Advertise

Monday, October 7, 2013

What’s in Our Technology Future?

Apple front man Tim Cook, has admitted the possibility of the apple iwatch in our possible tech future as early as 2014. This device would be made of Corning Willow Glass,which is highly durable and flexible and is capable of running a digital display with Apple's current IOS. This sleek watch is rumored to have Wi-Fi connectivity in later models and may even replace your iphone. Cook also states that the iwatch would be a great response to the slightly awkward Google Glass. I could see myself in either. I would wear my iwatch and pretend I'm Dick Tracy, who's been captured and assimilated by the Borg with my Google Glass. But that's just me walking around everyday.

Next Generation Gaming Graphics
Even if you aren't a fan of games you have to see the new features being developed for the upcoming "Call of Duty - Ghosts" that's powered by a new innovative game engine. Using this new game engine technology, the mad scientists at Tesco have created a level of realism within the game that is near indiscernible from reality. As I said, this is not simply cool for gaming but for the future of all our high tech toys as this technology integrates into our laptops and iphones. This giant leap in screen resolution and graphics promises to draw us one step closer to that virtual reality we have been dreaming about since we got a glimpse of the Star Trek holodeck!

Virtual Organ Transplants
The Wake Forest Institute for Regenerative Medicine has created a working human kidney with the aid of a 3D printer. A 3D printer that uses cells rather than ink can actually build a working human kidney from scratch. Scientist admit they are years away from actually testing the working kidney in humans but have already successfully implanted an engineered bladder into a human patient. The same technology has already implanted regenerated tissue onto surface skin wounds and even has been used to replace degenerative bone tissue.

We focus on these three main advancements because they aren't simply our possible future, they are in developmental stages right now. We will see these innovations in our tech devices and on operating tables within the next year. What makes these three advances so important is their capability to greatly increase the power and efficiency of everything we are currently using. From these three innovations in technology further advancements will be possible in other areas of research and design that will shape our foreseeable future.

Sources:
Previously Posted on FullofKnowlege.com

Friday, October 4, 2013

Apple May Be Setting Samsung Up for a Very Painful Fall

It would not be out of reach for a company to fund research on a concept device with no real intent upon ever developing it. The iWatch has been rumored to be on the horizon for a couple of years. The issue with the iWatch concept, however, is the same as that with Google Glass, it isn't showing marketability.

Apple openly accused the Chinese technology giant of stealing research and design secrets from Apple to produce the Samsung Galaxy 5 iPhone. If they suspect Samsung of these shady practices it would be a crafty endeavor to front a fabled Apple iWatch research and development project specifically for the benefit of potential spies within their inner sanctum.

Apple is not violating any laws by admitting to the possibility of a future Apple iWatch when asked by about it, although Apple market shares bump slightly when CEO Tim Cook nodded that the concept was interesting and possible. And if Samsung happened to have gone ahead and pushed their own version of the iWatch to their peril it would certainly be unfortunate it they took a substantial loss when it doesn't sell.

The concept of the iWatch is the same as for Google Glass. It still requires refining in the designing. It is simply too bulky to fit comfortably on the arm and although the novelty of the iWatch is marketable the realistic viability of it is not.

Samsung announced the launch of their Smart Watch to arrive September 4th. No matter what behind the scenes subterfuge may be at play, its in Apple's favor to allow Samsung to test the waters with their own money before releasing a newer streamlined and more marketable version of its own later.

Sources/Resources
Previously Posted on FullofKnowlege.com

Can the Internet Threaten National Security?

In 2010, a man named Julian Assange became nearly as sought after by the United States government and Interpol as Osama Bin Ladin. His crime was leaking classified secret documents not to China or Russia, but to us. In recent news, another man named Edward Snowden is now hunted by the United States for leaking our government's intent to track, store and monitor every bit of digital information we send on the internet. Again, this man did not leak this to a communist government or terrorist organization. He leaked it to us, the American people. Why would it be so important to these individuals we be made aware of top secret government information? In this article we address the new internet age of online espionage and how secrets exposed globally can affect more change than by simply selling them to nations.

