Thursday, November 28, 2013

Ubuntu OS Smartphones

For the less tech-savvy, "Ubuntu" may sound like something an African tribal dance. For the rest of us, it stands as a strong, secure, open source alternative to the Windows OS. As a matter of fact, I am using Ubuntu on my laptop as I write this very article.
While it is debatable whether or not a current operating system injected into a smartphone can be considered "new technology", there is no doubt that it will bring a slew of new features and options for smartphone users in 2014.
The official announcement from Canonical, the company behind the linux-based operating system, states that they are hoping to achieve a unified experience on TV's, PC's, and smartphones. At the very least, this new technology will hopefully allow me to play some Battle for Wesnoth on my phone in 2014.


 Ubuntu OS Smartphone concept art





















Reference

Pearson, S: New Technology 2014. Retrieved November 28th, 2013 from: http://mattforte.hubpages.com/hub/Future-Technology-2014

LG presented Optimus F5 and Optimus F7


 
LG Optimus F5 and F7 smartphones now official with LTE connectivity and Jelly Bean

Based on this morning's leak, you already knew that LG's smartphone lineup was about to become more diversified, but now we're able to share concrete details of the Optimus F5 and F7, which will be unveiled at Mobile World Congress. As the naming scheme suggests, the Optimus F7 is the larger of the two with a 4.7-inch (312ppi) True HD IPS display, a dual-core 1.5GHz CPU, an 8-megapixel primary camera, 2GB RAM and a 2,540mAh battery. Meanwhile, the Optimus F5 will be targeted at those who prefer a more compact smartphone, as it wields a 4.3-inch (256ppi) IPS display, a dual-core 1.2GHz CPU, a 5-megapixel primary camera, 1GB RAM and a 2,150mAh battery.

Common among both devices are Android 4.1.2 (Jelly Bean), support for LG's QSlide and Live Zooming software features, a 1.3-megapixel front-facing shooter, 8GB built-in storage, microSD support and LTE connectivity. The Optimus F5 will come to market first in Europe during the second quarter, which is to be followed by the Optimus F7 "in select markets." Sadly, pricing has yet to be announced for either smartphone. For those curious, we've included the complete list of known specs after the break.

Optimus F5 Key Specifications:

- Operating System: Android Jelly Bean 4.1.2
- Processor: 1.2 GHz Dual-Core
- Display: 4.3-inch IPS (256 ppi)
- Size: 126.0 x 64.5 x 9.3mm
- Memory: 8 GB / 1 GB RAM / micro SD (up to 32GB)
- Camera: 5.0 MP AF / 1.3 MP
- Battery: 2,150mAh

Optimus F7 Key Specifications:

- Operating System: Android Jelly Bean 4.1.2
- Processor: 1.5 GHz Dual-Core
- Display: 4.7-inch True HD IPS (312 ppi)
- Size: 131.7 x 68.2 x 9.6mm
- Memory: 8 GB / 2 GB RAM /micro SD (up to 32GB)
- Camera: 8.0 MP AF / 1.3 MP
- Battery: 2,540mAh


Reference

Lutz, Z: LG Optimus F5 and F7 smartphones now official with LTE and Jelly Bean. Retrieved March, 2013 from: http://www.engadget.com/2013/02/20/lg-optimus-f5-and-f7-official/

Friday, November 22, 2013

How to protect yourself against phishing.

A phisher is someone who sends out hundreds of fraudulent emails, purported to be from respectable companies. These emails usually claim that there is some problem with your account, and tell you that you should reply with certain types of personal information such as a credit card number or password to keep your account active. They often threaten dire consequences if you do not comply, such as the deletion of your accounts.

1. If you receive an email that claims to be from a company that you trust but asks for personal information,   then you should visit the Web site.


