It starts at an early age; the American Dream is shoved down the throats of children with the ever-so pressing question: what do you want to be when you grow up? Most kids answer generically; they all are quick to respond with doctor, teacher, firefighter, president. These kids are then met with a smile and a gentle nod as they are told to pursue that career path in their futures. But what if, instead, those children said that they wanted to be artists, writers, musicians? They would not be…
Cue the Flashback sequence: It was the year 2000, and I was well into my career as a young Private First Class in the military, looking forward to promotion to specialist very shortly. My team chief, Staff Sergeant Bond called me into the office and asked me, “Benjamin, do you have AKO (Army Knowledge Online)?” The acronyms started running through my mind as I scrambled to think of what that could be. Surely I had it, I mean, after all didn’t everybody? After about a minute I decide to own up…
How has the Internet Impacted Information Privacy? Privacy is something many of society takes for granted. It is something that we all are given as human beings but throughout the years, the concept of privacy has changed. Sharing personal information such as family details, personal photographs and insights into our lives have become part of the norm in society with an increase in the popularity of social media networking sites such as Facebook and Instagram. Due to this, gathering information…
they reach their destinations. 83. Describe and explain the idea of "network neutrality." Are you in favor of network neutrality? Why or why not? Answer: Network neutrality describes the current equal access by users to Internet bandwidth, regardless of the services they are using on the Internet. Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content.…
Introduction Voice over Internet protocol (VoIP) or IP telephony is the name for a multimedia application that involves streaming audio between users through IP networks. Audio is digitized and sent across IP networks and then converted again to a playable format. It is rapidly growing in popularity due to its cost-saving nature. While there are a variety challenges that need to be overcome in order to make use of this technology widespread, VoIP has the potential to replace traditional phone…
U.S. Cyber Threat It is up to every single citizen in a nation to protect the way of life they love and have grown accustomed to. Threats upon this way of life are not only dealt with by the government officials appointed to monitor them. The responsibility of sustaining a healthy and safe nation falls upon the shoulders of every citizen within the borders, or simply citizens with any interests inside the borders. Some threats may be much easier to identify than others. Even with every citizen…
AMD After years of frustrating performance, Advanced Micro Devices Inc. (NYSE: AMD) appears to have turned the corner and is a hot commodity on Wall Street. It is one of the largest suppliers of PC microprocessors and graphics processors worldwide to computing original equipment manufacturers. The company’s main product lines include desktop, notebook and graphics processors, and embedded/semi-custom chips. Last year the company released its first major offering in five years, the Ryzen chipset,…
crashing the target machine. A Smurf attack is a type of Distributed Reflective Denial of Service attack, which uses an attacker system, amplification network, and a target. The best way to prevent a DoS attack and its variants would be to supply more bandwidth to the network. Although this is expensive, it makes it much more difficult for an attacker to coordinate an attack large enough to buckle the network. Setting up multiple servers can also help because the entire network becomes less…
“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We 've created life in our own image.” (Hawking, n.d.) No matter what humans invent it will always end up being used for warfare and computers are no different. Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world.…
Anonymous is a group of hacktivists that wanted to expose corrupt companies and businesses while starting mass awareness and staying unknown. It started out as joke on 4chan, an imageboard website in 2003. They went by the motto “none of us are as cruel as all of us.” Anonymous doesn't have a form of organization or logistics but the way an operation is started is by a member talking to other members about an idea. If they think is a good idea, they will support it. If not supported, the idea…