Social Networking

Social networking sites are growing more popular every year. In an article at www.about.com , Facebook is listed as the number social networking site in the United States. (http://webtrends.about.com/od/socialnetworking/a/social_network.htm) The article goes on to point out that there are different types of social networking sites, general purpose sites, special interest sites that follow a theme, and international sites. General purpose sites are sites like Facebook, MySpace, and Twitter. These sites offer social networking on a large scale with large user bases. Special interest sites are sites such as Flixster which combines social networking with movie reviews, and LinkedIn which is a business oriented social platform. Xanga is another special interest site that is a social network combined with a blogging platform. International social sites include Badoo, the number social networking site in Europe, and Studivz, a German version of Facebook popular with students. For anyone interested in social networking, there are plenty of options available and the sites can be used in different ways, regardless of the type.
I currently use Facebook for my social networking site and I previously used MySpace. I like the layout of Facebook and it is very user friendly for me. I think social networking sites can be impersonal, interpersonal or hyperpersonal depending on the people you are communicating with on the site. For me, Facebook is very interpersonal as I talk to a lot of family and friends that live in other states. I do notice that some people tend to over emphasize emotions when communicating on facebook. For instance, jokes that would get a good chuckle in person get an "LOL" (laughing out loud). I find e-mail communications to be somewhat impersonal, even when talking to those that I am close to. Facebook adds a more personal dimension to my communications. Facebook and other social networking sites give everyone a way to communicate at whatever level they are comfortable with, whether impersonal, interpersonal or hyperpersonal. The options available for social networking also meet the needs of a variety of users. It is easy to see why this communication trend is growing in popularity.

Groupon Says No to Google

Can you imagine turning down a $6 billion buy out offer from Google? Well, that is exactly what the online coupon site Groupon did. Groupon offers daily coupon deals to its users. For example, you could purchase a $100 voucher for a restaurant for $50 dollars. The catch is that a minimum number of vouchers need to be purchased before the deal is complete. The technology Groupon utilizes is not at all revolutionary. In fact, Bond (2010) reports that the idea behind Groupon is easy to duplicate and that hundreds of websites have sprung up across the globe that provide similar services.

Groupon's advantage comes from its business model. The "daily deals" are customized to the user's region. A user from Pittsburgh will only see deals for local Pittsburgh businesses. Addtionally, users can add personal interests to their profile, further customizing the deals that are available. Groupon is able to do this because of their organizational structure. According to Bond (2010), Groupon employs over 2,600 individuals, most of whom are NOT techy types. They are sales people who personally know their customers.

Most people would assume an offer from Google would indicate that someone had developed some new form of technology. In this case it would appear that Groupon found a way to personalize an internet business. I guess they wanted to hold onto that "innovation" a litle bit longer.

Bond, Andrew. (2010, December 10). A bullet that wouldhave made Google stronger. Retrieved from http://www.fool.com/investing/general/2010/12/10/a-bullet-that-would-have-made-google-stronger.aspx

To Chrome or Not To Chrome

Betanews.com user PC_Tool had the following questions regarding their review of Google’s Chrome Laptop, "'Where is Works?!? Where are the MSN and Yahoo! messengers? What? You cannot even install them???!? Where's my Windows Live Mail client? Why can't I find anything on this thing?!?!' Yeah. The average consumer? Doesn't handle frustration well" (Wilcox, 2010).

Google has started a pilot program for users to test their new Chrome laptop which is expected to be released during the second half of 2011. This may sound like incredible news to some, but this is not your everyday laptop. So, what is different you may ask? Well this laptop runs exclusively using a home wireless network or Verizon’s 3G network, and all of the applications are accessed via the web browser. With a Chrome laptop, users no longer install software locally using a CD or DVD, but instead access and install applications using the Chrome Webstore. A cool feature of these applications is users can access their files anywhere, because they are stored in the cloud or Internet. Another great feature is users get 100 Mb of data transfer free using Verizon’s 3G network.

Google’s laptop has great features and all, but what type of user does this system benefit? This laptop is perfect for an average user who does nothing more than instant messaging, social networking, emailing, or casual surfing. It is also a good laptop for software engineers who are looking to break into a new market by creating applications for Google's Chrome operating system. This laptop is, however, not good for any users of graphically intensive software like games or video editing.

I personally have applied to become a member of the Google Chrome Pilot program because I believe a laptop like this will be great for long vacations and also because I enjoy new technology. If you would like to become a tester, or just want more information, please visit http://www.google.com/chromeos/#utm_campaign=en&utm_source=en_us-ha-na-us-sk-launch&utm_medium=ha&utm_term=chrome%20pilot%20program.

References

Wilcox, J. (2010, December 12). Who really needs a chrome os laptop?. Retrieved from http://www.betanews.com/joewilcox/article/Who-really-needs-a-Chrome-OS-laptop/1292189689

Can we have some manners please?

