Friday 25 November 2016

Week 13: What exactly is FUN?


Now there is no gun pointed to your head, but in my opinion, do yourself a favour and play the video! All in good FUN. 

Looking at my first post, I've realised that it has been an interesting semester learning about the Internet and technology. Being naive and ignorant then (arguably still is?), I was skeptical with this module and was somewhat nervous as to whether it would turn out like CSE 111. Adding further to it being a prerequisite module, I felt like this module was a dread.... 

As days, weeks, months went by and with each new blog entry, I learn something new each day. I also found myself paying more attention to technology news on the latest news for a better scoop that relates with the week's topic in my blog. Like my peers, technology and the Internet has always been a part of my life and as I've blogged earlier, my best friend... So I guess it does not hurt to learn more about it. 


One of my favourite part of this module is allowing my inner adrenaline-rushed blogger to spill out. It was such a journey :) On top of that, I was able to better grasp on the topics went through in class. Personally, I believe that it is a good assignment/homework as students are then not bounded to a certain topic, venture out and learn more on their own! On occasions that I found myself uninspired, I was also able to learn some new things covered by my classmates. One of my favourite post is by my classmate Sherry, here. It was really interesting and I hope you check it out :) 

And the point of the song I've asked you to play earlier? I believe it embodies this very component in the syllabus. The requirement of weekly blog updates.
F is for Friends who do stuff together. 
U is for You and me. 
N is for anywhere And anytime at all.


Week 12: Hi Microsoft?

With the ending closer in view, we touched upon how understanding the brains behind our biggest innovations of our times can help understand where we are heading towards the future. Dubbing them as the BIG 3, Apple, Microsoft and Google were highlighted and we learnt how they dominated the market and are able to stay relevant in this age of fast-paced, creative and ingenious innovations being brought out. 

Keep in mind that Alphabet is the parent company of Google
However, there was one that I was really unfamiliar with among the BIG 3. You know what they say, once you go Mac, you don't go back. So, I took it upon myself to learn more about Microsoft and what was their latest news whether it being innovation-wise or expansion-wise.

In latest news, Microsoft is acquiring LinkedIn! 

As the social network for professionals with some 433 million users, LinkedIn will be part of Microsoft’s productivity and business processes segment but will maintain its branding and product. Via the all-in-cash acquisition of $26.2 billion, or $196 per share, this is the biggest acquisition since Satya Nadella was appointed the CEO for Microsoft in 2014. In his words, Nadella aims to accelerate the growth of LinkedIn, as well as Microsoft Office 365 and Dynamics. 


"But why LinkedIn? As social media platform that aims to connect working professionals, what can it offer Microsoft?" Those were the two questions at the top of my head, these two seem like completely different platforms focusing on different objectives.

Upon further googling, the Verge suggests that it is a "key way to boost the company's social networking presence". Having learnt that Microsoft did invest in Facebook back in the days, as well spent $1.2 billion on Yammer back nearly four years ago, Microsoft has struggled to break into enterprise social networks. 

From my perspective, I really hope that works out for Microsoft because that's a whole lot of $$ for an acquisition and with LinkedIn having 433 million users, I really hope their users are active (lol) 

Subsequent reports also suggest that this is great move for Microsoft to push out its products (i.e. softwares). According to Jasmine Sandler, CEO of Agent-cy Online Marketing, a B2B social media marketing agency and training business:
They are taking on a company that is the leader in B2B social networking and has an embedded user base (for any Microsoft products) of over 433 million captive global business professionals,” Sandler said. “The M&A makes a ton of sense in that they have common customers and can both expand their offerings and value to them.

The combination of Microsoft’s and LinkedIn’s graphs show the complementary nature of this deal. Adding the equation where LinkedIn had acquired Lynda.com (an online learning tools website),there is hearsay that Microsoft may leverage on that to sell their software products and provide assistance in learning to use them. So kudos to you Microsoft!
 
All the best?

Sunday 20 November 2016

Week 11: What We Have, Or Should Have, In Common With Technology

Like us, the Internet is constantly growing and evolving to be ever than before.  From our last blog post, one of the fundamental and similar features of IoT applications shared is the use of technology gathering data in order for us to better complete task(s) as well as minimise distance between ourselves more efficiently and at a lower cost. Through this, it is needless to say how via ever-changing technologies can help and further facilitate changes in how we live, consume and produce things.

