Monday, November 11, 2013

Technology and Architecture (My Choice)


      Technology has had an impact on architecture. I consider architecture to be one of the most interesting forms of art. Some may put it in a separate category but, to me it is an artist designing a living space. Prior to computers architects would have to draw everything that they would even consider making a model of. Now there are many programs that architects can use so they don't have to draw out all the information. Some examples of great programs are ArchiCAD, Punch software, SketchUp, Revit Architecture, and softplan. Many architect artists will always use the pencil but these computer programs have truly helped the process out greatly. Using a pencil to hash out ideas is always the best to get the ball rolling. The technology of the computer is great help to architects. These programs allow artist to get the measurements and what not down. Having a program to help is a big time saver. Not only does it save time but they also allow to put multiple ideas down for one room or different options for the roof. That is very helpful where as when you have a pencil and graphing paper you can not show your client all the information. The programs for architects are also great because it enables people to put the land size down and all the great information about the plot for the house. Not only are these programs great for getting an idea for the outside of the house but they also do floor plans and some even go as far as furniture to let the client see and understand how it would look. These programs are so fantastic and technology is the reason they all exist.               

Wireless Network Precaution


       Wireless network is something we all have been dealing with over the past few years. When I was a child and got my first computer we had to drill holes through our floors to go to the garage in the house to get all of our computers hard wired. Now that we have wifi(wireless networks) we were able to get rid of all the wires, plug the holes and make the house look good again. Wireless networks have many pluses but, there is always a downside to everything. The plus about wireless is we can use it everywhere, no ugly wires, and no hassle to connect. The down side about wireless networks is the security. Being within a wireless network it opens out computer information up. It doesn't just throw you info into the world but, it does make it easier to hack info.
      In order to make sure our computers are safe here are a few easy steps you can take to protect your computer. Put up a fire wall this will enable your computer to fight off the hackers. While you are in a public wifi zone it is s good idea to just brows the internet and not make any large purchases while in public wifi. It is also suggested that you do not use public wifi to do your banking. This information is very important and you want to make sure you are in a secure network before doing so. While you are on a wireless network it is also advised for you to remove you public share on folders, this is your information and you do not need other people snooping around. While on wireless networks it is important to make sure you take precautions.     

Cloud Computing



      Cloud computing is a new technology. Im sure many of you have heard of it from apple. The could is the idea that you are able to store information in the “clouds”. This gives you the ability to store things and not have your computer move slower because it is all junked up. The could is sort of like an external hard drive, you have the information but it is not directly on your computer. I personally am not sold on the idea. I have all mac products and do not use the could.  like many products there is good and bad.  
      One main problem people have with the cloud is the price. Since it is a new program the could space is rather costly. Unfortunately for companies such as Microsoft not all the consumers like it. They wanted to create a new xbox where all the games would be stored in a “cloud” many of the consumers complained and they decided not to do it. I personally agree with the xbox consumers because when I pay for something I like to have a hard copy. Especially with something like xbox I enjoy taking my games with me and going to friends houses. I am also a skeptic about the cloud network because of security. We do not know ho actually safe they are. This is something that is storing your information and you want it safe. Although the cloud is good for running programs within companies, it is easy to store and opens quickly. The cloud works for companies and networks but for my personal use im not sure about it. Maybe in a few years I will be able to safely use the cloud.      
Source

Parental Control Software


          Parental control is so important since the internet has become such a large part or our culture. Parental control is sort of a new concept in the terms of t.v. used to never need to be controlled by parents but was controlled by the t.v. provider. Parental control software enables parents to watch and block what their children do on the computer. This is important because kids can not roam free on the internet. This would be like bringing a child to a water park and just letting them go and saying okay see you when the park closes. It is not okay for a parent to let their child roam free on the internet. As a child I was against this but as I grew up and understood what was on the internet it all made sense. Children do not know any better and need to be monitored.
          There are many softwares such as norton, web watcher,net nanny, DNS, Microsoft and many more. All of these programs allow parents to keep and eye on what children do on the internet. This is so important that parents realize their kids can not just have a computer to do what they please on it. It is not only important because they will learn things they shouldn't know at that age but there is an issue with multi media that is being sent, such as photographs that should have ever been taken and private information that kids don't understand is private. Kids need to slowly get privileges such as the computer. It is important that parents understand why they need to monitor their kids. There are so many programs that there is no excuse why parents shouldn't enforce/ use the products out there. I am not talking about kids 15-18 but kids more or less 14 and under. They think they know it all and they don't they are children and need to be protected.   
Source

Radio Frequency Identification



          Radio frequency identification is the wireless non connection use of radio frequency waves. This gives the ability to transfer data via wireless. RFID is a type of tracking devise that allows people to track items or even animals down. The tags that are able to be traced contain electronically stored information which is sort of like a barcode. Many tags are powered by a magnetic field, battery or interrogating Em field. This allows the devices to send microwaves and give them the ability to be detected. This is a really important piece of technology that many people use and may not even know it.
          Many people have their dogs chipped. This simply means the dog receives a chip inside of them and they will be able to be detected. This is important because many dogs get lost and with the amazing RFID we can now track our dogs down incase they do get out. Unfortunately the tracking devices do cost a rather high amount of money but people will pay it for their dogs. I personally feel every dog should have this. When I was on vacation in california I was swimming down a river when a golden retriever came swimming up next to me. When I looked at the dogs tags I noticed he was chipped. I called the tracking company and I kept the dog with me for the time being. Since I was on vacation in the middle of I don't know the people at the company were able to call the owners and explain to them where I was and they were so happy that I found their dog and called the company. This was my first interaction with a device such as RFID and it was a great experience. As soon as I get a dog I will ge them chipped. Technology is so amazing.   

Digital Image Stenography



          Digital image steganography is the ability to encrypt a file with information. It allows people to hide a digital image by encrypting it into the content of the message. This is a way people can send secrete messages. Some examples of people who would do this are people who are paranoid and people who think their information is so secretive that it needs to be encrypted within another file. To me it is crazy and anything that is that secretive should be spoken about only in person, id say it is crazy. The main ways that people do steganography is through image,audio and video files. The goal is to hide the info within these multi media files. For the people sending messages secretly know that some files can only send up to 1,000 words which is nothing so it is important that they use carriers and other programs that enable encryption to be higher than 1,000 words.
          Steganography dates from way back in the day. The use of tattooed messages on slaves’ shaved scalps is an example of old time stenography. Messages were hidden when their hair regrew, as well as messaged carved in wood and covered with wax. When it was first used in English in the sixteenth century, referred to cryptography writing in codes and ciphers. This history is important to remember when you think of the digital version of it. 
Souce 

Computer Forensics



     Computer forensics is a type of digital forensic science is legal evidence found in computers and digital storage media. Computer forensics is used to get information on digital media. It identifies ad recovers information through a computer. This is used in a scenario when the cops or someone needs to look into someones computer. When we delete items on the computer they do not actually get deleted and they can be pulled up in the future. This is important for situation such as cases when police have to get into someones computer because they have been accused of child pornography. This is used when people try to hide stuff on their computers. One example of how to find things is by using key strokes.
     Having the ability to go into someones hard drive and find hidden things is very important. It also should let everyone be well aware that when you are on the computer you can not hide anything. It is so important that people realize the computer is not like one copy of a photo. There are so m any layers within the computer and they are so deep there is always a way to find old memory or information.   
Source