Tuesday, December 11, 2007

Mind Control

Weiss, P. (2005). Mind Control. In P. De Palma. (Ed.), Computers in society (pp. 213-216). Dubuque, IA: McGraw-Hill.
Unit 8, Article 46

Review by Kim Doyle

This article by Peter Weiss considers how advanced software is being used to alleviate chronic pain and restore motor function to quadriplegics. By inserting a device called brain-computer interface (BCI) into the brain, researchers are running clinical trials to prove that function can return to a paralyzed person. The article begins by telling the story of Matthew Nagle, a victim of a stabbing rendering him unable to use his arms or legs, paralyzed from the neck down. Despite his condition, he is now able to play Pong. He can because of microelectrodes that have been implanted in his brain that read neural activity. Processors read patterns associated with arm motions that are then translated into signals that control the Pong paddle. The device is called BrainGate, developed by John Donoghue, head of neuroscience at Brown University. Eventually Donoghue hopes to hook BrainGate up to stimulators that can activate muscle tissue, compensating for a damaged nervous system.

Some physicians are skeptical about the use of BrainGate. Fearful that not enough is known about the device, these medical professionals think it may have been premature to plant it in the brain of a human being. They claim less invasive options are available. Nonetheless, as soon as Matthew Nagle learned of the clinical trials, he begged his doctors to let him be the first subject. He is now convinced he will be walking again someday as a result of using BrainGate. Likewise, Donoghue is convinced that embedding electrodes in the brain of paralysis victims is the only promise at this point of restoring mobility.

Reaction

I think this is absolutely incredible. It is inconceivable to me that someone can be so brilliant as to think of something as revolutionary as BrainGate. What hope it will offer to those who have been victims of terrible accidents and are no longer able to move! Even though it may not accomplish everything its designer hopes it will, Donoghue is still taking a major step forward on behalf of those who cannot take a step themselves.

Kabul’s Cyber Café Culture

Majumder, S. (2003). Kabul’s cyber café culture. In P. De Palma (Ed.), Computers in society (pp. 188-189). Dubuque, IA: McGraw-Hill.
Unit 7, Article 40

Review by Kim Doyle

Sanjoy Majumder writes in this article, originally published in 2003, about the establishment of cyber cafes in Kabul. Just two years prior the Taliban banned the use of the Internet by anyone other than the government. Afghans are realizing, as are citizens in other developing countries, that the Internet is a way to catch up with the rest of the world. In Kabul, and elsewhere, Internet is accessed through a wireless broadband system – very fast with high-capacity lines. There is a high level of enthusiasm around Internet use. Afghans are keeping their newly established cafes very busy. The low cost, only $1 for an hour of access, is a primary reason for this high level of use. Sabir Latifi, hoping to be the country’s first privately-owned Internet service provider, is recruiting help from others that have become familiar with the Internet when visiting other countries. They have returned to Kabul excited about what they have learned and use the Internet extensively to keep in touch with contacts and friends they have met while visiting other places. Latifi’s hope (when this article was written) was to bring the cost of Internet access down and make it available for free to Kabul University students. Latifi also believes the Internet can play a crucial role in empowering the central government and bring the people together.

Reaction

Majumber creates an image of Kabul - dusty streets with kebab stalls, vegetable carts, curio stores, chaotic traffic…and Internet cafes. It does seem incongruous. Yet the Afghan citizens are clamoring to these cafes in an effort to become connected with the world outside of their own. This article was written in 2003. It could be assumed therefore that Internet use has increased. The Internet has become so commonplace in our country. We take it for granted and know that nearly any kind of information needed or wanted is available. It is difficult to imagine it being one’s only connection to the outside world. What an opportunity for a war torn country that has been under such oppression.

Why Listening Will Never Be the Same

Teachout, T. (2001). Why listening will never be the same. In P. De Palma (Ed.), Computers in society (pp. 198-201). Dubuque, IA: McGraw-Hill.
Unit 8, Article 43

Review by Kim Doyle

In 2001 the sale of pre-recorded compact dropped by 10% outsold by blank discs for the first time. While the author of this article may agree that this was a sign of an acute crisis in the recording industry, he also believed this to be an indication of a “radical and irreversible way we listen to music” (pg. 198).

This article was written in 2002 and by this time millions of Americans were using their computers to share music files by sending them over the Internet. Attempts were made to control this through legislation and by developing software that would prevent this from being possible. These attempts were unsuccessful. Teachout writes in this article that while recording industries saw this as a threat to their existence, there was another implication that was unexplored.

