Sunday, May 4, 2008

Final Writing

When I started to do service learning, I thought it will like an easy work. What I expected on the service learning was that just helped people who came to a computer lab. Compared to my expectation, my service learning was totally different.

Before I started the service learning, what I knew was that I had to change or remodel Open Hand's Event database. So I thought that this company might use mysql and postgres for its database. However, when I went there and saw their database, they were using Microsoft Access which I never use before. In here, I noticed that my expectation was wrong because I had to study how to work Microsoft Access.

At that time, my community partners want to change their database using an web application. So what I thought that I could use mysql and connect to django which I started to learn in Computer Society class. Then I did not have to study about Microsoft Access. I and my community partners made a plan to create this web application using django. During the making a plan, my community partners said before creating this web application, we had to get permission to their IT people.

From here, we had a conflict with IT people. I thought that IT people disagreed with our plan, so they kept complaining it. But thing is that one of their complaining was persuaded me. If we created the web application, there were no one to handle if it had a problem when I was not there. We took 3 weeks to make a decision for this situation.

What I felt was that this was not like a class project. When I did the class project, we built a program which a professor was asking to. However, the service learning was not. I had to think about all the cases including the future. Finally, I felt was that service learning was like a job because I had to listen to my community partners so I could get what they really want and their want could be changed easily. Also, after this service learning, I knew how to use Microsoft Access.

Sunday, April 27, 2008

Question 9.27

Accounting System - I think the accounting system need to test before it releases and uses. If the system develops with new skills and technologies, then there are many benefits compare to old one. However, if the error is occured in the system, the information may be lost. Then it makes critical problems to people who has their account. So this system needs to test as much as what developers can do. If this system is a perfect, then it will fine.

Game - Nowadays, many games are coming out. Compare to video games, I think pc games have more bugs than video games. The reason is that when the pc games come out, several games are not worked properly. I think that developers try to make a due day, so some of test are ignored. After a week from released game, the company provides some of patches which can solve the bugs. For games, it does not make critial problems compare to accounting system but it will give bad feeling to consumers.

Photo Sharing System - For this system, it will not give much of critical problems. However, the biggest problem will be a personal privacy. If a photo can affect to other people, then these people can have a problem with their live. So if a person who controls or manages this system, he/she needs to remove a photo which will affect to other people's live.

Sunday, April 20, 2008

Community Partner

The organization of community partner is Project Open Hand which has been providing "meal with love" to people living with serious illness and to senior in San Francisco and Alameda country and has served as a model for over 100 organizations over the world since 1985 (This is from Project Open hand website). Their main goal is to help people to eat because without eating, those who have serious illness people cannot take their medicine. This program is created by Ruth Brinker from her experience when her friend died of AIDS.
I work for Special Event for Project Open Hand to develop the databse and survey. Right now in the database, there are approximately 3000 volunteers' information. Last Friday, we finally send an survey email and we are getting a good respond. After done with this survey, we have to work on the database to make more friendly to community partners. Right now, they are using access to use the database, so we have to find out the easy way to use it. Also, we have to redesign the databse, too.

Sunday, April 13, 2008

1.
Technician - He have to understand how to use calibrating a fule value. He has responsibility to read a documentation and need to know which value will give a error before using the program because he will be the one who will use this program. Without test, this kind of problem
can occur. If he did the test, he would be put value zero.

Person who wrote the fuel-value calibration program - He has responsibility to check the program which works fine. When he modified or changed some code, he needed to bug from the beginning that changes works fine or not. Depending on how much time he spend to build this program, the bug time will be longer. He need to think all the cases that may give an error.

Person who selected and purchased - He has responsibility to know about the program. This program will use for his company. Then he needs to do research about the program and gets information. After that, when he purchases this program, he needs to check and run the program that it works fine or not. It means that this person should have some knowledge of this program that how does it work. Another option is that he can go with technician that he can check the program and if he says ok, then they can purchase the program. Or they can make an insurance for the program that if there is a problem on the program, the company of program will do something for them.

The software company that sells the network software - When the company sells the products, it needs to tell about the good, but also it needs to mention the bad or weak of the program.
Just saying about the good, then how the company will handle if the program have errors. Every program can not be a perfect because programs are humans that they can miss some of the cases. These cases may appear when users are using it. So they need to make some of way to handle this problems. For exmaple, the insurance may be one of the solve this problem.

The captain of the ship - The captain is controlled all kinds of things of the ship. Without his permission, this software can not install in the ship. So captain need to what the problem is all about and he need to ask a technician to test the program before installing it. And After installed the program, they have to test again to make sure it work correctly.

2. D-U-E Process
Describe - The first day of Service Learning, partners who are from the company and we (I and Derrick) decided to make a web application which controls the database. We want to use django to make it, but their ITS people disagreed with it. They just gave their own opinions that it would be not worked at all. We thought that it would be alright to build using django, but their opinions were very strong that we gave up to build the web application. Rather than making it, we got other job to do such as work on the survey and make Microsoft Access more friendly. What I felt was that it was really hard to convice people who are in the real world.