We first identify what the internet is at its essence. It is a global community where information can reach every part of the world in minutes. In the past, stealing secrets between nations served as a means of ensuring an equal footing on the global playing field. Governments each had spies infiltrating other governments seeking to learn the secrets of the other. When captured, the spies were held accountable. The cold war between Russia and the United States is a perfect example of the power of information in shaping governments and the balance of world power. We, however, remained largely oblivious to the shadowy conflict being waged under the cover of secrecy. Today that has changed and what we know as a global community can threaten national security.

Whether or not you consider those who leak government secrets to the public as heroes or guilty of treason the information they leak has potential to place others in harm's way. They may consider themselves as heroes by uncovering a questionable operation but in doing so reveals troop movements and locations. The information can reveal the identities of our undercover operatives within terrorist cells. The line is blurred as to whether we have a right to know this information but do we have the right to endanger those serving our country? Often these people who pass this information online are not considering the overall damage being caused by their actions. They are only concerned with achieving their motive.

So what is the benefit of your knowing secret information? When information leaked about the government storing and monitoring massive amounts of digital information from our cell phones and computers, the government had to address that. We begin to question if we want our government looking into our personal information and we want the matter investigated. Certainly those elected officials involved could find it very difficult to be reelected. The apparent intent of the information gathering is to locate terrorists hiding in waiting within our borders. The result was the public being entered into matters of national security. We learned later that checks and balances were in place to ensure no one's right to privacy was being violated. Again, whether we feel this exposed secret operation is good or evil is irrelevant. That tool in the nation's defense against terror within our borders has been compromised.

In the future, there will surely be more secret information leaked to us via the internet and we will decide for ourselves our opinions upon what we have learned. We should also consider the consequences. Nathaniel Mepham said, "Freedom is not free, everyday soldiers give their lives so we can live ours." Now that we are being interjected into matters of national security by those seeking to affect change in governments, we are made responsible for what we know. And good intent does not exempt spies from accountability.

Sources/Resources
Previously Posted on FullofKnowlege.com

The History of Spam

Spam not only fills up your Inbox but can infect your computer with viruses that can damage your system or even hijack your computer to be used as a host to infect more computers. We address internet viruses and some simple fixes that can greatly reduce the threat of online viruses and the spam that can cause them.

First I'll share a frightening scenario. You go to the doctor with complaints of fatigue and shortness of breath. After some tests you learn you are seriously at risk for congestive heart failure but with medication and some changes in your habits you can maintain your condition. You pick up your prescription and return home. You check your email and strangely find your spam box filled with emails corresponding to your medical condition. No, your doctor has not shared your private medical records with the entire world… well, not intentionally.

Botnet is a term that refers to the vast and intricate network of virus infiltrated computers that spammers use to send out massive amounts of information but also infect other computers to gain access to information. That's a mouthful and is enough to make your ears ring. But this is actually a very simplified definition of a very complicated system that can make your computer a node in a vast network of other computers to make you an unwitting accomplice to internet fraud. This article will focus on how you can protect your computer and yourself from spammers.

From nearly its declassified conception in the 1990s, the internet first discovered porn which soon resulted in the ability to submit credit card/bank account information over the internet. Porn became commercially widespread via the web in 1991. Not long after, the first resourceful net surfer realized there was profit to be made from the acquisition and theft of personal information from others and hacking was born. Soon after, security measure was installed into operating systems and spam was the hackers answer to internet security protocols.

Hackers are not internet gods and they cannot obtain your personal information unless you make it available to them. They must be able to access some or part of the data that you have manually provided. They utilize spam as a means to trick you into providing them with the information they need. Spam is the tool of their trade and even one in a million pieces of spam sent out resulting in either a newly acquired computer in their network, or allows them access to your personal information is profitable.

