Skip to main content

Home/ StJulians_ITGS/ Group items tagged machines

Rss Feed Group items tagged

The Zhan

Kodak declares bankruptcy: The company that captured the 20th century (Photos) - 0 views

  • Unable to keep up with the 21st-century transition from film to digital technology, Kodak listed a debt of $6.8 billion
  • Kodak has been felled by exactly what it espoused: universal access to cameras.
  •  
    The main social and ethical issue that this article brings up is that of people and machines. The fact that Kodak has declared bankruptcy is hardly surprising, as though they were the company who worked so hard to develop the world of photography, they have failed to develop themselves in order to adapt to the new world of photography, while other companies such as nikon, samsung etc, have by constantly creating new digital cameras with new attractive features. This article is recent story of how Kodak are trying to sue Samsung for potentially infringing one of their patents: http://www.bbc.co.uk/news/technology-16631710 This article is prime example of how having an innovative idea is simply not enough to be successful over an elongated period of time: Just because Kodak had the idea of digital photography, that does not mean that they did not have to compete with other companies to remain the leading brand in photography. It seems to me that Kodak's complacency after having had the idea of digital photography led to their downfall. Explain the relationship between the IT system (digital photography) and the social/ethical (people and machines) The article shows how for the the public to continue to have an interest in machines such as digital cameras, they must continue to be developed, improved, updated and upgraded, as the appeal of new technology attracts customers. In this case, Kodak failed to keep up with the rate at which the world of digital photography is evolving.
  •  
Jorge F1

Israeli hacker retaliates to credit card hacking - 2 views

  •  
    An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
  • ...1 more comment...
  •  
    One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
  •  
    Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
  •  
    I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
Mr Brooke

Skilled robots set to infiltrate schools and military - The National - 2 views

  •  
    As technology is increasing, robots are becoming more and more used in our society. This has impacted our world in many ways such as more machinery is being used in order to produce goods. This can lead to unemployment since less people are required to work in this industries as machines have taken the role. "The latest version of Honda's Asimo robot is reported to be able to distinguish between the voices of three different people spoken at once by using a combination of face recognition and sound analysis" By this quote taken from this article, we can see that robots are starting to resemble more to humans such that they can now distinguish between voices of three different people spoken at once. This is a social and ethical issue since machines such as robots are taking the role of human beings. The question is, for how long more is technology going to continue to increase? Are human beings on their way to extinction?
  •  
    As the article states, there are numerous robots that could perform tasks such as serving drinks (Asimo), teaching psychology (Nao), and replacing infantry (Petman). There is a danger of becoming overly dependent on technology. As we have discussed in class, the inherent characteristics of computers are that they will only do what they programmed to, regardless of the identity and intentions of the user. Also, both the computer and the user (if not equipped with appropriate technical know-how) become very vulnerable if the system malfunctions in a way that was not predicted. In tasks too dangerous to be directly undertaken by human beings, such as operating valves at the Fukushima Daiichi nuclear power plant, robotics become essential. Companies need to strike a balance between commercialisation and what is truly necessary for the benfit of humanity.
  •  
    In the field of medicine, robotic surgery is becoming increasingly popular: http://futureoftech.msnbc.msn.com/_news/2012/01/13/10150612-robot-surgeons-may-get-upgraded
Jorge F1

