Tuesday, April 29, 2014

The second revolution of technology

As the technology grows, people become more and more dependent on it. In the past, we might think that the technology will one day have consciousness and take on a wave of revenge. However, that everyone day may have arrived silently but with a scarier way. They are after our jobs.



From the basic muscle jobs to higher level cognitive level jobs such as doctors. For example an artificial intelligent name Watson. It can obliterate human in term of knowledge, seen on a game show. It is able to understand human nature language. And because technology can be made and remade, more and more can be produced. Meaning that in the future, you might have a version of Watson in the house yourself! Have it to do things, manage things for you. Sound good isn't it?



Not so fast, what about the jobs that we once depended on? They are slowing being taken over by exponentially growing computers. Then when we relies on it so much, it seems that we are their biological robot now. Like the airline trials Google Glass check-in. The man is not deciding anymore, the computer or the main server is. He is just there to “help” the operation. In the near future, we will have a humanoid robot replacing many jobs such as cashier, assistant, maids. Technology might one day replace our pets! Robot pets!



Our jobs are slowing being consumed by technology, and it doesn’t seems to have much new jobs now. What should we do about people that depend on muscle jobs? In the far future, many not be far, doctor may be replaced! We need to think about that and cope with it. Maybe learning how to code will allow us to have job controlling the robots again, instead of it control us.

Major Concepts
  • Privacy concerns, job concerns, future concerns
  • Our right as a human are being replaced
  • Who is being control by it, digital divide.

Potential Advantages
  • Many example such as google glass, the cow milker

Potential Disadvantages
  • Did not state how to deal with the problem

Discussion Questions
  • Who is controlling who?
  • If our jobs are becoming less and less, what should we do about those jobless people?

Citation
  • Grossman, David. "Will robots put us all out of work?." BBC News. N.p., n.d. Web. 28 Apr. 2014. <http://www.bbc.com/news/technology-27125728>.
  • "Airline trials Google Glass check-in." BBC News. BBC, n.d. Web. 29 Apr. 2014. <http://www.bbc.co.uk/programmes/p01xz1br>.
This is for assignment and education only. Any rights belong to their rightful owner 



Thursday, April 24, 2014

The Heartbleed Bug


What is it?
In short it is a security bug in the OpenSSL cryptographic software library. Specifically, a simple logic error in the extension. This bug allow any attacker to obtain sensitive information from the server, given that they have time and some level of luck. These sensitive information include e-mail address, ID and password of clients, server’s master password, even decryption key of the server. The list goes on.


How did it happened?
It was a simple logic error in an extension, HeatBeat used to keep the connection between server and client alive without needing to reestablish the connection, written by a Ph.D. student in 2011. The extension was then reviewed by one of the four core developer of OpenSSL. The flaw however was overlooked and the extension was implemented to later official releases. By default, the extension is enabled thus the bug is present by default. 


Who got effected?
Any client that have servers that used OpenSSL version ranged from ONLY 1.0.1 to 1.0.1f. Why only between these number? Because before 1.0.1 the extension wasn’t present and after 1.0.1.f the bug was patched. This means that many giant website, companies that were using these version might have their sensitive information stolen without any warning at all. This means that YOUR id and password might have been stolen!

What was the damage?
The bug was already there for 2 years without anyone publicly disclose it which can indicate that many company have been attacked over the course of 2 years. Leading to many account being access by the attackers and messed with. Maybe the bank are hacked without them knowing. Even more alarming is that the attackers are NOT traceable. The attack this bug enable is silent and leaves no trace. Recovering from it will take sometime.

How to prevent it or recover from it?
Servers can be prevent heartbleed from happening any further by applying the latest OpenSSL security patch and users should change their password. However you must ensure that the server have already applied the patch or else the server can still be attacked.  There are many vulnerability test services out there that can check for such bug. Using them can find out whether your server is safe or not.

What did you learn from it?
I learnt that even a simple logic error in programming can lead to a global problem. And having an open source program can have more people to review the code and find the bug or flaw in it preventing any bug or flaw that can happen to be overlooked.

