Posts

Review: The History And Impact Of YouTube

Image
Today I am writing a review of a paper covering history and impact of  YouTube. It is written by Tashi Kamlaldin Rwalshrangpa, Sanan Mammadli, Adeyimika Agboola Adetunji, Alejandro Ballesteros Perez, Louis Alvin. The paper overall structure was very good, firstly a history of YouTube, then the technical aspect of it(as we are IT students) and then social aspects and society influence of  the platform. A little bit more division of paragraphs would ease reading, but overall it was not difficult to read it.  The language used in the paper is easy to understand, didn't use complex English dictionary. Sources are very well sited, there are plenty of them. You can see all the references mentioned very clearly.  The paper was interesting to read. The articles were exciting, and I have learnt many facts that I did not know. I really liked the fact that they covered the technical aspect of  YouTube and the way it stores videos. Also, mentioning the social and political aspects was very imp

The Social Contract Theory

Image
The Social Contract Theory was first formulated by Thomas Hobbes in his book Leviathan and later added to by Locke and Jean-Jacques Rousseau. According to it, the society should strive to develop a set of rules that make sense to everyone (making people follow them voluntarily). For instance, driving on the right (or in some places, left) could be a common example - drivers keep to the right not for fearing the police but to avoid confusion and possible crashes. This theory can be applied in IT ethics. User Interface and overall User Experience is crucial in Web Design. Good product should be easy and understandable to use, otherwise users won't be happy to use it. Consumer will prefer a product that is easy to use and doesn't require any special training. Apple is very famous for concerning about user experience, starting from packaging, ending with small animations that guide you what to press.  A good example of developed set of rules, that make sense to everyone in IT is we

If a person has control over any function, it can also be used to control the computer

Image
Stephen Hawking is a well-known British physicist and a world-class scientist, who is considered the most practical theoretical physicist since Albert Einstein. At the a very young age of 22, Stephen Hawking contracted Amyotrophic Lateral Sclerosis (ALS) also referred to as motor neurosis. It causes muscle twitching and deterioration of muscles which leads to degeneration of muscles, difficulty in swallowing, talking and even breathing. Initially, doctors made a prediction that he has only 2 years left to live. But the genius went on to live up until he turned 76 and passed away in 2018. A human with such a rare degenerative disease went on to do phenomenal work in physics on Black holes and became one of the most outstanding scientists of all times. He was the best selling author of his time. Now, a question rises: how did a disabled man who could barely move his muscles got around to start giving lectures and writing books? This is where comes the intervention of Intel that has helpe

The values of hacker ethic

 Hacking has been around for a very long time. Normal people see it as some nerds quickly typing stuff in terminal console. In reality, it is much more complex, and hackers have their own ethics. Pekka Himanen in his Hacker Ethic has proposed that the hacker ways are in fact a new 'step up' from Max Weber's classical Protestant work ethics, just as the latter was a step up from the older pre-Protestant attitudes. In my opinion, passion, freedom, work ethic, nethic, money ethic, caring and creativity are all essential parts of hackers' values in the current world. Passion drives every interest that there is. Without passion, there is no motivation, therefore no results. A hacker must be passionate in order to be sucessful. Freedom is required to be able to explore. Without freedom, there would be no creative exploration and interesting new results. Work ethic is important in any part of life. Without it, results can not be achieved nor the progress be made. Work ethic di

Censorship and privacy

Image
 In 2018, Russia tried to block Telegram, after it Pavel Durov rejected to meet the new Russian's law requirements. The Yarovaya's law, which requires operators to save all voice and text messages of their customers for six months, and their internet traffic for 30 days, went into effect in Russia on July 1, 2018. The position of Moscow's Meschansky district court is that, in accordance with the Yarovaya's law, social networks are required to store encryption keys from all user correspondence and provide them to Russia's Federal Security Service upon request. Telegram management insisted that this requirement is technically impossible, because keys of opt-in secret chats are stored on users' devices and are not in Telegram's possession. Pavel Durov, Telegram's co-founder, said that the  Federal Security Service demands violate the constitutional rights of russians to the privacy of correspondence. On 13 April 2018 Moscow's Tagansky District Court has

Mitnick formula

Image
Estonia can be considered one of the most developed countries in terms of cyber security. According to Global Cybersecurity Index, Estonia is in TOP-5 in the world in terms of cybersecurity.  The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each country’s level of development or engagement is assessed along five pillars – Legal Measures,  Technical Measures, Organizational Measures,  Capacity Development, and  Cooperation – and then aggregated into an overall score. Estonia is the first nation in the world to implement electronic voting, which is a gigantic cybersecurity challenge - to provide both anonimity and trust, which are key elements of fair election. It has a well-developed system of ID-cards and signing the docu

Bad design consequences

Image
Human errors are inevitable. Flaws in design can lead to serious consequences. In IT small errors can affect millions of users and create a PR nightmare for the company. One of the examples that came to my mind was Samsung Galaxy Note 7 battery catching fire.  Back in 2016, Samsung discontinued its Galaxy Note 7 smartphone just two months after its became available on the shelves, due to battery defects causing the phone to overheat, combust or explode. Around that time, Samsung Galaxy S7 Edge also reportedly caught on fire. But the main focus was on the Note 7, as it's definitely the smartphone that became Samsung's biggest advertising nightmare to date. The phone's battery reportedly had a flaw in design that made it prone to bending, and indeed, there were  dozens of reports of Note 7s catching on fire. The Note 7 was quickly withdrawn from sale and Samsung tries and forget about it as a their error from years ago, but there are reports that the brand new Galaxy S22 may