Tag Archives: computers

Where Do We Go From Here…?

business computer connection contemporary
Photo by Mateusz Dach on Pexels.com

by Rick Bretz

In the movie “Six Days, Seven Nights” Harrison Ford tells Anne Heche, “we’re going to be here for a long,long.long…..long,…..long,,,,,,,,long time.”   Well, that’s where we are with information technology and the Cloud Computing environment and this technology wasn’t built in six days and seven nights.   Computers have been around since mechanical computers were invented such as the Abacus and the Babbage Engine concept and have steadily infused themselves in its many forms since then.

http://www.computerhistory.org/babbage/

From the Abacus to the SMART 8K Television. Computers and their handy friends, the microchips that help create the SMARTness of the “Internet of Things”,  are all around us. The microprocessor jump-started the imaginations of engineers and inventors in the years afterward.  This is the computing power along with size and heat requirement that got the whole Internet of Things started.

https://www.techspot.com/article/874-history-of-the-personal-computer/

It’s in the mobile phone, the electric car, the hybrid vehicle, and even gas-powered transportation.  It’s in our airplanes, trains, hotel rooms and are a big part of our security posture with the cameras on houses and businesses.  It has let us get cash from ATMs and buy stuff from grocery and mall stores by sliding in our computer chip credit or bank card when we just can’t get to the ATM.

gray and white robot
Photo by Pixabay on Pexels.com

Once we get into the house, the Information technology stuff lives in our security system, our home network, our SMART refrigerators, our high tech televisions.  It has even let bloggers reach thousands of people at the creation of blog site on WordPress.

The security that protects all of our data in our hard drives and CPUs has lagged behind historically but has not stalled at a red light on the information superhighway. A Black Hat hacker has to only be right once while network security defenses and protocols have to defend all attacks, much like terrorist going after soft targets.  That area of Technology is trying to keep up but it is a wall chat constantly renovated as security professionals keep stacking the bricks but the territory gets longer and wider.  All the while, the buying public has purchased and purchased, waiting for the next, biggest and smallest and fastest with all of the bright colors associated with it.

Moore’s Law

The law is based on Moore’s prediction that the number of components on a computer chip would double every two years. More accurately, Moore predicted that the number of transistors placed on a single square inch of an integrated circuit chip would double every two years.

With all the “Whiz Bang” stuff out there, what’s really important is not the latest and greatest from a historical standpoint.  The worthy topic is a discussion about value.  In another string of words:  “How much did people pay for the latest hot shot device and how many forked over the cash?”  The follow up question would be ”how long did the cash light set have to wait before they could get it.” Let take a look.

For several years, the power and features of computers increased while the cost dropped at a rapid cycle, some people said 18 to 24 months where costs dropped and computer specifications raised to another level.  That concept is obsolete now because companies need more time to develop ideas, test concepts and generally raise the technology bar.

According to a USA Today article in June of 2018, the price of an HP 3000 in 1971 costs 95 thousand dollars. In 1977 an Apple II computer costs 1298 dollars, adjusted for inflation would be more than 5300 dollars.. In 1990 a Commodore VIC costs about 300 dollars, adjusted for inflation it would be a little over 900 dollars.  These prices were for computers with considerably less computer power and speed of today’s models. Today, a consumer can get a laptop, PC or even a SMART phone for a few hundred dollars and be able to run apps, software and use the speed and power of the device that people could only wish in 1971 and 1980.

Today, you can access the world wide web from any device from just about anywhere where the infrastructure exists. That brings us to the age of Cloud Computing.

Technological Evolution

Technology seeks the most efficient form, unless otherwise constrained. Efficient form is defined qualitatively as one that is best adapted to its application or as one with the least number of problems.

 

This means that the technology evolution has brought us to this point where we can go get any document and work any any place we want to work, be it at the beach, the cafe, hotel room, or hotel lobby.  Today you don’t have to be in the “Office” to finish a job you started in the “Office.”  To bring the idea home, you don’t have to start working in an office when beginning a new job today,

Cloud Computing serves as the next step on the timeline from local area networks, storage and infrastructure and desktop applications residing on local hard drive to accessing personalized desktops, data files and applications while sitting at your favorite coffee shop while the power of the Cloud goes out does the work for you.

 Since this began with a movie reference, here are two more to ponder. Two movies recently released reveal the potential for technology.  The movie “Lucy” showed how integrating computer technology and information with human beings can bring dangerous, unintended consequences in the wrong hands but in the right hands can be a force for good.

The other movie aired on Netflix and was called, “Extinction.”  You have to decide who is doing the dirty work and who is being selected for extinction.  The movie centered around Artificial Intelligence and how far humans are prepared to advance robot technology in 100 or more years from now.  Without spoiling the movie’s plot and conclusion, it surprises you when trying to decide who are the protagonists and who are the evil doers and whether there are any categories at all.

