Sunday, February 24, 2008

LAMP

The acronym LAMP is a group of words which use for web applications and server. This is usually free and open source software, so every programer can download and make their own web application using their own database. LAMP refers that Linix - referring to the operating system; Apache - the Web Server; MySQL - the datebase management system; PHP and sometimes Perl or Python, the programming languages. Also there are many different programming lanaguages such as ruby on rails. Thesedays, many people use LAMP to build their own web application and to show their talents. Also, there are many source code that people can use it for themselves.

Sunday, February 17, 2008

Exercise 3.4

The assistant cheif of police insist that the religious images in the mural be painted over because there is different between state and religion. And also he did not like the paint because he did not have the same mural like the mural in the painting. There is conflict between police and artists, the students, the community partner, because they have totally different idea.

The "I" means individual or youself. If there are many people include you, then it becomes "we." I think that "I" and "we" cannot be seperated by itself because, without "I", there is no "we." For example, there is no group or community without individual. So I can state that
"I" + other people = "We"

digital privacy

The privacy is used frequently in ordinary language as well as in philosophical, political and legal discussions, yet there is no single definition or analysis or meaning of the term. Digital technology and the internet have made new threats possible. For example, computer chnologies database, digital cameras, the Web - have profoundly changed what people can know about us and how they can use the information. The first step of protecting privacy is that people have to understand the risks and problems of digital technology. In privacy, there are three key aspects:

1. freedom from intrusion- being left alone
2. control of information about oneself
3. freedom from surveillance
None of these concerns are absolutem, they may need tobe balanced against other concerns, such as publicsafety.

As technology, specifically the internet, takes off, issues of privacy are critically important. For
example, Should Google be allowed to take pictures of people's houses? What happens if someone takes a picture of a private citizen and posts it on the internet? What happens if it is a video?

The formulation of privacy is negative right. The reason is that the important of privacy is protected information, such as bank account, social security, passport, etcs, from other people. These information stored in database and frequently update the information.

Sunday, February 10, 2008

Service Learning

- In the book, Colleges are most concerned about preparing citizens for the future, graduates who are well prepared to enter the job market and contribute to society. Insititutions that require serivce-learning courses believe that such courses offer a fundamental way to develop and graduate involved citizens. The reason is that the experience of service-learning is smiliar to work in real-world. When we do service learning, we actively learn a lot which depends on the result of our effort. So the point of the service learning is for us to grow in skills and knowledge precisely. This is not only good for us, but also for our community. Therefore, to be citizen is that if we do something good for our countries, they will response for what we do. Then we get something good, and also our countries, too. I think this is the meaning of the concept of educating students to be responsible students.

- I think both of them are important. Generally, in colleges, we learn subjects from professors. And also, we take tests, do homework, and write a paper. I think what we are doing in colleges is basic compare to work in the real-world. Then, think about this. Without basic knowledge, how can we work for? We can study while we are working, so we have to prepare for what we gona do. For service learning, we learn which we do not learn in colleges. What we are learn is by expereience. So there are different among these two. What I can conclude that both of them are our duty to learn for our futures.

Privacy (google street view)

- Google address potential privacy concerns that images of Street View is not different than what you might see driving down or walking on the street. These images are not allow to use for personally. Also Google mentioned that if images contain objectionable content, people can report to google with responses. For Google Street view, some people may like it or not. I agree with their response but they have to take care about images. When I look at the stree view, I can see that they try to take an image of street. As they said, these images are what we saw when we are driving. For example, when we drive a car on the street, we can see people out there, so it is hard to take a picture without people. I think these images can show on the Street View. However, some images are not. I saw many pictures on the web which are not capable to be shown on the Stree View. For exmaple, one picture shows inside of a house when we zoom in it. There are several pictures that people may does not like it. Therefore if google take care images more carefully, the Street View will help us a lot.

Sunday, February 3, 2008

career plans and goals

This is my last semester staying at USF. After the graduation, I will become an army in Korea. (this is required especially Korean men) This military service is 2year. After this, I am planning to get a job related to computer science especially making a web page or a new program.
I am not sure right now. After 3~4 year, when I get some experience of the real life in Korea, I want to study computer science for master in the U.S. After that, I want to get a job in the America. I am sure that Korea and America will give me different working experience. I want to learn a lot. These are just my hope. I am not sure it gona happen or not.

encryption

- When using symmetric algorithms, both parties share the same key for en- and decryption. To provide privacy, this key needs to be kept secret. Once somebody else gets to know the key, it is not safe any more. Symmetric algorithms have the advantage of not consuming too much computing power. Asymmetric algorithms use pairs of keys. One is used for encryption and the other one for decryption. The decryption key is typically kept secretly, therefore called private key or secret key, while the encryption key is spread to all who might want to send encrypted messages, therefore called public key. Everybody having the public key is able to send encrypted messages to the owner of the secret key.

- For symmetric encryption, it only use a one key to encrypt and decrypt message. Also there is standard pattern to move the each bit of the key. For example, there is Caesar cipher which is shift cipher. What it does is that replace each letter with plus 3 mod 26. Then “Attack at dawn” becomes "Dwwdfn dw gdzq." Like this example, there is a pattern to crack the message.
For asymmetric encryption, there are two keys which are a public key and private key. When A make a priavte key, then A can encrypt the message. Also, A can create a public key to show everyone. The important issue is that only A can decode the message because only A knows the private key.

- For symmetirc encryption, if a sender know the key, he/she can encrypt and decrypt the message. If not, he/she can not do anything with the message. The reason is that there is one key which is a secret key. Therefore, depend on a sender who know the key or not, we can identify him/her. For asymmetic encryption, if a person encrypts the message with his private key, and send to other poeple with public key. They can see the public key, but they can not decode the message because they do not his/her private key. However, they can know who encrypt the message.

advantage of symmetirc encrpytion
1) all user share the key
2) very fast and secure

disadvantage of symmetric encrpytion
1) particularly in one-shot communications
2) not easy to give a key to other people

advantage of asymmetric encrpytion
1) key distribution simplified

disadvantage of asymmetric encrytion
1) encryption/decryption much slower
2) much larger keys needed
3) spoofing of public keys