2. Do not click the links in the email. Instead, type in the address of the site that you wish to visit.

3.  If there is no sign of the supposed problem when you sign into your account, seek out a contact phone number.

4.  Call the "company" and ask if they sent you an email. The answer will likely be no.

5.  Forward the email to the scam-reporting email address that the representative on the phone can give you, then forward it again to the Federal Trade Commission.

6.  Delete the email.

Tips & Warnings

  • Always type in the address of the site you want to visit versus clicking a link in a suspicious email.
  • Leave the email header intact for the Federal Trade Commission (FTC). The header is the information that appears in the message box when you forward an email. It will help the FTC track and punish the sender.
  • Never open an email from someone that you do not know. Unless it is a business account, no one that you don't know should have or be able to use your email. Most of the excess is junk and the rest is an attempt to scam you or sell to you.
  • Never give out personal information over your email.
  • Never use email links to get to popular web sites like eBay or PayPal.

So dear colleagues remember to be on your A game whenever it comes to Phishing.

Reference 
eHow Tech: How to proect yourself from phishing scams. Retrieved November 22nd, 2013 from: http://www.ehow.com/how_2003275_protect-phishing-scams.html#ixzz2lOnE1QBJ

Wednesday, November 20, 2013

How do You Think Cybercriminals Should Be Punished?

Well according to the ethics and issues section 11-1. A hacker was sentenced to 41 months in jail for illegally using hundreds of company's computers as part of a money-making botnet. The punishment is about the same for auto theft, despite the hundreds of thousands of dollars in damages caused in addition to the thousands of dollars the scheme netted the criminal.

Viruses, DDoS attacks, adware and other malware continue to disrupt businesses and cause damages that are difficult to estimate. Many experts and computer administrators claim that the punishment for cybercrime often is out of proportion with the damages caused by the crime. Some legal experts claim that lax security on the part of Internet users is to blame, and perhaps those who practice lax security should be punished as well.

Others claim that many organizations provide exorbitant estimates of true damages that cybercriminals cause and that these alleged damages provoke an emotional overreaction to the crimes. The types of crimes and international extent of possible damages are relatively new territories in criminal law.

So what do you think?
Should the punishment remain the same?
Is the punishment too harshed?
Should the time be decreased?
Or should it increased?

Reference
Shelly, G. & Vermaat, M. (2011). Computer Security and Safety, Ethics and Privacy:Cybercriminals. In McMahon, K.(Eds). Discovering Computers, Boston: Cengage Learning, pp.562.

Wednesday, November 13, 2013

OCZ NIA 2 - Neural Impulse Actuator

OCZ NIA 2 – Neural Impulse Actuator

OCZ NIA Technology 2013
OCZ have confirmed that they will be manufacturing a successor to their Neural Impulse Actuator (NIA) in 2013. So what exactly is an NIA anyway? It’s actually an incredible piece of kit. Wearing the comfortable headband, users are able to control PC Games without even touching the keyboard which reduces reaction times by up to 60%.
The commands are very easily assigned and calibrated based on the user’s physiology. The result; gamers are able to jump, run and fire much more quickly than ever before, without even lifting a finger.
Essentially it works by converting EEG (brainwaves) signals into keystrokes. As it is configured using the supplied software, it can be used in almost any scenario where a keyboard would be used.
Sound good? It’s already being sold by many online retailers such as Play.com and Amazon, although it may be worth holding out until the NIA 2 is released.

Reference

Graham, J(2012). what new technology will we see in 2013: OCZ NIA 2 - Neural Impulse Actuator. Retrieved October 27th, 2012 from: http://techod.com/new-technology-2013/

Leap Motion

Leap Motion

Leap Motion lets you interact with your computer in a completely new way. Natural hand movements, instantly interpreted with an unprecedented accuracy of 1/100 of a millimeter, for just $70. It’s undoubtedly one of the coolest gadgets to be released this year.
Leap Motion Technology Today
The Leap Motion is roughly the same size as a smartphone; it does its magic by creating a 3-Dimensional interaction space of 8 cubic feet to precisely interact with and control software on your laptop or desktop computer – it can even sense individual hand and finger movements independently, as well as small items such as a pen.

