Monday, December 9, 2013

Paper # 5- Robotics

Robotics


     Technology is advancing as fast as ever and this is especially true in the field of Robotics. Robots are able to replace humans for certain tasks, either making it easy or doing stuff that we just don't want to. iRobot is developing a robot that can replace you at the office through telepresence(iRobot). There's even a robot that mows the lawn for you, the Lawnbott
     Robots such as these have great benefits to society. Being able to essentially work from home all the time will save a good chunk of money, as well as cut down on gas emissions. There is also less chance of car accidents happening. Also having robots doing tasks like mowing your lawn will leave you with more free time, allowing for more time with family or work. 
     Naturally there will be problems with the robots. Robots break down and need to be fixed costing money and time that might have otherwise been saved. They also can't do everything humans can do. Unless programmed and designed for a certain task, there's a high possibility it can't do that certain task, like cleaning fragile or small items. The iRobot telepresence robot won't be able to do everything you could if you went into the office itself. 
     An issue that might arise when employers start buying robots instead of hiring humans, an increase in the unemployed. Sometimes it's better for a human to do the work. Another issue would be malfunctions that technology inevitably has. Having a robot malfunction during a meeting or when you're changing the mower blades can lead to adverse consequences that may result in legal ramifications. But having robots inevitably breaks means they also need someone to fix them, offering job possibilities.
     Robots are great helpers for humans, able to do most of things we can better or just a lot safer. They have become an important source of labor for society with many uses. Although they can never replace humans completely, robots will always be a major help for certain tasks that humans are at risk doing or just don't want to do.



Sources: 

Monday, December 2, 2013

Scratch

Using the Scratch program we created a little game that kept score of how many other sprites the main sprite ate while changing looks and making a noise when "eating."

4- Copyleft and Copyrights, Paper #4

Marcus Sellner
Introductory to Computers
12/2/13

Copylefts and Copyrights

     The idea that humans need to protect their intellectual property has been around for quite awhile. People like to take credit for their achievements. That's why Copyrights emerged, represented by a circled capital C or by a (C). This symbols presence on whatever software or item means that it is intellectual property of the author and copying or distributing of the item or software without the author's consent may lead to legal ramifications. Copyleft, represented by a backwards C in parentheses, means that the item or software is "free" as well as any modified or extensions of the item or software to be free as well. Free does not mean free of cost, but free as in being able to be modified freely. The use of copyleft means that the author surrenders some of the rights that are available under copyright laws, but giving up some of them that would usually be protected by copyright laws.
     Copyrights are in place to protect the authors incentive to create. If all the credit and rewards from a program went to someone who wasn't the author, the author themselves would have no reason for creating the program in the first place. However, excessive restrictions due to copyrights will lead to hampering of progress, so there is a limited amount of information that can be copyrighted. Basically, copyrights are in place to credit the author as much as possible while avoiding hampering the spread of the software or idea.
     Copyleft works within the copyright system to promote spreading, modifying, and distribution of the software while giving some protection to the author of the work. However, the author cannot claim exclusive rights to a copylefted work. Anyone can work or build upon the work. Copyleft has many benefits, but one main goals is to promote innovation in a work. A problem with copyleft is that the author themselves have to choose to make their work licensed copyleft. 
     Both copyright and copyleft licensing have their benefits. Copyright licensing allows for due credit and rewards and copyleft allows for creative twists on programs that would otherwise be unfounded. However copyright licensing can be too restricting, haltering the progress of the spread of the program. Copyleft can take away the motivation for creating programs by putting less emphasis on the author and more on the public. But having both types of licensing available is beneficial to society. Having just copyright licensing available would impede modifications and extensions on programs that need them. And having only copyleft would lead to less motivation for creating programs due to lack of credit.





