2. If I was in charge of monitoring the elections in California I would eliminate the entire electronic component of the voting process. Having voters report to various polls around the country, through some process of selection, they would each receive a paper (or some green alternative) voting ballet. On the ballet they would fill out their information including social security number as well as imprint their finger prints on the document for complete legitimacy. (Many would no doubt object to the finger printing process, however such a measure would ensure the validity of their identity and their vote in the process). With all of the prior information available on the documents people would continue through and personally write in their choice as well as placing signatures at the end of each category. Recording such a vast amount of data would take longer in the absence of computers but I believe that under the right guidance, in terms of gathering voting totals and data, that it would yield a much more effective voting process and an accountable one above all.
Monday, December 14, 2009
Blog #6: Electronic Voting
Wednesday, November 18, 2009
Blog #5: Intellectual Property
1. Downloading a song you don't own from a major label artist.
- While I recognize that the act of taking music without paying is stealing I feel like it is up to the label to ensure that their product does not find its way into consumer hands before its release date. Once the files have reached the open internet they are "virtually" unstoppable and I feel as if prosecuting someone because they found music on the internet that the company was responsible for is ridiculous. If its worth so much in revenue spend some of it on security before it gets to the internet. Again, I don't think its right but either were the killings of the American Indians.
2. Downloading a song you don't own from a struggling independent artist (who doesn't give you explicit permission).
- If an artist isnt as financially set as another it definitely sucks when their material finds its way into the public domain but again I stress the importance of security and being able to account for every unit that is to be sold. Also, leaks don't only come from the outside of an artist's camp.
3. Downloading another copy of a song you already own.
- That's just selfish and ridiculous.
4. Shoplifting a CD from a store.
- Definitely bad.
5. Downloading a song to "try it out" - if you like it enough, you'll buy the CD.
- Let's clear the air, NOBODY JUST TRYS A SONG OUT. That's not how music works. You either like it or you don't, if you do you keep it and if you don't you wouldn't have said song anyway usually.
6. Copying a CD from a friend, or ripping a CD you own to your hard drive, and then giving the CD away
- No stopping that, that's just how the game is played and everyone knows it.
7. Making music you own available online to share with a couple of friends.
- Completely up to the individual.
8. Making music you own publicly available on the Internet, such as through KazAa or Limewire.
- Also up to the individual.
9. Creating and giving away "Mix CDs" of music you like to friends
- There are questions of how you got the music of course but once it reaches the CD the cat is out of the bag.
10. Creating and selling "Mix CDs" of music you like to anyone who wants to buy them.
- This is the only area in which I feel some moral obligation to lean towards the conservative side of this argument. Its one thing to obtain said material but selling it again as if you deserve the profit from someone else's art is completely immoral and evil in my opinion.
Tuesday, October 27, 2009
Blog #4: Python Output

1.
a. 7
b. 13
c. 3
d. Combine computes the mathematical function of addition.
2.
a. 8
b. 6
c. 30
d. Splitup computes the mathematical function of subtraction.
3.
a. Strange: a = 6
b.Weird: a = 8 , b=4
Strange (8+4)
= 12
c. reallyWeird (8 , 4):
strange (8 - 4)
reallyWeird: a = 8 , b = 4
strange (8+4)
= 12
d. downrightOdd: a = 3
reallyWeird (2 * 3)
= 6
4.
a. 1
b. 4
EXRTA CREDIT:
Odd computes the mathematical function of division.
Wednesday, October 7, 2009
Blog#3: Math
a. 1,101 base-10/ 13 base-16
b. 10,101 base-10/ 14 base-16
c. 1,100,101 base-10/ 15 base-116
d. 1,111,111 base-10/ 22 base-16
NUMBER 2
a. 1000 base-2/ 1 base-16 or 8 base-16
b. 111111 base-2/ F3 base-16
c. 1110001 base-2/ 17 base-16
d. 16 base-16
*I apologize but I was not able to complete the rest of the problems. I need to come by your office hours again to get some clarification before I can finish this post.
