The ioT Life

giphy (11).gif

IoT fiery development, the government and manufacturers out of many policies and products, but consumers are new or future Internet of Things will change how life, in fact, from many Hollywood movies to see the human imagination of the future, many TV series

Early demonstration of the thirst for the future of high technology.Such as the sensor in the morning when the detector will automatically detect the sun out of the window, adjust the curtains to be opened how much room lights need to turn on.

The wearable device will also bring together the previous night’s Sleep information as well as the previous day’s diet records, suggest that we should drink this morning how much water; brush the teeth, smart toothbrush will remind us where you still need to be strengthened.We can also use the phone remote control appliances and let the coffee machine starts to help us brew coffee. So after dressing change, we can go out immediately.

On our way to work, use our mobile phone to turn on the company’s computer and air conditioner, automatically adjust temperature and humidity, and prepare for us the most suitable working environment. If there is an accident on the road passing through, the in-car system will remind us to divert it. After get off work to exercise, wearable devices will record our movement, the way home can also help turn on the air conditioning, ready to take a bath, and bathed in fear of carbon monoxide poisoning.

But with the ioT, smoke detectors and agiler and secure to prevent accidents. At weekends when home, the sensing device will also record your lifestyle and the habits of electricity consumption, understand what you are on the electricity consumption, when is the peak of electricity, which appliances are not often used, you can unplug the plug And so on, the power company can also collect information about each individual, estimate when the power supply will be insufficient, and remind users in advance. The Internet of Things not only brings convenience to life but is safer and closer to human life.

ioT into our lives, do not particularly feel its existence. However, everything you do will be recorded by it!

giphy (12).gif

Teodor Mitew(n.d).FCJ-168 Do objects dream of an internet of things?Retrieved fromhttp://twentythree.fibreculturejournal.org/fcj-168-do-objects-dream-of-an-internet-of-things/

. (n.d).Understanding the Human Machine. Retrieved from http://ieeexplore.ieee.org/stamp/stamp.jsp?reload=true&arnumber=6679313

 Jared Porcenaluk (June 4, 2017 ).The Future of IoT – What Will the World Look Like in 2067?Retrieved from https://www.iotforall.com/future-of-iot/

Advertisements

Wk 10: Cybercrime

ezgif-2-f7954a47e5.gif

Major Governments are developing software called “cyber-weapons,” aiming at building an advantage in cyber-world, even against military and economic opponents. However, these “weapons” have instead been stolen by hackers in order to blackmail the money and develop into a global cybercrime.

Cybercrime causes an annual global economic loss of 445 billion U.S. dollars.
Among them, more than 160 billion U.S. dollars was lost due to cyber attacks on individuals and businesses involved in intellectual property rights.A report in the Washington-based Center for Strategic and International Studies says cybercrime has become an expanding industry that undermines trade, competitiveness and invention.

Ransomware can become a new trend in cybercrime. According to a report released earlier this year by SonicWall, a cyber security company under Dell, (SonicWall Annual Threat Report 2017), a total of more than 630 million attempts to extortion online were identified in 2016, up from 2015 The year saw a record 3.8 million, an alarming increase.

In March of this year, some people in the UK published a hacker dron named Snoopy. At this year’s Black Hat Hacker Annual Meeting, Bishop Fox, a security company, also used Raspberry Pi to build a Web site Road attack capability of the drones “dangerous drones”, as long as the fly near the top of the target, you can for WiFi, Bluetooth or RFID and other wireless communication channels to attack. Most of these hacker drones disguised as Wi-Fi hotspots ability to attract motor users to connect and then steal a variety of information within the phone. And its production costs only 500 US dollars up and down, can be said to be quite cheap new attack techniques.

This telling us be careful on the networkk.

 

Maria Popova (10.06.10).hacker Retrieved fromhttp://searchsecurity.techtarget.com/definition/hacker

Maryse Godden. (3 November 2017).Who are Anonymous?. Retrieved from https://www.thesun.co.uk/news/3885265/anonymous-guy-fawkes-mask-hackers-nasa-claims/

Raffi Khatchadourian(June 7 2010 ).hacker Retrieved from https://www.newyorker.com/magazine/2010/06/07/no-secrets

Wk 9: The hack

anonymous

Hacker is a person who good at computer science, programming and design highly understandable.In computer security, “hacker” refers to the person who studies how to take the computer security system. They use public communications networks, such as telephone systems and the Internet, to log in to each other’s systems under non-formal conditions to gain control of the system.

