Saturday, November 19, 2011

Redo Blog #2: We Evolve as Technology Evolves


 It seems like yesterday when the first ipod came out, offering an alternate of music listening to radios and CD walkmans. Nowadays we have even more high tech gadgets the likes of iPod’s and phones with multiple technological abilities. It is here where these things have taken flight, offering all sorts of goods and services, much to users benefit. As Rheingold detailed in his excerpt, How to Recognize the Future When It Lands on You, when he “began to notice people on the streets of Tokyo staring at their mobile phones instead of talking to them,” that the next phase of technology was beginning to wave through. The wave of new communication has established peer-to-peer networks, through exchanging “short text messages” as well as using the internet to connect with others.  Though these may seem like an important step in the technology realm, Rheingold states that it’s merely “a small harbinger of more profound changes to come” some which are beginning to reveal themselves today.
Through the mobile communication capabilities, groups like flash mobs are able to quickly connect amongst each other. They have taken it a step further though as they do not just use a “short messaging system” via texts, but they also use blogs, email, Wi-Fi, and webcams to spread news of where the Mob will meet and what they themselves will do. An example can be seen with Improv Everywhere’s flash mob that gathered hundreds of individuals to Grand Central Station in New York City, where they performed a skit as Frozen travelers. With out mobile communication via cell phones and the Internet, performing the skit would not even have been possible. This instance is only one example of man evolving as technology evolves. The trend of this evolution is on display in workplaces, schools, and all parts of society each and every day.
              It has been a little over a decade since Rheingold had first witnessed cell phones users observing the screens of their phones while admiring texts. Technology has evolved very fast and brought much to users delight through its multifaceted features. As each day progresses newer features are added to, gaining popularity and diminishing use of the less capable features. Though the benefits added daily may at the time seem revolutionary, in the end the are all just merely small harbingers with “more profound changes to come”. Those changes beginning to take affect are on our full display by smart mobs like Improv Everywhere, who continue to interact through mobile communication. From banding together and connecting with each other through cell phones, Wi-Fi, and the Internet, people are able to effectively evolve as technology evolves, continuing to use what’s well liked while also awaiting change still to come.

Friday, November 11, 2011

Technology Spring Boards the Future


            The future is fast approaching with the technology standpoint indeed. It seems like yesterday when the first ipod came out, offering an alternate of music listening to radios and CD walkmans. Nowadays we have even more high tech gadgets the likes of the iPod nano’s, iPod touch’s, iPod shuffle’s, and even iPhones. It is here where not only the iPhone but additional phones have taken flight, offering all sorts of goods and services, much to users benefit. As Rheingold detailed in his excerpt, How to Recognize the Future When It Lands on You, when he “began to notice people on the streets of Tokyo staring at their mobile phones instead of talking to them,” that the next phase of technology was beginning to wave through. He continued that exchanging “short text messages” is merely “a small harbinger of more profound changes to come” some which are beginning to reveal themselves today.
            A recent statistical analysis of society revealed that roughly 70 % has some type of mobile cellular phone. From this then, take into account how many of those phones are the up to date, popular ones complete with all new features. This instance is what Rheingold had been talking about, the shift into new age technology. Nearly every phone contains text messaging, which in some cases is even cheaper than phone conversations. The sudden convergence of the “cellphone/iPod combo points to a growing reality”, that little wireless devices are capable of immense computing power. Phones now are complete with Internet capabilities for users to surf the web, access their social networks, or look up information readily from their handheld phone. Cell phones have the ability to download games and screen savers, and also contain GPS systems to help find a route or how far a user is away from a given destination.  These  technology features of today’s cell phones offer a vast array of benefit to cellular users, making it easy to access personal and public information at their fingertips. Cell phones and mobile access have come quite a long way since Rheingold first encountered it in 2000.
            It has been a little over a decade since Rheingold had first witnessed cell phones users observing the screens of their phones while admiring texts. Technology has evolved very fast and brought much to users delight through its multifaceted features. As each day progresses newer features are added to cellular phones, gaining popularity and diminishing use of the less capable features. Though the benefits added daily may at the time seem revolutionary, in the end the are all just merely small harbingers with “more profound changes to come” slowly spring boarding technology towards the future.