“But when we communicate online, whether it's on Facebook or through email, or when we tweet or text, what's missing? What specific elements do we miss out on when we trade face-to-face communication for connecting through our computer or blackberry? It may seem obvious to some, but I think we tend to forget about the importance of HYPERLINK "http://www.psychologytoday.com/basics/body-language" \o "Psychology Today looks at Body Language" body language , voice inflection, and the simple act of looking someone in the eye during a conversation. Granted, technologies such as Skype can provide us with the screen image of the person to whom we're talking. But is eye contact as palpable on a screen as it is in person? And how ‘undivided' is our attention when we're reading someone's email message, as opposed to when we're sitting across a table from them? Can a text message convey the nuance of a facial expression?” (Nogales)
I have several social sites that I use. I use facebook for my personal and linkedin for my business. I find that my facebook is almost hyper personal because I find that I over give information about my life. I used it talk with friends, family and make new ones. I have also dated a few people off of the site but I do find at time it has become intrapersonal because I will correspond with people that I somewhat know but not on a personal level of others on the site. On linked in however it actually feels impersonal and I actually find I don't use it unless I am looking for an employee and/or resources for my work and it may turn to interpersonal if I use email to go back and forth with them. I think it varies depending on what you use it for and how much you feel like sharing, I have a habit of over sharing and sometimes think it works against me but it can be a good way to communicate with persons you may not be able to talk to as much as you like.


Nogales, Ana Dr. (October 2010) Face Book Vs Face to Face Psychology Today Blogs retrieved from "http://www.psychologytoday.com/blog/family-secrets/201010/facebook-versus-face-face" http://www.psychologytoday.com/blog/family-secrets/201010/facebook-versus-face-face

What is Twitter?

“What is Twitter? It is many different things to many different people” says Daniel Nations from About.com in his 2010 article title simply, What is Twitter? Twitter Explained. I selected this form of social media as I was quite frankly clueless and am “old school” according to my children. Social media itself boggles my mind with its instant connection to the world and people. But Twitter brings instant connection into a totally new realm of “hyper-instant” that can be used for all three types of communication: impersonal, interpersonal, and hyperpersonal again supporting Mr. Nations definition of Twitter being “many different thing to many different people” (Nations, 2010).
Mostly the craze with Twitter is advertised for use to give out hyperpersonal communication for those that like to share their daily activities to post them to the world, such as, “I just finished making dinner.” But if you take that statement further using Twitter and “tweet.” I just finished making dinner using Alfalfa’s Organic Bean Sprouts and it was great,” you have extended your communication into both hyperpersonal and interpersonal advertising to try entice you to try the sprouts. And finally you can go one more step and “tweet” Made dinner, Use Alfalfa’s Organic Sprouts recipe I saw on Healthy Cooking Twitter, bought them at 9th Street Market, on sale! Perfect for the health and pocket” you add to your hyperpersonal, interpersonal statement a new twist of marketing for Alfalfa Sprouts.
I did not realize the extensive use of Twitter until I read this article and finally got it. “Twitter is micro-blogging. It is social messaging. It is an event coordinator, a business tool, a news reporting service and a marketing utility”(Nations, 2010).
Nations, D. (2010). “What is Twitter? Twitter Explained.” About.com. Retrieved December 10, 201 from
http://webtrends.about.com/od/socialnetworking/a/what-is-twitter.htm

LinkedIn, a Useful Tool for Connecting Business Professionals

Since I’m new to the business world, I haven’t used LinkedIn myself however, my wife has for years so I ‘interviewed’ her. It seems that the standard protocol is to use Facebook for personal and LinkedIn for business contacts and never, ever let the two intertwine!


LinkedIn satisfies two key purposes: it allows you to keep in contact with former colleagues, see their progress in their careers. It also allows helps in the job hunt realm. Recruiters can find you there and if for example you’re interested in a company you can look that company up in LinkedIn and see if you have anyone in your network connected with anyone at that company and get ‘introduced’ virtually. These are forms of interpersonal communications. My wife is currently working at a job that she was recruited through LinkedIn for. That being said, she wouldn’t want any of the people on that site to see her Facebook pictures from her 40th birthday party.


The below link brings you to a graphical explanation that supports the above definition.


http://www.linkedin.com/static?key=what_is_linkedin&trk=hb_what

Should you Friend your Physician?

Should everyone Friend?

“As your doctor, I might sit on the edge of your hospital bed and try to quell your fears and anxieties of being ill. Or, I might bounce into the examination room with a bright smile and try to make you laugh with one of my very funny (read: corny) jokes. We might sit together and catch up on your life over the past six months since we last saw each other. In fact, we might have a patient-physician relationship that makes other patients and physicians utterly jealous.
But, please, don't ask me to be your friend. That is, your Facebook friend.” (http://www/)

Should everyone accept all the invitations on Face Book? Most of the population accepts friends on Face Book to keep in touch, gossip, and communicate. Should you friend your own personal Physician? After all this is the person that knows you in a medical sense but nothing else. Should your Physician accept?

In all cases I believe it to be no. Keeping the Doctor patient relationship is the utmost importance to any healthcare professional. To have your personal physician as a friend on a social networking is not a healthy idea for the person/patient. There has to be a demarcation between the two of patient and physician. The case of a person being a social friend to your personal physician is not always the wisest choice. Again the demarcation factor and how wise is it to know your Physician can see or read everything you put out on the social network? It is like an open invitation to be viewed and reviewed.