Sources:

Monday, November 11, 2013

Software Theft - Paper #3

     Software theft is the copying or distribution of copyright protected software without authorization. Most people do this because the profits can be substantial without labor costs. But there are some who do this for the purpose of lowering a publishers profits or ruining the publishers reputation. These types of people justify their actions by claiming the publishers are over-pricing the products and believe they are doing a public service by offering the product for a cheaper price or even for free. Some software that has been stolen could have viruses build in or may be incomplete compared to the publishers version, meaning the only one who profits off of software theft is the thief and thief alone (FAST, 2013).
      Software theft can occur though many methods. Scenario one involves the unauthorized use of the same software on multiple PCs, leading to heavy fines and eventual purchase of the product anyways(SSIA). Scenario two is the spread of software by one criminal either though physical copies or though the internet(Nagpal).
     Scenario one revolves around purchasing one licensed software for multiple PCs. "John" wanted to cut expenses, so he used the same software for 45 PCs. Eventually, one user of the illegal software had to call technical support, which lead to the SSIA realizing that the company didn't have licensing for the software, leading to an overall expense of $500,000 that could have been avoided.
     Scenario two is when someone purchases a copy of the legal software and then duplicates it using CD ROMs and then sells it using dealers, or sells the software though electronic downloads. Either method is used for monetary gain, and usually leads to incomplete or compromised software.
     Software theft has heavy legal ramifications. Copyright infringement can be punishable up to five years in prison and $250,000 in fines. Repeat offenders can be imprisoned up to 10 years and violators can be fined up to $150,000 per work(US Copyright Law). As well as the legal consequences, users of stolen software may experience exposure to viruses, lack of technical support, and no accessibility to upgrades that would be available though purchase of the product.
     Software theft is a criminal activity that leads to nothing except profit to the thief or harm to the publishers reputation. The harsh legal consequences for participating in software theft is justified and the actions of these criminals are deplorable.
   








Sources:
fastiss, 2013, FAST, 11 Nov. 2013
Software & Information Industry Association, 2013, SSIA, 11 Nov. 2013
Chmag, Nagpal, Club Hack, 11 Nov 2013
http://www.symantec.com/about/profile/antipiracy/consequences.jsp

Monday, November 4, 2013

NXT Sensors

Tonight we attached sensors to our NXT robots. First was the speaker. This program applauds when opened. Second was the light sensor. The sensor stops the NXT robot from moving when it detects a dark spot. Third was the touch sensor. The program drives the NXT robot forward until the touch sensor hits an object, causing the device to brake. Lastly, there was the ultrasonic sensor. The program has the device drive, sending out ultrasonic waves. Once the robot gets too close to an object, the ultrasonic sensor tells it to brake.













Linus Torvolds was the co-developer of Linux. He did something that challenged the developers of other operating systems: he made Linux a free download.






Steve Woziak is the co-founder of Apple computers. He was the main designer of Apple I and Apple II.
Steve Wozniak Addresses Bay Area Discovery Museum's Discovery Forum

Monday, October 28, 2013

Tonight we built a Castor bot, using a kit from LEGO. We had to deviate from the directions slightly due to some incongruities between ours and their model. Most of the changes resulted from minor size differences, and involved some moving of the connecters. Code:

Monday, October 14, 2013

Click here to see my animoto.








Mini-Paper #2 - Concerning Employee Monitoring

     Employee monitoring can be a controversial subject. Kristin Morgan, from an informative perspective, states that employee monitoring can be used as an important tool to assess and improve employee performance and productivity. She assumes that employers will work to improve their employees opposed to firing them. However, from an academic standpoint, Jitendra M. and Suzanne M. believe that the cons outweigh the pros for employee monitoring, assuming that employees wish to keep their privacy.
     Morgan's primary purpose is to stress how employee monitoring can be used to improve the overall quality of employees, as well as teaching the employers how to implement the systems required. However, Jitendra and Suzanne state that employers can abuse these systems and create stress for the employees.
     For example, let's say that an employee's call is being monitored when on the phone with a customer. The employee makes a rude statement on accident without noticing, ultimately causing the customer to hang up, frustrated. The employer notices and confronts the employee in an attempt to improve the employee's ability to interact with customers. This is how employee monitoring can be used from Kristin's point of view.
     On the other hand, the stress buildup of always being monitored can be detrimental to the employees. Constantly being aware that your job depends on your employer's judgement on your actions may lead to extraordinary stress buildup and cause sub-par results from employees.
    Morgan believes that using employee monitoring systems, when used correctly, can be used to improve employees whose problems wouldn't be addressed otherwise. Jitendra and Suzanne believe that employee monitoring can be harmful to both the performance and health of workers due to a high amount of stress. The disparity in these views are beneficial to employee monitoring possibilities. It can lead to Morgan's ideal use of monitoring and improve employer-employee relations by building trust in employers by knowing if their employees are working well. However, the disparity in ideals may lead to a complete abandonment of employee monitoring, effectively shutting off the benefits it provides, although saving employees from the detrimental effects.
     Employers can either use monitoring well or not, regardless of the debate. Depending on which side the employer is on, they can make the workplace good or bad. If done badly, frustration and stress can build up in employees, a negative side effect. However, good use of monitoring will lead to fruitful employees and methods to improve their performance.

