no pros associated with being in physical pain and poor shape because of computer use. However one pro of health issues is that it make deter people from spending too much time on computers.
Cons: One major con to these health issues is the importance of health in maintaining a long life and career. In the modern office, it is full of computers, and people spend most of their time working on labs. However if they get a health issue such as wrist pain, that could greatly limit their ability in the office. If a person gets wrist pain from typing, and they need to use computers to make a living, they will either further the pain, or be forced to find a new job.
https://www.betterhealth.vic.gov.au/health/healthyliving/computer-related-injuries
B. Medical/Personal Health Records
Medical health record: The terms medical record, health record, and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdiction
Pros:
- Providing accurate, up-to-date, and complete information about patients at the point of care
- Securely sharing electronic information with patients and other clinicians
- streamlined coding and billing
- improve productivity
- Legible, complete documentation
- Reducing costs through decreased paperwork, improved safety, reduced duplication of testing, and improved health
- be careful about protecting the data from unauthorized access
- the danger of ransomware, where hackers install malware on the medical organization’s servers. Their aim is to hold the data hostage until they receive money. In the meantime, patient details are unavailable, and work can slow down
https://en.wikipedia.org/wiki/Medical_record
C. Computer Modeling/Imaging - the use of image captures and creation of models in order to formulate various scans of the body to find signs of dysfunction.
Pros:
- Ability to quickly see broken bones
- Ability to see organs in body and see problems
- Show muscles and inflammation
- Ultrasound to see baby before birth in mother’s stomach
- Radiation from CT scan can be harmful to patient
- Some tests take a long time to produce and for the image to form
- Could be life threatening and results don’t come back for a long time
- Could be life threatening and results don’t come back for a long time
Source: Mr. Davis and my brain
D. Telemedicine/Telesurgery:
Telemedicine is the process of diagnosing and aiding a patient through electronic communication, . It does not involve face-to-face interactions between the patient and the doctor; therefore, there is no human interaction in telemedicine. Some pros of telemedicine include the fact that it is cost effective because all that is needed is an electronic device for communications. Another pro includes it is more accessible for patients, especially patients who are too ill to leave their houses. Cons of telemedicine include the lack of human interaction, possibly making it harder for doctors to correctly diagnose and cure illnesses. It also makes keeping medical and personal records up to date hard as it can be easier to forget to document telemedicine interactions.
Telesurgery, also sometimes known as robotic surgery, is performed by doctors operating electronic equipment, such as the davinci code, instead of directly on the patient. Pros of telesurgery include that fact that doctors can be hundreds of miles apart from the patient they are operating on, making it more accessible for the patient especially in crucial circumstances. Although telesurgery can lead to more precise and effective surgeries with faster recovery times, they often require much more time to complete and are often times more expensive. Another con includes the fact that telesurgery machinery is not always compatible with every patient. This means compatibility tests would have to be taken and adjustments to the machinery may need to be made before the surgery is performed.
https://evisit.com/10-pros-and-cons-of-telemedicine/
https://www.medicaid.gov/medicaid/benefits/telemed/index.html
https://healthresearchfunding.org/pros-cons-robotic-surgery/
Blog Post 13: Challenging the facts
So currently, America and the world are experiencing a big problem with carbon pollution coming from automobiles, which (debatably) is causing global warming. So many car companies are producing 'hybrid' cars which run on a mix of electric and gas power, however these cars have been proven to have a similar impact on pollution to any normal car. So the question arrises onto what we can actually do to limit carbon pollution from cars.
In my Theory of Knowledge class we always watch CNN 10 to start the class. One day a report was shown about the developement of self-driving cars. The secret to limiting carbon pollution may lie in the self driving car. Many times people determine which car they buy and drive on which is the most fun to cars. However most of the time these 'fun' and 'big' cars are the one use the most gas. However if people don't drive the cars, they may be more inclined to get a better car for the environment, like a prius. So if we want to be more economically minded the first step is to switch to self-driving cars. The development of self driving cars is a completely IT task. We need to develop a technology that would monitor the roads and drive the car for us. Once we lose the urge to drive wasteful cars. These self-driving cars can greatly limit carbon waste.
