This week we looked at the Internet of Things (IoT) commonly known as increased machine-to-machine communication. (Think the iCloud as a way of connecting and controlling devices but bigger!) Its making machines “smart.”
That being said many people think about creating the next machine, when in actual fact we should be looking at the way that machines gather data, analyses and distributes between other connected machines. This is where the ‘cloud’ comes into play. The IoT’s cant function without a cloud component which analyses and leverages data. ‘The cloud is what enables the apps to go to work for you anytime, anywhere’ states wired.
Safe to say making technology ‘smart’ is a huge shift, whether in the right direction or not (as argued by many) its happening and doesn’t seem to be slowing down. New generations now don’t know a world without technology, this impact alone is enough to change the way that innovative minds are now implementing and conducting problems associated with technology.
This week explored the idea that the data and content on the internet just wants to be free. The problem with data on the internet wanting to be free is that it is continuously copying and replicating data put online daily. Simply, the selfies you post are no longer yours.
This week I focused on internet cookies as a way of identifying how the internet can track its users and even grab data from search histories and collect any data you put on the internet. Most definitions found on the media, look something a little like this:
‘Cookies are programs that Web sites put on your hard disk. They sit on your computer gathering information about you and everything you do on the Internet, and whenever the Web site wants to it can download all of the information the cookie has collected,’ states howstuffworks.
However that isn’t entirely true. Cookies cant grab information from users devices by themselves nor do they run like a program. Instead cookies are a piece of text created by a web server that can be stored on a users hard-disk.These store particular information from web sites and later retrieve that data. A web site can only take information from its unique user code that it has dropped onto you hard disk. It cant take information from the other codes of different websites.
This proves that the media often generates and is scared of technology circulating data and stealing personal identities/data. Although the internet can do all those things in different ways its clear that most cookies are generated from individual web browsers.
Over the last couple of weeks, I have again struggled to find recipes that don’t have chilli or seafood in them. I have however zoned in on a dessert this week and found Kkwabaegi (twisted donuts). The ingredients are below:
3 cups all purpose flour for doughnuts, plus 2 tablespoons for dusting
2 tablespoons butter
1 packet of dry yeast (about 2¼ teaspoons: 7 grams)
2 tablespoons plus 3 tablespoons white sugar
1 cup milk
½ teaspoon salt
corn oil for frying
½ teaspoon cinnamon powder (I used cinnamon sugar)
Make the coating
Add 2-3 tablespoons sugar and the cinnamon powder to a brown paper bag. Shake to mix well. Set aside.(I used cinnamon sugar here which is exactly the same, i just didn’t want to create a mess)
Make the dough
Fully melt the butter in a small saucepan over medium heat. Remove from the heat and add milk, sugar, and salt. Mix well until everything is well dissolved. Crack an egg into the saucepan and mix well. Add the yeast and stir. Let it sit for 5 minutes. (This should change the texture from runny into a lumpy mixture)
Transfer to a large bowl. Add 3 cups flour and mix well with a wooden spoon. When everything is well mixed, use your hand to knead the dough for a few minutes, and shape it into a big lump. Cover with plastic wrap.
Let the dough rise until it doubles in size, usually about 1 hour to 1½ hours.
Deflate the gas with your hand and knead the dough for a few minutes until it’s soft and smooth. Cover with plastic wrap again and let it sit for 30 minutes to 1 hour until it doubles in size again. (Let rise for as long as possible, this makes the donuts more light and fluffy)
Roll out the doughnuts
Uncover the dough and knead it for a few minutes. Put 2 tablespoons of flour on the corner of your cutting board to use for dusting. Divide the dough into 16 equal pieces.
Take a piece of dough and roll it out on your cutting board so it forms a rope 10 inches long and ½ inch in diameter. If it’s sticky, sprinkle some flour on the area you’re working in. When you roll out the dough, move one hand upward and the other downward so that the rope is twisted in between your hands as you roll it. (I really struggled with these instructions and ended up just trying to twist them and let them sit.)
Take the dough off the board, hold it aloft, and bring the ends together. The tension in the dough will twist it as it hangs. You can add as much tension as you like, but I think the best looking kkwabaegi has 3- 4 twists in it.
Place the twisted dough on a floured cutting board or tray. Repeat with the rest of the pieces of dough.
Let the doughnuts expand for about 30 minutes. 15 minutes in, gently flip each doughnut over with your hands so the bottoms don’t get flat and all sides expand nice and round. (I forgot this stage which is probably why my donuts were light and fluffy and were more of a doughy consistency)
Fry the doughnuts
Heat up 4 inches of oil in a deep skillet over medium high heat, until the temperature reaches 350° F. Lower the heat to medium heat, then gently set each doughnut into the hot oil by hand. Be careful not to get your hands too close to the oil. Add as many pieces to the oil as your skillet will allow, enough so the doughnuts can sit in the oil without pushing against each other. (I used a deep fryer for this, which was a lot easier)
Cook for about 5 minutes, occasionally gently flipping them over with tongs, until they get crunchy outside and are evenly golden brown.
Strain the cooked doughnuts. Put them in the brown paper bag with the sugar cinnamon mixture. Shake a few times until they are evenly coated. This is best done when the doughnuts are still warm. Repeat this with all the doughnuts until they are all cooked and coated.
