Wednesday, October 24, 2007

The Unabomber

Ted Kaczynski bombed people for nearly 18 years. He bombed, killed and maimed innocent people. He's against technology altogether. Ted had 25 victims in his bombings. He killed three of them and wounded the other 22 people with his mail bombings. David Gelerneter was one of the people target by Ted K. and ended up losing some of his fingers. I think David was tareted because he is a Computer Science proffesor at a University. Many people believe that Ted Kaczynski is a madman because he did all this bombing. To a degree he is, but he is a very smart man. He went to UofM to study Mathmatics and then got into Harvard to study Mathmatics even more. Many of the Unabombers targets had to do with people who had a lot to do with Technology and had at least a little influence in the technology field.

Friday, October 19, 2007

October 19, 2007

Social Networking: focuses on the building and verifying of online social networks for communities of people who share interests and activities, or who are interested in exploring the interests and activities of others, and which necessitates the use of software.

Infrastructures: generally structural elements that provide the framework supporting an entire structure. The term has diverse meanings in different fields, but is perhaps most widely understood to refer to roads, airports, and utilities.

Hardware: is a general term that refers to the physical artifacts of a technology.It may also mean the physical components of a computer system.

Software: is a general term used to describe a collection of computer programs, procedures and documentation that perform some task on a computer system.

Ethics: (via Latin ethica from the Ancient Greek ἠθική [φιλοσοφία] "moral philosophy", from the adjective of ἤθος ēthos "custom, habit"), a major branch of philosophy, is the study of values and customs of a person or group.

Intellectual Property: is an umbrella term for various legal entitlements which attach to certain names, written and recorded media, and inventions. The holders of these legal entitlements may exercise various exclusive rights in relation to the subject matter of the IP. The term intellectual property reflects the idea that this subject matter is the product of the mind or the intellect. The term implies that intellectual works are analogous to physical property and is consequently a matter of some controversy.


Stealing WiFi probably shouldn't be illegal but also should be illegal at the same time. It kinda depends on the situation. If your neighbor has WiFi, and its not secured, it should probably be their fault for not securing their network. Same thing applies for coffe shops like StarBucks. If they aren't smart enough to secure their network so that only paying customers can get it, it shouldn't be the the person's fault for "stealing" it. But if its a BIG company, like Ford or GM car plants, it would probably be easier for them to leave it open then to secure it because of the different levels of authority. So if you steal from large company buildings, like Ford or GM, it should be illegal.

Friday, October 5, 2007

"Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.

Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs." (http://www.wipo.int/about-ip/en/)

Digital rights management (DRM) is an umbrella term that refers to access control technologies used by publishers and other copyright holders to limit usage of digital media or devices. It may also refer to restrictions associated with specific instances of digital works or devices. To some extent, DRM overlaps with copy protection, but DRM is usually applied to creative media (music, films, etc.) whereas copy protection typically refers to software. (http://en.wikipedia.org/wiki/Digital_rights_management)

Jamie Thomas went to court on Tuesday, October 2nd, 2007 for stealing and sharing music illegally. She claims that she never shared her music for free using Kazaa and also claims she doesn't even have a Kazaa acount. The case ended late Thursday night with Thomas losing the case and owing the music compainies $220,000, more than she would of had to pay if she setteled it out of court.

Wednesday, October 3, 2007

Evaluation of Ready.gov

Ready.gov is a good website. It helps out in most cases. Most of it seems to be common sense of what you should do in case of an emergency. It also helps out by letting you know what to do in situations that you are not familiar with, such as terrorists attacks or what not. The website probably costs $500 or so a month to keep it updated in the latest information about the different emergencies. People who use this website are probably one's that need a little extra help to get certain supplies for different emergencies.