Teachout explains his position by first presenting a bit of history of the recording process. For most of a century records were made through a process known as analog recording. By 1976 this was replaced by digital recording where a computer was used to convert sound waves into a sequence of binary digits. In 1983 we were able to store music in actual digital form by a laser scanning process. The author describes this as the true digital revolution. No longer does the recording process produce a record album. When music is converted to numbers, it becomes an idea and leaves the realm of being an object.

How does this impact the way we listen? Teachout explains this by comparing the listening process to viewing visual art. Replications are frequently made of well-known pieces of art. Despite the quality of these replicas, there is always only one original work. By contrast, music only exists through performance. Even a recording is a performance in itself. It is its own entity. Therefore a recording does not have the same relationship to a live performance as does a replication of a painting to its original. Every time we hear a piece of music, it is an original.

Teachout’s analysis of this in 2002 was to suggest that the spread of computer-based listening would start to alter the way records were being made and marketed. Performers were feeling under pressure to develop recordings that offered something very different than a performance. All songs on a CD had to be very strong, not just a collection of unrelated selections. Musicians needed to take charge of their own recording decisions. The author predicted that artists would start making their own recordings and market them via the Internet. Managerial institutions would likely be created to facilitate this for musicians but the ultimate responsibility for the work would belong for the first time to the artists themselves. Teachout further predicated that record albums would go away as well as record stores. The triumph of the digit was at hand.

Reaction

The triumph of the digit was definitely at hand. As we know now Teachout’s predictions have proven true. He presents a perspective of this phenomenon that I would never have considered. I appreciate his doing so as it really brings into focus the direct impact on the individual artist.

Music in a digitalized format offers a great deal of choice to the listener. By shopping through iTunes we are able to create a selection of songs ourselves rather than purchase an entire CD. We can shuffle songs listening to them in any order. While these choices are appealing, it does take some control away from the artist. It makes sense therefore that artists would need to consider new strategies of making and marketing their music.

As a classical musician I have always been irritated when record labels chop up classical music, selecting a favorite movement from one classical symphony and another movement from another symphony for example. This is clearly not the way the composer would have intended a work to be heard and I find it very disruptive to the ear. It may work well for figure skaters but it doesn’t work for me. Unfortunately this is a process that can easily be done now that music is digitalized. The sad thing is that the great masters of music of whom I speak (Mozart, Bach, Brahms, Beethoven and many, many more) are no longer living to give permission to manipulate their works in this way. I have no doubt that if they were still living, permission would not be granted.

Regardless of how music is recorded and what new opportunities these technological advances may offer, we need to remain aware as consumers how best to support the artists.

Sunday, December 9, 2007

China’s Computer Wasteland

Joffe-Walt, B. (2005). China’s computer wasteland. In P. DePalma (Ed), Computers in society (pp. 169-171). Dubuque, IA: McGraw-Hill.
Unit 7, Article 35

Review by Kim Doyle

What becomes of the billions of computers that are retired each year? Benjamin Joffe-Walt, author of this investigative report, provides a bleak answer to this question. China has become the dumping ground for electronic waste (e-waste) and the United States is a huge contributor to this dangerous situation. Other countries, including Malaysia, Canada, Sweden and Singapore are guilty of this as well, but international watchdog groups estimated that the United States alone exported more than $1 billion worth of electronic waste to China in 2004. Companies like Hewlett-Packard, Dell, Sony, IBM and Apple all manufacture electronic goods in China as well. Products are sold to Western countries and China gets back the rubbish.

This waste is highly toxic and very dangerous to the Chinese immigrant workers who feel they have no choice but to “farm” computers. They cannot find other work and it is the only way they can keep their families fed. The author describes the trip taken to the rural Chinese town of Guiyu where workers are seen sorting through piles of e-waste looking for usable parts that can be sold or burning the rubbish causing noxious fumes that workers constantly breathe in. Dr. Chen, a doctor at a local health clinic, reports that there are many cases of lung problems. The burning releases pollutants that cause this and other diseases, heart attacks and pulmonary edema.

Joffe-Walt reports that China’s e-waste crisis is a byproduct of its unequal development. It is open to international markets and capital has enhanced the divide between urban middle class and the rural poor. E-waste sweat shops are located in secluded areas where migrant workers sit stripping wires or disassembling broken motors earning an average pay of $3 - $4 a day. Local residents who got rich doing this e-waste work are now the e-waste bosses getting rich off the migrants they bring in to do this work for them.