Hackers can be roughly divided into the white hat, the gray hat and the black hat.White Hat hackers aim to “improve” by cracking a program to import modifications that enhance or change the program’s use, or by intrusively reminding system owners of computer security vulnerabilities or even Take the initiative to be repaired.Gray hat hackers to “show off” as the goal, through cracked or invaded to show that they have a superb technology.Black hat hackers to “lust” as the goal, through the crack or invasion to gain unlawful interests or vent negative emotions.

Among them, white hat hackers are mostly employees of computer security companies, and in a completely legal case to attack a system, while black hat hackers also known as “Cracker”.

And Anonymous is the largest, most famous and centralized activist hacking group in the world.Although no more rigorous hacking pedigree has so far emerged, in reality it is difficult to define radical hackerism at both ends of the traditional black hat and white hat spectrum.

However, their core concept is to reach their social or political goals, regardless of whether the means are legitimate, using data collection, intrusion, sabotage or online advertising. Therefore, the activities of radical hackers mostly have strong social movements, protests and conceptual colors. Like an anonymity itself not only participates in a number of political or social events such as attacks on ISIS, the Shakyidiki Church, and WikiLeaks as a programmer.

They are everywhere.

Maria Popova (10.06.10).hacker Retrieved fromhttp://searchsecurity.techtarget.com/definition/hacker

Maryse Godden. (3 November 2017).Who are Anonymous?. Retrieved from https://www.thesun.co.uk/news/3885265/anonymous-guy-fawkes-mask-hackers-nasa-claims/

Raffi Khatchadourian(June 7 2010 ).hacker Retrieved from https://www.newyorker.com/magazine/2010/06/07/no-secrets

Wk 8:The impact of social media

Have you ever heard about Hong Kong Umbrella Revolution?

Hong Kong’s “Central Government Occupation” operation is not just social movement. It’s also a political revolution.The mass protest campaign triggered by the change of government policies not only spreads in Hong Kong but also spreads rapidly over the Internet.

Social Media plays an important role in this social movement.As it can help accelerate the spread of the revolution at all levels of society and enhance the cohesion between the members of the movement.Arousing international attention.Enhance cohesion among citizen and give a positive value.

However, these positive evaluations are only part of the reality. Social media have also brought contradictions and divisions to the overall “Umbrella movement” and even the social public opinion.

ezgif-2-b08dfef97a.gif

According to a study by Scholar Merlin (2011) on “Arab Spring”, social networks have four different positive functions in promoting social movements or social revolutions:

1.Social media have voiced and synergized channels for citizens who are dissatisfied with the government.

2.Campaign conveners sent a large amount of encouraging messages through social media that other protestors were even more positive about their odds.

3.Social networking sites have raised the price of detente exercises by those in power.

4.Citizens raise the international awareness of social movements through social networks.

We can imagine the effect of social media is huge as social media release our freedom.

 

Maria Popova (10.06.10).Malcolm Gladwell Is #Wrong. Retrieved from http://designobserver.com/feature/malcolm-gladwell-is-wrong/19008/

. (7 March 2011). How Twitter Will Change the Way We Live. Retrieved from https://www.theguardian.com/commentisfree/2011/mar/07/facebook-twitter-revolutionaries-cyber-utopians

 

Tetyana Bohdanova. (December 9 2013 ).

How Internet Tools Turned Ukraine’s #Euromaidan Protests Into a MovementRetrieved from https://globalvoices.org/2013/12/09/how-internet-tools-turned-euromaidan-protests-into-a-movement/

Wk7: The meaning of the Social Media and Gatewatchers

 “Bridges made of pebbles” 

This is terms of describing the social media such as Twitter.
Twitter is an aggregate site which using the word #hackedu to get the attention of the consumer and aroused discussion. Which mean the pebbles being each of the tweets, coming together to form a suspension bridge to a full story.

ezgif-5-91d0652510.gif

labeling is one of the most useful tools that Twitter has created as the content is limited to 140 words. Via the tag we can aggregate more people easier.It added a second layer of discussion and brought a wider audience even into what would have been a private exchange.

These sum of 140 words tweets added up to something truly substantive, like a suspension bridge made of pebbles.Tags are powerful, useful tools for marketing, communication and driving engagement.

In fact, almost every social network has implemented a labeling system in the past few years. Include factbook, Instagram or youtube. A tag is a better method to communicate with valuable viewers on the internet.

