2008年6月8日 星期日

2008年5月4日 星期日

Final Writing Assignment

Before I doing the volunteer work, I was nerves about taking the job. I was worry about that I cannot do the work right, and cannot complete my work. And also, I never have a job before, and when the professor said that I should look this volunteer work as a real job, I knew that this is not a joke; which made me even more nerves.
After I finish this work, I realized that this is not just a work that I went every Friday. I actually learned something during this time. I know how different this society is; I know how people can be so different than each others. And I finally understand why those people need help, and why rich people can only get richer and richer. I use to hate homeless people, and also afraid of them a lot. But after this semester, I realized that they are not so different with us. And sometime, they are even more afraid of us than we do.
I think this volunteer work really changes me a lot, and there is probably only one thing which I didn’t change in my mind- I want to be a really rich person. In this way, I can help way more people out there.
I love this work and I believe I will do even more volunteer work in the future. This actually makes me think that my life finally means something.

2008年4月20日 星期日

community partner


• What is the organization, and where are they located?
o Network Ministries
o 336 eddy st, San Francisco, CA


• What population do they serve?
o They help people who has low income around Tenderloin with issue relate to computer. They also open free computer classes for those people who want to study computer.


• How big is the organization?
o This organization is made up of teams with 4-6 people.


• How long have they been in existence?
o Since 1972, 36 years old.


• Are they a local organization, national, or international?
o Local organization.


• What is their mission?
o They want to bring technology into low income society in order to help them to increase their opportunity in the society. They also help them to understand what the outside world looks like now with all the computer stuff. Basically, Network Ministries is like a bridge connects their world to the advance real world.


• What are you doing with them this semester?
o I have to go to Network Ministries every Friday to help or teach senior citizens with all kinds of computer problems and skill. Sometime, we also need to fix computer problems. (Software, hardware, etc.)

2008年4月6日 星期日

Digital Information Writing Assignment

Amazon & iTune – they make money by selling songs individually, which means they don’t sell songs in one CD album; the consumers have the choice to buy the song he/she wants instate of buying just one CD which also include bad songs.


KKBox- this sofeware is from Taiwan. They charge monthly fee. And u have unlimited download. But the disadvantage of this program is you won’t get the newest song of the market. And also, you can download whatever song you want as long as it is in the downloadable list, and you don’t have to download the whole CD. If you want to download the newest songs on the market, they will charge extra fee for doing that.


For all three programs/website, they all use similar system. Those songs you wish to download can only play on certain media player.

For Amazon, you need Amazon MP3 Downloader application to download the song. Although you can play the song on iTune or Windows Media Player, but there’s protection on the mp3 file which makes it’s harder to share the music or video, etc.

For iTune and KKBox, you can only download the file via their software, and you can only use the software to play those file you downloaded. Also, you need to create an account before you use these software (buying music); and these software will use this account to identified the music you downloaded to see if you have the right to play them.

2008年3月16日 星期日

The Cathedral and the Bazaar


What does Raymond mean by the 'cathedral' and the 'bazaar' style of software development?

  • Cathedral- carefully crafted by individual wizards or small bands of mages working in splendid isolation, with no beta to be released before its time.

  • Bazaar- all people (could be anyone on the internet) work together on the project. And by releasing the bata version, people all around the world can work on one project.

According to Raymond, what is necessary for a successful bazaar-style project?

  • It has to be open-source.
    Certain software designing and coding skill is required.


Do you think Raymond's characterization of these styles of development is accurate? Why or why not?

  • Yes. The whole point for Linux system is “Open-Source.” Because of this, Linux software should be done by “People,” not “person.” And with more and more people involved into the project, the more good ideas will get into the project too.

In your opinion, what sorts of projects tend to be successful open-source projects? What is it about them that causes this?

  • One good example, Wikipedia: this is not about software, but it is really simuler with open-source spirit. And as people can see now days, wikipedia have got great success already. I believe that’s because everyone can join it, and people can share and receive knowledge from each otheranytime at anywhere.

In your opinion, what sorts of projects are better suited for commercial development? Why is this?

  • Software likes Micresoft Office. That’s because this kinds of softwares are require high level of stability. That’s why it is probably better design and written by one group or one certain people.

2008年2月24日 星期日

LAMP

Lamp stands for
Linux-OS,
Apache- web server,
MySQL -database server,
Perl( or PHP, Python)-programming language.

(Combining 4 technologies together)

LAMP is use to run used to run dynamic web site or servers. And people are so interesting in this because
First, LAMP is free and open sources.
Second, it is stable.
Third, the efficiency is as good as “J2EE” and “.Net”.