Some of the post that I am able to see on Face Book are not proper or could be construed as being severely depressed or other disorders that a physician due his oath would have to take action. Most of the posts I see that could be mistaken are just whining notes but why put yourself out there for inspection from your physician on a daily basis. And is he or she really your friend? Would they have the same circle of friends and the same interests?

Face Book’s value is social networking and unless you are in the same social network as your physician it is never a good idea. There is no policy with the AMA as of yet but it is come to the front of the to do list.

(http://www) the Physician makes a good point, “For many of us physicians on Face Book, the thought of opening up our personal pages filled with family photos, off the cuff remarks and potentially relationship status and political and or religious views to our patients gives us the heebie-jeebies……..” The physician may share a potential view that his patients may take an issue to.

It is better left that Physicians do not friend patients. There are none of my Physicians I not want to have friend me on Face Book. It would not leave it as a social network but babysitters with your Physician looking on to make sure you are ok.

References
http://www. Usatoday (Vol. com/news/opinion/forum/2010-06-10-column10_ST1_N.htm?POE=click-refer). Retrieved from http://www.usatoday.com/news/opinion/forum/2010-06-10-column10_ST1_N.htm?POE=click-refer
http://content.usatoday.com/topics/topic/Culture/Computers+and+Internet/Facebook

Sprint

Sprint, like most cell phone companies, is currently jumping on board with new technology that will advance group collaborative communications. First, Sprint is offering on their phone plans unlimited text and web usages. There are even apps on Sprint phones for tweeting, Facebook and emails. One can get these apps set up to where they pop like voicemail messages on the phone. There is even a 4G network available for certain Sprint phones.

To help strengthen Sprint with its technology, Sprint has made alliances with several other companies. HP has helped Sprint with the mobility of business solutions. The next alliance is Sprint with IBM. IBM has helped Sprint with integrated business software programs. Microsoft has joined Sprint to help with security and reliable custom apps for business and personal use. With these alliances Sprint has succeeded in getting a leg up on its competition.

www.sprint.com

Forbes.com/sprint

Company Spotlight: Sprint Nextel Corporation /Marketwatch: Telcoms, March 2010, vol9, Issue 3 retrieved at www. Regis/library/business source complete.com December 11, 2010

Social Media and Divorce

"The most common reason seemed to be people having inappropriate sexual chats with people they were not supposed to," said Mark Keenan.

Facebook, MySpace and twitter are leading to more and more divorces. Divorce-online.co.uk studies 5000 different divorces files from the United States. The researchers found that 20% of those had a Facebook some where in the divorce papers. Senior digital investigator Giovianni Masucci at National Digital Forensics, Inc. states,”half the social media cases they investigate expose some sort of cheating”(Chen, S). The article does not mention any information about other social networking sites like Twitter or Myspace. It seems to me that if someone in a marriage is willing to have a sexual chat with someone other than their spouse on Facebook the marriage was headed for a possible divorce anyway.
According to CNN lawyers are using social media like Facebook to build cases for their clients (Chen, S). Divorce Attorney Lee Rosen says he uses websites like Flowtown.com to find all of the social media pages that someone may be using. Recently divorce lawyer Ken Altshuler represented a woman who was divorcing her husband because of alcohol abuse. The husband denied the accusation and claimed to have quit drinking. However, the lawyer was able to find a photo of the accused husband drinking a beer on Facebook. Professor of Psychology Elizabeth K. Englander at Brightwater State College in Massachusetts gives a reason to why some people post their whole life online even when they are seeing another woman or man. Englander states, “ the sense online is sort of like the mob effect, you feel like you're one in a million, and so who will ever notice you?
While I do not and would never condone cheating on or lying to your spouse at least do not treat them as if they are stupid and blatantly post photos of you cheating and lying.

Chen, Stephanie. 2010. Divorce attorneys catch cheaters on Facebook. Retrieved from http://articles.cnn.com/2010-06-01/tech/facebook.divorce.lawyers_1_privacy-settings-social-media-facebook?_s=PM:TECH

O'Donnell, Matt. January 4, 2010. Study: Facebook often leads to divorce. Retrieved from: http://abclocal.go.com/wpvi/story?section=news/bizarre&id=7199535

Cyber bullying - More than you Know

“Cyber bullying is an imprecise label for online activities ranging from barrages of teasing texts to sexually harassing group sites. The extent of the phenomenon is hard to quantify. But one 2010 study by the Cyber bullying Research Center, an organization founded by two criminologists who defined bullying as "willful and repeated harm” inflicted through phones and computers, said one in five middle-school students had been affected.” (The New York Times, p. Cyber bullying) Have you been a victim? You would be surprised at who has been bullied and who does the bullying.

I run a non- profit college planning organization and I had to get special permission to blog even for my secondary educational needs. It was approved only with all my information being researched and checked. The Board of Directors approved the topic of Cyber Bullying because the group has mentoring programs on internet safety and use and feels any enlightened conversation will help the young students.