In my Theory of Knowledge class we always watch CNN 10 to start the class. One day a report was shown about the developement of self-driving cars. The secret to limiting carbon pollution may lie in the self driving car. Many times people determine which car they buy and drive on which is the most fun to cars. However most of the time these 'fun' and 'big' cars are the one use the most gas. However if people don't drive the cars, they may be more inclined to get a better car for the environment, like a prius. So if we want to be more economically minded the first step is to switch to self-driving cars. The development of self driving cars is a completely IT task. We need to develop a technology that would monitor the roads and drive the car for us. Once we lose the urge to drive wasteful cars. These self-driving cars can greatly limit carbon waste.
Blog Post 14: Chapter 13 Review
13 - 8:
Augmented reality is live streaming of real-world environments that have been manipulated or changed when one views it through technology.
The once popular app, “Pokemon Go”, used augmented reality to base their entire game. In this example, augmented reality was used to take a live stream from the camera of the phone and items such as the pokemon characters and the pokeballs were added to the live feed so that the users could play the game.
https://www.digitaltrends.com/mobile/best-augmented-reality-apps/
13-9:
Explain the technological considerations that archivists must be aware of when creating digital copies of works for preservation purposes.
Online identities or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Some can even be deceptive about their identity. Users should not be required to identify themselves because there would be no efficient way to do so. Risks include false identities and inherent lying while benefits include a free reign internet, which is how it was intended to be used.
13-11:
(ii) Describe two technical considerations when deciding which file format
should be used to save a photo taken with a mobile phone.
One should consider the preservation efforts for the file formats. This is important because not all file formats are accessible on all platforms It is also important to consider how long you want to preserve the image and if the format will need to be updated eventually in case the current format goes obsolete.
(b) Explain the policies a national newspaper should follow when deciding to use
images from a citizen journalist on its website.
When a national newspaper uses images taken from a citizen journalists, they must make sure the image is appropriate and does not invade privacy. First, as with all images used on the website, they must cite the image. Next the must make sure that the image does not breach any privacy of the people photographed. Lastly, especially for natural disasters, they must make sure the image is appropriate for the website
(c) To what extent do concerns about citizen journalism outweigh the benefits?
To a moderate extent, the concerns of citizen journalism outweigh the benefits. Sometimes, especially in disasters, the first people on the scene are the citizens. It is hard for official journalists to get to the scene quickly enough to get footage, so sometimes the citizen journalists are the only ways to get a look inside the event. However there ares some concerns with citizen journalists. The citizens do not have the moral code of a real journalist, for this reason they may take pictures of people without their consent. This invades their privacy and is not appropriate to be published. So although citizen journalism is the best way to get images sometimes, all implications of the picture must be known.
Augmented reality is live streaming of real-world environments that have been manipulated or changed when one views it through technology.
The once popular app, “Pokemon Go”, used augmented reality to base their entire game. In this example, augmented reality was used to take a live stream from the camera of the phone and items such as the pokemon characters and the pokeballs were added to the live feed so that the users could play the game.
https://www.digitaltrends.com/mobile/best-augmented-reality-apps/
13-9:
Explain the technological considerations that archivists must be aware of when creating digital copies of works for preservation purposes.
- They must make sure their digital files are easy to retrieve and are saved in an accessible folder
- They can prevent these from being deleted by flagging them and saving them in a locked file so if another user uses the same account it is protected
13-10:
Online identities or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Some can even be deceptive about their identity. Users should not be required to identify themselves because there would be no efficient way to do so. Risks include false identities and inherent lying while benefits include a free reign internet, which is how it was intended to be used.
13-11:
- (i) Identify two methods of accessing news online.
(ii) Describe two technical considerations when deciding which file format
should be used to save a photo taken with a mobile phone.
One should consider the preservation efforts for the file formats. This is important because not all file formats are accessible on all platforms It is also important to consider how long you want to preserve the image and if the format will need to be updated eventually in case the current format goes obsolete.