 The Leap hardware is actually quite unassuming, considering its capabilities. It's just over three inches long, an inch wide and less than a half-inch thick (79 x 30 x 11mm), with a glossy black panel on top, behind which resides the infrared sensors. On the bottom, you'll find a black rubber panel embossed with the Leap Motion logo. The edge, meanwhile, is ringed with a seamless aluminum band, save for a USB 3.0 Micro-B port on the left side (though the device runs at USB 2.0 speeds). There's also a slim LED power / status indicator on the front edge. Alas, as of this writing, the company wasn't able to reveal more specifics about the internals themselves, thanks to pending patent considerations. Along with the controller itself, users get a pair of USB 3.0 cables in the box -- a 5-foot and a 2-foot cord.

 As of this writing, there are 54 applications built to run on Windows 7 and 8 machines and 58 apps for Macs running OS X 10.7 or higher. Nine of those apps are Windows exclusives, and 14 applications are Mac-only, with one app, called Touch less, having separate, but functionally identical versions for each (more on that later). Naturally, with such a large library of software at launch, we were unable to test every app in the Airspace Store. However, we did spend time with quite a few apps for both Windows and OS X.

To read more go to the links in the reference

References

 Graham, J(2012). what new technology will we see in 2013: Leap Motion. Retrieved October 27th, 2012 from: http://techod.com/new-technology-2013/

Gorman, M (2013). Leap Motion controller review. Retrieved July 22nd, 2013 from: http://www.engadget.com/2013/07/22/leap-motion-controller-review/

Saturday, November 9, 2013

Body Area Networks

Local area networks literally can move over when a body are network (BAN) makes the scene in a few years. This set of wearable or implanted body sensors will turn the body into a human router. The devices will communicate wirelessly and transmit data from the body to another device that performs an action.

For example, you can save a word processing document to a device on your wrist, walk to a printer and just touch the printer with your hand to print. Or, merely by shaking hands, you can transfer information from a business card stored on your wrist device to another device worn by a business colleague.

researchers actively are pursuing the BAN architecture and applications. Many of the uses are being developed for physical rehabilitation, interactive games and human interaction with computers. Each year experts in the fields of computer science, electrical engineering, bio-medical engineering and medicine meet at the BodyNet conference to exchange ideas.

Dr Eric Topol is a leading cardiologist who has embraced the study of genomics and the latest advances in technology to treat chronic disease. In 2010 he said that The iPhone is the Future of Health Care. Very early into his TED presentation, Dr. Eric Topol began by stating: "This is an electrocardiogram. And, as a cardiologist, to think that you could see in real time a patient, an individual, anywhere in the world on your smartphone, watching your rhythm, that's incredible. And it's with us today.   


2 - electrocardiogram TED













You check your email while you're sitting here. In the future you're going to be checking all of your vital signs, all of your signs, your heart rhythm, your blood pressure, your oxygen, your temperature, etc. This is available today."  

 Now how does it work? Well, there are these small band-aids or these sensors that one would put on, on a shoe or on the wrist. And this sends a signal. It creates a Body Area Network to a gateway (shown as an iPhone on the slide). The gateway could be a smartphone or it could be a dedicated gateway. That signal goes to the web, the cloud, and then it can be processed and sent anywhere, or a caregiver, to a physician, back to the patient, etc. So, that's basics of the technology and how it works.  

4 - Monitoring Sensor Strips


This is already out but they are still working on the other things to make sure that they are in working properly. What do you think about this kind of technology?

Reference

Shelly, G. & Vermaat, M. (2011). Communications and Networks:Body Area Networks Sense Intentions. In McMahon, K.(Eds). Discovering Computers, Boston: Cengage Learning, pp.471.