Cyber bullying is everywhere in the news, TV, and radio. I would go one step beyond the teenage and middle school crisis and touch on another issue of cyber bullying with religious groups. These groups include both Far right, left, and atheists.
Everyone’s point of view is correct one group says the world is 6000 years old another group says it is millions of years and the argument of who is correct leads to more arguments. My experience comes from a local networking group in a community I lived in for most of my life.

I decided to join a study group to learn more of the religions of the world. I contributed as was expected and part of the agreement with the group. We had full disclosure and agreements in place to not violate privacy and respect of others. Our contributions were mostly regarding community service and helping others and the different practices from around the world.

Then the zealots took over our group. Victimization on the internet comes in many forms. Cyber bully is the new buzz word but I would like to add one, “Pastors of the Internet” (POTI). What I mean by this statement the group came across self proclaimed pastors who were very innocuous at the beginning and very comforting to some of the group.

Slowly the change came about and the proof of the first statement “willful and repeated harm” as cited proved to be spot on target. The fact there were threats of violence did not become clear until the day the group did NOT say amen to one of the “POTI” posts of great length and rambling words of no meaning.
None of knew he was testing everyone and the threats started slowly at first and very obscure but it grew to the point people were threatened with death. I never gave my real name most of the people did identify themselves which I believed to be a mistake but everyone trusted. I had one of those gut feelings and I used an alias.

My research ended on this project and my class was done. I left this group and have never logged in since then. I could not take the brutal attacks on some members of our group. I was not one of them as I am fairly meek and mild with internet postings.

50, 60, and 70 year old people were bullied, called names, and told to die as they were too old to live anymore. All of this from a “pastor”, cyber bullying yes it is more than any of us can know. There has got to be an answer.

References
The New York Times. (2010, September 30). Cyber bullying. Message posted retrieved from http://topics.nytimes.com/top/reference/timestopics/subjects/c/cyberbullying/index.html,

Business and Social Networking

"How do most successful companies use social media?” Tweeting and Blogging To The Top –

Nora Ganim Barnes (Spring2010)

All companies should be asking themselves how they can become more successful, and work their way to the top through the use of social media. Two extremely profitable social media mediums are tweeting and blogging. But, there are some limitations companies will have to overcome in order to make tweeting and blogging pay off. First of all, there must be ground rules in place, for what can and cannot be said on social networks. Plus, if the wrong thing is said, it could be detrimental to an entire company and the company’s reputation. Some people would feel that these ground rules are a violation of one’s freedom of speech. Once these ground rules are met, companies can begin to use social networking to help their business become more profitable. One way that a company can utilize social networking, is by keeping employees up-to-date on meetings and office goals, through the use of tweets. This communication would allow all employees to be on the same page. Another way companies can make money using social networking is by acquiring faster responses from customers, thereby getting up-to-date feedback on their product(s). Fortune 500 businesses have already grasped this idea and have been quite successful with it.

After reading Nora Ganim Barnes’ article on tweeting and blogging, I found that Fortune 500 businesses(these are companies that are not incorporated or not as big as the Inc.500 businesses) are moving at a much faster rate towards social networking than Inc. 500 businesses. The Fortune 500 businesses see social networking as a way to get a leg up on the competition. First, the consumer is able to give feedback on the specific product, which is then evaluated by the company, thereby giving the consumer an added value to their purchase. Secondly, social networking allows these companies to run product and brand awareness campaigns through blogs and tweeting, with a more cost effective and valuable system of marketing. Thirdly, social networking makes a substantial difference as to whether or not a company, like Inc. 500, will be more or less successful in today’s business world. It also means that the Inc. 500 companies must overcome limitations, such as certain legal issues that come with social networking. Once these limitations are overcome, they too, like the Fortune 500 companies, can successfully use social networking in order to make a profit and have a successful business.

Barnes, Nora Ganim. (Spring 2010). How Do the Most Successful Companies Use Social Media? Retrieved November 25, 2010, from http://web.ebscohost.com.dml.regis.edu

Hybrid Reality and Location-Based Gaming

Per Adriana de Souza e Silva closing comments “The game arena is no longer confined to a board or to a computer screen.”


Hybrid Reality and Location-Based Gaming (HR&LBG) takes the online gaming to a new level of reality. For years the gamer has been trying to “get into the game” and now with mobile technology as advanced as it is the gamers are now able to interact with real life characters in realtime. CAN YOU SEE ME NOW? is a good example of how a good Hybrid Reality and Location-Based Game would work. According to de Souza e Silva, in the HR&LBG there are two components, a digital and physical component (de Souza e Silva 2008). The digital component is the online gamer that is logged in and is tracking and communicating with characters that are participating in the physical component, in real cities being chased or chasing one another around that city with mobile hand held devices such as cell phone and PDAs. Throughout the chase these characters are communicating with one another via GPS and text messages. The urban unknown variables such as bad GPS signal and red lights all contribute to the overall difficulty of the game. There are many different types of scenarios that could be manifested into an urban environment setting as a hybrid reality game such as a cold war spy game or the traditional cops and robbers.


Traditional video games and board games are confined to a defined space of the computer or the game board. Social interaction and space is limited and tied to the computer and physical game itself. Hybrid Reality and Location-Based Gaming redefines and bridges the space between two and three dimensional reality games using the advances in mobile technology and internet computing to take real time data such as climate, terrain, and other variables in the urban environment and used them to set up the limits of a hybrid reality experience.