The growing role of viewers in news creations is also changing the traditional role of the media and correspondents and their readers.One concept suggested by scholars is gatewatching which is considered to replace traditional gatekeeping journalistic roles.The new innovative practice of news coverage is social media planning, which involves digitizing narratives that make use of online and social media content.

Gatekeepers include the selection and filtering of relevant online and social media sources and direct access to the original source referenced in a story of a reporter. However, in addition to the professional sources of social media search and filtering available, traditional news skills are still necessary to paste curated pieces of information.

However, in addition to the professional sources of social media search and filtering available, traditional news skills are still necessary to paste curated pieces of information.Gatekeepers are the process of monitoring and controlling the flow of messages to viewers, and janitors use piecemeal viewer input to create complete news stories.I think this will not damage the value of professional news as it may affect people to focus on the global issues more.

References:

Chris Anderson (). The Long Tail. Retrieved from https://www.wired.com/2004/10/tail/

Steven Johnson. (Jun. 05, 2009).

How Twitter Will Change the Way We Live. Retrieved from http://www.time.com/time/printout/0,8816,1902604,00.html

Matthijs van den Broek. (July 11 2006).

Gatekeeping wordt: gatewatching. Retrieved from

http://www.denieuwereporter.nl/2006/07/gatekeeping-wordt-gatewatching/

Wk6: iOS or Android mobile?

Pia

“Which system do you prefer when you decide to get the new phone?”

Today, most people would choose a phone based on the system at first. As the quality of the system will affect the convenience of life. Unquestionably, It’s an era when information technology rapidly develops and We don’t want to waste too much time to wait for the phone system loading.

The phone developers created ten smartphone system but only two mobile phone systems dominate the market – Apple IOS and Andriod. These two platforms accounted for more than 99 percent of all new smartphones shipped over the last year, and that rose to 99.7 percent in 2017, according to IDC. Evan BlackBerry makes Android devices now. So why are these two platforms so pop?Let’s delve into the key differences between the two systems.

when you turn on the Apple phone it already had lots of applications right out of the box to use. The Apple phone concept is simple and easy to use. Apple defines everything that is on the phone.Apple phone used to not allow install the extra app as the users can be protected from suspicious sources of harmful software. Apple’s network would be more feudal. A year after the iPhone’s introduction, Apple launched the App Store which means Apple wanna build up the apple network.The hope is to strike a balance between liberal systems and feudal systems. Also, outsiders could write software for the iPhone and be setting the stage for a new round of revolutionary VisiCalc now.

We often call Apple’s software ecosystem a ‘walled garden’ because of the Apple fiercely controls what can come in and leave for that matter.Apple’s review of all the apps and verification of the identity of app publishers.

“Smart mobile devices to better recognize user’s preferences and requirements.”

Conversely, Android system is freer than iOS. Android system is based on the Linux kernel development and use of Java programming language.It led to the interface has endless changes.Android created a free and open source mobile platform that any coder could write for and any handset maker could install since the system is easy to manage.

Nearly any new phone will be able to run Android such as Samsung.The phone evolves since users add apps from indie developers to take advantage of the seamless Web access.

However, Android is not a very safe than iOS as it has many bugs that easy to hack in.“Pulse Secure’s 2015 Mobile Threat Report put the figure at 97 percent of all mobile malware, while the US Department of Homeland Security estimated in 2013 that just 0.7 percent of malware threats were aimed at iOS – and while this is partly because Android has more users, it’s mainly because it’s simply an easier target.”

Android’s connection to the Google ecosystem of services is strong and arguably more useful compared with Apple’s cloud services suite. It’s easier to break into Android, and malware writers will almost always go for the low-hanging fruit.

Actually, some Android phone would provide another system to fix bugs Such as Samsung S8+. I tend to use the Android phone since  Android connect Google drive and it easy to manage my google accounts.


 

 

“That is the re-creation of the Internet. That is the re-creation of the PC story,” Schmidt told business leaders at the World Economic Forum in Davos a month after Christmas.

Smartphone is like a private little computer in your pocket.Easy to carry and manage your stuff simply. It’s also the new way people want to connect with each other.