Notable Links:

https://www.independent.co.uk/life-style/gadgets-and-tech/news/the-end-of-moores-law-why-the-theory-that-computer-processors-will-double-in-power-every-two-years-10394659.html

https://www.techspot.com/article/874-history-of-the-personal-computer/

Article on the history of computer prices.

https://www.usatoday.com/story/tech/2018/06/22/cost-of-a-computer-the-year-you-were-born/36156373/

Here’s an excellent computer timeline that outlines when each type of computer was introduced to the scientific community and then the buying public.

http://www.computerhistory.org/timeline/computers/

https://ethw.org/Early_Popular_Computers,_1950_-_1970

 

 

 

 

The Right to Privacy, Data Protection and Social Media

globalhopping

By Rick Bretz

Joining a social media site like Facebook is opening the curtains to the big picture window to your life.  However, when you pull the draw string to open up the curtains in your home, you can close them back up just as fast anytime you want to keep your life to yourself.

“The right to be left alone”

The World Wide Web is the global communicator and what a user does on it or puts on it is forever, saved on a server somewhere for use on the Wayback Machine.  When you click on something you are part of the big industry of data mining and collection that can be parsed, sliced, organized and delivered to businesses and analysts everywhere.

Congratulations! You are part of the modern technological community.

The Right to Privacy

A book published in 1995, authored by Caroline Kennedy and Ellen Alderman, foresaw the future conflict between data protection, data collection and the right to privacy for internet commerce customers.

In the introduction, the authors pointed to a phrase justice Louis D. Brandeis used more than 120 years ago when he called the Right to Privacy, “The right to be left alone.”  The question is if you buy something from a vendor website should you have the right to be left alone or should your personal preference data be left alone.  If you buy a widget on the internet today you will find widget advertisements pop up on the news websites you visit later on.  Is that right? Is that OK.  Is that just the way businesses run in the age of information technology?  The short answer is “Yes.”   Does it give a business the right to do whatever they want with the data?  Arguably, “No.”

The authors also correctly point out that the word “Privacy” does not appear anywhere in the United States Constitution. However. one could infer a right to privacy when reading it, especially in reference to the Bill of Rights and its amendments.  The important one that comes to mind is the fourth amendment concerning illegal search and seizure.

laptop computer table

The current issue being covered by the media involves Facebook and how they treat their data mining and collections of users.  The business of selling user data and preferences to other agencies for them to use for other purposes has made Facebook users think twice about continuing to post their thoughts and likes.

One could argue that when someone signs up for Facebook, Instagram or any other social media site you are giving up your right to be “left alone.”  What you really want is the ability to selectively let your friends and relatives know what is going on in your life.  People are upset today because Facebook is treating their data from the personal lives of users like another commodity, like selling computer hardware on the open market.

In the Kennedy and Alderman book, the authors were ahead of their time when discussing issues associated with personal rights concerning this issue. Their topics included, Privacy and Your Self, Privacy Versus the Press, Privacy and Law Enforcement and Privacy in the Workplace

The book discusses the Fourth Amendment, in particular concerning a law enforcement case.  The book explains that this amendment states “a right of the people to be secure in the persons, houses, papers and affects, against unreasonable searches and seizures, shall not be violated.”  The book further explains that the Supreme Court has interpreted the amendment as protecting an individual’s “reasonable expectation of privacy.”

The question remains, if you join a social media site, should you presume a reasonable expectation of privacy.  Today information technology, web use, and data collection and analysis generate effective business practices and customer satisfaction.  It’s the reason a consumer can order something from the internet from a vendor and be assured that product will be available to be sent to customers the same or next day.  Data mining and collection can be used to effectively manage a business or negatively effect a user as when businesses sell their data to other companies or when black hat hackers steal the data and sell it or hold it for ransom.

Most universities have an Information Technology ethics course as part of their curriculum for computer science graduates.  The “Do No Harm” philosophy can be followed or not.  As with any instrument of technology, if put in the wrong hands, the potential for damage increases.

Businesses have a legal and ethical responsibility to protect data.  Data that can personally identify someone should be protected with a special effort.  Personal Health Information (PHI) and Personal Identifiable Information (PII) like social security numbers, phone numbers and addresses are gold to black hat hackers who want to ransom the data.  Experts in the field of information security will tell you there are millions of instances everyday where hackers try to exploit vulnerabilities in commercial and government networks to get user data. The good news is most of them are thwarted by perimeter security technologies.  The bad news is it only takes one attack that defeats these measures to mess things up.   Consumers don’t need companies selling their data and spreading it elsewhere to add to the challenge of safeguarding user information. Protecting data and personal privacy should be important to an individual and to everyone who sees it.