Sources:
http://www.stfrancis.edu/content/ba/ghkickul/stuwebs/btopics/works/monitoring1a.htm
http://faculty.bus.olemiss.edu/breithel/final%20backup%20of%20bus620%20summer%202000%20from%20mba%20server/frankie_gulledge/employee_workplace_monitoring/employee_monitoring_privacy_in_the_workplace.htm

Monday, October 7, 2013

Componets


CD/DVD player to read cd/dvd discs


Screen/monitor to display images on computer.


Hard drive stores data (non volatile)


Mouse- this is used to move the cursor on the screen.


Battery - is used to supply the computer with power.


Keyboard - used to give commands to the computer. numbers/letters/enter/backspace/tab/ ctrl.



Memory(ram) is the storage space used for nonvolatile data.


Usb port is used for many different things, but it is a connection that most devices use to connect to the computer.


Webcam is used to take images/video and puts it onto the computer.


Jump Drive is a portable volatile storage space. (data storage)


Surge protector is suppose to save the computer/power supply from getting under voltage and over voltage.



Motherboard is the circuit board where all of the components are put to run a computer.  buses, drives, processor, etc.

Monday, September 30, 2013

E-waste

Around the world old electronics, or e-waste, is being thrown away and dumped onto normally pristine landscapes. Not only is this harmful towards the environment, but it harms the health of surrounding inhabitants as well. E-waste buildup over the years has been massive, and the complications it brings will only increase if something is not done.
This e-waste is greatly impacting the daily lives of the surrounding inhabitants. It harms the scavengers health, as well as polluting the area. Also, certain types of e-waste provides criminals opportunities to steal personal or sensitive government data. However, the exporters of the e-waste find that dumping the e-waste is cheaper than properly disposing of it.
The people that scavenge e-waste by literally cooking components are slowly poisoning themselves by breathing in toxins that are released. Personal or sensitive data can be viewed by hooking up hard drives from thrown computers and simply opening the files(Inquirer). The companies that export the e-waste state in the video that the exporters don’t want to pay to dispose of e-waste properly even though they realize its hurting the environment.    
To help reduce the amount of e-waste we produce, certain actions should be taken. For one, legitimately donating old electronics you don't want or need to friends or family will prevent that machine from contributing to the e-waste piles. Another way is to find a website or business that legitimately recycles your device, instead of exporting it out of the country. Also, you could consider selling your computer used.(3 solutions)
        I believe that e-waste is harmful to both people and the environment it pollutes, as well as providing opportunities for criminal activity. Selling old electronics or donating them instead of "recycling" them is the best way to avoid contributing to e-waste and I will remember to go for one of those paths with my old electronics. I'll just have to remember to smash my hard drive.







http://www.theinquirer.net/inquirer/news/1050291/smash-hard-drives


.

Fingerprint readers


https://docs.google.com/document/d/16-rcoRrVO3tUn_mOrkqQzsDU-Xtm1j8gNkKgwmei-RM/edit?usp=sharing

Monday, August 26, 2013

First

My name is Marcus Sellner and my major is nursing. I've spent much time around computers, yet managed to not learn much about them. Restarting the computer fixes most of the problems that you get. Updating your drivers assists performance greatly, and as a last resort, wiping your hard drive is sometimes necessary to continue using the computer. I'd like to learn the basic structure of computers so I can eventually build a computer. Learning how to build robots is also an interest. Upgrading my computers security would be wonderful.


We talked about how computers use preset programming to function and do as we wish. We input data though things like keyboards and touchscreens, and computers give us the information sought though monitors, speakers, and similar devices. Wireless networks, as such created though modems, are considered one unit, even though there are multiple devices.