Monday, March 12, 2018
For my create project, I am creating an in-game football win probability calculator where the user can input the current margin, time, favored team, and yard line of the team, and the program will output a percentage value of the team. I found the formula based on an excel document online. The variables need to be adjusted which will require functions.
Wednesday, February 14, 2018
The 10 Breakthrough Technologies of 2017 presented in the MIT Technology Review offered interesting insight of upcoming products for the near future. Some technology, like the autonomous truck, 360 degree camera, and face recognition software is already familiar to many people. There were also technologies relating to medicine, renewable energy, and super computers. I did not recognize the medical inventions, and did some additional research on those. Scientist are working on reversing paralysis by implanting chips into the brain. This ground breaking technology, that would give the ability of movement to people with spinal cord injuries, is not going to be available for another 10 to 15 years and is still fairly far off. A recent medical innovation that is being used today is gene therapy used to cure hereditary diseases. Next scientists are seeing if it can combate cancer and heart disease. Outside of the medical spectrum, scientists are working on hot solar cells that convert heat to light beams for continuous power. This will not be around for another 15 years, but is a peak into the future of renewable energy. Other technologies include the most powerful supercomputers and the smartest artificial intelligence yet, which will be available within a half decade. Many of these innovations have the power to change society, economically and socially. It may also be true that in a decade these projects had been stalled or transformed with a different goal. I believe that autonomous vehicles, supercomputers, and AI will be utilized more often, although possibly not within the timeline. Other projects like unlimited renewable energy and medical treatment with the ability to cure cancer may reach a point where it seems hard to obtain the large goal. Nonetheless, these technologies are changing the world for the better and absolutely have the potential for even more.
Monday, February 12, 2018
1. Cryptography has been since 2000 B.C. when the ancient Egyptians used hieroglyphics.
2. Plaintext: CS IS COOL
Ciphertext: FV LV FRRO
3. A Caesar cipher is an example of a large class of ciphers known as substitution ciphers.
4. A random substitution, where letters are randomly replaced by other letters, is more secure than a Caesar shift because in a Caesar shift, all letters change in the same pattern, and with a 26 letter alphabet, there is only 25 possible shifts. For a random substitution there are more opportunities, basically an infinite number, to decode a message.
5. A frequency analysis is the technique used to crack substitution codes based on how often different letters occur.
6. A random substitution cipher looks hard to crack but is actually easy to crack.
7. I would guess that a Caesar shift encoded message would probably take me 5 minutes or less to crack. By focussing on short words, you can simply shift each letter until the word makes sense and then work from there.
Thursday, November 16, 2017
Internet and IP Addresses
What is a protocol?
- Protocol is the set of rules that all users of the internet agree to follow in order to communicate between machines.
What is an Internet Protocol (IP) address?
- An IP address is a set of numbers unique to each computer or device on the internet. This address, similar to a mailing address, allows each computer to be communicated with and is part of the standard Internet Protocol, mandating every computer address.
How is it organized hierarchically?
- IP addresses are organized hierarchically to sort them into different categories. Most IP addresses have 4 parts, 8 bits each, and the different parts break it down by country, region, subnetwork, and specific device. This makes its easy to locate devices and communicate with them.
How many bits are in an IPv4 address?
- There are 32 bits to IPv4 addresses, 8 bits to each part of the address.
How many IPv4 addresses does that mean there are?
- There are 4 billion addresses, but because this is not enough for the number of devices now, we are in the transition to new addresses named IPv6. IPv4 was designed in 1973 and adopted in the 1980s so they did not accurately predict the number of devices that would be used.
What is the difference between IPv6 and IPv4?
- IPv6 uses 128 bits per address as compared to the 32 of IPv4. IPv6 can account for over 340 undecillion addresses, much more than the 4 billion that IPv4 provided.
Why do we need IPv6?
- Because IPv4 cannot account for all the devices connected to the internet, we need IPv6 to help account for all if them.
What is an IP packet?
- IP packets are pieces of information, that take different routes to get to the destination, and are reassembled to display the finished product. An example of this would be when someone uploads an image onto the internet, the image will be broken down into packets.
What is the difference between an IP address and an IP Packet?
- An IP address is the specific set of numbers to each device connected to the internet to helps group them by location. An IP packet is a piece of information being sent to a destination, along with other pieces of information although each may not be sent the same way, to be reconstructed into the whole again.
What is the purpose of the Domain Name System (DNS)?
- It associates names with specific IP address. The computer uses this system to look up domain names to get the address, which connects the device to the destination on the internet.