Thursday, November 10, 2011

Redo Blog #1: AIM Project


            In Sherry Turkle’s “Life on the Screen”, Turkle chronicles life in cyberspace and the way that individuals interact through out their computer networking. In the case of the MUDs, people essentially create their own collaborative virtual community. Through the virtual community, players can collectively create, maneuver, and actively discuss on a daily basis. Over time, familiarity makes usage of the virtual systems easier as individuals networking the system gradually become more comfortable. From further honing of the systems, the virtual characters develop their own identity and selves. According to Turkle, “As players participate, they become authors not only of text but of themselves, constructing new selves through social interaction”(12). From the continuous interaction that players have with the various virtual systems, they do indeed create players that reflect themselves or an individual of their liking. This statement holds very true in terms of the recent aim interaction.
            Each person in class was given the assignment to create their own virtual persona. Male, female, tall, short, fat, skinny, regardless of what they created it was all in fun of the virtual reality. We were required to have a specific background of our created aim character, complete with a brief life story consisting of what they look like, where they are from, what they enjoy, and what they do not enjoy. The character I created was named Maribel, a grade school lunch lady from West Virginia. Maribel ended up talking with only one individual who happened to be a drug dealing, ex NFL hoodlum named Tyrone. Boy, did it create quite interesting conversations, ones full of some memorable quotes and statements. It was from the discussions with Tyrone that I definitely felt that I had seriously constructed a “new self” in Maribel throughout the specific interaction with Tyrone.
            From continued chatting with my alternate aim partner it became more evident that our created selves did indeed take on virtual personas. I myself personally felt that I put significantly more effort into making my discussions more realistic throughout my social interaction. By chatting often I was able to actively continue the conversations as my virtual being, adding more information to make it as realistic as possible. The more specific I became, and the further in depth with my created character I went, the more the virtual reality became somewhat of a reality. Through the project it became more evident that Sherry Turkle’s statement that the players also “become authors not only of text but of themselves,” held quite true. I myself did in fact not only author my aim character throughout the text, but also gave it more of a self throughout detailed characteristics. Being the author of the virtual character persona, I felt myself transpiring the virtual into reality from the in depth aim conversations.

EXTRA BLOG * Sexual Predators Infest Internet


Amid the turmoil and the recent allegations posed against the Penn State football program, the quite controversial discussion of sexual predators has been a thorn in the side of society for many, many years. This instance, more popularized because it’s happening to a well-publicized figure, is merely one instance of an occurrence that’s happens daily worldwide. Sexual abuse has evolved as technology has evolved, being soon in different formats and being used through types of social media.  A main cog in sexual predation has been due to the rise of the Internet and how it is used in family households today.
            Even though computers provide an insurmountable amount of help and provide several resources to us, they also provide danger for homes full of young children and teens. A recent study done by SentryPC garnered some eye-popping statistics. The company sent out questionnaires and also went door to door asking for web users to fill out surveys. What was found may cause parents and guardians to become more aware of the things their children are doing on the Internet and whom they talk to via their social networks.
            The staggering statistics revealed these alarming facts. One in every five teens who use the Internet stated that they received some form of sexual solicitation, asking for sexual information and engagement. Twenty five percent of those children are exposed to pornographic material, and seventy five percent are wiling to share personal info in exchange for goods. Additionally one in every thirty youth says that they have encountered sexual solicitation aggressively in the last year. And lastly, one of the most eye popping of all is that only 1 in every 3 households are using some type of block or filtering system to protect their children.
            The statistics not only reveal those facts, they also reveal just how dangerous anything you do on the web is.  Even amongst those who don’t intentionally mean to come across sexually, if the wrong person views a questionable comment or observes a questionable interaction they could very well report it to police. This is why when surfing the net you need to be cautious for your children and family members, but also yourself as well. Having a filter in place may not completely protect a child, but it will be more beneficial to have one rather than not having one in place at all.

Wednesday, November 9, 2011

EXTRA BLOG * Ilegal Downloading: It Can Cost You Dearly


You hear a song that you like that sounds pretty upbeat with some catchy lyrics, most would decide to get it for there IPod or mp3 gadget. Nowadays most do not want to pay though, meaning that a seemingly easy online download would be feasible. Wait right there though, as it could cost you, in some instances pretty heftily.
In the case of Joel Tenenbaum, he was charged anywhere from 67, 500-675,000 dollars in what was deemed as unconstitutionally excessive illegal music downloading. At first it appeared Tenebaum would not be seen as liable and the jury would let him slide. However, the Recording Industry Association of America demanded a review and the court of federal appeals decided that Tenebaum would be responsible. Tenebaum, who was a grad student at Boston University, had his lawyers vigorously fight that the Digital Theft Deterrence Act, as well as the federal copyright laws were not supposed to have been a target of the consumer. Those who represented the RIAA rebuttal stated that the economic impact of the downloading of illegal files was in a greater capacity than sharing a single tune. Because of this, Tenebaum’s charge could simply not be diminished.
Though it is merely one individual, Tenebaum’s case sent shockwaves throughout his entire campus, as well as many colleges on the East coast revealing that illegal downloading is a serious problem amongst college campuses. The RIAA has been pressing this issue immensely ever since the web has been used for music downloading. This case, when first presented to them, was one that would send a message to all consumers or illegal downloading, letting them know that they could very well be next, having there actions cost the dearly.

