The hackers have made more headway in the war against locked iPhones. Now iPhone users can unlock their iPhones without rendering the phones unusable.
Apparently, the hackers have pledged to modify every new update Apple publishes so that the unlocked phones are never rendered useless again. But a security issue arises: how does one know the hackers aren't adding anything malicious to the updates? They could modify the updates to grant them access to the phones. How would one know? Anything that can affect your computer can affect your iPhone, like viruses and spyware. Is slightly better customer service worth the risk of an insecure phone?
In other news, the iPhone will be released in China at some point in the future. It makes me happy to know that people around the world are benefiting from the improvements of technology. On the other hand, many people in the world are unable to enjoy life as they go without adequate food and shelter.
More news on the iPhone:
http://www.wired.com/gadgets/miscellaneous/news/2007/11/iphone_china
http://www.itwire.com/content/view/15433/1103/1/0/
Tuesday, November 20, 2007
iPhone Wars
Posted by
StephenK
at
12:04 PM
0
comments
Labels: technology
Monday, November 12, 2007
Global Competition
Global Competition
The world is flatter. This is good because those of us in the United States seem to be falling asleep. We aren't as competitive as we used to be. Many expect that they will be guaranteed a well paying job, but that isn't true - it never has been true. More so now than ever, we are involved in a global competition for jobs. We all must strive to perform better than each other if we want to be paid well. This will drive progress.
In an ideal world, we wouldn't compete with each other. Everyone would have a job they enjoy and that they can excel at without competing with others for it. But we don't live in an ideal world. We live in a world with naturally lazy people that try to satisfy their desires with the least amount of effort. If all those who choose to be lazy are allowed to do so, society would be severely hindered in its progress. Would the hunters and gathers have become anything more if they had succumbed to laziness? With the incentive of financial power, many are enticed to compete so they can fuel their natural desire for power. Progress is a natural side-effect of competition that benefits many. Compare our life today with life of hunters and gatherers: we can communicate with people all over the world; we live in comfortable buildings; we take food for granted; and we understand more about the world around us.
Everyone will have a job. The number of jobs that can be filled is infinite. When jobs are replaced by technology or outsourcing, more jobs are created. The computer replaced many jobs, but many jobs have been created by the computer: computer scientists, information technology departments, computer factories, and many more. Outsourcing will have the same effect. As jobs are shipped overseas, more jobs will be created at home. The limiting factors are entrepreneurship and education. Those who lag behind the changing environment risk difficulty in finding a job, but not all jobs can be outsourced: on-site construction, counseling, management, and many more. As Thomas Friedman pointed out, those with higher education move up in their jobs to care for the more difficult parts of the job as the menial parts of the job are sent to those who can accomplish them. For example, he pointed out an artist that concentrated on sketches as artists in India filled in the colors and shading. The artist concentrates on the creativity, and artists in India concentrate on completing the picture. The ideas will start at home, and their development will occur abroad. Much knowledge remains to be discovered; therefore, the levels that can be achieved are limitless.
In the end, the flattening of the world is beneficial for all. Those abroad now have higher paying jobs, and those with more education can concentrate their efforts on increasing knowledge and wisdom.
Persistence of Hierarchal Organization
The Library of Congress contained about 20.5 million books at the end of the year 2006 (http://www.loc.gov/about/reports/). If one person read one book per day, that person would finish reading every book in the Library of Congress about 56,126 years after beginning. It is impossible for one person to know everything in this life. Because one person will not know everything, groups of "followers" develop around the respective experts of various fields. If someone wants advice about something, he will seek out someone he knows that he considers the most knowledgeable about the subject.
Instead of replacing hierarchies, the flattening of the world will improve them as current experts are replaced with better experts. People don't have time to read hundreds of blogs to find answers. They prefer to read one blog that is correct and complete than dozens of blogs that contain only part of the information being sought, or that are inaccurate.
Posted by
StephenK
at
6:33 PM
1 comments
Tuesday, November 6, 2007
Software Patents
Lets say you alone develop and sell software that becomes wildly popular. As you dream of the things you will buy with your coming fortune, a software company develops software that does the same things your software does, except the company sells its software for less and does a better job marketing and maintaining the software. As your dreams of luxury begin to fade with the realization that the software company will inherit your coming fortune, you wish that you could stop the company from stealing your idea. Something exists to prevent others from stealing your idea, and it has been around for many years: patents.
I'm for software patents. If people cannot patent their software ideas, they will be less likely to research better methods without the ability to make money from their improvements.
Software patents not only help large companies, they also help small companies and individuals. If a small company develops a unique software program and patents it, they can profit from it while the larger companies must either pay royalties or find a better way to do the same thing - thus driving progress.
Software patents don't hurt those who don't patent their ideas. If someone can prove the idea existed before a big company came up with the idea, the big company will be unable to patent the idea.
In an ideal world, better algorithms will be shared without charging money, but we live in an imperfect world. We live in a capitalistic society, and we must follow the rules of that society if we are going to progress together. Too many people would take advantage of the system if everything was free, and society would not progress if everyone was a thief.
