Connectivity and Censorship

As a species we are connected. Our access to information is increasing exponentially. Many authorities and governments around the world have fears about what this access can mean for the people in their countries. These concerns cause them to censor the amount of communication that individuals have or cut them off entirely if they feel the risk is too great.

This dilemma is at the forefront of many world leader’s mind and many governments have different methods and levels of constraint for the Internet, cellular phones, and other forms of communication via technology. Listed below are some examples of differing severity levels of censorship in various countries.

The United States – The US censors technology very little. In the US it is illegal to use cell phone jammers for private use. However, federal officials can use them in some instances. Recently, transit officials in San Francisco shut down power to cellular towers blocking all cell phone usage on the BART in order to prevent protesters from coordinating on stations and platforms to convene upon.   This censorship incited a public outrage and government investigation regarding the legality of the shutdown.

China – It is common practice for Chinese officials to monitor chat rooms, private screen, and black list websites. Their censorship of the Internet is termed the “Great Firewall of China”. Go to this link to see if your site is blocked in China.

North Korea – The government of North Korea has total control of all computers with Internet access. Only three websites can be accessed in North Korea and they only contain academic information. There are a few chat rooms allowed, but they are heavily supervised by the government. The high level of censorship has produced a huge cell phone black market in North Korea.

As you can see, different governments approach the idea of technology censorship very differently throughout the world. And the socio-political reasons behind the amount of restrictions vary equally as much. Listed below are some common reasons for and against censorship:

Reasons why censorship is necessary

  • Censorship can protect the safety of the public
  • Censorship can prevent youths from being exposed to inappropriate content
  • Censorship can protect social unity and national glory
  • Censorship can prevent disturbing the social order
  • Censorship can protect national security


Reasons why censorship can be dangerous

  • Censorship violates the natural right of self-expression
  • Censorship can prevent people who have an emergency from getting help
  • Censorship can lead to ignorance of the world and other cultures
  • Extreme censorship can lead to social upheaval
  • Extreme censorship can lead to an oppressed and uneducated society


A professor at the University of Kansas, Barney Warf, published a definitive study of the geography of Internet censorship in an issue of GeoJournal. He believes that the more globalized a country becomes, the harder it is to control types and levels of information the public can access. Whether or not technological censorship is right or wrong is situational and up to individual opinion. As the world becomes more connected it will become harder for nations to control the flow of data and we will see this issue continue to arise worldwide.

You can read this article to learn more about Professor Barney Warf and his study.


Internet Anonymity: The pros and cons

Google is the newest heavy hitter in the social media world. One of the most notable differences between Google and other standard social media sites like Facebook or Twitter is that account holders are restricted from using pseudonyms. Anonymity is commonplace on the Internet, which is most likely the reason why Google ’s decision to ban pseudonyms has made such a large impact. There are a few key pros and cons to complete anonymity on the Internet, here are a few to consider.

Pros

    The Internet almost never requires users to provide their real names or implements effective methods of verifying personal information. Consider all the fake celebrity Twitter accounts, the source behind Twitter’s “Verified” status. However, easy anonymity comes with a particular layer of safety that is a necessity in many cases. Think of someone who has been the victim of abuse or stalking. For these people, being able to use a name other than their own makes them harder to find and therefore safer. In these cases, the connectivity that comes with the Internet can still be enjoyed while remaining at a safe distance from those they wish to stay away from.

Cons

    The majority of Internet annoyances, including crimes, begin with a fake persona on the Internet. Email scams, social media spam and profile hacks are all done by employing an anonymous account in one form or another. This makes anonymity on the Internet a complicated issue because it’s a difficult thing to adequately monitor. While there are methods, such as IP tracing, that can reveal the identity of most Internet users, generating a fake identity is still easy. In the same way that anonymity can grant freedom, it can also be a shield for criminals.

    Internet anonymity is a matter of personal responsibility. It is only as bad as the person taking advantage of it. When deciding your stance on the issue, first consider how you use it.

Tech That Remains the Foundation of Computer Science

It seems like as soon as you buy a new piece of technology, a faster and better version comes out. Technologies that were ground breaking last week are old news this week. However, it may surprise you to know that the root of these technologies have stayed the same for 50 years.