But as we leverage on this very advantage that technology can provide us, technology has not halted and it is constantly improving. To understand such an important phenomena (i.e. how technology keeps improving), it is important to take a look at one of these models called DIKW. Often cited as a widely recognised, yet 'taken-for-granted' information management model, it seeks to explain how streams of data can moves into stages which eventually falls into wisdom. One good quote I was fondly reminded of as this model was briefly mentioned in class is this: "Wisdom is not knowledge. Therefore it’s not knowing that 2+2=4, but how/why 2+2=4"

The DIKW refers to Data, Information, Knowledge and Wisdom with components of actions and decisions. By referring to the model, we can understand how data goes through each stages/hierarchy of stages before reaching to wisdom (where most innovations occurs). In an attempt to better understand, allow me to explain each stage as briefly as possible with some whimsical scenario. 


Think of scenario where you last had a petty argument with a significant other over how you are always late in meeting him/her (you're not late, that person is simply early). ANYWAYS, both of y'all dropped the argument for a later time... with that later time being later that night. As you lay in bed and about to tuck in, you receive a message from your boo.

Data

Represented by symbols, stimuli, signs or signals, the data simply exist with no meaning attributed to it whatsoever. As for the scenario we have imagined above, the data presented in this stage is the 'ding' sound you receive on your phone when you get a message.



Information 

Data presented then moves on to the information stage where we can articulate what the message means. As such, this information becomes useful and is able to serve a function. In this case, we open the message and try to understand the underlying meaning in the message.


Knowledge

In this stage, we understood the message as a passive aggressive strategy on their part to restart the argument. Feelings might start to boil as you can choose come up with a message to counter that passive aggressive message, apologise for your tardiness and make an effort not to be late again or ignore the passive aggression and go to sleep instead. As we all know from past experience, unresolved issues can lead to arguments being brought up in the future as we can recognise the patterns of communications of our boo. 

 

Wisdom 

As mentioned, we can learn from past experience the patterns of communication that emerge through interaction. In this case, we have three options to choose from: 

A: Be passive aggressive and reply with a K. 
B: Ignore the message and go to sleep. 
C: Take the high road and ...


Because we all know our boo's too precious to lose over a petty argument like that. Words of advice, a wise friend once told me that if you ever faced with an argument, ask yourself: "Will it matter in 5 years time?" 

Spoiler: This won't. 

Characterised as having the quality of experience, knowledge and good judgment, being wise requires critical thinking and choosing the right battles to fight in order to get the best outcome one wants. With critical thinking, it enables us to process, analyze, and understand knowledge or the data by itself is worse than useless. 

While ignorance can be bliss, ignorance breeds misunderstanding and misuse of data which in turn can lead to knowledge not fully being utilise properly. This in turn creates a chain effect where no good outcomes can further be reproduced. 

In the technology world, this could then lead to the lack of innovation and technology may never improve. As such, technology as well as humankind should always aspire to keep improving. I will, indefinitely.  :)


Wisdom is not knowledge. Therefore it’s not knowing that 2+2=4, but how/why 2+2=4.

Source : http://www.coolnsmart.com/wise_quotes/
Wisdom is not knowledge. Therefore it’s not knowing that 2+2=4, but how/why 2+2=4.

Source : http://www.coolnsmart.com/wise_quotes

Friday 18 November 2016

Week 10: It's Bigger than We've Ever Imagined

As the Internet becomes more widely available and is my bestfriend, the cost of connecting is steadily decreasing with more and more electronic devices having wi-fi and sensor capabilities being built into them.  Factor in how technology and manufacturing costs are going down, the market for smart devices is sky-rocketing. As such, this creates the perfect environment for inventors, entrepreneurs, engineers and even you and me to contribute to IoT (a.k.a Internet of Things).

Although this concept, coined by Kevin Ashton in 1999, is not new, IoT is becoming ever prevalent and even more relevant in this digital age. We've seen google glasses to smart refrigerators being introduced to the market, we're entering a world where our future is far from what we can imagine because the "next big thing" is always around the corner.

An overview. Credit: goo.gl/VjueYa

 

But what is IoT? 

Quite simply, IoT is a concept where it revolves around the communications between any devices that are connected to the Internet and to each other. It is built on cloud computing and networks of data-gathering sensors that creates this convenient, transportable, transferrable and instantaneous connection for people to people, people to things or to things to things.

As I was learning more about IoT, I came across this TedTalk with this humourous speaker that gives an incredible overview (but not overly simplified) version of our lecture we had in class. For a better understanding, check it out!



As the new rule for the future becomes: “anything that can be connected, will be connected, ” How does it/has it impact folks like us?

1.  Got green fingers?

Now who said technology can't contribute to our environment? Well known for the current range of drones, Parrot, created this ultra fabulous sensor called Flower Power. As a wireless device planted next to one's flowers, the sensor analyses sunlight, air temperature, fertilizer level, and soil moisture. This data is then collected and transmitted via Bluetooth to one's smartphone where one is then alerted on what the plants need. Cute name for a technology, but be warned it comes with a price tag of a whopping U.S. $89 -- which is pretty generous considering the amount of things you can plant, save the environment don't you think? (Yay consumerism!)