Sunday, September 27, 2009
Blog #2: Net Neutrality
The wonders of the internet have been a part of the American experience since their introduction into society at large in the 1980's but along with such technological advancements come issues of consumer rights vs. network control. 1. Behind the scenes there is a war being fought over some of the freedoms that consumers enjoy. This battle is all in the name of Net Neutrality. One one side there are the consumers who willingly pay for internet service but do not want to be charged based upon the content that they access whether that be apps, downloading or any other legal cyber activity. On the other side are the networks and others lobbying to be able to monitor consumer content and decide charges based upon the specifics of their internet transactions. In essence this becomes another internet privacy issue because the main point being debated is how intensively the networks can and cannot monitor consumer activity. 2. Along with President Obama and his administration FCC Chairman Julius Genachowski, a major player in the ever-present issue, has a vision of what the internet should be like. The chairman said that protecting the privacy of the consumer was essential to further investment and innovation by the very consumers themselves. He goes further to equate the absence of net neutrality to the ISPs "erecting tollbooths" throughout the cyber world. Read more of what he and the Obama administration have to say about the issue HERE. 3. As expected with every volatile issue there are sides in favor and sides in equally strong opposition. One such opposer is Scott Cleland, the founder of Precursor LCC and chairman of NetCompetition.org . Cleland argues that with innovation essentially comes more barriers that must come along in order to properly regulate things. He potentially addresses the issue of the fact that new apps and programs are being made everyday by people other than the software companies and that such innovation, if left unchecked, could lead to problems in the cyber communities. He also argues that consumer should have a choice, but pay for each and every one in the end. Find about more on his opinion of the issue HERE. 4. With so much passion on either side of the issue I (as usual) stand in between looking at both and seeing glimpses of truth in both. As a consumer and one who GREATLY enjoys the perks of a neutral net I must say that I would not like for the ISP's and furthermore the government to be able to monitor my internet activity to the extent that I would be charged for all of the individual data packets I send and receive. However, I am aware that not everyone on the web has the best intentions and that in some instances a more Big Brother-like presence from the networks at large would potentially create a safer environment in which consumers can make their transactions without fear of fraud and worse. In the end the glass remains half full and half empty depending on how you look at it.
Monday, September 7, 2009
Blog #1: Cloud Computing
1. My understanding of cloud computing is that it basically provides a massive space for all internet services like Amazon, Yahoo, etc. to be available to the public. It eliminates the necessity to have a service specifically connected to each and every consumer but allows everyone to be able to go and utilize them at their own discretion.
2. The main benefit for someone accessing the cloud would be that they wouldn't have to go through the task of getting specific services connected to them at their residence or place of work. They can access the services they need anywhere and be held accountable for their use only. The disadvantage would be that the individual user would be held accountable for any content viewed or any other transactions under their account and since the cloud is so available someone could easily take advantage of that.
3. The benefit for a start-up company using cloud computing would be that they could target a vast amount of users all at once. They could also have a potentially lucrative business depending on their relevance and the demand for their product or service. However a disadvantage of a start-up company using the cloud could be that their particular service may be more susceptible to hacking and viruses. For example, Myspace gained a quick reputation for allowing people everywhere to network through a social forum but before long accounts were being hacked into, spam was being sent to more people's email boxes every week. Eventually Facebook came along offering a sleek interface and a great deal more security.
4. The social dangers of cloud computing are numerous. There are people set on uploading viruses as well as massive amounts of spam running rampant but the fact that nothing electronic or otherwise is completely reliable is also a valid argument. Having services available to the masses via the cloud adds to the fast paced instant gratification that our generation has become accustomed to but there are security dangers. One commonly known fact is that when you work on something on any computer you save it to your own personal collection so that you still have your work in the event of a crash of any kind. If some catastrophic meltdown of the internet and the cloud alike were to occur simply having your work saved elsewhere would be the quickest and most painless option.
CHECK THIS OUT... http://www.youtube.com/watch?v=XdBd14rjcs0
Wednesday, August 26, 2009
The Best Batman (of my generation)
Subscribe to:
Posts (Atom)