Saturday, December 3, 2011
Siri can't direct you to an abortion clinic
Most people go online 'for no particular reason,' survey finds
demographic said they have done so at least occasionally. The study -- conducted among 2,260 adults ages 18 and over on landlines and cellphones -- has a margin of error of 3.7%."
Fallout continues over smartphone tracking app
Thursday, December 1, 2011
Facebook and the Stock Market
As a user of Facebook, would you advise Facebook to go public?
Source: CNNTech
Friday, November 18, 2011
Microsoft iPod Spoof
I think that this video has a lot to say about the different marketing strategies implemented by Steve Jobs and Bill Gates. While Jobs knew how to sell the form of a product, Gates focused solely on the product’s function. Although Apple products have become more popular in recent years since the inception of the iPod, Apple products in general do not historically have a reputation for tremendous functionality. But they sure do look cool. However, we have seen that Jobs was able to use the form of a product to make it become a more attractive medium of human expression.
Sunday, November 13, 2011
5 Reasons Why Consumer Tablets Are Bad For Businesses
Monday, November 7, 2011
BidPal
So here’s how it goes. The charity organization buys BidPal’s services to conduct the silent auction. Several days before the auction, BidPal receives the information for each auction item (such as item description, starting bid, and minimum raise) from the client and loads it into a database. Several hours before the auction, BidPal arrives to the auction site and sets up its own wireless LAN network that connects to a central server with all the auction information on it. The bidding devices used by the client are nothing more than iPod Touches with the BidPal app loaded onto them.
So BidPal assistants, such as myself, clean and charge the iPods and then synchronize them with the wireless network. We check to make sure all the information loaded into the database is correct and then begin registration. Usually bidders are slightly confused when they receive the device simply because they have not encountered this kind of technology in a silent auction setting. And if they have sour feelings about the change, those feelings only get extrapolated as the evening carries on and the bidders' BAC steadily increases. But that is where BidPal assistants come in handy. We circulate around the auction area and ask bidders how they are enjoying the device to ensure that the bidders understand the technology and to fix any glitches that might be occurring. This really helps to make sure that the technology is warmly received and that people enjoy themselves. For the most part, people enjoy it, are fascinated by it, and want it back for next year’s auction!
Saturday, November 5, 2011
Study: More women, traditional media are blogging
Saturday, October 29, 2011
Facebook stops 600,000 suspicious log-ins a day
Sunday, October 23, 2011
Cloud storage
Why is cloud storage better than cloud computing? Because in some cases with cloud computing, if the server is down, my software is useless. But with cloud storage, as provided by Dropbox, the files are stored on a particular folder on my computer and after changes to one or more files in that folder are made, then my computer communicates with the central server to update its copies of those files. Once the server itself is updated, then it updates the folders on my other computer devices. But if the server goes down, I still have my files. This is a great medium through which to transfer raw data and files between devices and it doesn’t make me, the user, feel too worried about the server going down for an afternoon.
Sunday, October 16, 2011
Cloud computing
I think that cloud computing technology started to become popular and seen as an opportunity when individuals started spreading their computing across desktops, laptops, mobile phones, and tablets. All the software on these devices needed to communicate with each other so instead of making that happen companies decided to simplify it: instead of communicating with each other they will communicate with one central machine. In the cloud, instead of software being sold as a product, it is now sold as a service. The computing technology no longer lies with your machine but with the software company’s server. In a sense, we have regressed back to the original terminal-server setup. All of your eggs, will be in one basket, quite literally. The cloud is not a mysterious, omnipresent technological force. It’s a big machine in a big room. So what are the dangers here? In the words of Mark Twain, “If you put all your eggs into one basket, you better watch that basket!”
Next week we will look closer at cloud storage offered through Dropbox which I can definitely get behind.
Saturday, October 15, 2011
MIM Software
Saturday, October 8, 2011
The Evolution Of The Barcode... The RFID
The only reason RFID tags have not come full circle is because of how many different companies and sectors use barcodes. In the supply chain field, RFID has been implemented and makes distribution much more efficient. Now, tags are located on pallets and not individual products. The RFID scanners are used to track what leaves and enters the store or warehouse, where it's going/came from and at what time. This detailed information is sent to a system which records all data. As you can see this is much more efficient than scanning individual pallets and then entering information into a system because it is done for you and at a faster pace.
Here is an infographic featured in Baseline Magazine, of Wal-Mart and how they use RFID tags for their supply chain
Source: HowStuffWorks & Funnel Inc.
The evolution of mobile phones
Hacktivists Part II
Misha Glenny says that there are observable character traits present in the majority of hackers he has met. Interestingly enough, most of them have Asperger’s syndrome, a mild form of autism. This manifests itself as highly specialized technical skill coupled with awkward social skills. In the life stories of the hackers he met, many of them developed their computer/hacking skills in their early to mid teens when their moral compass was still developing. Even Ryan Cleary, the hacker discussed in the last post, was diagnosed with Asperger’s shortly after his arrest in June. This information tells us that there are psychological and social reasons to explain the circumstances that create a hacker. Please keep in mind that very little, if any, scientific research has been done on the correlation between hackers and their psychological states. Furthermore, the goal here is not to pigeon-hole hackers but to try to understand the kinds of circumstances that might surround the decision to enter the field of cyber crime.
Now that we more fully understand the kinds of individuals we might be dealing with, we should ask, “Do we like hackers?” Are they totally scary? Do they represent a new kind of civil disobedience called hacktivism? Or both? They definitely are scary for several reasons: they are highly motivated, highly skilled, they exercise control over companies and governments seemingly without effort, and they remain hidden. If you can hack into the CIA and live to tell the tale without any jail time, then wow! You are damn good at what you do. The CIA, supposed masters of espionage, cannot pinpoint the identities of its hackers. Well, I’m not sure that a group like LulzSec could be described as engaging in hacktivism since they just do it for the laughs. On the other hand, Anonymous is more serious. We do have to hand it to them, they do tend to take down organizations we don’t like and also fear for other reasons. But you know, what do we really benefit from their schemes? I don’t know about you but I haven’t noticed any differences in my life because of them. I guess that’s what we need to ask ourselves. Are they actively changing the world for the better or just taking minor, ultimately insignificant, shots at the powers that be? We will see what the future holds in store for hacktivism.