Twitter

Information Technology in a Global Society studies the Social and Ethical impacts of IT on different Areas like Business and Employment, Health, Education, Entertainment, Art, Politics, and Science.

Monday, November 24, 2008

Astronauts Jiggle ISS Water Recycler Handle But Crew Can't Drink Pee Just Yet


















The multimillion dollar water recycler recently installed by astronauts aboard the International Space Station is still experiencing some minor issues this evening, meaning crew members will just have to wait to have their first peetinis, Long Island Iced Pees, Whiskpee Sours and other lame pee-themed drinks I have yet to think of. The prototype recycler, which separates waste from water using a centrifuge system, was brought to the station aboard the latest shuttle mission. It malfunctioned two hours after installation, although a separate sweat and waste water recycler is working as expected. Phew!

Sunday, November 23, 2008

Supercomputers Corroborate Einstein's e=mc2 After 103 Years

















Believe it or not, but it has taken 103 years and the combined power of various of the world's top supercomputers to prove Eintein's biggest equation right, resolving e=mc2 at the scale of sub-atomic particles. The feat has been achieved by a team of French, German, and Hungarian physicists led by Laurent Lellouch at the Center for Theoretical Physics in France, and has finally answered a question that has puzzled scientists for decades: The Mysterious Case of the Disappearing Atom Mass!

The Pentagon Bans USB Flash Drives

AP reports that the Department of Defense has, at least for the time being, banned USB flash drives and is collecting all Pentagon-owned drives from the entire department. The Pentagon hasn't issued an official statement, but a spokesman did say that they are dealing with a "global virus" that affects such external storage. Apparently, Department of Defense lackeys are being told that they may not get their drives back, and no information has been given regarding the length of the ban.

Aptina producing cellphone image sensor that shoots HD video

Aptina -- a division of Micron that manufactures one out of every three sensors for mobile phone cameras -- has announced the high resolution 5 megapixel MT9P013. There are better sensors out there already, but this one will also be able to record 720p HD video at 60 frames per second, and 5-megapixel video at 15fps. The sensor is going into production in January of 2009, according to Aptina, so it shouldn't be too long before we start seeing much better quality amateur films out there in the world.

Verizon Staff Accessed Obama Cellphone Data, Became Ex-Verizon Staff





















Several Verizon Wireless employees stumbled upon the Pandora's Box of personal cellphone accounts, that of President-Elect Barack Obama, and couldn't help sneaking a peek. Luckily, the account was old and out-of-use, there's no indication that email records, voicemails or call contents were monitored, and at the very most the employees only got to see billing records, according to Verizon Wireless CEO Lowell McAdam. Oh yeah, and the employees are now fired.

Saturday, November 22, 2008

What is Windows 7?

Is the Internet affecting our people skills?

Rewired Generation:

Milenials we're called or Generation Y's: Casual wear, BRB, LOL, :) we're better reading emoticons than people's facial expressions. Is this bad? Of course not.

Tuesday, November 18, 2008

Bling bling earphones!! Just like Lil Jon!!














ON SALE FOR ONLY £3,500 !!! These gold plated diamond-encrusted earphones are the most expensive earphones in the world. Frankly, i would settle for a burger and fries.

Apple Apples Are Not from Apple



























Apple should sue, COPYRIGHTS! :)

Monday, November 17, 2008

An eye for an eye .. mm how about an eye-cam instead?




Tanya Vlach, a San Francisco-based artist, lost her eye in a 2005 car accident, and now keeps a blog chronicling the "monocular life." She's got a real-enough looking prosthetic eye, but Tanya's a self-described "sci-fi geek," and, with the approval of her doctor, she's put out a call for engineers to build her a camera... for her fake eye.

Barack Obama running for Prime Minister of Israel ... or is he?!!!


















Benjamin Netanyahu (who is running for Prime Minister of Israel) has copied, well just about everything off of Barack Obama's website and made it very similar. 

One of Benjamin's top advisors said: "Imitation is the greatest form of flattery. We’re all in the same business, so we took a close look at a guy who has been the most successful and tried to learn from him."

learn, ok thats fine. But what happened to intellectual property and copyrights!?

Friday, November 14, 2008

Our New President Elect Really Gets it!

A weekly broadcast on youtube by OBAMA, that 'ought to catch the attention of the new generation.

Is your ISP (Internet Service Provider) Spying on you?

ISP's infringing our privacy by allowing Ad Agency's to install spying software that tracks our surfing habits online.

Online Games that will save the world!