2. Keep losing your sh*t? 

If you're like me, I've mentioned here how I'm always misplacing my harddrives, phones, and basically anything I have in sight (or out of sight hahahaha k lame joke but definitely a set up for this pun), GearEyes is ONE. OF. THE. GREATEST. INVENTIONS. I'VE. EVER. SEEN. Because just look at this beauty, not only does it help and organise one's stuff, it helps track it too so users (a.k.a me, a.k.a potential buyer) can be sure that I will always have what I need when I need it. By using RFID stickers that is then placed onto a device/thing of one's choosing as well as an app, the app tracks where the item is located and alerts the owner when it is left behind/out of range. Now, hold your horses because it is still on kickstarter but it has already achiever almost 210% of its pledged goal. Not even out yet and already in demand.... I know what I want for my next birthday. (Be sure to pledge guys, help people like me get organised)


3. Interested in joining the Church of Iron?

If you're one of those people who like sweating for fun, what better way then to up your gym game with Smart Clothing! Also known as Athos, each piece of clothing has sensors built into them that measures the muscle activity using electromyogrpahy. Information gathered is then relayed to a "hub", which can be conveniently attached to the user's chest/leg and also to the app of one's smartphone. Users can than analyse their performance during their sweat party. How fun! Not sold yet? Now, not only do you get to sweat yourself off, kill those major frustrations in a healthy way, you get to look like a superhero. Now, isn't that a dream?




IoT is impacting almost every aspect of our lives, offering countless opportunities to ease our work, improve our performance, reduce cost as well as connect with others (/bridge the distances for long-distance couples) ((view at own discretion because inappropriate and NSFW to list down here)). As more and more innovations are being introduced to the world, I'm convinced the future is here and it is all thanks to the Internet of Things!

Week 9: The Reality in Marketing/Advertising

Let's rewind. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Can you imagine a time when the internet was just filled with just texts and hyperlinks?

How boring. 

How unengaging.

With the Internet and technology being the integral part of our lives today, we are constantly bombarded by information but part of that information includes multimedia which was the topic we delved into class this week. By definition, multimedia is computer information that can be represented through audio, video, and animation in addition to traditional media (i.e., text, graphics drawings, images). This is important as it helps catch the attention of receiver of the message (a.k.a YOU) among the streams of text constantly coming their way and it has been useful to numerous fields in our world. 

One good example is marketing and advertising. With multimedia used to capture attention of their intended audience, companies have become more aggressive and competitive in trying to steal the spotlight. 

Bet I made you stop to figure out what this is right?

It's a hand hovering over a red light and a brillant use of a multimedia ;)

Before we dive into how one such company has made used of an ever-evolving technology to market their goods (and further reinforcing consumerism into our society), we can't talk about multimedia without touching on Augmented Reality (AR) and Virtual Reality (VR)! 

From Oculus Rift, Google Daydream and even Pokemon Go, Augmented Reality (AR) and Virtual Reality (VR) has been gaining much hype lately. But what are the differences between the two? 

AR refers to a technology that layers computer-generated enhancements on top of an existing reality in order to make it more engaging by allowing users to interact with it while VR refers to artificial, computer-generated simulation or recreation of a real life environment or situation. Examples of the former include apps like Pokemon Go while the latter includes the famous Oculus Rift. 



It can be pretty easy getting mixed up with the two (as I was) but I was eager to learn more. AR and VR are really similar in terms of how they both leverage on the same type of technology and exist to serve the user with an enhanced experience of the information presented. How they differ however is through the purpose and delivery method. In terms of purpose, AR enhances experiences by adding virtual components as a new layer of interaction with the real world while VR creates its own reality that is completely computer generated and driven. With regards to the delivery method, AR can be used with hand-held devices that we use everyday (i.e. handphones, laptops, tablets) while VR requires an additional head-mounted or hand-held controller to connect people to the virtual reality. That being said, AR and VR do not necessarily operate independently of one another and are ofte used coinside each other to create an even more immersing experience. :)

Now that we have a better understanding of how technology has embedded itself into our reality, it is interesting to see how companies make use of such to capture their audience. 

If you have been reading my posts, then you'll know my love for make-up so it came as a surprise to me when Sephora announced a partnership with the leading augmented reality technology company ModiFace to create their very own Augmented Reality Makeup Artist




With this brillant scheme, (capitalism and consumerism is ever prevalent) the platform allows users to receive the same service from a sales rep without actually having to visit the store. Considering how more consumers prefer shopping online nowadays, it goes without saying how Sephora will see some major ca-chinggg rolling in. 