Notable Links:

https://constitutioncenter.org/interactive-constitution?gclid=EAIaIQobChMI0ez668Go2gIViLbACh0jtQufEAAYASAAEgL6C_D_BwE

https://www.sans.org/security-resources/ethics

https://www.eccouncil.org/code-of-ethics/

https://er.educause.edu/articles/2017/3/ethics-and-the-it-professional

https://www.reuters.com/article/us-facebook-privacy/facebook-says-data-leak-hits-87-million-users-widening-privacy-scandal-idUSKCN1HB2CM

https://www.techradar.com/news/us-uk-investigating-facebooks-role-in-cambridge-analytica-data-breach

https://www.americanbar.org/publications/blt/2014/01/03a_claypoole.html

https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/Lack-of-Privacy-Awareness-in-Social-Networks.aspx

http://archive.org/web/

 

 

 

 

1984-Thirty Years Later

nsa-operations

by Rick Bretz

George Orwell’s dystopian novel, 1984, published in 1949, has been reestablished as the go-to book for all things wrong with government privacy invasion and society’s ills.   With government-funded security professionals scrutinizing some or all of the internet usage and phone conversations that are happening today, it does reflect the worst themes of 1984. Of course it is more complicated than the government watching over people. September 11, 2001, showed us that proper vigilance can go a long way toward keeping people safe from terrorists who want to prove a point by killing innocent people. Orwell’s novel remains a commentary on communist practices in the Soviet Union and modern relationships between governments, media and citizens throughout the world.

Some of the themes of 1984, nevertheless, seem to be blanketing our society as we live and work carrying our information devices. Smart Phone and internet monitoring are instances of privacy concerns. In spite of this fact, millions of people publicize their every move on Facebook, Twitter and any other social media. This fact makes it difficult to take the side of a person wronged by the invasion of privacy. People want privacy only on their terms. Like the movie star or celebrity who craves success but doesn’t want the paparazzi baggage that comes with it. If you want safety and security and still need your family and friends to know about last night’s pizza party, you have to compromise a little, maybe a lot.

Below is a 1984 to present comparison.

1984 Themes Today
Invasion of Privacy-1984————————2014> Phone Surveillance, internet tracking
Constant Surveillance1984———————2014> GPS Trackers in Vehicles, Cameras on Streets and at traffic lights. Aerial Surveillance
Torture (Room 101)-1984———————–2014> Pick a country
Double Think-1984——————————2014> Advertising, college professors
 

Cult of personality1984————————-2014>

World Leaders, celebrities, musicians, talk show hosts, and televangelist
Tele-screens (two-way Monitors)-1984——2014> Overhead surveillance, street cameras, two-way camera software
Class System (Proles, Outer Party)-1984——-2014> The 1 Percent, Poor, Working Class, Blue Collar, Middle Class, the Power Elite, Educated Elite, Fortune 500 CEOs, Government Officials (Elected and Appointed)
News Speak-1984——————————-2014> Affordable Healthcare Act, (government catchphrases used as titles for legislation)
Ministry of Plenty (Food Supply)-1984———-2014> Rising Oil Prices, Government Regulation, Inflation
Ministry of Peace (War)-1984——————-2014> World Leaders and Defense Ministers
Ministry of Truth (News)-1984——————2014> CEOs and managing editors of news organizations dictate the headlines and stories seen by consumers. Federal Communications Commission. Advertisers
Ministry of Love (Dissidents)-1984————-2014> Whistle blowers usually pay a price
Poverty, Vices-1984—————————–2014> Making vices like alcohol and drugs (marijuana) available control the public and provide needed revenue.
Censorship-1984——————————–2014> If a show or story does not please a power player, they have monetary and power influences to make it disappear.
Controlling the Middle Class-1984—————2014> Taxes, regulations and travel restrictions or religious and government organizations (Republican and Democratic Parties)

 

There are many ways to track a person today. It would be difficult to get lost when the hunter really wants to find you. Let me count the ways: GPS Device, Car Computers, Credit Cards, Smart Phone, Home Phone, Social Security Number, Driver’s License, Aerial Reconnaissance, Drones, and Toll Roads just to name a few.

Cars today have what is called a “Breaking Coach.” It tells you that you have driving skills. Don’t kid yourself. It is a way to determine how safe our driving habits are in case we are in an accident. Insurance companies and law enforcement officials really want to know this.

Your MAC (Media Access Control) address is a unique set of digits that identifies your particular computer or Network Interface Card, and with the IP (Internet Protocol) address, can determine your internet history. It’s a digital signature.

When you drive through a toll booth, a camera records your drive through and your license plate and if you have a toll sticker on your window it identifies that too.

Officials in several states are studying the feasibility of adding hardware to vehicles to track the number of miles a car travels on the highway to determine a road tax.

And the hits just keep on coming.

 

Notable Links:

http://www.history.com/this-day-in-history/george-orwells-nineteen-eighty-four-is-published

http://en.wikipedia.org/wiki/Nineteen_Eighty-Four