 Patently Apple(2010).Body Area Networks: Apple, Sensor Strips & the iPhone. Retrieved March 31, 2010 from http://www.patentlyapple.com/patently-apple/2010/03/body-area-networks-apple-sensor-strips-the-iphone.html



Tuesday, November 5, 2013

Flying 'Gimball' brings new impact to drone rescue technology

Nov 4 - Swiss-based researchers have devised a spherical flying robot that can withstand multiple collisions and continue to transmit live video footage in hard-to-reach environments. The lightweight Gimball doesn't require unwieldy sensors and its inventors believe it could be used to help with search and rescue missions.

Gimball is a flying robot with a difference - it's able to transmit continuous live footage in difficult terrain, even when confronted with obstacles. It's designed to replicate an insect's ability to shrug off collisions, according to the co-creator Adrien Briod, from Swiss technology institute.

Adrien Briod, EPFL Doctoral Assistant, said: "We wanted to produce this ability of insects to cope with collisions and stay in the air after contact, instead of breaking and falling to the ground.... so that's why we developed the Gimball robot that allows this inner frame to remain stable even when there is a strong collision that affects the orientation of the outer frame, the protective frame."

 Fitted with an HD camera, Gimball's double carbon-fibre spherical ring keeps it oriented vertically. According to co-designer Przemek Kornatowski, its exterior cage absorbs shocks as it rotates.  Przemek Kornatowski (PRON: Sham-ack Corner-tov-ski), said: "The cage, for example, this spherical structure around is made of carbon fibres, carbon fibre rods, with this white plastic parts which connect them together. The robot can actually, when it's flying can also roll on the obstacles or on the floor or on the walls."

Thirty four centimetres in diameter and weighing just 370 grams, Gimball is powered by twin propellers and steered by fins. Its gyroscopic stabilisation system helps it stay on course. Gimball Buzzing Briod says Gimball offers a crash-proof leap forward in rescue mission camera technology. Adrien Briod, EPFL Doctoral Assistant, said : "Typically we're able to fly through a forest without even avoiding the trees, it would just fly into them and continue flying after the collision.

We want to fly in collapsed buildings, in factories that may have been demolished or places wherever we would want to go and search for gas leaks etc., people after an earthquake." Other drones use motion sensors, which Briod says are heavy, fragile, and unable to operate in smoky conditions. But he says it's Gimball's resilience that sets it apart and, in the competitive world of drone technology, provides an impact that's hard to ignore.

Reference
 Reuters.(2009). Flying 'Gimball' brings new impact to drone rescue technology. Retrieved Nov 4, 2013 from http://www.reuters.com/video/2013/11/04/flying-gimball-brings-new-impact-to-dron?videoId=274403461

Saturday, November 2, 2013

Good and bad things about the Internet


The internet has an amazing amount of information on it. It also has some absolute nonsense. It is a very valuable research tool, but it is necessary to be very selective about what you accept as being true. Whatever source of information you use you need to be careful. I have seen nonsense in books. What one of your friends tells you might be more reliable than an internet site. At least you know the person telling you.

Another problem of the internet is the amount of pornography on it. Of course pornography is not new, but if it is sold in a shop, the shopkeeper can at least see the person buying it. On the internet a child can get access to all sorts of 'adult' sites. All they have to do is click a box saying they are over 18. One problem that is rapidly disappearing is that the children know so much more about computers than the parents.

There are other undesirable sites on the internet. No doubt potential terrorists can get information about explosives.The Australian Government want to introduce censorship of what we can see on the internet. There already is a low level of this, but they want to do more. As I made clear in my article: Internet Censorship, I am opposed to this. With all its problems, I think the internet is a good thing overall.

It allows Humans all over the world to keep in touch. Potentially the internet can contribute to the fall of repressive regimes. The Chinese Government is right to fear the internet. The truth hurts them.
As President Obama said in Cairo on June the Fourth 2009:
"The Internet and television can bring knowledge and information but also offensive sexuality and mindless violence into the home." 


