Posts

10 Breakthrough technologies of 2017

Of the MIT list of ten breakthrough technologies of 2017 I am already familiar with "reversing paralysis", "self-driving trucks", "The 360 degree selfie", and "reinforced learning". Each of these things have gained a notable amount of attention in the last year whether it be over controversy or pure innovation. The articles which I should learn more about are "Paying with your face" and "Gene therapy 2.0" as these are both things which will only become bigger in the future. Another topic that I think will almost certainly not go away are botnets from the "Botnets of things" article. I think everyone who owns some form of a computer should be aware of this and be made aware of ways to potentially stop their own devices being used in a botnet. The only thing on this list that I think will go away or at least not become very popular are the 360 degree cameras which are unnecessary in most people's lives until they …

Cryptography Questions

1. Cryptography and ciphers have been used as far back as 2000 B.C. in Egyptian hieroglyphics.

2. FV LV FRRO

3. A Caesar Cipher is an example of a large class of ciphers known as substitution ciphers.

4. Random substitution is much more secure than a Caesar shift because all of the replacements are random rather than the shift which follows a pattern. Because of this the random substitution has around 4x10^26 different possibilities while the shift has only 25.

5. Frequency Analysis

6. According to the reading, a random substitution cipher looks easy to crack but is actually hard to crack.

7. I think it would take me about 5-10 minutes

favicon

Image

IP Blog Post

What is a Protocol?
A well known set of rules and standards used to communicate between machines.

What is an Internet Protocol (IP) address?
A unique set of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

How is it organized hierarchically?
from most broad to most specific it is organized in country/network, region/network, subnetwork, device.

How many bits are in an IPv4 address?
Ipv4 addresses have 32 bits.

How many IPv4 addresses does that mean there are?
This means there are more than 4 billion unique addresses.

What is the difference between IPv4 and IPv6 ?
IPv4 have only 32 bits and provides only 4 billion addresses while IPv6 uses 128 bits and provides 340 undecillion unique addresses.

Why do we need IPv6?
We need IPv6 to accommodate for the increasing number of internet users as it can provide IP addresses for more people than it will ever need to, while IPv4 can only provide for about half of the worlds cur…

Data Privacy

Article 1:
      This article about the Accuweather app shows how many companies make their money off of a free app. The app begins by asking you if it could access your location even when not in the app. This is in order to comfort the user into thinking their data will not be used if they so choose. In reality Accuweather will still be selling your location data to other third party companies. They have to do this because most advertisers benefit more from their ads when they are targeting the larger audiences of the bigger weather apps.

Article 2:
      This article acknowledges the problems with data privacy resulting from ads that can track location. Advertisers can set their adds to be based on location and if they then monitor where their adds are being displayed they can effectively monitor someones location without them even knowing or accepting any conditions. The advertiser can, if they want to, monitor the path an individual takes on a day to day basis by putting dots on p…

Microchips in Humans

Positives
-access to passwords and identification is always present and easy to use with the right technology
-can be used to store medical information for people with chronic illnesses
-can be used for simple purchases like from a vending machine and other actions such as unlocking a car
Negatives
-privacy could be breached (people could be tracked
-other people could access information on microchip
-things like purchases made and frequent actions with the microchip could be tracked

I think this types of technology will almost certainly become more common but will never be truly widely accepted because while people always want the newest technology most people will not want it inside of their body as it is an idea that, quite understandably, scares people. The most widespread concern is that it could be used to track your whereabouts and actions which is a daunting thought. The negatives that come with micro-chipping humans seems to overwhelm the positives which, for the most part, i…

Everyday Algorithm

Given a pile of pens, find and discard the ones that do not write anymore
1 assemble pens in a row 2 find paper  3 while pens remaining in unchecked row 4       scribble on paper with first unchecked pen in row 5       if pen works  6             place in working pile 7       else 8             place in not working pile