Hybrid Reality and Location-Based Gaming is in it infancy, because many people still use their mobile device like a glorified telephone and not like a hand held global positioning computer. As mobile technology advances and the gamers reach further for that ultimate goal of virtual reality, hybrid reality gaming will become more of the norm. The integration of computer based technology and realtime data processing to set up a game based on reality has true potential for applications far beyond gaming for the fun of it. This type of integrated technology could be employed for social, economic, and military applications for training and problem solving for real world scenarios.


Notes


Blast Theory + The Mixed Reality Lab. Can you see me? (2001-2004). Nottingham, UK: Retrieved 23 April 2007 from http://www.canyouseemenow.co.uk

de Souza e Silva, Ariana, (2008). Hybrid Reality and Location-Based Gaming: Redefining Mobility and Game Space in Urban Enviroments. Retrieved from http://sag.sagepub.com/content/40/3/404



WikiLeaks - Information Will Find a Way

"Information wants to be free" (Ludlow, 2010, para. 4).

In recent history, the posting of classified information on the website WikiLeaks has generated much controversy that might make the idea of liberating all information not the best, or the safest, idea. I am not about to debate whether or not all information should be made publicly available or defend WikiLeaks for potentially putting US service men and women overseas in danger. What is important to understand is that WikiLeaks is not a single crack in the dyke that can be plugged or eliminated. It is evidence of a larger movement.

The advent of the internet has spawned an ongoing struggle between transparency and anonymity. Holding people accountable for their internet actions can only be done if the source of posted information can be verified. On the other hand, the ability to protect the identity of the source of information on the internet is seen by many as a necessity in the battle against "big brother". WikiLeaks utilizes technology developed by the Tor project to protect a source's identity. The Tor application reroutes internet access through several levels of relays that hide the source's IP address and the IP address being posting to, making it impossible to connect the poster to the post or the emailer to the email. In fact, according to Nathaniel (2010), the developers of Tor have been contracted by the US government to ensure their intelligence activities are not compromised.

So this technology isn't all bad. As is the case with ANY technology, it can be used for good or evil. The problem lies with the intent of the users. Shutting down WikiLeaks and its developers will not remove the threat of exposed classified information. In fact, the last couple of days have seen the WikiLeaks website relocated due to a denial of service attack. If information wants to be free, it will find a way.


Ludlow, Peter. (10/4/2010). WikiLeaks and Activist Culture. Nation, Vol. 291, Issue 14.
Nathaniel, Rich. (9/2/2010). The most dangerous man in cyberspace. Roling Stone, Issue 1112.

Surfing at Work

John Reed, executive director of Robert Half Technology stated, “Many companies monitor computer use, and excessive shopping is a red flag that could put someone's job at risk” (“Cybermonday shopping at,” 2010).

Employee usage of company networks for personal leisure has been an issue since the world wide web has become so widely available. This time of year with Black Friday and Cyber Monday, online shopping becomes one of the bigger reasons employees use company networks for personal gain. Who does not want to save a dollar or two? Cyber Monday is a widely known term for the Monday following Black Friday. The first Cyber Monday was November 28, 2005, when Shop.org released a press article entitled “Cyber Monday' Quickly Becoming One of the Biggest Online Shopping Days of the Year”.

Although Cyber Monday deals can be great, the excessive use of company network resources during work hours can reduce employee productivity. So what can a company do to keep their employees focused on the job? You may be surprised to find out many employers resort to blocking access to online shopping websites like Amazon and Ebay. Those employers who are not blocking access to these websites are monitoring how often their employees are leisurely surfing. Some companies have gone so far as to fire employees for wasting time surfing the Internet. For example, David Innes, 42, lost his job with Scottish and Southern Energy after bosses concluded he spent a "ridiculous amount of time" surfing the web (“Accountant fired over,” 2010). Employers are not only blocking these websites to keep their employees from wasting time, but also to protect their networks from malicious software. All it takes is for an employee to click a rogue link for a virus to be released or a hacker to be let inside.

Remember, the next time you see an email with a discount for that state-of-the-art ebook reader for 10 dollars off, is it worth your job? My suggestion is for everyone to read your companies Internet usage policy to ensure you are following the rules.

References

Accountant fired over internet use 'unfairly dismissed'. (2010, June 14). Retrieved from

http://www.bbc.co.uk/news/10313450

Cybermonday shopping at work closely monitored or blocked 635219. (2010, November 23). Retrieved
from http://find.galegroup.com.dml.regis.edu/gps/infomark.do?&contentSet=IAC-Documents&type=retrieve&tabID=T003&prodId=IPS&docId=A242732372&source=gale&srcprod=ITOF&userGroupName=regis&version=1.0

New Pentagon Command

to Sawer (2010) "the whole question of cyber security is shooting up everybody's agendas." (p. 2)

NATO and the United States communication networks are constantly being attacked, Anders Fogh Rasmussen Secretary General of NATO states, "It's no exaggeration to say that cyber attacks have become a new form of permanent, low-level warfare". NATO is of particular concern since they receive hundreds of attacks daily. Some computer have been deemed to "important" to be shut off for security work to be completed. I feel that NATO should have redundant computer systems so one can be maintained as the other is working.

