Posts

Ethical Data Collection - Consent

The most important issue involving ethical data collection is consent. This is because most people don't know all of the data we’re generating when we go online, making consent hard to truly receive. We should not only understand what we’re consenting to but have the ability to opt-out later, by either turning off the data tap or removing our information from where it’s stored.

In this article, the role of consent is brought into discussion involving Google's project Nightengale. The main problem that arose was the fact that Currently, the public does not know enough about Project Nightingale to make definitive ethical judgments. In fact, ethical determinations require balancing different and sometimes competing, ethical principles. There have been short cuts involving gathering consent that need to be evaluated. The article states, "Sometimes it might be ethical to collect and use highly sensitive information without getting an individual’s consent." This is showing …

Explore Progress 12/6

For the first two days of research, I finalized which computing innovation I was going to use for my explore task which ended up being the app PulsePoint, which is a new app designed to alert nearby help in case of CPR/ First Aid related emergencies. I gathered most of my sources and found the harmful/beneficial effects of this app. For the next day of class, I hope to finalize the types of data used as well as input/output.

Submarine Cables - 12/4

1. No, Sharks biting the cables is very rare. Sharks are accountable for zero cable faults between 2007 and 2014.

2. Some things that cause the cables to break include fishing vessels and ships dragging anchors, Environmental factors like earthquakes and less commonly, underwater components can fail. Deliberate sabotage and shark bites are close to none. 

3. Pretty much everyone who accesses the internet has the potential to use these submarine cables. Telecom carriers, mobile operators, multinational corporations, governments, content providers, and research institutions all rely on submarine cables to send data around the world. 

4. A cable is typically as wide as a garden hose. The filaments that carry light signals are extremely thin — roughly the diameter of a human hair.

5. The cables use Fiber-Optic Lasers on one end fire at extremely rapid rates down thin glass fibers to receptors at the other end of the cable. These glass fibers are wrapped in layers of plastic (and sometimes ste…

IP Questions

What is a protocol?A protocol is the official procedure or system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.What is an Internet Protocol (IP) address? a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.How is it organized hierarchically?It is organized hierarchically by each number is represented by bits. IP addresses are 32 bits with 8 bits per part of the address. The system of hierarchy works like this first numbers are usually the country/network, 2nd numbers are region/network, then its subnetwork and finally its the device.How many bits are in an IPv4 address?All IPv4 networks have 32 bits, and each “section” of the address denoted by the decimal points contains eight bits, “192.0. 2.0/24” leaves eight bits to contain host addresses.How many IPv4 addresses does that mean there are?  According to Reserved IP ad…

Blown to Bits

Koan 2: Perfection Is Normal:
This koan describes perfection in coding as being an everyday expectation. This has grown true in today's technology compared to generations of technology before that.  In today's technology, when sending a message or a photo via phone or computer it is expected that every bit is perfect and in its correct placement. The koan states, "a character being wrong in an email, for example—are so low that we would be wiser to worry instead about a meteor hitting our computer, improbable though precision meteor strikes may be". This koan showed how technology has evolved, and how perfection in this sense is quite normal. 

Koan 4: Processing Is Power:
This koan examples how processing speeds and bit capabilities have been growing since the 40s and haven't appeared to stop. The fastest current computer can be considered outdated in two or so years. This koan also shows how things are being produced at a much faster rate. The koan states, "…

Coding in the Wild: Astronomy

I chose coding within Astronomy because I hope to go into a sort of Aerospace Engineering when I am older, and coding within Astronomy is very similar. The author explains very in-depth on how coding is used daily in their job. The author uses coding programs like Python in specific ways. An example would be running extraction codes on radio images produced by VLASS. The author then cross matches the catalog of VLASS sources against a historical radio survey looking for sources that have recently appeared or disappeared. The author states, "50–70% of my work time is spent writing and debugging code." He splits his time into three major categories including developing the software pipeline for identifying explosions, writing wrappers for pre-existing software packages to turn raw radio interferometer data into usable scientific images, and miscellaneous tasks like making plots to visualize data. The main thing that the author states that they needed t to learn was coding beca…

The Internet is for Everyone

From the given 9 challenges in the article I personally picked the two as followed:

"Internet is for everyone - but it won't be if Governments restrict access to it, so we must dedicate ourselves to keeping the network unrestricted, unfettered and unregulated. We must have the freedom to speak and the freedom to hear."

and,

"Internet is for everyone - but it won't be until in every home, in every business, in every school, in every library, in every hospital in every town and in every country on the Globe, the Internet can be accessed without limitation, at any time and in every language."

I chose the first one listed because I feel very strongly about the topic. I feel that the government has too much control of us already, and if they were to begin restricting us from the internet as well we would be losing that part of our freedom. The government does not technically own the internet - no one does in reality - so for them to begin restricting the interne…