If we live in a world of ever changing technology, what makes these core technologies remain unchanged? Was the initial design so strong that it didn’t need much improvement? Here are a few technologies that have retained their integrity for over 4 decades.

Virtual Memory – 1962 – This allows systems to use hardware memory more efficiently by recycling space used for memory. This idea led to time-sharing or the ability for systems to multi-task.

MOS Chip – 1967 – Metal-oxide semiconductor. This technology is used today to make computer chips and is referred to as CMOS (complementary metal-oxide semiconductor). The technology has changed a bit over time so adaptability is one trait that has kept it alive.

C programming language – 1969 – Created by Dennis Ritchie at Bell Labs, C is the most popular and widely used programming language in the world. When you get something right why change it?

We have seen these technologies morph into other types of tech, programming languages, and inspire new ideas and designs. It’s amazing that these technologies have remained at the root of so many technological innovations today!

You will find more tech which has withstood the test of time here: http://www.osnews.com/thread?484715


What to do when your email has been hacked

Every email account is vulnerable to the nefarious plots of hackers. Though there are several steps you can take to protect and secure your private information, there will always be a chance that your very own email account could one day be compromised. So, what do you do after your email has been hacked? The important thing to remember in this situation is that there are proactive steps you can take to regain control of your digital life. Here are 3 things to consider.

Notify Webmail Provider

    It’s important to let your webmail provider know that your account has been compromised. Informing them of your situation will help them to identify the problem and fortify their security to make future hacking attempts even more difficult for the hackers. While most webmail providers are not liable for successful hacking attempts, they definitely want to do all they can to prevent them.

Change Password

    This may be the most important thing to do after your account has been hacked. You’ve heard the term “the criminal always returns to the scene of the crime.” Well, the same can be said for hackers. Once you’ve determined that your email has been hacked, make sure and change your password to one that is both complex and absolutely different. If your house were broken into, you’d change the locks. The same measure of safety should be considered for your online identity.

Notify your contact list

    Make sure to send a message to everyone on your email contact list informing them of the recent hack. It is likely that they will have gotten SPAM messages from your account that could either be virus transferring Trojans or some strange solicitation for money. Make sure and communicate the situation clearly and concisely in the subject of your email, as many on your contact list may already be wary of opening emails from your account.

No one likes having his or her personal information compromised. It’s important to remember that, if your email has been hacked, your online banking and other Internet managed services may also be compromised. If you’d like additional information on what you should with a hacked email, please take a look at this article.

Keep Your Business Focused on the Big Picture

Most of us set goals in our personal lives. It keeps us motivated and each accomplishment gives us the drive to keep reaching further. We do this in our home life so why not do this in our work life too?

Around 30% of our lives are spent at work. Some people are unfulfilled by this time. Many people do not feel that they are an active part of the company and let whatever comes into their inbox dictate how their time is spent. Setting goals gives people a sense of control and allows them to choose how they spend their day. They feel like an active member of the team as they have a say in creating  goals and the part they will play in their completion.

More than ever people work autonomously; people who work like this must be proactive about setting goals. Regardless of whether you work in a group or autonomously, here are a few tips that will help you start the process of goal setting.

  1. Set or Assess Goals Every 3-6 Months – Schedule a meeting or set time aside dedicated to setting goals. This timeframe will keep the goals fresh and it will be easier to commemorate achievements.
  2. Write Down Your Goals – Physical documentation of your goals will help the group keep the focused on those goals.
  3. Aim High – Set goals a little outside your comfort zone. This can lead to learning new skills and finding pride in one’s work. Remember, don’t set your goals so high that it is an extreme burden or unachievable for you or your team.
  4. Find a System to Measure Performance – By breaking goals down into smaller ones and determining the skills that need to be perfected, you can more easily measure the progress toward the finalization of the goal.
  5. Celebrate Each Achievement – Whether working individually or with a team, be sure to celebrate each step that has been reached that supports the larger goal. Positive reinforcement goes a long way and it can be as simple as a word of acknowledgment.
  6. Schedule the Next Goal Setting Meeting Ahead of Time – You may lose perspective and drive if you do not refresh your goals. Goals keep us feeling excited and accomplished and that leads to job satisfaction.