(b) Explain the policies a national newspaper should follow when deciding to use
images from a citizen journalist on its website.
When a national newspaper uses images taken from a citizen journalists, they must make sure the image is appropriate and does not invade privacy. First, as with all images used on the website, they must cite the image. Next the must make sure that the image does not breach any privacy of the people photographed. Lastly, especially for natural disasters, they must make sure the image is appropriate for the website
(c) To what extent do concerns about citizen journalism outweigh the benefits?
To a moderate extent, the concerns of citizen journalism outweigh the benefits. Sometimes, especially in disasters, the first people on the scene are the citizens. It is hard for official journalists to get to the scene quickly enough to get footage, so sometimes the citizen journalists are the only ways to get a look inside the event. However there ares some concerns with citizen journalists. The citizens do not have the moral code of a real journalist, for this reason they may take pictures of people without their consent. This invades their privacy and is not appropriate to be published. So although citizen journalism is the best way to get images sometimes, all implications of the picture must be known.
Blog Post 15: Chapter 14 Review and Wikileaks
14/7:
Wikileaks publishes classified classified and secret materials from anonymous sources about governments and organizations often from other countries nd in violation of the law. They have published stories about Guantanamo bay, the Australian internet blacklist, Sony’s hack, and many other scandals. I think they are justified to some extent for them to publish these materials because it is their right to be able to publish and express their knowledge, however in some cases this is not okay because it is considered an invasion of privacy. They are also justified to some extent because it is their right to inform the public, just as it is the public’s right to be entitled to knowing what is going on in their society.
https://www.telegraph.co.uk/news/0/wikileaks-greatest-ever-stories-scandals/
14/8:
Wikileaks is a well-known hacker online entity that reveals classified information for the public to know. Recently they released a large amount of classified information on the Iraq war, the American government has condemned wikileaks for ‘threatening national security’, however no serious actions have been taken against them due to a number of technological obstacles. Firstly wikileaks organizes itself online, so a lot of the people hacking are volunteers who have little direct contact with the leaders of the group. Also once they leak information, it can never be taken back, because its all online forever. Wikileaks has strong online security, with military grade encryption for their information and they have an ‘insurance’ policy that leaks all of their information if anything happens to them. Therefore the only way anyone has been able to harm wikileaks is through hacking them back, which takes very skilled hackers.
https://thenextweb.com/us/2010/10/23/why-hasnt-the-us-government-crushed-wikileaks/
Wikileaks publishes classified classified and secret materials from anonymous sources about governments and organizations often from other countries nd in violation of the law. They have published stories about Guantanamo bay, the Australian internet blacklist, Sony’s hack, and many other scandals. I think they are justified to some extent for them to publish these materials because it is their right to be able to publish and express their knowledge, however in some cases this is not okay because it is considered an invasion of privacy. They are also justified to some extent because it is their right to inform the public, just as it is the public’s right to be entitled to knowing what is going on in their society.
https://www.telegraph.co.uk/news/0/wikileaks-greatest-ever-stories-scandals/
14/8:
Wikileaks is a well-known hacker online entity that reveals classified information for the public to know. Recently they released a large amount of classified information on the Iraq war, the American government has condemned wikileaks for ‘threatening national security’, however no serious actions have been taken against them due to a number of technological obstacles. Firstly wikileaks organizes itself online, so a lot of the people hacking are volunteers who have little direct contact with the leaders of the group. Also once they leak information, it can never be taken back, because its all online forever. Wikileaks has strong online security, with military grade encryption for their information and they have an ‘insurance’ policy that leaks all of their information if anything happens to them. Therefore the only way anyone has been able to harm wikileaks is through hacking them back, which takes very skilled hackers.
https://thenextweb.com/us/2010/10/23/why-hasnt-the-us-government-crushed-wikileaks/
Blog Post 16: Edward Snowden Essay
snowden__hero_of_villian_.pdf | |
File Size: | 80 kb |
File Type: |
New Blog Post 17: Chapter 17 Review
16-15
As we make our robots and machines more complex mechanically, we are also making them more complex physically, making them look more and more like humans. However, having robots that so closely resemble humans raises a variety of ethical issues. Firstly, research has shown that humans tend to show empathy towards human-looking robots in case or cruel punishment, as evident based on the video of Boston Dynamics robots being kicked around. On the opposite side, to get us to not feel empathy for robots that look so lifelike may limit our ability to feel empathy for our own kind. Another issue is that if we make the robots too lifelike, then we will not be able to distinguish between the robots and humans, as seen in the fictional world of Bladerunner.