References:

Daniel Roth( July.23.08.). Google’s Open Source Android OS Will Free the Wireless Web Retrieved  from https://www.wired.com/2008/06/ff-android/

Jonathan Zittrain(February. 4, 2010). A fight over freedom at Apple’s core Retrieved fromhttps://www.ft.com/content/fcabc720-10fb-11df-9a9e-00144feab49a?mhq5j=e3

Diffen.com (Nov 17 2017). Android vs iOS Retrieved from https://www.diffen.com/difference/Android_vs_iOS
Simon Hill  ( October 24. 2017).Android vs. iOS: Which smartphone platform is the best?Retrieved from https://www.digitaltrends.com/mobile/android-vs-ios/

 

Wk 5: The value of the Creative Commons and the streaming service provider Spotify .

swift-lookvid4

“In my opinion, the value of an album is measured by the artist’s efforts, and the price in the market is determined by the artist’s (or the affiliated company’s) opinion. It is the same now and the future will always be.” The music streaming on the Internet has robbed the sales volume of physical albums like robbery, making artists have to come up with more ways to deal with such problems. “

Taylor Swift  Wall Street Journal on July 2014


In 2014 July, Taylor Swift removed all of her music from Spotify to defend the value of creating music.This immediately aroused numerous fans and music streaming company to restore.She also mentioned in the article that free music and the meaning of music itself have conflict.

So do the streaming service provider Spotify right to provide the sharing service to people freely? Do they have infringed copyright?

Spotify is the world’s largest streaming music service provider what offer two levels of streaming music: Spotify Free (160kbit / s) and Spotify Premium (320kbit / s or more).The premium version of the paid subscription has no ads throughout, enhances the quality of the music, and allows subscribers to download for offline listening. In addition, there is a Home Premium subscription for six accounts.After the download of Spotify, the song will be encrypted and can not be heard as normal MP3 on other players. So worry about the copyright.

ezgif.com-add-text (1).gif

Artists on Spotify can get an average of just under a penny of revenue per stream on the streaming service platform which according to the Spotify website is exactly $ 0.006 to $ 0.0084 on an on-demand basis.This kinda a small amount of revenue for artists but for famous artist such as Taylor Swift, it’s a way to make millions. Spotify has revealed that a singer’s worldwide best-selling album has earned $ 425,000 in streaming service for a single month, while albums such as “1989,” a record-breaking sales record, will surely be more lucrative. In addition, Spotify claims 70% of its revenue is used to reward the music industry, allowing revenue to flow back to the copyright owners, publishers, wholesalers and more.They distribute approximately 70% of total revenue to rights holders, who then pay artists based on their individual agreements.

“Music is art. Art is not only important and also has its own rare of precious value. This is why precious things should be paid such as music. I also think that artists and their record company will realize the meaning of an album’s price and hope they will not underestimate themselves and their own value. “

Taylor Swift  Wall Street Journal on July 2014 As Taylor Swift said art is important and has its own value that consumers should be paid for. However, Taylor Swift forgot the global industry trend. Now is no longer just selling but the value of innovation and creative marketing. It all based on network effect of aggregation today. Spotify offers an unlimited subscription package, close to the Open Music Model (OMM)—estimated economic equilibrium —for the recording industry. According to data from Norway, 900 million downloads of 1.2 billion unlicensed songs in 2008 are down from 210 million in 2012. Spotify has proven that provide streaming service is giving free and legal choices and people will reduce piracy.

BBC Music Week editor Tim Ingham wrote: “Unlike buying a CD or download, streaming is not a one-off payment. Hundreds of millions of streams of tracks are happening each and every day, which quickly multiplies the potential revenues on offer – and is a constant long-term source of income for artists.”

Under the Creative Commons, Spotify confirms the truth of streaming service develop a new digital economy and legalize sharing.


The future of entertainment is in the millions of niche markets at the shallow end of the bitstream.

Chris Anderson

 

References:

Chris Anderson (). The Long Tail. Retrieved from https://www.wired.com/2004/10/tail/

Kelly, K. (2008, May 2). BETTER THAN FREE. Retrieved from https://www.edge.org/conversation/better-than-free

Jonathan Zittrain (2008 February 20).Chapter 6: The Lessons of Wikipedia. Retrieved from http://yupnet.org/zittrain/2008/03/16/chapter-6-the-lessons-of-wikipedia/

Adamr . (2012.August .12).How Musicians Can Use Creative Commons.Retrieved fromhttp://diymusician.cdbaby.com/musician-tips/how-musicians-can-use-creative-commons/

 Lawrence Lessig .(n.d).Chapter One: Creators Retrieved
from http://www.authorama.com/free-culture-4.html