Friday, May 13, 2011

Chromebook


During their developers conference this past week, Google has introduced a new operating system called Chrome OS installed in ultra-portable laptops called Chromebooks. This operating system only uses the web and is constantly connected to the web. From movies and music to email and word processing, everything is done through the Chrome browser. The concept is great, as you can access all your information from the cloud. You wouldn't have to worry about forgetting your flash drive or forgetting to save your file. And security is great because anyone who steals your computer can't access your files as it is stored somewhere in Google's servers. However, with service providers limiting the amount of data bandwidth for each customer as I have mentioned in my previous post, it is not completely worry free. Customers would have to monitor their data usage. Also cloud computing is not always reliable and secure, as companies's servers sporadically shut down due to maintenance or are hacked by intruders. If you saved your homework in Google's servers and realized you couldn't access it the day it is due because of a bug in the server, then having cloud features would be useless. Cloud computing is becoming more and more popular. However, we should remember to always back up our files to physical locations where we have access to. It will be interesting how customers would use and adapt this new concept of Chrome OS as convenience does come at a price.

Video intro of Chromebook:

Tuesday, May 10, 2011

Cloud Versus Cap


As people are becoming more and more mobile, the direction of computing is going to the cloud.  Cloud computing is when resources and applications are stored at a remote location and could be accessed just about anywhere.  An example would be web email services such as Gmail and Yahoo mail.  Anyone with an account can access their email from any computer that has a web browser.  There is no need to use an installed email client on the computer.  Cloud computing allows people to access their information and applications without having to actually carry around their data and computers.  Many companies are starting to use the cloud and offer cloud services.  Companies like Amazon are now offering cloud drives where customers can store data onto their servers and access it from any web browser.  Netflix allows customers to stream movies from the company's cloud instead of having to download first in order to view them.


Although cloud computing is more convenient, it demands more bandwidth because data is streamed more often through networks.  Many wireless providers such as Verizon and AT&T implement data caps to their data plans due to the high usage of bandwidth.  Customers have a set limit in the amount of data they can upload or download and if they go over the limit, they would have to pay additional fees for more data usage.  Just recently, AT&T imposed a data cap on all of its DSL home Internet users.  They claim that it is to restrict the top five percent of users who use a disproportionate amount of bandwidth and would actually help customers.  However, customers are skeptical about the cap and are unhappy about it.  The direction Internet service providers are going is completely opposite of the direction cloud computing is going.  The data caps they impose hinder the progress of cloud computing.  Internet service providers should instead improve their services for their customers.  Cloud computing requires more bandwidth and the providers must widen the bandwidth, not restrict it by charging customers more.  Time and time again, we see these companies continually take customers' money without much improvement on services and in some cases, even a decrease in services.

Saturday, May 7, 2011

Businesses Going Postal


With the rising popularity of the Internet, many people have shifted from traditional mail to electronic communications such as email and instant messaging.  The United States Postal Service has experienced a drop in mail volume over the past 5 years and as a result, lost billions of dollars in revenue.  Due to its deficit, USPS has been borrowing money from the U.S. Treasury.  Some speculate that USPS's current situation is dire, and that the company should cut more jobs and services, such as Saturday deliveries, to save money.  Others, however, see USPS as an opportunity for other businesses.  Michael Ravnitzky, a chief counsel of the Postal Regulatory Commission, suggests that the hundreds of thousands of delivery vehicles that USPS deploys daily could be used for more than just delivering mail.  He believes USPS can use its vehicle network to provide telematic services.  Because USPS delivery trucks go through millions of delivery points almost daily, sensors can be added to the vehicles to detect a variety of things throughout the United States, monitoring things like air quality, road conditions, and traffic.  Businesses could then pay USPS to use their sensors.  For example, a wireless phone company can use the USPS sensors to detect any dead zones in the country and improve their wireless service without having to spend more money using their own vehicles and methods.  Government agencies can also use USPS sensors and network to improve security, having the sensors detect any chemical or biological agents in the air.


The cost of adding sensors to the vehicles is relatively low and revenues from it can help sustain the postal service.  Creativity has to be used with technology.  Some people would blame technology, saying that it hurts the USPS business without finding any solution to the problem.  However, people like Ravnitzky can see the benefits of technology and creatively use it to save USPS.  With snail mail becoming obsolete, this might become a new business model for USPS.

Monday, May 2, 2011

Network Intrusion


When data is placed onto the Internet, it is not always secure.  Sony's network is a good example of that.  Two weeks ago, Sony's Playstation Network (PSN) and Qriocity services were infiltrated by hackers looking to steal information about Sony's customers.  Sony was alerted about the intrusion, through their security system, and shut down their networks.  However, they were too late.  Hackers were able to steal information ranging from customers' addresses, email addresses, and credit card information.  Millions of PSN users' data were compromised.  Sony held a press conference earlier this week regarding this intrusion.  They stated that although data was stolen, credit card information was encrypted, so hackers would not be able to decode that data into anything useful.  Customers' addresses and other data however, were not.  This attack on Sony's networks is not only bad for customers but for Sony as well.  Their reputation of being a reliable brand is lowered due to the attack and people question their integrity of security measures.  Lawsuits may also occur because Sony did not handle the data securely and the FBI is currently investigating the whole situation.