Feeling pride in our work and feeling like we contribute is valuable to everyone. Setting and reaching goals reminds us of the important part we play in the larger goal.

Characteristics of Good Apps

An app is simply as valuable as it’s function. There are particular things that can determine the value of the function, whether or not the app is useful, whether or not the app works accurately or even whether or not the app is fun. Take ‘Angry Birds,’ for example. This app has value because of the universal level of entertainment it offers. But a good idea doesn’t necessarily translate to a beneficial app. So what key features do all good apps have in common? Here are three common features found in highly functional and valuable apps.

Stability and Reliability 

    A good app should go through rigorous testing prior to a launch date.  The developer should be confident that the app will still have value under a wide range of different conditions including disabled WIFI, impaired cellular data and smartphones set to airplane mode. Even if the base function of the app is creative and useful, if it doesn’t work under a variety of conditions then the app loses much of its value. A good way to determine value in an app is to research the amount of testing that went into development.

Consumer Consideration

    Any app worth it’s price is going to provide worthy functionality. However, the developer needs to consider the consumer in the design of the app and understand that no one wants a surprise overage charge on his or her monthly bill. A good app shouldn’t consume too much data as many cellphone plans consist of monthly data caps. Before downloading an app, make sure and research the amount of data it costs to use the app.

A Well Constructed API

    API stands for application programming interface. Basically, it’s the way in which applications communicate with one another. For example, if you have an app that makes posts to Facebook, that app does so by communicating with Facebook’s API.  This is a very important part of app development because most apps, in one way or another, communicate with other apps. Nothing is more irritating than realizing your Twitter app has made duplicate posts. A good app will have a well-constructed API to insure that the right information is being communicated.

    While an app’s worth can be of objective determination, there will always be several key elements to look for when searching for that fantastic new download. For more tips on finding great apps, take a look a this article.

DOS Through the Decades

Remember DOS, with its black screen and blinking cursor eagerly waiting for your command. The Disk Operation System (DOS) celebrated its 30th anniversary a week ago. DOS has arguably been the most important OS of all time and in honor of it turning thirty, I would like to reflect on where it has come from and where it is going.

In 1981 IBM released the PC and the following options for operating systems (OS).

  • IBM Personal Computer Disk Operating System – cost at the time: $40
  • Digital Research CP/M-86 – cost at the time: $240
  • SofTech USCD p-System w/Pascal – cost at the time: $695

DOS was the only one of these three that was available right away and was the most affordable and for that reason became the most popular and commonly used. For a few years the public willingly used the no frills interface of DOS. Then in 1985 Microsoft released Windows, which at that time, was a Graphical User Interface (GUI) that required DOS as an operating system but allowed for easier access to programs. The earliest versions of Windows were not very popular but as newer and improved upon versions were released, each one still needed DOS, until 1995.

When MS-Windows 95 was launched it do not required DOS but could run completely independent as it had its own built-in OS. However, it did include some portions of the 16-bit DOS code to function. Like a baby bird, Windows had not quite learned to fly without a little bit of assistance from DOS.

But all things must change and a year later in 1996, Windows-NT was released. It was the first version of Windows that was fully 32-bit with no 16-bit DOS code in it all.  However, DOS did not disappear from our lives.

Many people still use DOS believing its simplicity to be reliable and efficient. They don’t want all the bells and whistles that are included in “user friendly” interfaces. For this reason, newer versions of DOS continue to be developed and sold. Many computer manufactures still sell computers with DOS as the main operating system. Today we see FreeDOS, ROM-DOS, DR-DOS, and others on the market. It appears DOS will live on so long as the die-hard fans still demand the simple elegance of cmd enter.

Let technology keep you cool

Staying cool in the summer is sometimes more difficult than it sounds. We all have our own means of beating the heat, be it swimming, eating ice cream, or lounging in a good old-fashioned air-conditioned room. However, there will always be more unique approaches to stay cool, thanks to gadget technology. If you’re looking to last out the summer in comfort, one of these quirky devices just might do the trick.

The Bedfan

This first gadget promises to keep you cool at night, even if you like to sleep under a large blanket. The Bedfan connects to the end of your bed, positioning a small vent just under the covers, and creates a slight breeze. Thanks to natural insulation, this strategically placed airflow generates a fantastic cooling effect. If you sleep best nestled under a large cover but hate being too warm, the Bedfan is here to help. For a closer look at the Bedfan, check out this website.