While there are some computer recycling programs available, this author reports that the United States is failing to step up and take responsibility for managing their own waste. Other countries have done a better job of this. In May of 2001, the European Union adopted a directive requiring producers of electronic products to assume responsibility for the recovery and recycling of their own waste and to phase out using hazardous materials. Until the US and other countries do a better job of this, China will continue to face the life-threatening dangers of exposure to this toxic e-waste.

Reaction

This comes as a huge shock to me and it really shouldn’t. Knowing how hard it has been to get rid of my own personal computers I no longer use, it should come as no surprise that this would be an enormous problem for our country. Where do all these old computers go? Now I’m aware of the sad truth and I’m ashamed that as a nation we are so negligent in the manner we dispose of our e-waste. I work for an agency I am proud to say does a good job of addressing this issue. We get maximum use of computers we buy, recycling them throughout the organization so that all those needing computers have machines consistent with their level of proficiency and use. Computers no longer needed by employees are made available to clients who may not be able to purchase one for themselves.

We need to take personal responsibility by supporting programs now available to deal with this waste. We must support proposed legislation holding businesses and computer manufacturers responsible for the recovery and recycling of their own e-waste. We must stop making our problem a disaster for the poor in other countries who feel they have no other option but to work amidst this toxic material.

The Level of Discourse Continues to Slide

Schwartz, J. (2003). The level of discourse continues to slide. In P. De Palma (Ed.), Computers in society, (pp. 164-165). Dubuque, IA: McGraw-Hill.
Unit 6, Article 34

Review by Kim Doyle

In this article John Schwartz presents a critical perspective of the use of PowerPoint for presentations. Microsoft developed this technology 10 years ago and critics have complained ever since. Schwartz accuses it of being “deadening to the soul” (pg. 164). The use of PowerPoint is pervasive, even among young students who are using it for school reports.

A serious misuse of this software program cited by Schwartz in this article is that by NASA engineers when presenting a report on their investigation of the crash of the Columbia shuttle. Edward Tufte, a Yale University professor and expert on the presentation of visual information, published a critique of that presentation. He claimed a key slide containing information crucial to the shuttle’s malfunction was imbedded in the presentation toward the end. This would imply a lesser significance to this point than was actually true, as confirmed by an independent board that investigated the disaster. James McKenzie, an educational consultant, is quoted in this article as saying PowerPoint has actually damaged our culture.

Microsoft’s chief product manager, Dan Leach, expresses pride in the software package and says customers love it. He points out that the application is just a tool – a template for users to fill in the blanks. Others share his view and claim that the tool doesn’t control what users present or how it is used.

Schwartz claims that PowerPoint is here to stay and “not always for the worse” (pg. 165).

Reaction

This article caught my eye because despite the length of time PowerPoint has been around, I’m just learning how to use it – and I like it. I’m discovering it is far simpler to use than I thought and wish I had begun using it sooner. If I had, I would have better records of trainings and meetings I’ve conducted. I find myself often re-creating material that I shouldn’t have to because I haven’t kept things organized in such a way to access it when needed. I like what I can do with this program, and for the most part have not found presentations I’ve attended poorly done. I like being able to use handouts that are consistent with the slides and can make notes accordingly. It’s true that when presenters do little more than read the slides to an audience, one could take offense at this, if they even stay awake to do so. But again, this is a decision of the user. If someone is not effective at presenting, it probably won’t make much difference what tool they use to share information. It probably won’t be well done anyway. It’s shocking to hear that a team of NASA engineers would use such poor judgment as to present crucial information in the way they did. This is a gross mistake on their part. It’s not the fault of the application. I like PowerPoint and I agree with the author – I think it’s here to stay.

Saturday, December 8, 2007

Why Spyware Poses Multiple Threats to Security

Thompson, R. (2005). Why spyware poses multiple threats to security. In P. De Palma (Ed.), Computers in society (pp. 121-123). Dubuque, IA: McGraw-Hill.
Unit 6, Article 28

Review by Kim Doyle

In this article Thompson warns us of the growing threat of spyware referring to it as annoying and impacting the computer experience in very negative ways. Thompson also informs us that it poses a very real threat to corporate and even national security. Spyware is software downloaded unknowingly and presents real and pervasive dangers that are not always known. They are also not very obvious. Spyware installs itself silently on a PC where it begins any number of unwanted actions. Among these are "phoning home", where information about a PC user and their computer habits are sent to a third party to use to spam a computer. Another tactic is to capture keystrokes a user types thereby accessing personal information, bank accounts, passwords, etc. While spyware presents this threat to security and privacy, it can also harm computer performance. The addition of spyware can significantly slow down a computer's boot time which if multiplied by the number of PCs used within an organization, can wreak havoc on productivity.