Friday, November 4, 2011

Social Networking Dangers


            Myspace, aim accounts, msn messenger, and facebook. These are just some of the social networks that are popularly used to talk amongst peers, family, as well as friends. These domains can be used for positive social means, and unfortunately negative social means as well. They can be used so individuals can express themselves or used to manipulate a group or individual. In the case of Megan Meir, she was the individual who was clearly manipulated. Her suicide, caused by cyber bullying, grabbed national attention creating quite a stir amongst parents of children who often used these social networks. Having grown up as an individual who used nearly everyone of these networks, it became eye opening to myself and to my siblings of how dangerous these networks could really be, in the present and possible future as well. It now, more than ever has become so crucial for users to watch what the post or comment on as it could put them in some type of danger.
            Social networking has engulfed today’s teen. Studies according to common sense media state that more than half of every teen feels compelled to check their media site every single day. Its mainstay in culture as repeated before has benefits, as well as determents that can potentially affect individuals now or later in their future. Minus the Internet predation, which definitely should not go unnoticed amongst those who use these sites, there are additional reasoning’s as to why social networking can be dangerous for the user. In a study conducted by Kaplan in 2008, "one in 10 college admissions officers routinely check out college applicants' Facebook and Myspace pages". They want to get a better understanding of the individual, and what better way than to look at a social network they use and update daily. Not only do undergraduate admissions do this, but also graduate admissions as well as prospective employers often surf networking sights to better evaluate candidates. Adding to the networking surfers are attorneys and lawyers. Whenever a case is received, the respective lawyers research for information of all those involved. A case involving a Rhode Island student’s drunk driving incident resulted in having him being sentenced to prison, when his original sentence was much shorter. This was because his facebook page featured him partying merely days after he left a woman clinging to life in the hospital after his reckless car accident, revealing to the judge that he showed no remorse. Other instances include child pornography cases that can also have legal issue, if individual’s nude or scantly clothed photos surface with out permission.
These are merely minor examples of social networking that can be great danger to users, potentially leading to consequences in the present or down the road. What an individual does will could affect their acceptance, it could lead to cyber bullying, and it could leave a blemish on their legal record for the rest of their life. It is extremely vital to any user of social networks to be very cautious with what they say and do on their specific sight. They need to make sure they steer clear of the dangers, and safely use their social networks.

Friday, October 28, 2011

Time Will Tell If Google's Privacy Policy Remains Private


            When thinking of Internet websites and search engines almost immediately the first thing to come to mind is Google. Yes, Google, the #1 search engine and unquestionably the most frequently used site has revolutionized people’s ability to find answers to questions or information on certain topics. Google offers just as its mission statement says, “to organize the world’s information and make it universally accessible and useful” (Vaidhyanathan- Googilization of Everything). Google has become a constant part of daily culture to everyone who has access to the Internet. It’s programs under the Google name such as G-Mail, YouTube, as well as Google Chrome and Google Maps, display just how revolutionized search engines have become due to being more convenient for users. Though Google may seem to be more convenient for users it also has the ability to enter into ones private life. It claims to have privacy settings however, Google’s ability to manipulate users gives it “pretty much a lack of privacy.” Its ability to scam personal data from intimate networks reveal behavior that has not gone unnoticed by users all across the globe.
            Google’s manipulation and inappropriate behavior with its users came to boiling point with unsatisfied users in Germany and Google’s program “Street View”.  Minister Ilse Agner was quoting saying “Google has for years penetrated private networks, illegally”.  According to the report, only two weeks previous Google had been telling German consumer protections authority “that it was only recording the network’s names and addresses” when they were gathering even more personal data as well. Google’s rapid collection of personal information from Wi-Fi networks is simply an inappropriate behavior because they take advantage of users personal information. Due to uproars like this and several others that question the privacy claims of the search engine, Google said it will introduce an option that will allow “users to encrypt searches on its website as an added protection against unauthorized snooping”, however further personal information will need to be provided in doing so, causing many to question Google’s attempt at another user privacy claim.
            Google is a search engine that will continue to be used, however as it revolutionizes so do other search engines as well. It seems that only future use will show how stable Google and it’s user privacy is and will remain. Thus far its inability to affectively notify users for info and in turn hack into users personal information is clearly instability on the websites parts. It will be interesting to see if the encrypting of searches will have a positive or negative effect for Google and its users. The only thing one can do is continue to use the website hoping for improved privacy or use an alternative search engine. Time will tell if Google’s privacy policy will in fact remain private.