DNA link led to sex attack arrest - 4 views

  •  
    The national DNA database proved "uniquely crucial" in an investigation that led to the conviction of a sex attacker in Essex. But police fear the service that helped to link Lawrence Button to the sexual assault of a former University of Essex student, in 2009, may be scaled back.
  • ...3 more comments...
  •  
    This article compromises the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter. It was a matter of fortune that Button's DNA had been collected due to his arrest for a domestic assault in May 2010. This is because according to the Protection of Freedoms Bill, biometric material can only be retained if the holder consents it formally. This consent "can be withdrawn at any time". There are also strict regulations on the amount of time that a DNA profile can be retained by authorities according to the new Bill. In addition to that, what way is there to ensure the 62 million(http://en.wikipedia.org/wiki/United_Kingdom) British citizens have their DNA profile taken and input in the database? This compromises the integrity and completeness of the DNA database. According to the article itself, "The national database is believed to hold over five million DNA profiles". The new Bill also "requires schools to get parents' consent before processing children's biometric information" (http://services.parliament.uk/bills/2010-11/protectionoffreedoms.html) The full official bill on the regulation of biometric data can be found at: http://www.publications.parliament.uk/pa/bills/lbill/2010-2012/0099/lbill_2010-20120099_en_2.htm#pt1-ch1-pb1-l1g1 Hence the sweeping statement "The odds, we were told, were over a billion to one, so we were quite confident we'd got the right man", is certainly misleading, because the database is likely not to include a fraction of the British population. The most disturbing thing is that the responsible chief Richard McNamara states "it was the DNA alone that convicted the man, because we never had any other evidence". Is it really ethical to convict a criminal solely based on a potentially incomplete database? A solution to this problem would be to enforce surveillance systems and active police monitoring in order to obtain more plausible evidence.
  •  
    This article regards the compromising of the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter.
  •  
    "The Zhan" you raise some interesting points on the privacy issues of DNA databases. However I think you may have misunderstood the reliability issue of the DNA test. When two DNA samples are found to be the same then it is 99.99% certain that it is in fact the DNA of the suspect and is a very reliable indicator that it was that person. There are forensic issues involved in the collection and contamination of DNA samples from a crime scene but that is another issue. The main social and ethical issue here that you have rightly pointed out is the collection and storage of DNA from people. This article outlines some of these issues from 2008: http://news.bbc.co.uk/2/hi/uk_news/7177152.stm Here the issue of innocent peoples data being stored has come because ....."following a change in the law in 2001, all DNA collected by forensics - for whatever purpose - can be stored permanently. " It was promised in the recent election in the UK to destroy old data but it appears to be one of the many U turns that the current government has made: http://www.telegraph.co.uk/comment/telegraph-view/8659968/A-Bill-to-curtail-our-liberty.html
  •  
    I agree with your first point to some extent, but I think that implying that it DNA profiling is 99.99% accurate is when in fact it is 99.9999999999% accurate (one to a trillion sir, get it right), is not acceptable - according to this http://www.guardian.co.uk/commentisfree/henryporter/2009/may/25/dna-database-false-positive I think that retaining DNA samples in databases and profiling an individual in a pervasively detailed manner could lead to extremes such as that of convicting criminals for pre-crimes, as portrayed in the film Minority Report. That would heavily compromise a citizen's privacy. http://3.bp.blogspot.com/-I7tBjrA8Mj0/TWPfWNY9-0I/AAAAAAAAADg/QTXlFpTtNvM/s1600/MINORITY+REPORT.jpg "The US government has come up with a Big Brother-esque machine that senses if an individual intends to do harm". The system, "Future Attribute Screening Technology (FAST), determines if a person intends to do harm by using a mal-intent algorithm that uses data from sensors that monitor a person's physiological and behavioral changes." http://news.techworld.com/security/3309928/tom-cruise-pre-crime-minority-report-machine-brought-to-life/
  •  
    Good find Zhan! Would be interesting to see what the bods in the maths department have to say about "adventitious matches" and statistical probability. Maybe any of you who do HL maths can follow it up and add to this? Nice to see a reference to some classic sci-fi as well. This is a favourite read of mine. Also one of my all time top ten films! http://en.wikipedia.org/wiki/Do_Androids_Dream_of_Electric_Sheep%3F http://www.imdb.com/title/tt0083658/
Fiche Galinha

Will A Machine Replace You? - Forbes.com - 0 views

  • Will A Machine Replace You?
  •  
    Interesting article that gives a good overview of employment concerns. It is a little unbalanced in the sense it does not offer the other side of the story. But this makes it a good starting point for discussion
Ines Simon

Apple's Siri curses out 12-year-old - 2 views

  •  
    Someone reportedly tampers with a demo iPhone 4S so that when a 12-year-old boy picks it up and asks Siri a question, she is not amused or amusing. She tells him to 'Shut the f*** up.' Read this blog post by Chris Matyszczyk on Technically Incorrect.
  •  
    The main social and ethical issues are integrity of the system, security, and people and machines. Although I do not own an iPhone 4S, I would imagine it the product had been hacked and its set-up instructions had been reprogrammed by a user who is extremely knowledgeable on issues such as encryption and programming know-how. Perhaps because the iPhone referred to in the news story was a "demonstration" version, I suppose its encryption levels are not as powerful as the real product (Apple would have to invest less money in manufacturing). However, there is a much simpler explanation, according to "MacTrast" (http://www.mactrast.com/2011/12/siri-tells-twelve-year-old-to-shut-the-fck-up-after-pranksters-tamper-with-display-iphone/): Simply changing the name in the contact card by verbalising it (asking Siri "Call me (insert ridiculous statement here)") allows the user to tamper with the phrase voiced by Siri, without having to deal with complicated encryption or validation processes. This means the system itself is integral and works correctly, but the given primary contact's nickname is has been inappropriately altered. To solve this problem, the company should enforce the security of its demo versions of the Siri for iPhone 4S by impossibilitating a deliberate change of contact names and redistribute them across retailers.
The Zhan