2008年2月17日 星期日

Chapter 3- first two bullet points in Exercise 3.4 (p38).

1)

  1. I believe that the reason why the police damaged the painting was because he did not agree with how they paint the mural. basciallt, he sis not like the idea how they gonna paint the mural.
  2. Also, i believe the factor was because the those people's image(Virgin of Guadalupe, Jesus, Padre Miguel Hifdalgo, Mother Theresa) in his mind is way too different with those artists, students, etc's idea.
  3. The ideally way to respond this situation is to report that to the person who has higher prosition in the police system; or even better, report to the news, let the whole society know this thing.

2) i believe that "I" and "We" are unseparatalble, "We" are maded by "I". Without "I", there are no "We"; and without "We", "I" means nothing. For example, each students, artists are "I," and the mural is made by "We." the mural repersent all "I"s = "We."

More Privacy

i believe that privacy is a negative right because privecy is use to help protect people's property; for example, personal information, home address, bank account, etc. Digital privacy is a person's right to protect his/her own property relate to digital data; this is my definiation for digital privacy. the most populer way for people to use in order to protect their own data in digital privacy is password. and what does pasword means? it means protection in the digital world. that's why i believe that privacy, especially digital privacy, is a negative right.

2008年2月10日 星期日

Service Learning. Chapter 1 of Learning Through Serving.

I believe it is reasonable and appropriate for colleges to educate their students about engaged citizenship. That’s because at the botton line, we are still students, we are still learning. The reason we are still learning is because we are not ready to enter the society. Although I believe that college should educate students, they should not say which things are right or wrong. College students are different than other students, they know how to think, they will create their own principle and follow that, and they know when to correct their own principle. It is ok that they did something wrong; the problem is did the college teach them how to correct themselves? College is like a small society, we learn how to improve ourselves in the college, and we learn how to engage into the citizenship in the college. It is ok that we did something wrong sometime because it is our responsibility to think; and it is the college’s responsibility to teach us how to think.

Privacy.

Basically, after Google release Google street view, they also allow people to remove any picture which has them inside. Google’s reason was any pictures you can find on the Google street view are the same with those view you can see on the street. So there should not be any problem about showing those pictures on the internet. But from other people’s point of view, they believe that you can see them walking on the street, but you have no right to show other people how them looks like, because they have the privacy of their body, house, cars, etc. I believe that that’s no problem to show those street pictures on the internet because those are public properties. But Google has no right to show people’s face on the internet; and what Google can do is use software like Photoshop to erase those people and their properties in the pictures before they put on internet.

2008年2月3日 星期日

career plans and goals

In the future, i really wanna join Americn company in Taiwan, and do works realate to computer.
and after that, i hope that i can open my own company to sell something creative and interesting.

and in fact, what i really wanna do is to be a philanthropist and help those poor African kids.
so as long as my job in the future can help my family, African kids, and meaningful. i ll be more than happy to do that.

1. Explain the difference between symmetric-key and asymmetric-key encryption.


How are keys distributed with each technique?


symmetric-key:
It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit.


asymmetric-key:
It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.


Why is each technique cryptographically secure? In other words, what needs to be done to crack a ciphertext encrypted with each algorithm?


symmetric-key:
because the symmetric-key system only need one key, in order to crack the message, you only need the key. Or you can find the pattern how they encrypt the message. For example: the encrypted message is “Lbj-Xfo,” and you can probably guess that the real message is “Kai-Wen” by moving each letter to the prior letter. (but you probably need to try out every single possible.)


asymmetric-key:
asymmetric-key is like double encryption. First, the user use his private key to encrypt the message, them he/she public the message with public key; although everyone can see the message, only the person with his own private key can decode the message. So, in order to crack the system, you need the person’s private key, or need to know how they created the private key. It is almost impossible to crack the system because the key is too big.


How can each technique be used to confirm a sender's identity?


symmetric-key:
Symmetric-key confirms sender’s identity by knowing who can encrypt the message or decode the message; in other words, by knowing who has the key.


asymmetric-key:
Asymmetric-key confirms the sender’s identity by double the encryption. One person encrypt the message with his private key, and send that with public key. And only the person with another private key can decode the message. The person can also use his private to encrypt his sign in order to let the other person know who he is. (Digital Signature)


What are the strengths and weaknesses of each approach?


symmetric-key:

  • advantages
    Safer (lots of probability), and faster.

  • Disadvantages
    One time transactions, how to give the key to the other person. And once other people know the key, you have to change the key at both sides.


asymmetric-key:

  • advantages:
    Allow letting other people read the encrypted message without any risk.
    No problem for distributing the key.

  • Disadvantages:
    Big and slow.

2008年1月27日 星期日