He was recognizing some of the good and the bad of the internet.

The internet can also help to reduce bad things about good regimes. The first amendment of the Constitution of the United States of America guarantees free speech. The internet allows this to be extended.

Repressive regimes fear the truth. North Korea attempts to keep the truth from its citizens. Historically Cuba has not been much better although recent events make me cautiously optimistic about Cuba while North Korea is worrying. Apart from these extreme regimes, the internet can play its part in informing us about what our own governments are doing.

 You may, or may not, like what is going on in Gautama Bay, but you need facts to make up your mind. The internet is quite young. The potential of this tool is vast. The government of the United States is supposed to be of the people, by the people and for the people. (This is from the "Gettysburg address" of Abraham Lincoln). The internet can help make this so, not just in the United States.


So what do you think guys do u see the internet as a good thing, a bad thing or both?
Let me know what you think.

 Reference

Challis , S.(2009). Good and Bad things about the Internet. Retrieved June 1, 2009 from http://voices.yahoo.com/good-bad-things-internet-3431970.html


Tuesday, October 29, 2013

Should You Worry about Cell Phone, Cellular Antenna and Wi-Fi Device Radiation?

Billions of people use cell phones and more than 80% of the world's population has access to cell phone service from cellular antennas. Wi-Fi signals permeate businesses, public areas and homes everywhere. the number of wire-less device is expected to rise sharply in the coming years, and many are concerned about potential health effects from cell phones, cellular antennas and Wi-Fi devices. Some cell phone users who suffered rare illnesses have filed lawsuits against cell phone companies, but the cases usually are lost due to lack of scientific evidence linking the use of the phones to the illnesses. While debates rage in communities over placement of cellular antennas, the consideration of health effects on residents is muted because the federal government's Telecommunications Act of 1996 prohibits local governments from considering health effects when making decisions about cellular antenna placement.

The law does not apply to Wi-Fi antennas and some municipalities reject municipal Wi-Fi deployments due to residents' health concerns. It generally is agreed that no studies conclusively demonstrate negative health effects from cell phones, cellular antennas and Wi-Fi devices, but skeptics claim that the technology is too new to have endured long-term studies on humans. Long-term studies that are underway may not provide results for decades.

So i find that law that was passed was very foolish how could a government not have any say about things that are or may be a health risk to people?

Ok share your thoughts with me and if you like you can answer one of my questions.

Are you concerned about cell phone, cellular antennas or Wi-Fi radiation?

Do you or anyone you know minimize use of cell phones or other wireless devices due to health concerns?

Do you think that the governments should be required to consider health concerns when making decisions about wireless deployments?

Tell me, would you live next to a cellular antenna?

Why or why not?

Reference

Shelly, G. & Vermaat, M. (2011). Communications and Networks:Wireless Transmission Media. In McMahon, K.(Eds). Discovering Computers, Boston: Cengage Learning, pp.494.

Thursday, October 24, 2013

Tongue May Become Joystick to Control Devices

Ok so here's something interesting i read in my Computer
& Information System text book. They are considering using the tongue as a Joystick to control devices.  The article stated that many people are paralyzed from their neck down due to spinal cord damage, however, these people still have control of their tongue due to the fact that the tongue is controlled by a cranial nerve and not the spinal cord.

So for these type of people the Georgia Institute of Technology's Tongue Drive system may be the input device that helps them control their lives. Ok so they are stating that in the Georgia Tech prototype the tongue is used as a Joystick.  There is a magnet which is less than one-eighth of an inch wide which is surgically implanted under the tip of the tongue, and when a person moves his or her tongue, sensors on each cheek record the magnet's movements in one of six directions.