Understand - I could understand what their ITS people disagreed with the our way to make the web application, but what I thought was they did not listen to us. I thought that we could not solve their opinions which gave us some problems about the web application. This would be the biggest reason that they did not listen to us. We tried to figure out, but it was really hard to solve. We were doing service learning, not work for a job.

Encourage Communication- The acutal problems which ITS people came with are 1) who will fix or control the web application when it breaks down or it has a problem? they want to have a supporter after we leave. 2) How about the security? The content of database is very important to them, so they want to very secure. I never thought about this kind of problems before I met them. Also, ITS people said that they can make a web application for our partners, but it was only saying. After that, there was no action. I thought, this is kind of a failure when I was doing my service learning because I could not convince them. My expectation of service learning is changed a lot compare to before.

Sunday, April 6, 2008

Digital Information

a. I choose three sites which provides digital information such as musics and videos. For mp3.com, while vistors listen to music, they can watch advertisement. So they make money from advertisements. For Itune, they cost per song that consumer need to pay to download the music. Last one is cyworld which is from Korea. Many Koreans make their own website and decorate it. When they decolate, they have pay to buy decoration. Also, they can download the music. This is one of the legal website in Korea. These kind of website use their item or advertisement to make their money.

b. These kind of website give a freedom to consumers. Nowaday, new musics, Tv shows, or movies are kept coming out. Then consumers can listen to music or watch the Tv shows or movie when they want to do. For exmaple, rather than buy a music CD, consumers want to get what they want to listen to. Therefore, they download what they like to listen to. Once they download the musics and movies, they own the musics and movies because these are going to their hard disk and store them.

Sunday, March 16, 2008

Read The Cathedral and the Bazaar by Eric S. Raymond

1. The Cathedral and the Bazaar, a position paper advocating the Linux development model, was first presented and made widely available on the Web shortly thereafter. There are two singular approaches to software development. The Cathedral represents conventional commercial practices, where developers work using a relatively closed, centralized methodology. In contrast, the Bazaar embodies the Hacker Ethic, in which software development is an openly cooperative effort.

2. Linux and fetchmail both went public with strong, attractive basic designs. Many people thinking about the bazaar model as he have presented it have correctly considered this critical, then jumped from it to the conclusion that a high degree of design intuition and cleverness in the project leader is indispensable. He points out that a design is essential for successful bazaar project. A certain base level of design and coding skill is required. Of course, but he expect almost anybody seriously thinking of launching a bazaar effort will already be above that minimum. The open-source community's internal market in reputation exerts subtle pressure on people not to launch development efforts they're not competent to follow through on.

3. Yes, Raymond's characterization of styles of development is accurate. What I agree with him is that a design is really important as coding a software. If people easily understand design , they can easily use it. An open-source software is for everyone, not for individual. Another concept is that a project leader must have good people and communications skills. He mentions that in order to build a development community, you need to attract people, interest them in what you are doing, and keep them happy about the amount of work they are doing.

4. As we know, Linux is one of the success open-source project. This is an operating system that people can easy to use when they develop their software. Before I came to USF, I did not know about Linux. I started learn about it when I took CS110 class. First time, I really did not like using Linux because I did not know how do use it and, at that time, I was using windows. However, right now, I can use Linux and it is familiar. It is not hard to use it. Once you figure out how to do it, I think everyone can use it. Also, many developers use Linux. There are other such as source products are the web-server “Apache”, the internet address system “Internet Protocol”, and the internet browser “Mozilla Firefox”.

5. There is Redhat which give away the product, sell support and after sale service. Another project is Mysql which is open-source community version, and a for-pay enterprise version.
In addtion, there are Netscape and java that you give away your software to help sales of related and closed software.

Sunday, February 24, 2008

LAMP

The acronym LAMP is a group of words which use for web applications and server. This is usually free and open source software, so every programer can download and make their own web application using their own database. LAMP refers that Linix - referring to the operating system; Apache - the Web Server; MySQL - the datebase management system; PHP and sometimes Perl or Python, the programming languages. Also there are many different programming lanaguages such as ruby on rails. Thesedays, many people use LAMP to build their own web application and to show their talents. Also, there are many source code that people can use it for themselves.

Sunday, February 17, 2008

Exercise 3.4

The assistant cheif of police insist that the religious images in the mural be painted over because there is different between state and religion. And also he did not like the paint because he did not have the same mural like the mural in the painting. There is conflict between police and artists, the students, the community partner, because they have totally different idea.

The "I" means individual or youself. If there are many people include you, then it becomes "we." I think that "I" and "we" cannot be seperated by itself because, without "I", there is no "we." For example, there is no group or community without individual. So I can state that
"I" + other people = "We"

digital privacy

The privacy is used frequently in ordinary language as well as in philosophical, political and legal discussions, yet there is no single definition or analysis or meaning of the term. Digital technology and the internet have made new threats possible. For example, computer chnologies database, digital cameras, the Web - have profoundly changed what people can know about us and how they can use the information. The first step of protecting privacy is that people have to understand the risks and problems of digital technology. In privacy, there are three key aspects:

1. freedom from intrusion- being left alone
2. control of information about oneself
3. freedom from surveillance
None of these concerns are absolutem, they may need tobe balanced against other concerns, such as publicsafety.