Thursday, October 26, 2017
The first article titled What Did You Think They Do With Your Data by John Battelle on NewCo Shift informs readers on the reality that companies offering “free” services are using your personal information for their benefit, often selling it to other organizations. This specific example in this article is how the free AccuWeather app was selling anonymized data of their users to a third party company even though some of those users selected to not allow AccuWeather to access their location. The way AccuWeather has managed to do this is by asking misleading questions to make the user believe one thing when in reality they are utilizing something the user did not think of, so in this situation location. The article reminds us to always be cautious when using “free” services, because nothing is truly free.
In the next article, For $1000, Anyone Can Purchase Online Ads to Track Your Location and App Use by Jennifer Langston on University of Washington News explained the dark truth about online advertisements. The article talks about how companies can know when someone enters specific areas based on location based ads. The person who buys this ad can know further information on the victim, like what other apps they use. This articles acts as another reminder on how to handle the ever changing digitalized world.
The final article When You Should (and Shouldn’t) Share Your Location Using a Smartphone by Brian Chen with the New York Times explores the benefits and dangers of location sharing services like Apple, Google, Facebook, and Snapchat. He provided an example where his wife could use his location when he was in a motor accident where finding his location was very helpful. Other times when sharing a location is when someone needs to meet up with a group of people or when a parent tracks a child. He also noted that not all location sharing services are accurate and they need improvement. It is important to remember to never give your location away to strangers, but restrictions are easy to set.
All of the above articles were very informative and in a way helped me think about using technology a little differently. The first articles made me think of things most people like to ignore, and made me actually realize what “free” accounts are. I am not saying all free services are bad, but when I put out my personal information is could always be used maliciously. The second article surprised me the most on how someone can pay for ads and track your location. UW News did a good job of simplifying the fairly complex subject. The only question I had was what determines a “designated area” for someone to be in located via advertisements. Could this be potentially anywhere with LTE connection or do they have to be connected to an unsecure public network? The final article was pretty standard, and I felt aware of all of the material, but it was a definite reminder of what today’s technology is capable of.
Monday, October 2, 2017
Recently, multiple companies have started microchipping, or inserting a tiny computer chip into one’s body, its employees. This futuristic technology offerers many benefits and improvements, but it also has downsides that accompany it like any new technology nowadays. The first benefit is that it has the potential to make tasks more efficient and quicker. Modern companies, like Three Square Market in Wisconsin, allow employees to scan their ID or use the coffee machine or photocopier simply by waving their hand with the microchip. The possibility of one’s passport being linked to the microchip is on the horizon which could seriously eliminate lines. Another benefit would be that it cuts down on documents that one carries around. This has the potential to be one’s ID, credit cards, and passport, and someone would not have to worry about all of their important documents when they are stored right inside them at all times. The third and final benefit is in the medical world, doctors can quickly identify a person and their medical history when in the hospital setting. This is slightly different from a phone or handheld device because this device is always inside the body of the person. This small but vital improvement can make a big difference for important situations. The new technology also may have some negative side effects along with it. First off, inserting a computing device within or under the skin of a human could be a health issue concerning irritation, infection, or migration of the object in the body. If a company make its employee have microchips inserted in them and the employee has a health issue relating to the chip, who is to blame? Another issue is that one’s personal data is being stored on the device. That personal data is transmitted to scanners outside of the body and it could possibly be intercepted. Just like credit cards, the chip needs to be used with extreme caution; however, the only problem is the user may not be aware or have the choice, since it is implanted within them. The third and final concern is the possibility of GPS tracking the device. With this, your location will always be known. Although this is basically true today, the chip is inside your body and it is much harder to get rid of. This can help companies know where and how their employees are doing their work, but raises moral concerns and is somewhat unsettling.
This technology still seems futuristic and definitely still has a ways to go. This chip used by companies right now is fairly simple and basically only eliminates the action of getting a card or phone out of their pocket. To some, it is not worth inserting a computing device into their skin to eliminate a ten second daily activity. To others, this is a large step into future technology where the technology now conforms to our bodies for maximum efficiency. Personally, I do not believe many other companies are going to join the microchipping community in the near future. This is because the current microchips are only used to scan ID and use machines. Eventually, technology similar to this will replace our wallets, but based off research I do not think this will happen within the next 5 years.
Wright, Aliah D. “Microchipping Employees: Do the Pros Outweigh the Cons?” SHRM, Society for Human Resource Management, 7 Aug. 2017, www.shrm.org/resourcesandtools/hr-topics/technology/pages/microchipping-employees-do-the-pros-outweigh-the-cons.aspx.
Gaughan, Richard. “Advantages & Disadvantages of RFID Technology in Humans.” It Still Works, Leaf Group, 2017, itstillworks.com/advantages-disadvantages-rfid-technology-humans-18010.html.