Posts

Explorer Task Blog Post One

December 6, 2019
Yesterday, I collected research information on my computing innovation in an attempt to fully understand how my innovation works and what part of the software actually uses higher-thinking to solve some sort of problem. I collected links that can help me in answering this question and I also looked at other computing innovations that have similarities. Today I plan on continuing my research with a focus on the software that allows the hardware in my computing innovation to function properly. I will continue to find sources and hopefully, gain a better understanding of how my innovation works.

Consent and Ethical Data

In my opinion, consent to give out personal information is a big deal especially considering that 91% of us don't even read the legal terms of conditions when we agree to hand out our information on the internet. It gets tricky though as researchers themselves can't explain how people will view their personal information being used and so informed consent can never be achieved. Our control over privacy is something instilled in the values of the constitution and our consent to give it away is very serious.

"The tricky ethics of Google’s Project Nightingale" looks to explore one of Google's controversial programs that were agreed upon by the healthcare system Ascension. The software allows Google to have access to tens of millions of patient records with the ultimate goal of making health records "more useful, more accessible, and more searchable" for doctors in particular. Data ethics debates like this one are narrowly honed in on consent as it is obviou…

Submarine Cables

Jason Hurrie December 2, 2019
1. Sharks do tend to bite submarine cables in theory because they are attracted to the electromagnetic signals emitted by the lines which can be easily damaged. Such signals are thought to trigger a feeding reflex which can confuse sharks that easily mistake the cables for food.
2. Submarine cables can be damaged in a number of ways. One, earthquakes can severely disrupt and or damage them, two, deliberate sabotage is a rare but possible outcome, and three, most commonly, submarine cables are damaged by fishing vessels dragging anchors along the ocean floor which accounts for 2/3's of all cable damage.
3. Submarine cables are used by just about everyone who wishes to communicate through technology across oceans and seas to opposing continents; in fact, people who use the internet still rely heavily on underwater cables. Google owns a large share in many of the existing cables and will currently be the sole owner of the Curie cable which is to be comp…

IP Blog Post

In computer science, a protocol is a set of procedures or rules for transmitting data between electronic devices such as computers. An IP Address is a label that is used to identify multiple devices on a computer network; such devices often use IP addresses to communicate with each other. An IP address consists of two parts: 1. Identifying the network (IPv4) and 2. Identifying the host (IPv6). There are precisely 32 binary bits in an IPv4 address which means in theory, there are just over 4 billion of these addresses available or already taken. Contrary to IPv4, IPv6 uses 128 bits to create a single unique address on the network and its goal identifies an endpoint device in the internet protocol version 6. Both are equally important, however, IPv4 addresses are running out as more and more devices gain access to the internet. IPv6 addresses allow for a much larger address space which in turn accommodates for a much larger demand. In addition, IPv6 addresses have improved traffic routi…

7 Koans Blog Post

Koan 2: Perfection is Normal

In today's society, everything is subject to copyright. Why? Well, one major reason is that computers and software, in general, don't make a whole lot of mistakes. In fact, errors seen in technology have become somewhat of scarcity as it often takes an outside source such as the internet shutting off or a virus to complicate matters.  One reason computers do such a good job copying and identifying things is that they perfect the ongoing task at hand. As stated in the excerpt, someone sending a picture they took over to their friend should expect that friend to receive the same picture with no apparent decreases in resolution or quality. It just goes to show that while computers do fail from time to time, they are in essence perfectionists.


Koan 3: There is Want in the Midst of Plenty

The end of an era as many like to say; that is what older generations use to mark the beginning of change. In the world of technology, we see a remarkable shift in dat…

Field Trip Blog

Image
Historical Museum:

The furthest picture on the left: Pictured above is two of my classmates participating in a decoding simulator meant to symbolize the enigma code that was broken by the British during World War Two. I quite enjoyed participating in the activities set up at the station which is why I decided to take a picture because I was fascinated and intrigued to solve a secret code. Obviously, intercepting radio messages during World War Two was key to winning the war and the code that was used in these signals revolves around wireless communication.

Picture in the center: Displayed here is an image of a wireless radio machine also used during World War Two. This machine would've been operational on naval ships crossing the Pacific and Atlantic Oceans. Again, the sheer size of these wireless radios stacked into naval ships fascinates me and I thought it was very interesting learning to some of the volunteers talk about this machine and its use in World War Two. Because this m…