As technology, specifically the internet, takes off, issues of privacy are critically important. For
example, Should Google be allowed to take pictures of people's houses? What happens if someone takes a picture of a private citizen and posts it on the internet? What happens if it is a video?

The formulation of privacy is negative right. The reason is that the important of privacy is protected information, such as bank account, social security, passport, etcs, from other people. These information stored in database and frequently update the information.

Sunday, February 10, 2008

Service Learning

- In the book, Colleges are most concerned about preparing citizens for the future, graduates who are well prepared to enter the job market and contribute to society. Insititutions that require serivce-learning courses believe that such courses offer a fundamental way to develop and graduate involved citizens. The reason is that the experience of service-learning is smiliar to work in real-world. When we do service learning, we actively learn a lot which depends on the result of our effort. So the point of the service learning is for us to grow in skills and knowledge precisely. This is not only good for us, but also for our community. Therefore, to be citizen is that if we do something good for our countries, they will response for what we do. Then we get something good, and also our countries, too. I think this is the meaning of the concept of educating students to be responsible students.

- I think both of them are important. Generally, in colleges, we learn subjects from professors. And also, we take tests, do homework, and write a paper. I think what we are doing in colleges is basic compare to work in the real-world. Then, think about this. Without basic knowledge, how can we work for? We can study while we are working, so we have to prepare for what we gona do. For service learning, we learn which we do not learn in colleges. What we are learn is by expereience. So there are different among these two. What I can conclude that both of them are our duty to learn for our futures.

Privacy (google street view)

- Google address potential privacy concerns that images of Street View is not different than what you might see driving down or walking on the street. These images are not allow to use for personally. Also Google mentioned that if images contain objectionable content, people can report to google with responses. For Google Street view, some people may like it or not. I agree with their response but they have to take care about images. When I look at the stree view, I can see that they try to take an image of street. As they said, these images are what we saw when we are driving. For example, when we drive a car on the street, we can see people out there, so it is hard to take a picture without people. I think these images can show on the Street View. However, some images are not. I saw many pictures on the web which are not capable to be shown on the Stree View. For exmaple, one picture shows inside of a house when we zoom in it. There are several pictures that people may does not like it. Therefore if google take care images more carefully, the Street View will help us a lot.

Sunday, February 3, 2008

career plans and goals

This is my last semester staying at USF. After the graduation, I will become an army in Korea. (this is required especially Korean men) This military service is 2year. After this, I am planning to get a job related to computer science especially making a web page or a new program.
I am not sure right now. After 3~4 year, when I get some experience of the real life in Korea, I want to study computer science for master in the U.S. After that, I want to get a job in the America. I am sure that Korea and America will give me different working experience. I want to learn a lot. These are just my hope. I am not sure it gona happen or not.

encryption

- When using symmetric algorithms, both parties share the same key for en- and decryption. To provide privacy, this key needs to be kept secret. Once somebody else gets to know the key, it is not safe any more. Symmetric algorithms have the advantage of not consuming too much computing power. Asymmetric algorithms use pairs of keys. One is used for encryption and the other one for decryption. The decryption key is typically kept secretly, therefore called private key or secret key, while the encryption key is spread to all who might want to send encrypted messages, therefore called public key. Everybody having the public key is able to send encrypted messages to the owner of the secret key.

- For symmetric encryption, it only use a one key to encrypt and decrypt message. Also there is standard pattern to move the each bit of the key. For example, there is Caesar cipher which is shift cipher. What it does is that replace each letter with plus 3 mod 26. Then “Attack at dawn” becomes "Dwwdfn dw gdzq." Like this example, there is a pattern to crack the message.
For asymmetric encryption, there are two keys which are a public key and private key. When A make a priavte key, then A can encrypt the message. Also, A can create a public key to show everyone. The important issue is that only A can decode the message because only A knows the private key.

- For symmetirc encryption, if a sender know the key, he/she can encrypt and decrypt the message. If not, he/she can not do anything with the message. The reason is that there is one key which is a secret key. Therefore, depend on a sender who know the key or not, we can identify him/her. For asymmetic encryption, if a person encrypts the message with his private key, and send to other poeple with public key. They can see the public key, but they can not decode the message because they do not his/her private key. However, they can know who encrypt the message.

advantage of symmetirc encrpytion
1) all user share the key
2) very fast and secure

disadvantage of symmetric encrpytion
1) particularly in one-shot communications
2) not easy to give a key to other people

advantage of asymmetric encrpytion
1) key distribution simplified

disadvantage of asymmetric encrytion
1) encryption/decryption much slower
2) much larger keys needed
3) spoofing of public keys