Device Tracks Blood Flow in the Brain - 2 views

  • A headset ultrasound monitor could make it easier to detect the dangerous aftereffects of brain injuries.
  • The company's monitor consists of a headset that directs an array of ultrasound beams through the head and uses a proprietary algorithm to automatically detect the mid-cerebral artery, one of the major arteries supplying blood to the brain. The device then locks the relevant beam onto the artery and measures its blood flow. A machine attached to the headset gives an index of flow and peak velocity.
  •  
    "A new ultrasound device could make it easier to detect a potentially life-threatening condition". An excellent example of data-logging applied to a practical real-life situation.
  •  
    The invention of this device will drastically improve the monitoring of brain related injuries and in particular the one mentioned in the article - vasospasm. The fact that nearly 50% of soldiers who sustain blast injuries can potentially develop vasospasm is more than enough reason for there to be plenty of funding towards the development of this device. It says in the article that "the company plans to make a more rugged version of its commercial device for the battle field." If the company manages to actually develop this, the amount of soldier deaths in the battle field will decrease as the soldiers will be able to get treatment sooner. Within this development the company could have the data be live streamed to the doctors so that they can analyze the data to see if there is any problem. The data can then be stored so that the patient's development can be recorded. As the device is measuring the blood flow in the brain this could also be used to analyze the soldiers brain whilst on the field. This could contribute to developments in other studies of the brain like post-traumatic stress.
Mr Brooke

BBC News - Soldier Andrew Garthwaite to get bionic arm controlled by mind - 2 views

  •  
    Criterion B . Describe, step by step, how the IT system works. 1. Surgically implanted nerves are connected to electrodes placed on the chest area. 2.The nerves prompt electrical signals from the brain to the electrodes. 3. The electrical signals are then interpreted by a micro-processor, into natural movements. More information on how bionic arms work: http://thetartan.org/2008/9/22/scitech/howthingswork
  •  
    Outline how this IT system works: Essentially, this system consists of hardware (electrodes) that replace the nerves going to and from the brain. Electrodes are connected to the chest muscles which control 6 motors that move the prosthetic joints. When the mind sends a message through the nerves to move a muscle in the arm, the signal causes a muscle in the chest to contract, which activates a certain electrode to tell a motor to move a part of the bionic arm. A more detailed account of how mind-controlled bionics works is here: http://science.howstuffworks.com/bionic-arm.htm This story is a prime example of how IT is being used to radically develop medical research and treatments.
  •  
    The main social and ethical issue in this article is People and Machines. This new bionic arm which is controlled by the mind is an important development, in this technology, now allowing people who have had to have limbs amputated to have new arms/legs that they can control as they would their original arms/legs. However, due to the fact that it is very new and expensive technology to develop, although it points to the future, at the moment almost no one that would need a bioninc arm would be able to afford it. This means that although it is an essential step forward, at the moment it will not be something that can help the majority of people who most need it. As well as this, the bionic arm, although it is controlled by the mind, it will never be as fluid and will never work as intuitively as your arm.
Mr Brooke

What's in electronic devices? | Greenpeace International - 3 views

  •  
    1.11_people_machines 2.3_environment 2.3_ewaste 3.1_hardware
  •  
    1.11_people_machines 1.9_policies 2.3_ewaste 3.1_hardware
  •  
    I could never thought that such things could lead to such problems! This social and ethical issue (people and machines) is surely affecting the world around us, not only use but the environment as well. Not everyone is aware of this, that these electronics can lead to a lot of harm! Yet, even if more people would be aware of this, I don't think anything special would be made to reduce so many pollution and harm to the society as people are becoming so dependent of technology that eventhough they would like to reduce such pollution, they wouldn't abdicate their electronics in order to reduce pollution (in my opinion) Furthermore, technology has been increasing rapidly and will continue to increase even more. This means that more pollution due to more electronics will be made. The question is, for how long will Earth continue 'alive'? Because by this passe, how technology and pollution is increasing drastically, not many more centuries.
Jorge F1

BBC - Newsbeat - Sim cards used to send thousands of spam texts blocked - 0 views

  • Never reply to spam text messages (if you do it just confirms your number exists and you're likely to get even more) Forward any spam messages to your operator (most of them have dedicated text numbers you can send spam to so they can investigate where it came from) Always be careful about handing over your mobile number, especially online (you'll often need to untick small boxes in forms if you don't want your number passed on)
Mr Brooke

What's the carbon footprint of ... email? | Environment | guardian.co.uk - 4 views

  •  
    "What's the carbon footprint of ... email?"
  •  
    The news article mainly addresses the issue of people and machines, although the use of email has numerous advantages, it is affecting the environment and speeding up the greenhouse effect. However, the main cause of the high carbon footprint is predominantly due to spam emails; each spam email creates 0.3g of Carbon dioxide if you times this by the 62 trillion spam emails sent globally it is equivalent to "driving around the Earth 1.6 million times". Here is a link to another news article which breaks down the several aspects of email and shows their impact on CO2 emissions: http://news.cnet.com/8301-1023_3-10220363-93.html
Mr Brooke

Rise of the robots and the future of war | Technology | The Observer - 1 views

  •  
    Excellent piece on UAVs lots of links and some discussion of ethical issues
1 - 15 of 15
Showing 20 items per page