This article points out that thousands of spyware applications are downloaded every day in large organizations in which employees use the Internet. Some of these applications are undoubtedly intended to steal passwords and critical data. Thompson notes that despite its prevalence, it is probably the least understood espionage tactic used today. Also very disturbing is that spyware is used by terrorists to disable computer networks during crises.

Thompson offers some potential solutions. He suggests the first line of defense is education and protection. Anyone connected to the Internet must know they are part of an incredibly complex network. Spyware creators take advantage of this. Organizations such as COAST (Consortium of Anti-Spyware Technology), are being created to make users aware of the spyware threat. The second line of defense presented in this article is disclosure legislation. All applications should be readily identifiable by users prior to installation so that users know what is being downloaded to their systems. The third solution offered by Thompson is aggressive prosecution. Lawmakers should aggressively pursue those who use spyware to disrupt service and steal private information. The final line of defense is planning for spyware attacks and developing responses to them. It is important, notes Thompson, that businesses and government work together to address this issue and develop safeguards to protect the security and privacy of Internet users.

Reaction

I knew nothing about spyware prior to reading this article. It is quite frightening and leaves one with a feeling of being violated. It is a very uncomfortable thought to think that each time I log on to the Internet, spyware users may be accessing my personal information or tracking my keystrokes to tap into my bank account. It is particularly discomforting to learn that terrorists are using spyware to disable computer networks. It makes me want to discontinue posting articles on this blog for fear of creating an avenue for a spyware user to access my information. So I believe I will sign off for now and hope that Thompson's proposed solutions are taken to heart by those in a position to disable these insidious threats.

To Size Up Colleges, Students Now Shop Online

Carnevale, D., (2005). To size up colleges, students now shop online. In P. De Palma (Ed.), Computers in society (pp.105-108). Dubuque, IA: McGraw-Hill.
Unit 5, Article 24

Review by Kim Doyle

Destination-U is now one of the many online resources where students can go to learn about various colleges. College officials know their website is the first point of contact for prospective students and must make a good impression. So they are going all out to make their website as inviting and helpful as possible. Drexel University, one of the colleges cited as an example in this article, provides e-mail addresses of current students who have agreed to respond to questions from prospective students. Joan T. McDonald, VP for enrollment management at Drexel notes that the tricky part of technology is having enough staff to make sure that responses to student inquiries are pretty much instantaneous. Drexel officials have also done everything they can to make sure their institution comes up at the top of as many Google searches for colleges as possible. They do this by making sure they use the Meta tags, hidden descriptive information about Internet pages that search engines use.

The College Board offers one of the most popular college-match services. This is free to the public and officials report that on average, more than one million students use this service every month. Students fill out a questionnaire identifying what they are looking for in a college, location, etc. The search provides a list of colleges that match the criteria given by the student.

Gregory A. Pyke, senior associate dean of admission for Wesleyan University, says that colleges now need to be prepared for surprise visits by prospective students. Doing initial research on the Internet may eliminate the step of contacting the college in advance to set up a visit. Other officials are quoted in this article saying that despite the advantages technology offers in the college search process, admissions personnel have not given up on the personal touch. Most still develop glossy brochures and students will still want to arrange visits to get a feel for colleges.

Reaction

I don’t find this surprising. Given the expanse of the Internet and the information available at our fingertips, why shouldn't colleges be using it to market their “product”? I think this is a great way for students to learn about colleges and for colleges to make themselves known. Prospective students can become aware of many colleges and universities that they may never have considered or even known about. And, this process enables students to learn a fair amount about a college if a visitation is not possible. I’m glad that some of these services are free. As my kids approach college age, I’m sure we will be checking them out.