By uploading a photo via Facebook Messenger, users are directed to their most compatible shade of make-up. From lipsticks to foundation, users can explore the myriad of styles and how the look could work for them before actually buying the product. A win-win for the consumer and the company! 

1 point for you technology. 


PS. It is also worth noting how Sephora rolled this out on Facebook isn't it? Of all platforms to do so, social media... OH MY GOD. Smart move and 2 points for you Sephora. In the grand scheme of things, doing so just seems right as it not only increases brand awareness, it engages their target audience. And why? Because, U.U.A. (That's right, another shameless plug hehehe)

Sunday 6 November 2016

Week 8: Hackers and #Only90sKidsWillRemember

Before I start my adrenaline-fueled post once again ... One question: Did you miss me?


As weeks rolled by, the class covered Internet Security which I believe is one of the most important topics to talk about with regards to the technology and the internet (I mean, come on, the WWW was founded upon created a more secure network right? Remember our first lecture/my first post? ;) Haha) 

However, what intrigued me most during the lecture was hackers. I've always wondered what it was like being a hacker, how does one learn to become one and whether it always meant being unethical. 

Before this class and thanks to unrealistic media depictions, I always thought one needed to be smart and be great at computers in order to be a hacker. The common stereotype of a hacker always seem to be (at least to me), a loner nerd in a black hoodie straining his neck as his meticulously types in code after code on his keyboard. In reality, hacking requires more than just computer programming skills and social engineering skills... or so I've learnt. From my group's phishing presentation, I've learnt that hackers actually leverage on our human psychology and weaknesses in order to exploit for their own gains and benefits. Instead of finding out techniques to enhance our own security, understanding the different types of hackers in existence is just as important me thinks... 

Firstly, what is a hacker? 



According to PCtools, "hackers" refers to anyone who enjoys understanding, modifying and exploring programmable systems, particularly computers, systems and servers where these individuals bypass security measures, usually for malicious purpose or criminal activity.

So while most hackers are known for their malicious intent, hackers should not be put into a box and stereotyped into one group as there are a few different categories for them.

White Hat Hackers

Categorised as the "good" hackers, these computer security experts specialise in penetrating systems in order to ensure that the systems are well secured. IT security professional rely on constantly evolving arsenal of technologies in order to fight off the "bad" hackers. Working for online security or web maintenance, most of their tasks involve security checks, vulnerability assessments and penetration tests. In a way, you could say they're ethical hackers being as they are doing it not for malicious reasons.

Black Hat Hackers

Ah, don't they give all hackers a bad rep. With the help of the media, these hackers are depicted as actual criminals who are mainly known for specialising in breaking into networks/computers as well as creating computer viruses. Using exploitative methodologies of finding the path of least resistance, these hackers look for weaknesses in order to crack into systems with the main intent of getting monetary gains.

Script Kiddies

Not one to usually hack in order to gain information but rather make a name for themselves, these type of hackers borrow programmes, copy codes and use it for virus in order to deface websites or attack networks. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. Think of the group "Anonymous" who uses these type of attacks frequently.

Hacktivists

While some are motivated by politics or religion, others just with to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. There are sometimes known as the Blue Hats and bare similarities to the Script Kiddies. 

State-Sponsored Hackers 

As the saying goes, if you can't beat them, join them? Right? Exactly what the government is doing, they realise that that some hackers serve their military objectives. When it is all about controlling cyberspace, these hackers have limitless resources and funding to civilians, corporations, and governments. Ethical? Well, that's a controversial topic we might step into.

Spy Hackers

Usually hired by corporations to gain a competitive advantage and steal trade secrets from their competitors, these hackers hack from the outside or gain employment in order to act as a mole. They are quite similar to hacktivists, but their main agenda is to serve the goals of whoever is paying them.

Cyber Terrorists

Generally motivated by religious or political beliefs, these hackers intend to create fear and chaos by disrupting critical infrastructures. By far the most dangerous, these hackers are equipped with a wide range of skills and goals. Their ultimate goal? To spread fear, terror and commit murder, just 'cus.



While hacking need not necessarily be a criminal activity as mentioned above, the idea of knowing how so many viruses on the Internet is increasing is sad. As we touched upon the number or viruses and malware programmes increasing in this digital age, I remember a fond time.



While it has been close to 6 years since the world's largest and most popular peer-to-peer filesharing website has been shut down, it is still important to understand and be aware of the types of techniques used to violate systems. I will still remember this piracy machine and all the potential malware and viruses that masqueraded as media files I've downloaded in the past. Ignorance is bliss but today, bliss comes with a very hefty price tag.