Commentary. “Is It Unethical to Design Robots to Resemble Humans?” Quartz, Quartz, 23 June 2017, qz.com/1010828/is-it-unethical-to-design-robots-to-
resemble-humans/.
16-16
As we push forward in our society technologically, robots are becoming more responsible for our everyday tasks. This leads some people to question whether humans will have any jobs that cannot be performed by a computer in the next few hundred years. One example of robots taking human jobs is in Charlie and The Chocolate Factory, in the film, Charlie's dad put toothpaste caps on toothpaste at a factory, until he was replaced by a robot that could do the job twice as fast. This is a rational threat however, and it would be inappropriate for a company to knowingly develop machines that would take a priority over humans and harm humans financially. The only way that it would be appropriate would be if the people being replace were evenly compensated for the loss of the job. Another option would be to make positions in charge of the robots, to make sure they do not malfunction, or upgrade them when necessary.
Today. “Robots: Is Your Job at Risk?” CNNMoney, Cable News Network, money.cnn.com/2017/09/15/technology/jobs-robots/index.html.
16-17
Natural Language Processing are "techniques for processing human languages to enable a computer to understand meeting" (ITGS 333).
Two components of an expert system are the knowledge base and inference engine.
One way that expert systems can be used is in the medical field, if the system has a list of symptoms and measurements that coincide with a certain disease, it would make it easier for doctors to diagnose for patients. This would not only speed up the process for the doctor but it could also save lives.
Another area that can be useful with computers is in the concept of a machine translator like google translate in comparison to a human translator. In the past, in interactions between people who speak different languages, a human translator has been present so the two can understand each other. However google translate has become so fast that if you upload a picture of a foreign language it could translate it instantly. However one advantage to having a human translator could get some intricacies of language and slang that google translate couldn't.
Tutorials Point. “Artificial Intelligence Expert Systems.” Www.tutorialspoint.com, Tutorials Point, 8 Jan. 2018,
www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_expert_systems.htm.
“What Is Natural Language Processing (NLP)? - Definition from WhatIs.com.” SearchBusinessAnalytics,
searchbusinessanalytics.techtarget.com/definition/natural-language-processing-NLP.
Gay, Stuart. Information Technology in a Global Society. International Baccalaureate Organisation, 1997.
As we make our robots and machines more complex mechanically, we are also making them more complex physically, making them look more and more like humans. However, having robots that so closely resemble humans raises a variety of ethical issues. Firstly, research has shown that humans tend to show empathy towards human-looking robots in case or cruel punishment, as evident based on the video of Boston Dynamics robots being kicked around. On the opposite side, to get us to not feel empathy for robots that look so lifelike may limit our ability to feel empathy for our own kind. Another issue is that if we make the robots too lifelike, then we will not be able to distinguish between the robots and humans, as seen in the fictional world of Bladerunner.
Commentary. “Is It Unethical to Design Robots to Resemble Humans?” Quartz, Quartz, 23 June 2017, qz.com/1010828/is-it-unethical-to-design-robots-to-
resemble-humans/.
16-16
As we push forward in our society technologically, robots are becoming more responsible for our everyday tasks. This leads some people to question whether humans will have any jobs that cannot be performed by a computer in the next few hundred years. One example of robots taking human jobs is in Charlie and The Chocolate Factory, in the film, Charlie's dad put toothpaste caps on toothpaste at a factory, until he was replaced by a robot that could do the job twice as fast. This is a rational threat however, and it would be inappropriate for a company to knowingly develop machines that would take a priority over humans and harm humans financially. The only way that it would be appropriate would be if the people being replace were evenly compensated for the loss of the job. Another option would be to make positions in charge of the robots, to make sure they do not malfunction, or upgrade them when necessary.