You can easily prevent this by never typing a password. Once you save a password to a notebook file, the simple act of copying and pasting the password will prevent a hidden keylogger on your system from recording your keystrokes and sending your password to the hacker. A registry cleaner or even your product enabled security software will search and destroy any potential viruses hidden on your computer to acquire your information. But the best method to protect your passwords is to simply never type them. Copy them once and forever copy/paste as needed from then on.

Your password should never be simple. It shouldn't be your child's name or your favorite vacation location. It should be a series of numbers and letters that you randomly type on your keyboard with your eyes closed. If you can not remember your password, you have a good password. Type it once to a notebook document then copy/paste it as needed. Search browser software can now auto save your passwords once you paste them in and can then apply them for you without you ever having to look up the password file. Notebook documents contain no add-ons and no external software, and thus are not as easily read by hacking software. I personally have never had any issues by copying/pasting my passwords from a notebook document.

Finally, your Internet browser has available applications that automatically block third party ads. Admittedly, most ads are not malicious or intrusive. But questionable sites will typically have questionable ads that will seek to infect your computer or, at least, spam an endless run of popup windows on your computer. Your browser can prevent these from interrupting your surfing experience. But remember to disable this useful little tool for the sites you love and want to earn their tiny bit from your visit!

Thursday, October 3, 2013

Isolation: A Real Concern for the Online Generation

If you are like me and your profession is the Internet, isolation can become an issue. It's an interesting psychological problem not easily understood or resolved. In fact, one need not be alone to become isolated. We are, in essence, more united now as a civilization than we ever have been in history. So how can we possibly be isolated?

Even if our profession is not online we do tend to spend a great deal of time online at home. We shut out our friends, family, and spouses drawing into ourselves more and more. And we absolutely never go anywhere without our smart phones. Some of us, me included, can even reply to a text message without even looking at the screen while simultaneously carrying on a conversation face to face with someone. Texting and walking can become as dangerous an activity as texting and driving, especially when the two intersect.

I am reminded of some amusing images I've seen while researching this article. A soldier standing at parade rest is addressed by his superior while texting behind his back. A woman topples into a mall fountain while texting and walking. A police officer directs traffic with one hand and checks his smart phone with the other. Even surrounded by people, we simply close ourselves off to the world around us with disastrous results.

Are we lost souls? Are we doomed to a fate of only connecting with others via cloud based relationships? No, we are not hopeless cases. With some simple guidelines we can cure ourselves of our own isolation and reconnect with those around us. But it is not easy and will feel unnatural at first.

Allow and embrace life's little interruptions. I have a cat that roams freely about my home. She will eventually make her way to me and require affection. Rather than shooing her away, I force myself from whatever I'm doing and show her attention. This is therapy for me as well, forcing me to return to the world around me. When friends and family visit, I leave my smart phone on vibrate in another room. If for any reason I do require my smart phone to receive a call related to a deadline or new contact, I let my visitors know that I'm expecting a call. My friends and family know this about me, and appreciate my efforts to remain centered in the here and now.

Many of us do, however, have deadlines and online obligations that require us to focus on what we are doing. I resolve this by reserving time to myself that I feel certain  will not be interrupted. I awaken early and sit in my window with a cup of hot tea or coffee during the early morning hours. And while the rest of the world sleeps, I tend to my assignments. By the time the first rays of the sun warm my face, I have my pending assignments completed.
With laptop and smart phone in tow, I drive to the coffee shop in town. I am warmly greeted there by friends and colleagues, the two are synonymous. Here we chat and exchange ideas and opinions over an early morning cup. Admittedly, this is often where I get my ideas and subject matter that I share with all of you.

There are moments of my life reserved for work and online activitiesn but there are definite moments specifically reserved for those directly in my life. As with all things, a balance must be maintained. This is vital as we delve ever deeper into this new era, so we don't loose ourselves in the thickening cloud around us.

Sources/Resources
Previously Posted on FullofKnowlege.com