Sources 
  • "What Exactly Is The Coding Error That Is Responsible For The Heartbleed Bug In OpenSSL?." Forbes. Forbes Magazine, 17 Apr. 2014. Web. 22 Apr. 2014. <http://www.forbes.com/sites/quora/2014/04/17/what-exactly-is-the-coding-error-that-is-responsible-for-the-heartbleed-bug-in-openssl/>.
  • Paul, Ian. "VPN provider proves OpenVPN private keys at risk from Heartbleed bug | PCWorld." PCWorld. N.p., 17 Apr. 2014. Web. 22 Apr. 2014. <http://www.pcworld.com/article/2144962/vpn-provider-proves-openvpn-private-keys-at-risk-from-heartbleed-bug.html>.
  • Pachal, Pete. "The Programmer Behind Heartbleed Speaks Out: It Was an Accident." Mashable. N.p., 11 Apr. 2014. Web. 22 Apr. 2014. <http://mashable.com/2014/04/10/heartbleed-programmer/>.
  • Hesseldahl, Arik. "The Heartbleed Bug Is Mostly Fixed, but Not Entirely." Recode. N.p., 18 Apr. 2014. Web. 22 Apr. 2014. <http://recode.net/2014/04/18/the-heartbleed-bug-is-mostly-fixed-but-not-entirely/>.
  • "Heartbleed is Scarily Easy to Exploit."PCMAG. N.p., n.d. Web. 22 Apr. 2014. <http://securitywatch.pcmag.com/security/322691-heartbleed-is-scarily-easy-to-exploit>.
  • "The Heartbleed Bug." Heartbleed Bug. N.p., n.d. Web. 22 Apr. 2014. <http://heartbleed.com/>.
  • Zetter, Kim. "Heartbleed Bug Sends Bandwidth Costs Skyrocketing | Threat Level | WIRED." Wired.com. Conde Nast Digital, 14 Apr. 2015. Web. 22 Apr. 2014. <http://www.wired.com/2014/04/cost-of-heartbleed/>.
  • "Heartbleed." Wikipedia. Wikimedia Foundation, 22 Apr. 2014. Web. 22 Apr. 2014. <http://en.wikipedia.org/wiki/Heartbleed>

This article is a homework assignment by Mr.Pete

Sunday, April 6, 2014

Article review

Samsung claims a graphene breakthough
Graphene is one of the recent super material found by scotch tape and pencil lead. It is way more stronger than steel, flexible and highly conductive. The conductivity was so good that researchers need to use E=MC^2 to understand the property of it.

Because of it's useful properties, researchers took interest as well as big corporations. Up until recent years, producing graphene was a big of a hassle and every unprofitable making them.

A research facility own by Samsung discover a way to produce graphene is a cheaper way using germanium, hydrogen and water to produce high quality, single layer graphene, this is very exciting discovery because many more technology can be mass produce and commercially available for many users based on the single layer graphene.

IBM have shown the potential of the graphene based processor, it was not perfect, but it have shown the effectiveness of it.

Picture
 
Strength of graphene
 
Single layer of graphene
Major Concepts
  • Discovery of single layer graphene production at low cost
  • Short idea of the materiel used
  • The strength of graphene
Potential Advantages
  • Link to many resources. Research paper etc
Potential disadvantages

  •  Did not gave a brief idea of the process
Discussion Questions
  • Given that graphene is commercially available, what are the imaginations?
Citation
  • Hardawar, Devindra . "VentureBeat." VentureBeat. N.p., 4 Apr. 2014. Web. 7 Apr. 2014. <http://venturebeat.com/2014/04/04/samsung-claims-a-graphene-breakthough-which-may-be-huge-for-future-wearables/>.
This is an assignment of our teacher Mr.Pete
This is for educational purpose only 


Monday, January 20, 2014

Article Review 02

In the recent years, many dominate company have multiple interesting products. But even so other small company have their own products too, they many not be new innovational but instead they uses old concept and turn it into something new. They may look simple, but they are very unique.

First of all we have Cubelets, a cube-ish robot that can do just about anything (if you know how to assemble and program it) with different block to be used and program.

Have your family member felt scared of any medical instruments? If you are then Teddy the Guardian will fix that for you, but having those scary thing within a cute teddy! This Teddy have different basic features such as heart beat monitoring and other basic vital reads.

Have you or your family or your friend or anyone have a bad care for their teeth and you have to meet them everyday? Then this Kolibree smart toothbrush may be your solution, it can report to you such as if you have brush your teeth long enough or ensuring anyone who use it to remember brushing their teeth.

These are only few of the many interesting product that have been introduced at CES 2014. On the internet there are even more on the internet which is on kick start waiting to be backed by everyone! So be sure to check out other online product as well!