The BEX Runner

Staying active in the summer can be difficult. Your odds for heat exhaustion can    almost double when exercising in severe heat. While the BEX Runner does not claim to prevent these dangers, it does claim to help regulate body temperature.  The BEX runner attaches to your palm and through the power of science, draws in and stores heat from your body. This effect can make exercising in high temperatures much more comfortable. To learn more about the BEX Runner, visit their website.

The iPocket Fan

This is the perfect gadget for any iPhone fanatic looking for an interesting way to cool down. The iPocket Fan is a charging deck for your iPhone or iPod. Attached to the dock is a small desk fan and, when the iPhone is connected, an animated fan display also appears on screen. If you want to make the fan go faster, simply spin the blades on the animated fan on your touch screen. While this device may not be the best thing to rely on while staying cool, it sure is a lot of fun. Check out the website to learn more.

Keeping cool is easy with the right gadgets. Make sure and beat the heat this summer by regulating your temperature. If you’d like to read up on some more cooling gadgets, take a look at this article.

The Influence of Space Technology in Our Everyday Lives

People around the world watched as the space shuttle Atlantis took its last trip into space last week. This marked the conclusion of NASA’s space shuttle program however the thousands of technologies that were born from the program will stay with us far into the future. We use technologies from the space program at home, work, and while driving.

What comes to mind whenever you consider technologies produced by NASA? Probably rockets, spacesuits, and freeze-dried foods. It may surprise you to discover just how many common uses they have found for technologies originally developed for the space program. NASA releases a yearly periodical, called Spinoff, that is devoted to educating the public about the variety of technologies with origins at NASA that have become commercialized worldwide.

Here are a couple of common items that may surprise you to know wouldn't exist without NASA’s technology.

Athletic Shoes – A process called blow rubber molding was created to produce space helmets and is now utilized in many running footwear. This process allows companies to produce hollow soles in order to fill them with a shock absorbing material. Nike Air is one common shoe that utilizes this method.

DustBusters – Engineers at Black and Decker created a computer program that enables motors to perform well even when using very little power. Thus the cordless power drill and DustBuster was born.

Smoke Detectors – These were first created for Skylab, America’s first space station, in 1970. They are now so common that you cannot legally build a house without installing them.

The desire to explore space has inspired humans throughout time. The space shuttle program pushed these inspirations into the development of incredible technologies. We will miss the space shuttle but the desire to build bigger and better technology for space travel won't fade. We'll probably see many more technologies produced by NASA turning up in our homes, hospitals, and lives for years to come.

The Best Business Cards

Business cards are an essential and longstanding cornerstone of effective networking. The format is as standard as the medium, a small stock-paper card with basic contact information and, if you are feeling saucy, a witty catch phrase. However, more and more creative thinkers are handing out extremely memorable business cards that toss out old networking conventions and replace them with unforgettable innovations. The very standard of what is and what is not a business card is changing. If you're looking to improve your networking skills by creating a business card that will have people talking, consider a few of these creative techniques.

Add Texture

This is one of the most basic ways to make your business card more memorable. Adding texture to a card engages the sense of touch in a dynamic way, creating an additional layer of memory in the brain. It may sound silly, but if your business card has an fascinating texture, then the brain of the receiver will have one more thing to notice. Check out this great example.

Make Them Share-Worthy

Hand out a card that people will want to discuss with their friends or hang up on a wall at work. A simple and intelligent design on the back might just inspire others to show it to their coworkers. For example, take a look at this great mustache design on the back of a particularly fun business card. This sort of style will have people holding the card up to their face and, in turn, sharing it with others. Check it out here.

Make Them Digital

Who says a business card has to be a card? Why not go green and implement digital business cards by developing QR codes instead? QR codes are a popular trend among tech-savvy smart phone users. Demonstrating the ability to use this technology effectively will impress your audience, making your business card (and more importantly, your business) more memorable. Here are some tips on using QR codes.

Creating a business card is only limited by your imagination. Making your cards unique will make them more effective networking tools. For more tips and tricks on making business cards, make sure to read this article.