Blogs for bloggers
Wednesday, April 9, 2014
Cyberbullying
Cyber bullying is bullying through instant messaging, web site post, email, tweet, or digital messages and images send to a cellular phone. It involves negative action against someone or imbalance of power and agression. Children involved in cyber bullying often feel tormented, threatened, harassed,
humiliated and embarrassed. Children have killed each other and committed suicide after having been involved in a
cyber bullying incident. For example, the article " Girl's Suicide Points to Rise in Apps Used by Cyberbullies," talks about the a 12-year-old girl who was driven to suicide after being maligned, threatened and taunted online through texting and photo sharing cellphone apps. She was the youngest teen to commint suicide as a result of 15 middle school children who urged her to kill herself.
Tuesday, April 1, 2014
AI and Robotics
I think robots can do what humans do but only to a certain extend. Task like mass production at a factory or company data input can be easily handeled by robots, but other task that requires thinking (moral thinking) should be left for humans to complete. If a robot is programmed only to do a certain task then it will less likely make error than human. For example, if a robot is programmed to carry out a function requiring it to sort out materials it would not make much error because it only needs to carry out that task. Whereas, humans are more likely to make an error because we are programmed to do much more than that. The article" Drone entrepreneur Chris Anderson is skeptical about Amazon's drone delivery plan," talks about Amazon drone possible having problems. The drones that they created are programmed to carryout deliver of parcels, but they have yet to program it to avoid ostacles along its path. If that same parcel was to be delivered by a human being, it'd be in our nature to avoid obstacles. Hence, proving my point that robots are not able to do something they aren't programmed to do even if it's considered " common sense" for us humans.
Thursday, March 27, 2014
Legal and Ethical Issues
Creative Commons is a nonprofit organization that allows
people to share and express creativity and knowledge through free legal tools.
Through this tool people can share their creative works they created and they
can also modify the copyright term that best suits them.
Information should be free depending on what kind of
information is being released and who is accessing the information. Information
in terms of books and journal articles for the use of school should be
accessible to all students. Information in terms of music, movies, and TV
should not be free.
The article “Piracy, computer crime, and IS misuse at the
university,” talks about university students committing software Piracy.
Wednesday, March 12, 2014
Security and Privacy
Problems of privacy on the Internet is not a thing in the past, with new technologies and softwares, these problems are on a rise. Internet users need to be careful with the private informations from hackers, who seem to be in every corner of the web. Hackers are able to access your private information instantly just using couple of informations you post online. Not only are these type of small scale hackers more common now, but big scale hackers, who are able to steal personal informations of thousands of people or informations from the government are also more common now. The article "U-Md. computer security attack exposes 300,000 records," talks about hacker(s) being able to attack personal records of more than 300,000 universities students and professionals. It's shocking and a little impressive how someone is capable of doing this. Another example of a major security breach would be the Target security breach, in which thousands of customers shopping between the period of Black friday and Christmas of 2013 were attacked. Not only were their personal informations stolen, but these hackers were able to violate these informations by spending thousands of dollars from the customers credit account.
These are just some examples of our security of privary being attacked and violated online. These type of things happen on a daily basis to people's credit card information, social security, online sites, etc.. This just goes on to show that everyone on the web needs of be careful when using their personal information or going on certain sites. If big companies and the government, who have top notch security are able to become a victim to hackers then common users like us are bound to be an easy target.
Problems of privacy on the Internet is not a thing in the past, with new technologies and softwares, these problems are on a rise. Internet users need to be careful with the private informations from hackers, who seem to be in every corner of the web. Hackers are able to access your private information instantly just using couple of informations you post online. Not only are these type of small scale hackers more common now, but big scale hackers, who are able to steal personal informations of thousands of people or informations from the government are also more common now. The article "U-Md. computer security attack exposes 300,000 records," talks about hacker(s) being able to attack personal records of more than 300,000 universities students and professionals. It's shocking and a little impressive how someone is capable of doing this. Another example of a major security breach would be the Target security breach, in which thousands of customers shopping between the period of Black friday and Christmas of 2013 were attacked. Not only were their personal informations stolen, but these hackers were able to violate these informations by spending thousands of dollars from the customers credit account.
These are just some examples of our security of privary being attacked and violated online. These type of things happen on a daily basis to people's credit card information, social security, online sites, etc.. This just goes on to show that everyone on the web needs of be careful when using their personal information or going on certain sites. If big companies and the government, who have top notch security are able to become a victim to hackers then common users like us are bound to be an easy target.
Thursday, February 13, 2014
World wide web
The world wide web will continue growing and advancing as long there's a high consumer demand. With other big companies in the market, every one is competing to get the best and new advanced technology out in the market before someone else does. They are always trying to get their products to a new market so their company can be widespread. For example, both yahoo and facebook are trying to dominate Google's search engine by advancing their own.
A cloud is a network of servers that allows users to run an application or program from different computers and different location at the same time. It also allows users to store their data, software etc. online.
Article: Mark Zuckerberg Says Facebook Will Compete Directly Against Google As A Search Engine
A cloud is a network of servers that allows users to run an application or program from different computers and different location at the same time. It also allows users to store their data, software etc. online.
Article: Mark Zuckerberg Says Facebook Will Compete Directly Against Google As A Search Engine
Thursday, February 6, 2014
Networks and Communication
Asynchronous communication is also known as non real-time communication. It enables flexibility because it allows receiver to receive information when it's most convenient for them. Some forms of asynchronous collaboration,such as email, are ubiquitous. Asynchronous communication can be used in forms of web logs, where people can share ideas and comment. It can be used as discussion boards where dialogues can take place over time, messaging (email), databases, website links, etc..
Synchronous communication is also known as real time communication. It takes place like a conversation where it allows people to connect at a single point in time, at the sametime. Synchronous communication can be used in forms chat, instant messaging, audio, video, and web conference. This type of communication allows in-depth discussion with higher-touch interactions, sharing presentaion and information, and discussions and dialogues. In the article " Skype in the Classrrom, from York to Antarctica," the third graders are able to interact with scientist that were on the other side of the continent through skype. They were able to apply the materials they had learned and form discussions and higher-touch interactions.
Synchronous communication is also known as real time communication. It takes place like a conversation where it allows people to connect at a single point in time, at the sametime. Synchronous communication can be used in forms chat, instant messaging, audio, video, and web conference. This type of communication allows in-depth discussion with higher-touch interactions, sharing presentaion and information, and discussions and dialogues. In the article " Skype in the Classrrom, from York to Antarctica," the third graders are able to interact with scientist that were on the other side of the continent through skype. They were able to apply the materials they had learned and form discussions and higher-touch interactions.
Thursday, January 30, 2014
intro
Hi ya'll! Welcome to my blog! My name is Tenzin Dolkar.
I think a course can effectively integrate blogs and twitter through open discussion, live discussion. Open discussion on blogs and twitter encourage students to freely express their own opinions through words, improve communication skills, organization skills, and helps them stay on top of everything. The article " 60 ways to Use Twitter In The Classroom By Category," lists 60 useful way to effectively integrate twitter in a classroom.
I think a course can effectively integrate blogs and twitter through open discussion, live discussion. Open discussion on blogs and twitter encourage students to freely express their own opinions through words, improve communication skills, organization skills, and helps them stay on top of everything. The article " 60 ways to Use Twitter In The Classroom By Category," lists 60 useful way to effectively integrate twitter in a classroom.
Subscribe to:
Posts (Atom)