You can freeze any leftovers for up to a month. To rejuvenate them, take them out of the freezer and thaw at room temperature for 5 or 10 minutes before serving.
This was all taken from: http://www.maangchi.com/recipe/kkwabaegi
Thomas Douglas (2002) wrote in Chapter 5: (Not) Hackers that through collaboration in the early years of computer programming, hackers collaborated in order to increase knowledge of the way a computer functioned and how it could be manipulated. Douglas suggests that the youth are the ones generally hacking due to the wanting ability to control and manipulate the web. Although this is extremely dangerous and in some cases illegal, hackers collaborate in knowledge and understanding of programs exploiting gaps in the internet that the regular user doesn’t understand.
With hackers creating a simple problem solving technique many users who didn’t understand this subculture wanted the end product rather than hacking themselves. These users are called ‘End-users’ who want the end product but do not understand how the programs work. As these programs become more sophisticated and easily coded end-users become more detached from the machines. It is this bit of knowledge between code and end-users that hackers are able to exploit.
Douglas suggests that the collaboration of computer programmers was an important moment of hacker sub-culture style. This subculture is constantly in flux and has remained resilient to even mainstream culture. One things for sure, with the constant increase in collaborative knowledge, the hacker subculture will remain in flux.
The case study of both Arab Spring and Euromaiden movements were both spoken about in this weeks tutorial. Its interesting to see that many of the movements or issues in our society today are reflected, deeply debated about and provoke movement between groups of like minded people. #BlackLivesMatter is a movement that although isn’t ‘new’ knowledge, is a movement that is continuing to grow in both supporters and coverage. All around the world supporters of #blacklivesmatter are seen protesting in areas which stop the normal everyday activities. These are all organised through twitter and Facebook as well as many other social media sites. This way of connectivity provides impact, resourcefulness and a movement that won’t go away anytime soon. It provides like minded people with a way to find other like minded people in order to create power and a public voice all around the world, a lot faster and easier.
This week I had a look at the article written by Steven Johnson, who spoke about the way twitter is changing the way we live.
Twitter HQ designed the service, which now continually evolves and is being redesigned by its users everyday. ‘It’s like inventing a toaster oven and then looking around a year later and seeing that your customers have of their own accord figured out a way to turn it into a microwave.’
Its interesting to note that twitter is arguably as effective as google. Through the use of hashtags we can see live events that can be followed, engaging with twitter users who are following the same thread. You can share your opinions, links etc with a range of audiences through friends and hashtags and you can even search for information that has been commented and challenged on through users who may have shared links, for example, your favourite historian who has shared a paper on the 911.
This is juxtaposed by google, who’s search engine consists of older posts that have had many cited links pointing to them in order to be ‘up voted’ onto the main page of what you search.
Here is an example:
Here I did a search of the word ‘hashtag’ and above are the results. The websites suggested could of been linked through many different cites compared to other websites hence being the first to be shown, even though they could be a lot older. Twitter is current. Twitter is now.
Sat here in class, and from what I can see, over half of the class has an apple device. What is the problem with apple devices, its the inability to pair and share to other devices that aren’t apple.
Many times I have come to the conclusion that android is better in terms of their being more freedom and less of a walled garden in terms of what you can do on an android device. It sure has a lot more positives than apple.
Then I look at my iPhone, iTunes, iPhoto, Macbook, Apple tv, iPad and i think, how do I keep and access all of these things without having an apple device to share and sync them all together with through iCloud. If I had an android a lot of what i do couldn’t be synced with macbook.
This is the way apple operates, they have created a society similar to a walled garden which enables the syncing of multiple devices together to create convenience and user functionality. Its easy. Comfortable almost to have all your content and devices with one company.
But we are missing a key ingredient that android provides?
Android breaks free of the walled garden, instead having a openly free network that users feel free using. They are highly exposed to many different ideas with android users claiming freedom.
Apple even has a system which can convert android data to apple so you don’t lose content whereas the reverse isn’t possible. Apple limit users and it could be said that apple users have their freedom unrightly suppressed.
So by now you all know what the ‘walled garden’ is, if not have a look at Marie’s blog.
Most students this week looked at what a walled garden is and how your privacy isn’t protected. I wanted to have a look at the way in which information is used from walled gardens and by other means, in order to understand just how dangerous giving your consent to websites such as Facebook is.
Since last December this ‘site‘ had been known to federal police but on the 16th of August two schools were mentioned in the media informing the Wollongong Education office.
As mentioned in this news article the site was hosted over seas, targeting many young girls from over 71 different Australian schools. Nudes and explicit images were shared and swapped between boys and men, who requested girls by name, postcode and school, as if they knew the girls they were targeting.
Many women were disturbed about the distribution of pictures and the specificity of asking for a certain girl.
Although we can certainly understand where these men have gained access to these explicit photos, through sites such as Facebook, Skype, iMessage and many other ways of sending your photos, the images cant be tracked to their original sharing point due to them now crossing different media platforms and the ‘site’ being hosted overseas.
As we can see through this prime example, our information that we share on any type of media platform, is and has never been safe.