Comic from Penny Arcade

We should, however, be reminded that this can happen to any site or service on the Internet.  A few months ago, news and media site, Gawker and its sister sites were compromised.  Only usernames and passwords were stolen.  However, if these usernames and passwords were also used in bank accounts and other more important sites, hackers can steal more than just information.  To safeguard ourselves, passwords should be differentiated according to four tiers:

Tier 1: Online Banking
This tier should have a really complex password as this account is linked to actual money.  A mix of numbers, upper and lowercase letters would be best.

Tier 2: Primary Email Accounts, E-Commerce Accounts (i.e. Amazon, Ebay)
This tier should have complex passwords as well because lost passwords would be linked back to your primary email accounts and websites were you shop have your credit card information.

Tier 3: Social Networking Sites, Blog sites
This tier would need less complex passwords.  However, it is still good to have a strong password as these sites reflect your reputation online as well as in real life.  Safeguarding these with a good password is not a bad idea.

Tier 4: Fun sites, News Sites (i.e. Hulu, Engadget)
In this tier, passwords can be the same throughout the tier as it would be easier to remember.  If a hacker does get your password, all he or she has access to are sites that are for consuming media only.  It would not be of any use to them.

As Internet users, we should be reminded that data can be compromised and keep passwords strong.  Although it may seem like a hassle, having multiple passwords, it would save a lot of hassle in the long run especially if you get hacked.

Tuesday, April 5, 2011

A Different Kind of Classroom


I recently came across a site called Khan Academy.  The website was started by Salman Khan who was tutoring his cousins across the country.  He posted lessons on YouTube so that his cousins would be able to view at their own pace. Khan began receiving feedback from strangers about how useful these videos.  After Khan realized that a lot of people can benefit from his videos, he founded Khan Academy.  This non-profit organization provides over 2,000 videos and tutorials of subjects ranging from grade school biology and mathematics to college level calculus and economics.

Screenshot of one of Khan's videos

There is an interesting aspect of this website.  During his presentation at a TED conference, Khan envisioned a "flipped" classroom setting.  In this setting, students are assigned videos from the website to watch at home as their homework.  Students can watch at their own pace and back at the classroom, they would do exercises or the supposed "homework."  This type of flipped classroom allows more teacher to student time as teachers are able to help students who do not understand certain subjects or topics.  Khan further expands on this idea by suggesting that students who already understand the topic can tutor the students who cannot.  This whole idea eliminates the traditional classroom situation where some students who are slower learners fall behind due to the speed of the class.  They would not be able to understand the harder topics.  Khan Academy allows students to really understand the material before moving on to a tougher concepts which build upon what they had previously learned.

It is great to see how the Internet and technology can provide a more flexible way of learning.  Khan Academy also provides tracking tools for teachers to see where their students are progressing and which ones need a bit of help.  Khan Academy has begun a pilot program in the Los Altos school district to test out the effectiveness of this type of new classroom setting.

If this resource was available during my high school years, it would have helped me tremendously.

Video of Salman Khan's TED Talks presentation:


More Info

Wednesday, March 16, 2011

Artificial Artificial Intelligence





Amazon, popularly known for its vast web store, competitive pricing, and Kindle e-reader, has other venues of operations in different markets related to the Internet.  One market Amazon serves is the corporate market, where it provides other businesses with resources derived from the Internet.  During one of my E-commerce classes, I learned that Amazon actually runs a business called Amazon Mechanical Turk.

So what is Mechanical Turk?  Another name for this interesting business operation is Artificial Artificial Intelligence- in other words, fake artificial intelligence.  On the website, Amazon allows businesses to post up "HITs" or Human Intelligence Tasks, and anyone can go on the website and do these tasks and get paid.  Tasks range from having to find the best category for certain products to tasks such as identifying which picture is better.  The usual range of pay for each "HIT" is from a penny to 50 cents.  Amazon then compiles the data for the businesses and gives an average of the data acquired.  Companies are then able to then use this data to improve their business.  This Artificial Artificial Intelligence allows companies to accomplish what computers can not do, such as identifying the better picture or similar products.

It is interesting how Amazon began as a online bookstore growing into a big and successful player in Internet service and business.  Other than having a immensely popular web store and Mechanical Turk, they also provide servers and hosting options for businesses.

Tuesday, March 8, 2011

Tablets: The New Form of Computing?


With the launch of the iPad 2, many people are wondering if tablets would become the future of computing.  Many companies such as Samsung and Motorola are clamoring to get into the tablet market as Apple has shown that it is possible to make a profitable tablet.  However, would these kinds of tablets be able to replace the widely used personal computer?

Joshua Topolsky of Engadget believes so.  He believes Apple would continue to dominate the tablet market as they are focusing on the "experience of using the devicewhereas other companies are mainly focusing on the specifications such as the power of the CPU or how much resolution the screen has.  Topolsky believes that the appeal of the user experience and form factor the iPad provides would entice people to switch from their desktops or laptops to mainly using a tablet computer.  However, this seems like a one-sided vision as this would only apply to mainly consumer usage.

Tablets are very entertainment centric.  It is more for consuming media such as watching movies or reading news.  It is difficult to type for long durations on a virtual on-screen keyboard and using fingers to navigate is not as precise as say a pen or a mouse would be.  Many businesses need an actual keyboard to type quickly when communicating through email.  Designers need more precision such as a pen input in order to create what they imagine.   It is very difficult to say that tablets such as the iPad would replace the personal computer entirely.  For media consumption, it is reasonable.  But for actual business functions, tablets will not substitute personal computers any time soon.