The Obama administration plans to begin to counter these attacks with a new command, the Pentagon Cyber Command. The Pentagon Cyber Command began operating in October of 2010 however the largest problem seems that other agencies within the United States government have done little to fend off cyber attacks. The Obama administration is considering whether or not the new Command will play a larger role in the defense of network here in the United States. Some feel that Al-Qaida will soon exploit information about the NATO and United States networks obtained from rogue states. This problem could be on the scale of another 9/11 if terrorists obtain this information. The terrorist would possibly be able to mount an attack on the banking system, electrical grid and any other network they feel may distrupt or kill Americans. I feel that it is time for the government to create a new department that overseas the government’s ability to fight off a cyber attack, and this new agency should be headed by a cabinet level officer.

Fidler, S., Gorman, S., (2010, Sep 25). Cyber Attacks test Pentagon, Allies and Foes. Retrieved from http://online.wsj.com/article/SB10001424052748703793804575511961264943300.html?KEYWORDS=Cyber+Attacks+test+Pentagon+Allies+and+Foes
Social networking and employers have been in the news more recently as employers have begun to monitor the personal information of employees and prospective employees. Journal of Business Ethics published an article discussing employers’ use of social networking sites and the problems involved. “Employers Use of Social Networking Sites: A Socially Irresponsible Practice”, written by Leigh Clark and Sherry Roberts, delves into the growing trend of employers using social network sites to conduct background checks on potential employees and explains why it shouldn’t be done. Employers should not use social networks to monitor employees or potential employees.
Clark and Roberts do an excellent job of describing why employers should refrain from this practice. The article points out that social networks are designed to facilitate interaction between people on a personal level, not a business level. Internet communication has replaced face to face communication for a variety of reasons; however this type of communication should be afforded the same level of privacy as face to face, phone or traditional mail communication. A comparison is drawn between meeting a friend in a restaurant or bar and communicating via a social network. This comparison is very accurate as many people use social sites to keep up with friends rather than meeting in person. The writers point out that an employer would never send someone to a restaurant to eavesdrop on a personal conversation in an attempt to judge a person’s character; neither should an employer “eavesdrop” on a social site to gather information.
There are several reasons why employers should not use this method to judge employees or gauge the character of employees. There is no established proof that judgments made using information gathered this way has any relationship to one’s job performance. People have the right to a life separate from their work and looking at a person’s profile or page can be misleading. It would be like trying to judge the dynamics of a family by looking at a snapshot or two. Employees also need to be able to develop as people apart from their work environment. This improper usage by employers blurs the line between individual identity and employee.
The most overwhelming reason that employers need to refrain from this practice has to do with the social responsibility of the employer. Employers, as well as individuals, have a responsibility to conduct themselves in a way that is ethical and does no harm to society as a whole. Invading the privacy of an individual through a social network is damaging to that individual but also to society. “If a realm of personal privacy is not provided to this type of communication, society will forever lose the benefits that online communication provides” (Clark & Roberts, 2010). This quote sums up the whole idea. These types of communications need to be given the measure of protection that the user has a right to expect. If we, as a society, have to censor our own personal communications for fear of being judged, we then lose the effectiveness of that communication. We become cardboard cutouts interacting in a way that is wholly fake and utterly useless. While some maintain that anything that is put on the internet is fair game, I disagree. In the personal space that I have claimed as my social network, what I say, feel or think is not fair game. This information is placed there for a select group of people to see. For anyone to gain access to this information without the benefit of my permission is an invasion of my privacy. Clark and Roberts are correct, if we lose the ability to communicate in this manner in an honest way, we lose the ability to communicate in this manner completely. Anything less is pointless and employers should not be allowed to rob society of this valuable form of communication by rendering it useless.
References
Clark, L., & Roberts, S. (2010). Employer's use of social networking sites: a socially irresponsible practice. Journal of Business Ethics, Retrieved from http://web.ebscohost.com.dml.regis.edu/ehost/pdfviewer/pdfviewer?vid=3&hid=12&sid=9231dca3-15e2-44b6-8d27-30650608821b%40sessionmgr10 doi: 10.1007

Minding Your Netiquette

“Following proper netiquette is essential to developing professional relationships online, and the solution to ensuring employee etiquette is trust” (Nikravan, 2010). In his article, Minding Online Manners Boosts Leadership and Workforce Development, Laden Nikraven reviews the current down-spiraling trend of proper netiquette use in the workplace and the causal effect from poor leadership relationships.
Businesses today have a critical need to use online communication to reach not only their external consumers, but their internal customer, the employee. Current leadership methods frequently use the “hovering-over-the-shoulder” threat to enforce proper netiquette from their employees which according to Nikravan is back-firing. Employees that feel micromanaged and threatened are less likely to be productive or offer communication that supports their employer. It is this sense of “mistrust” that destroys online relationships and in office cohesion. Leadership needs to refocus the use of “hovering” and threatening employees to something proactive and useful such as providing meaningful netiquette rules and empowering their employees to use it successfully. According to Nikraven, “If trusted and thus empowered, employees using social media for the good of the company will collaborate with other members of the organization to be productive” (2010, para. 8).
There are many lessons to be learned from prominent netiquette experts. Proactive tools are available to all employers to regain their employees trust and improve their bottom line at the same time. These tools are as simple as remembering to communicate with professionalism and common courtesy no matter the medium. In this new cyber-communication age it is time to make sure these lessons and tools are used.
Nikravan, L. (November 17, 2010). Minding Online Manners Boosts Leadership and Workforce
Development. Chief Learning Officer. Retrieved November 26, 2010 from http://clomedia.com/articles/view/3917/1