Posted by
StephenK
at
7:33 PM
0
comments
Labels: technology
Saturday, October 27, 2007
Only Two iPhones Per Person
iPhone news: http://www.informationweek.com/blog/main/archives/2007/10/want_to_pay_cas.html
Apple has taken another step in combating the hackers. Now Apple sells only two iPhones to each person. Apple can restrict the distribution of its cell phones any way it wants as long as it follows the law.
Many people complain that Apple's actions are unfair. What is fair? Do people think fair means getting what they want? If a person doesn't like Apple's new policy, they should stop buying Apple's products: money speaks louder than words. But iPhone sales are doing well. The people have spoken: they like the iPhone more than they hate Apple's policies and methods of distribution.
Posted by
StephenK
at
4:19 PM
0
comments
Labels: technology
Monday, October 22, 2007
Women in Computer Science
Women should be treated equally in the field of computer science, they should be encouraged to be mothers, and they should be encouraged to pursue a career in computer science if they so desire.
As long as women have the same opportunity as men to enter the field and be successful, nothing more should be done. Discrimination against women solely based on their gender is not just. But one must be careful in completely eliminating gender-based discrimination without careful consideration. Forcing equality between men and women can lead to problems worse than unjust discrimination. During the time the Equal Rights Amendment was publicly debated, good reasons were given against passing the Amendment. Although most of the reasons are unrelated to equality in the field of computer science, they hint that some undiscovered reasons may exist that we are unaware of.
Posted by
StephenK
at
5:06 PM
0
comments
Labels: technology
Wednesday, October 17, 2007
Third-Party iPhone Application Development
Apple chose wisely to allow others to develop software for the iPhone. Not only can others profit from the popularity of the iPhone, fewer people will try to hack the iPhone to develop on it, thus making it more secure as the malicious hackers can no longer rely on the efforts of others to hack into the phone. But this decision will not make the iPhone completely secure: there will always be ways to break into it. Information on any electronic device will be completely secure only when the device is melted into an unusable mass.
Article on iPhone Development: http://www.informationweek.com/hardware/showArticle.jhtml?articleID=202403919&subSection=Macintosh+Platform
Posted by
StephenK
at
9:28 PM
0
comments
Labels: technology
Monday, October 15, 2007
Computer Security
Hackers vs. IT Security
A strange war rages between information technology security guards and hackers. IT security guards do everything to keep hackers out, but hackers continue finding ways to cause damage. The war is like a sword fight with one guy spending the fight dodging the other guy's sword without using his own sword to strike back and stop his opponent. This epitome of a defensive strategy fails to stop the attack. There are some IT security guards in the world that pursue the hackers, but the chase can waste money. The guards could spend an incredible amount of time and money chasing the hackers, or they could spend less money on improving systems to keep hackers out.
For the number of hackers to be reduced, they must be pursued. The security guards should implement systems that can identify the hackers enough to prosecute them. The automation of the task will reduce the cost of the pursuit. The FBI should implement a nationwide monitoring system with the ability to trace a hacker the instant the FBI is notified of an attack. As soon as the hacker is traced, the FBI should find the hacker's home address, find out who in the home is the attacker, and arrest the culprit. To increase the effectiveness of prosecuting hackers, more states have more laws against hacking. The number of hackers will diminish as the threat of getting caught increases. Hackers would think twice before trying to get into a system without authorization if they believe they might be caught.
One of the difficulties of catching hackers is realizing they are attacking. They continue to find ways to circumvent the systems put in place to identify attacks. If a hacker is just stealing information, he can easily seem like a normal person. A hacker could break into someone's account and view all the files that person has access to. More security measures should be implemented to recognize such attacks.
Responsibility
Measures must be taken to save money, and preserve privacy and reputations by preventing hackers from penetrating computers. In IT security, the responsibility to secure systems lies with many people: the users, the programmers, the hardware designers, management, and the system administrators.
Users have a responsibility to secure their accounts. The impenetrable walls of a castle are useless if the gate is left open to invaders. They must not share their passwords with anyone, nor should they store them anywhere. Potential hackers are not limited to external people. Someone in the organization could also be a hacker. Internal hackers could easily search through unsecured documents for passwords. External hackers that penetrate the system could find passwords stored on computers and use them to avoid detection. Users must also choose passwords that are difficult to guess, excluding birthdays and names of relatives and pets.
Programmers have a responsibility to do their best to make the software they build secure. Programmers should do their best to secure the systems and programs they build. If a programmer carelessly develops software that can be penetrated, and his carelessness causes security problems for the system the software runs on, the programmer should be held responsible for his negligence.
Hardware designers have the same responsibility as programmers. They contribute to the construction of the impenetrable wall.
Management has the responsibility of assuring that clear security policies are developed and followed. Managers need to make sure that the wall is impenetrable and the gate is closed and locked.
System administrators have the responsibility of aiding management by verifying that the security policies are followed by all. They are also responsible for detecting intruders and updating software and hardware as information about security problems arise.
The responsibility for securing a computer system does not lie with one person alone: it lies with all those who use or manage the system. Everyone must do their best to keep the system secure.
Posted by
StephenK
at
6:08 PM
0
comments
Labels: technology