Major Concept
  • The idea of product - Many product on the market are ideas that were made new.
  • Possibility - Even there are big company around us, there will always be new product
  • Uses - Even it is simple as a teddy bear, it can be for medical uses.
Advantages
  • It is review of multiple product from CES 2014 which is very interesting
Disadvantages 
  • If only the original article have more products
Question
  • Even small company can make such unique products, why can't big company have such too?
  • When a product is made, how long will each survive?
Citation
Steven, Tim. "CES 2014: Startups Steal the Show." Clnet. N.p., 10 Jan. 2014. Web. 20 Jan. 2014.



















































































































This article is an homework assignment from our teacher Mr.Pete

Thursday, October 31, 2013

Article Review 01

RoboBusiness robotic conference, Google director shows that their self-driving re are more safe then professional drivers, and having less near accident times. The software they develop arr able to make quick decision making braking and accelerating more safe then human drivers. It even able to maintain a consistant distance to other cars. Google director of this care also state that the car have driven over 482700 kilometer without any accidents at all.
Major Concepts:

  • Software driven car are less likely to cause any accident.
  • Human driven car accelerate and brake more sharply than software driven cars do.
  • It is able to self driven and maintain safe distance between car.

Potential Strengths:

  • Quote from Urmson "We're spending less time in near-collision states"

Potential Problems:

  • Did not provide the area the car were tested on.

Pictures:

Discussion Questions:

  • Is the car connected to the server or is it offline on it's own?

Citation:
Starr, Michelle. "Google: Self-driving Cars Safer than Professional Drivers." CNet. N.p., 28 Oct. 2013. Web. 01 Nov. 2013.
This article is an homework assignment from our teacher Mr.Pete

Thought Question

IB-[]-Computer Science
Teacher: Mr.Pete
Thought Questions
1. Would octal or hexadecimal be a better way to refer to the addresses in a 16 bit processor? Justify your answer.
-

2. Relate the concept of program to the fetch-execute cycle of the Von Neumann machine.
- In the Von Neumann Machine to process. 'Input' as fetch-instruction.to start the cycle, the central processing unit then decode the instruction fetched. Arithmetic unit then get the necessary data to execute the decode instruction. This shows that fetch-execute is directly related to the Von Neumann machine.

3. Personal computers originally came equipped with one, then two floppy drives. After that floppy drives became optional as CD drives became an standard equipment. Now USB flash drives are the current medium for storage of data. What are the advantages of flash drives over other forms of disk storage? do you think they will replace other media?
- As the technology advances, several old device no longer able to keep up the demand of storage, life span and speed. USB have a long life span because it does not have a moving part in itself. Moving part mechanism is too slow in modern sociality. Therefore one day flash drive will have enough storage, speed and it's durability to withstand the demand replacing other kind of media.

4. Why don't we just use powers of 10 when referring to storage? Aren't powers of 10 and Powers of 2 close enough?
- Computer is all about accuracy and precision any mistake will cause huge problem to it therefore any computing must be the correct number, not only 'close enough'

5. Walk through your kitchen and list the number of items that include embedded systems.
- Since the house that I current live in have only a small kitchen area and I am not a cooking person, I have the only item that have an embedded system is my Electric water heater. When it is boiling it will automaticly decrease the temperature to warm.

6. Did you have computer in your home as you were growing up? If so how did it influence your education to this point? If not, how did the lack of a home computer influence your education to this point?
- I remember when I was a kid, my father did manage to put together a barely working computer for me to play around. I was very happy for such event so I grew up working hard for myself so I can understand computer more.

7. The digital divide puts those who have access to technology on one side and those who do not on the other side. Do you feel that it is the right of everyone to have access to technology?
- Technology do put people into sides, but I personally think that everyone have the right to have access to the open internet world. Then again people must respect those who have and don't.

8. It will cost a great deal of money to erase the digital divide.Who do you think should be responsible for paying the cost?
- It will be a great deal of money to do such big thing, but it is very possible in the near future. Since scientist and manufactures are able to have yearly breakthrough of technology leading to many new innovation, and it is getting cheaper month by month. So I believe in the near future it will cost fairly average to erase the divide. Carefully plan thing accordingly the project will be less costly awhile reaching the most efficiency.

9. Having access to technology is not enough people must be taught to use the technology they have, How would you define computer literacy for each of the following group of people?
Kindergarten teachers in an industrialized country.
- Teach them a little bit more then enough to able register, login and use certain equipment.
High school students in an industrialized country.
- To the point they are able to keep in line with their professor's e-mail and other requirement may necessary.
College graduates in an industrialized country.
- To the point they are able to have a general idea of any kind of GUI so in the future they can easily understand how to operate automatic machines
Students in sub-Saharan Africa
- To the point they are able to access information on the internet.
Government officials in the Audes
- To the point they are able to keep in contact with uppers and their co-workers