Massively Multiplayer Online Games are becoming a common method to simulate reality.
How about a Massively Multiplayer Online Earthquake Simulation based on real life scenarios played out to see what would happen when the Big one hits?

If Cows could speak, what would they say?

RFID tags on cattle to keep track of diseases they say. Not too far fetched to think that we may be RFID tagged in the future so that God knows who could keep track of our movements. So much for Privacy!

Come on NASA! I'm not drinking my own Urine

Nasa designs a space simulator to mimic the environment on a space shuttle. Astronauts are running on treadmils and their sweat is being condenesed into containers along with their piss for recycling since water is scarce on a space shuttle. Sometimes, i just hate technology.

YUK!

Saturday, November 8, 2008

I think, therefore I Browse!



Fact or Fiction? Partially paralyzed users were able to move a computer mouse on a screen using mind power. FACT! Believe it or not, but a brain cap with over 60 electrodes interprets brain activity to enable disable people to better interact with PC's through thought.

Google CEO Shares his thoughts on Information Technology

Google CEO, Eric Schmidt shares very valuable information at a recent Bloomberg summit in October of this year (2008). Here is an interesting viewpoint:

If the camera phone allows you to be a Paparatzi, blogs allow you to be a reporter, and youtube turns you into a film maker, WHAT HAPPENS TO PRIVACY?

The TALIBANATOR ::: Robots Disguised as Insects



The military will not cease to impress. As part of the advancement of micro-munitions, Imagine little micro-controlled flying insects with mini C4 explosives fitted to take out snipers, or members of the Taliban, watch out for the TALIBANATOR, "I'LL BE BACK!".

Social & Ethical Issues ::: Explained

The widespread use of IT raises questions about social and ethical issues that shape the world today. The use of IT has brought both advantages and disadvantages, both costs and benefits to the world as we know it today.

Reliability

Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if it is entered incorrectly or if it becomes outdated. For example, a medical record that becomes dissociated from the patient it refers to becomes unreliable. The reliability of machines, software and data determines our confidence in their value.

Integrity

Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver licence data resulting in arrests of innocent people.

Security

Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society’s confidence in the information contained in the systems.

Privacy and Anonymity

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity, which might be called for in some contexts but is dangerous in others. For example, discussion of a delicate subject might require anonymity, or at least privacy. On the other hand, anonymity could also conceal the perpetrators of criminal, terrorist or computer hacking acts.

Authenticity

Authenticity means establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.

Intellectual property

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections. On the other hand, the same methods create opportunity for inexpensive dissemination of information.

Is it a fly? Is it a plane? No, It's Bat Spy!



Great for military use, but I'd hate to have this fall into the hands of my nosy mother in law :)

Military Applies "Turing Test" for Artificial Intelligence in MMO's


You will play with new characters on "World of Warcraft" and other MMO's (Massively Multiplayer Online games) and determine for yourselves if the character is convincing enough to be called Intelligent. The turing test is named after Alan Turing and involves two people and a computer. One person, the interrogator, sits alone in a room and types questions into a computer terminal. The questions can be about anything. As answers to questions appear on the terminal, the interrogator attempts to guess whether those answers were typed by the other person or generated by the computer. By repeatedly fooling interrogators into thinking it is a person, a computer can demonstrate intelligent behavior. If it acts intelligently, according to Turing, it is intelligent.


How Secure is Wireless WPA Encryption?

It turns out WPA "TKIP" Encryption is 
susceptable to hacks, switch to "AES" encryption
for unhackable wireless security.

WHAT THE HACK! Cyber terrorists BEWARE!

So now, hacking is a crime punishable by the Death Penalty in Pakistan, look out Bin Laden, we've got bigger heads to fry...

Wednesday, November 5, 2008

Firefox addresses Privacy & Security Concerns thru Private Browsing

Open Source browser, Firefox, offers a private browsing feature on its latest version of the powerful Web browser 3.1.  One can now rest assured that he's not leaving any tracks on his own PC or even on other PC's (or MACs, for our MAC lovers).  More and more is being done to protect our Privacy online.

Credit/Smart Card Readers ::: OTP Concept

OTP or One-Time-Password provides secure online banking and ecommerce by providing the user with an OTP to input rather than his PIN (Personal Identification #), making it even tougher for hackers to intercept consumer PINs.

Go Obama! ::: The Role of Internet on Presidential Elections

The first Black president owes much of his success to his strong command over online campaigning.

Followers

Creative Commons License
This work by Osama Alshurafa is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.