Using Technology for the Right Reasons



Many individuals are doing great things with technology to improve our lives. One individual in particular is John Doerr. Doerr is number 1 on Forbes' Midas List and along with an almost unmatchable work history, and he has a great passion for clean and renewable energy. His notion that wireless internet should be free is sensible.

For a closer look at John Doerr click on the following link to view the Prezi presentation I created:

http://prezi.com/zpjq_s_q4oww/using-technology-for-the-right-reasons/

by Beth M.

Reference

Hessel, E, & Corcoran, E, (January, 2009), The Midas List, http://www.forbes.com/lists
/2009/99/midas09_L-John-Doerr_2946.html


Cisco is on the move

Cisco seems like a company that is doing very well by utilizing technology for its main avenue of success. Cisco is best known for their networking equipment and services; these have definitely impacted cyber communications. The success from Cisco’s contributions to networking shows no sign of slowing down, as they have just unleashed a new type of router that is much more advanced than its predecessors. This new highly advanced router is called the CRS-3, or Carrier Routing System - 3. According to reports, this router is 12 times faster than any other core router currently available and can handle up to 322 terabytes of data per second, all while using 60% less energy.
In addition to the networking role, the company has been making real headway towards expanding their horizons to several different areas. One of the areas that Cisco has started to focus on is in cloud computing; this refers to the practice of using an internet connection to make use of various computing services from one centralized location. Rather than being a service provider, Cisco has plans to develop and implement an array of infrastructure tools for the purpose of supporting the jump to cloud computing. This will be another area where Cisco will most likely find success.
Cisco has also started a very admirable project called Connected Urban Development (CUD) to alter, in a positive way, how cities operate when it comes to communication. One of the main goals of this initiative is to build better networking grids that will impact everything from public transportation to everyday communication; eventually reducing carbon foot prints. Basically, smarter more efficient communication practices can have farther outreaching effects than just communicating.

References:

Cable, J. (2010). Cisco aims to build "next-generation internet". Indusrty Week/IW, 259(6) , 44.
Cisco. (2010). Retrieved October 15, 2010, from Cisco: https://www.cisco.com/web/about/ac79/ps/cud.html

Real Advertiser and Merchant Talk. (2010). Retrieved October 14, 2010, from Advertiser Talk: http://www.advertisertalk.com/cisco-advances-smartconnected-communities-vision-with-innovations-in-urban-safety-and-security-16069.zhtml

Why google.

Why Google?

Google’s mission is “to organize the world’s information and make it accessible and useful.” You can visit google .com or use one of more than 150 google domains to search for what you are looking for. Since the first search engine appeared they have expanded their offerings from a single service to dozens. They offer the option of finding information in many languages, and translating between languages. Google has grown to thousands of employees and offices around the world. They also distinguish between search results and ads. Google strives to provide the “perfect search engine” according to the co-founder Larry Page. Technology and technical products and services are continually being reviewed and updated in a continual effort to provide that perfect search engine. Google translate is one of the new innovations used by google. The mobile version uses voice recognition to transcribe your voice, translate your voice, than speaks it back to you in another language. Google is always looking for a new innovation that might make significant changes and some innovations the user might not even know there was a change that occurred.

www.google.com/corporate/index.html

Google Wave





“The problem with communication….is the illusion that is has been accomplished”
George Bernard Shaw

We live in a world where communication is primarily based on technology; communication is done through the use of cellular phones, text messages, emails, instant messages and social network sites. As the world becomes more technologically savvy, more options are being created to use as a form of communication. Companies are also constantly fighting to stay afloat in the war of new technology. Since, the creation of Google in 1998, the mission has been to organize the world’s information and make it universally accessible and useful (www.google.com, nd). However, in 2009 Google wanted to branch out into the social networking realm; they accomplished this by creating Google Wave. Google Wave is a web application that gives its user the ability to easily communicate with others (www.google.com, nd). This application allows individuals to share pictures, files, post blogs and chat in real time. Google Wave was created to surpass any current communication technology available with its futuristic capabilities. However, the application’s disadvantages that have resulted in its low user network, has led to Google Wave’s untimely demise.