Saturday, December 1, 2007

Making Yourself Understood

Dearlove, D. & Crainer, S. (2003). Making yourself understood. In P. De Palma (Ed.), Computers in society (pp. 54-59). Dubuque, IA: McGraw-Hill.
Unit , Article 13

Review by Kim Doyle

"In the age of technology, writing skills are more important than ever" submits Stuart Crainer and Des Dearlove in this article (pg. 54). Business leaders have more ways of communicating that they have ever had before, including e-mail, text instant messaging, video-conferencing and much, much more. These executives no longer rely on secretaries to correct and filter messages before sending them off to their intended recipients. They are responsible for creating their own messages and deliver them instantly. Crainer and Dearlove suggest a downside to this. Messages can now be easily misunderstood if they aren't lost in the deluge of messages flooding email inboxes.

The authors state that, regardless of these digital options, writing is still a fundamental skill necessary for good communication. Some believe that multimedia technology diminishes the need for strong writing skills. Don Spetner, senior Vice President for global marketing of a recruitment firm believes this is a misconception. Writing is still a very important core executive skill. Executives are spending more and more time writing. Email is one attributing factor to this. Hours are spent each day reviewing and responding to email. Jeff Skill, former eBay president believes that despite this time spent on email and in front of the commuter, communication skills are declining.

Crainer and Dearlove continue by stating that the style of business writing is also changing. There is a growing need for executives to ensure their communication is clear, direct and when necessary, personal. No longer relying on a hierarchy to get things done, executives communicate directly to guide, state expectations, persuade and inspire.

Instant messaging is a sign that things could get even worse. At a time when written communication is becoming more important than ever before, we are faced with the challenges of interpreting oddly abbreviated language, misspelled words, jargon, poor punctuation and terrible grammar.

Many executives who are discovering the need to improve their writing skills are finding help is now available. Writing coaches, classes and ghostwriters are on hand to assist those challenged by less than adequate writing ability. Communication consultant Lynne Kearney says the explosion of electronic information distribution provides "enormous opportunity and an enormous amount of content to be digested" (pg. 58). Previously having worked with business leaders to develop writing courses, Kearney says they now receive calls directly from senior managers requesting highly customized programs with the right content and packaged to grab readers' attention.

As the authors state, it is necessary now more than ever, to have the "write stuff" (pg. 59) and an accurate self-awareness of one's ability.

Reaction

Writing is a necessary skill for my work. I write a great deal creating various types of documents. Many of these are instructional and serious consequences will result if they are not very readable and carefully understood. I am also critical of others' writing and become impatient when I do not understand something someone else has written. I believe the digital methods of communicating used so profusely do draw attention to the fact that writing is not a skill everyone has mastered. With email we are now recipients of quickly crafted messages that with a touch of a send button our sender has informed or confused. This article has presented a perspective that I've not given much thought. I agree however, that having the "write" stuff is essential.

Making Meaning: As Google Goes, So Goes the Nation

Nunberg, G. (2003). Making meaning: As google goes, so goes the nation. In P. De Palma (Ed.), Computers in society (pp. 85-86). Dubuque, IA: McGraw-Hill.
Unit 4, Article 18

Review by Kim Doyle

In this article Nunberg describes the factors that influence rankings resulting from Internet searches. Google, the largest search engine, estimates its index has more than 16 million pages and conducts 55% of all Internet searches. The author indicates that a high Google ranking has considerable value to commercial sites as well as to ideas and opinions. The primary factors influencing Google rankings are how predominantly the search term figures appear in the pages and the number of links sites have to other pages. When a common word is used for a search, the top ranked sites will be those that are linked to a high number of other sites also containing the search terms. A more specific search will align with the interests of groups that aggregate around certain topics. What this means, as we read in this article, is that the dominant voice or idea will influence the results of a search, even so far as to imply a conspiracy, as a friend of the author once suggested. This leads to the complaints of some that feel the Internet is not a reliable source of information and search engines are not working as they should. The other side of this argument is that search engines are doing exactly what they should by providing an avenue for those with a particular interest or knowledge of a topic to voice it. Nunberg refers to the Internet as "uniquely democratic" (pg. 85). The major sites with the most money and power will be the top ranked and, in the case of a specialized topic, the Internet will appear to favor those that care most about it or have the dominant voice. Nunberg cautions us to be aware of this and reject the assumption that what a Google search produces reflects the consensus of the "Internet community" (pg. 85).

Reaction

I agree with what the author is indicating in this article. I believe many rely strongly on internet searches for information on any topic and it is appropriate to be cautious of what searches produce. It is often radically opinionated or very inaccurate. I use the internet with discretion. I will often check multiple sites and other resources to verify information. As a graduate student I have come to utilize the Internet extensively. While I find it an incredible resource, I also know I must be careful to know that it can't always be trusted to provide valid information.