The directions are: left, right, forward, backward, single-click and double-click.  The data is sent to a receiver on top of the person's head, which, in turn, transmits a signal wirelessly to a computer that controls an electronic device. Here is an example that was given, if the tongue moves forward and to the left, lights in the room could turn on or a wheelchair could roll forward. The article also stated that in a future development of the Tongue Drive System, it is been consider of also using the person's teeth as a keyboard. An individual tooth could be designated as a specific letter, so teeth could function, in effect as a keyboard.

So this article i found was pretty amazing the things that we can do with technology is so far advance. It is also amazing to see that someone is thinking about making the disables lives much better in this way they won't feel as helpless as they use to and some of them will be able to live on there own and do things for themselves.

So tell me guys what you think about this article share your advice and concerns. I would love to hear what you come up with also give this article a rating did you think that this device is awesome, dangerous or crazy.

Come let me know what you think!

Reference

Shelly, G. & Vermaat, M. (2011). Input:Input Devices for Physically Challenged Users. In McMahon, K.(Eds). Discovering Computers, Boston: Cengage Learning, pp.286.

Tuesday, October 22, 2013

Embedded Computers May Improve Quality of Life

The weather forecast may be close as your fingertips if plans to integrate embedded computers in everyday objects become a reality. Researchers are envisioning an umbrella with an embedded cell phone in the handle that will dial and then download the local forecast. The handle will glow green for good weather and flash red for imminent storms. Dancers can pin a small flower with an embedded motion-detecting computer to their clothes. When they move the embedded computer senses action and then synchronizes the tempo of music to this movement. Other embedded computers woven into can monitor heart and breathing rates. Wearing hidden embedded computers can help the elderly and people recovering from accidents and surgeries monitor their walking stride and pace. When their steps are uneven, the embedded computer can sound a warning and perhaps prevent a fall. Other embedded computers can give subtle feedback on the quality of physical activity.

Ok so this article has Advantages and Disadvantages, and everything has that but would you really want to have a computer with all the time?
This sounds crazy to me but that's just my opinion so tell me guys  what do you think about this?

Share yours thoughts about this let me know what you think because i would love to hear your thoughts.

Reference
Shelly, G. & Vermaat, M. (2011). Introduction to Computers:Computers Applications in Society. In McMahon, K.(Eds). Discovering Computers, Boston: Cengage Learning, pp.34.
 What is Computer & Information System?

 Information system (IS) is the study of complementary networks of hardware and software  that people and organizations use to collect, filter, process, create, and distribute data. The study bridges business and computer science using the theoretical foundations of information and computation to study various business models and related algorithmic processes within a computer science discipline.Computer Information System(s) (CIS) is a field studying computers and algorithmic processes, including their principles, their software and hardware designs, their applications, and their impact on society while IS emphasizes functionality over design.


Any specific Information System aims to support operations, management and decision making.In a broad sense, the term is used to refer not only to the information and communication technology (ICT) that an organization uses, but also to the way in which people interact with this technology in support of business processes.


Some authors make a clear distinction between information systems, computer systems, and business processes. Information systems typically include an ICT component but are not purely concerned with ICT, focusing instead on the end use of information technology. Information systems are also different from business processes. Information systems help to control the performance of business processes.


Alter argues for an information system as a special type of work system. A work system is a system in which humans and/or machines perform work using resources to produce specific products and/or services for customers. An information system is a work system whose activities are devoted to processing (capturing, transmitting, storing, retrieving, manipulating and displaying) information.
As such, information systems inter-relate with data systems on the one hand and activity systems on the other. An information system is a form of communication system in which data represent and are processed as a form of social memory. An information system can also be considered a semi-formal languagewhich supports human decision making and action.
Information systems are the primary focus of study for organizational informatics.


References
 
Coy, Wolfgang (June 2004). "Between the disciplines". ACM SIGCSE Bulletin 36 (2): 7–10. doi:10.1145/1024338.1024340. ISSN 0097-8418
 "Computer science is the study of computation." Computer Science Department, College of Saint Benedict, Saint John's University