In my quest to find the newest communication technology available, I came across information about Google Wave. This got my interest, because it was new, and since Google is such a popular company I was curious as to why I have never heard of their newest creation. The developers at Google created this application with the goal of combining real-time communication with social-networking and search capabilities built into a familiar interface (www. news.cnet.com, 2009). When using Google Wave individuals will not only be able to post items on their page, but they can also publish the wave directly to their website or blog (www.telegraph.co.uk, 2009). Even instant messaging capabilities are enhanced to the extent of being able to see what is being typed by the other individual as they are typing. Ecommercewisdom.com, reports there are many advantages of Google Wave. For example, the interface used, meaning the method of how one computer component may exchange data with another component, is similar to what is used in emails (www.ecommercewisdom.com, nd). Now, I know many people are not too concerned about how their computer interfaces, however this makes the process of information much smoother. Another advantage of Google Wave is the participant contribution aspect. This application encourages people to contribute to a wave that has already been posted (www.ecommercewisdom.com, nd). This is similar to a blog with the exception of being able to add maps, pictures or even invite other people to participate in the wave. The best and probably biggest advantage of Google Wave is the “real-time” aspect. When changes or updates are made by a participant in the wave these changes can be seen as they are being made (www.ecoomercewisdom.com, nd). With the many advantages Google Wave has to offer, who would not want to utilize this communication mechanism? However, as with all things, especially something new, there are also disadvantages that may not be many, but can be so daunting that they out way the benefits.

There were disadvantages in several categories of Google Wave. The instant messaging capabilities are very unreliable, it could be slow or fast at any moment, this hinders the “real-time” advantage (www.ecommercewisdom.com, nd). The benefit of Google Wave is to get a lot of people involved and have interaction on the wave, however in order to access a wave individuals must have a Google account and the system must have the ability to allow a large amount of users on at once. Right now the system does not allow a large amount of users on at a given time (www.techcrunch.com, 2009). Once an individual is invited to a wave they are permanently part of that wave. What this means is, if you no longer wish to have interaction with that person or you have shared confidential information they have access to this information forever (www.techcrunch.com, 2009). Currently, the waves do not provide any notification capability, so if there is new activity within a wave, individuals will not know unless they are constantly monitoring their wave. These disadvantages seem to be minimal compared to the advantages; however in August 2009 Google decided to stop any further development of Google Wave. They stated there is not enough user adoption that they would have liked to have (www.techcrunch.com, 2010).

In review of the overall capabilities, advantages and disadvantages of Google Wave, I would not suggest or invite anyone to use this. Although the advantage of “real-time” is a good feature when communicating with friends and family, I still have a difficult time grasping the whole concept of the “wave”. I agree that it is nice to have everything, email, blog, instant messaging and other capabilities all within the same application, but even the technologically savvy would still have trouble with Google Wave. I understand Google’s attempt to make the communication experience simplified, but it is possible it became more difficult.



References

Beaumont, C. (2009). Google Wave aims to transform online communication. Retrieved October,
17, 2010 from www.telegraph.co.uk
Ecommerce Wisdom (nd). Google Wave Advantages and Disadvantages You Should Know About.
Retrieved October, 17, 2010 from www.ecommercewisdom.com.
Google (nd). Google’s Mission. Retrieved October, 17, 2010
from www.google.com.
Tech Crunch (2009). Why Google Wave Sucks, And Why You Will Use It Anyway. Retrieved October, 17,
2010 from www.techcrunch.com.
TechCrunch (2010). Wave Goodbye to Google Wave. Retrieved October, 17, 2010
from www.techcrunch.com.

Computers Speaking the Right Language

“For individuals with autism spectrum disorders (ASD), the use of technology to provide intervention, particularly targeting the core social–communication deficits of the disorder, is promising.” Allison L. Wainer and Brooke R. Ingersoll (2010)


Computer technology and communication, whether it be globally or within the same room, are important for all humans. But what happens when the same things everyone else knows and learns by socializing with one another is lost on a particular individual? Children affected by autistic spectrum disorder in many cases have trouble with social skills. The brain does not act in ways where the autistic child knows what is appropriate behavior for certain places and what is not.

Allison Wainer and Brooke Ingersoll take a look at all the computer-aided programs designed to teach social skills to ASD children. Their research reviews the advancements in the past 15 years of computer technology – both virtual reality systems and software programs. In their research, many studies show a prevalence of ASD children having a strong learning ability with computers and are highly visual.

On a personal note, a friend’s child has an autistic spectrum disorder and recently began to swear in restaurants. As a mother, she tries to quiet him as you would with any child. However, this is not an ordinary child. What may be taught with a few words and discipline cannot be taught in the same way to her child. There must be another way, she says, because while he may not know what is he is saying, he uses it quite well and often in inappropriate places.

Wainer and Ingersoll reviewed computerized programs, the tests given to students, and how each applied into the real world. Their results concluded

While their review did not take into consideration of a control group, both researchers were impressed with the social, educational strides and speech improvement was evident in all ASD children participating in the program.

Although Wainer and Ingersoll report much progress in 15 years of this type of work, there is much more to be done. And with the increase of autistic spectrum disorders diagnosis increasing in both male and female children, it cannot come too soon.

Wainer, A., Ingersoll, B. The use of innovative computer technology for teaching social communication to individuals with autism spectrum disorders. Research in Autism Spectrum Disorders 5 (2011) 96–107.