Today. “Robots: Is Your Job at Risk?” CNNMoney, Cable News Network, money.cnn.com/2017/09/15/technology/jobs-robots/index.html.
16-17
Natural Language Processing are "techniques for processing human languages to enable a computer to understand meeting" (ITGS 333).
Two components of an expert system are the knowledge base and inference engine.
One way that expert systems can be used is in the medical field, if the system has a list of symptoms and measurements that coincide with a certain disease, it would make it easier for doctors to diagnose for patients. This would not only speed up the process for the doctor but it could also save lives.
Another area that can be useful with computers is in the concept of a machine translator like google translate in comparison to a human translator. In the past, in interactions between people who speak different languages, a human translator has been present so the two can understand each other. However google translate has become so fast that if you upload a picture of a foreign language it could translate it instantly. However one advantage to having a human translator could get some intricacies of language and slang that google translate couldn't.
Tutorials Point. “Artificial Intelligence Expert Systems.” Www.tutorialspoint.com, Tutorials Point, 8 Jan. 2018,
www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_expert_systems.htm.
“What Is Natural Language Processing (NLP)? - Definition from WhatIs.com.” SearchBusinessAnalytics,
searchbusinessanalytics.techtarget.com/definition/natural-language-processing-NLP.
Gay, Stuart. Information Technology in a Global Society. International Baccalaureate Organisation, 1997.
Blog Post 18: Database
1. A field is a section that splits up the aspects of a database to make it easier to organize. If the database is about cars the fields could be color, automatic or manual, brand.
“Field (Computer Science).” Wikipedia, Wikimedia Foundation, 17 Feb. 2018, en.wikipedia.org/wiki/Field_(computer_science).
2. Records are all of the fields collected together, and a set of records is a file.
Beal, Vangie. “Record.” What Is Record? Webopedia Definition, www.webopedia.com/TERM/R/record.html.
3. In a database a table is a collection of elements organized into rows and columns
“Table (Database).” Wikipedia, Wikimedia Foundation, 18 Apr. 2018, en.wikipedia.org/wiki/Table_(database).
4. SQL stands for Structured Query Language, and is the most common file format for databases.
“SQL File Format.” TechTarget, whatis.techtarget.com/fileformat/SQL-Extension-for-SQL-queries.
The company, Amazon, is an online shopping store that sells thousands of products daily. They are frequently used because they are known for having literally everything to sell, you can search for something and it should pop up instantly. They most likely organize all of their information in databases to make it easier to find. An example is that if you looked up "red dress" amazon would go to the clothing field, then the dress field, then the red field. It also gives other fields like price point and amazon prime. This allows Amazon to have millions of products for sale and organize them into an easy to use way.
“Field (Computer Science).” Wikipedia, Wikimedia Foundation, 17 Feb. 2018, en.wikipedia.org/wiki/Field_(computer_science).
2. Records are all of the fields collected together, and a set of records is a file.
Beal, Vangie. “Record.” What Is Record? Webopedia Definition, www.webopedia.com/TERM/R/record.html.
3. In a database a table is a collection of elements organized into rows and columns
“Table (Database).” Wikipedia, Wikimedia Foundation, 18 Apr. 2018, en.wikipedia.org/wiki/Table_(database).
4. SQL stands for Structured Query Language, and is the most common file format for databases.
“SQL File Format.” TechTarget, whatis.techtarget.com/fileformat/SQL-Extension-for-SQL-queries.
The company, Amazon, is an online shopping store that sells thousands of products daily. They are frequently used because they are known for having literally everything to sell, you can search for something and it should pop up instantly. They most likely organize all of their information in databases to make it easier to find. An example is that if you looked up "red dress" amazon would go to the clothing field, then the dress field, then the red field. It also gives other fields like price point and amazon prime. This allows Amazon to have millions of products for sale and organize them into an easy to use way.
Final Product: Grid-Wide Power Outage
I am posting this video for Greg, Maddie, and I. They did not post it.