Friday, December 5, 2008

Week 14- Comments

Comment on Amy Morris' Reading Response:
https://www.blogger.com/comment.g?blogID=1952905712855777154&postID=1308759155944712978


Comment on Cari Shepherd's Reading Response:
https://www.blogger.com/comment.g?blogID=2114852490468580221&postID=2600633713082655487&page=1


Comment on Lori Morrow's Reading Response:
https://www.blogger.com/comment.g?blogID=6958200230416907745&postID=6804134975345767030&page=1


Comment on Lauren Acquarole's week 13 Muddiest Point
https://www.blogger.com/comment.g?blogID=4181925387762663697&postID=3837808496528105981&page=1

Week 14 - Reading Resonse

I didn't actually have to do this week's readings, but I found that I couldn't comment intelligently on anyone's reading responses without reading the articles. Then, once I read them, I figured I'd post. It's getting hard to find people to comment on and I need a couple, myself...

What is CLoud Computing?
I thought this was a really useful analysis of the different methods of collaboration available in today's networked environment. I just finished doing a poster on Geographic Information Systems (GIS) for 2000, and one of the things it discussed was "distributed GIS," where the different pieces, maybe even the application used to create and display the product, are in different locations. At the time I read about it, I was thinking how this would have the same equalizing and empowering effect for small-budget libraries as the internet did. Cloud computing strikes me as a similar thing, although I am looking at it more from a collaborative standpoint than a necessarily capitalist one. That being said, given the increasing stability that will come with experience I can see a time where there will be specialty libraries all over the country, and public and academic libraries will have access to their entirely digitized collections, and all of this will be accomplished through collaboration and the magical fuzziness of cloud computing...but maybe I misunderstood altogether...

VIdeo
It was difficult to pay attention because the narrator talked like a seedy investigative reporter and looked really strange. Anyway, it was good enough; it went over pretty much everything from the first article. It did provide examples of the different types of cloud computing, which is always a nice way to get something concrete in your mind.

Future of Libraries Article
I agreed, pretty much 100%, with everything. Some of his suggestions for what libraries can do to cement their roles in the community and preserve the community history are things that I will bring with me to work to see if we can implement them.

Friday, November 28, 2008

Week 13- Comments

Comment on Stephanie Cunningham's Reading Response:
https://www.blogger.com/comment.g?blogID=5053881157949942224&postID=1401667253238448867&page=1

Comment on Susanna Woods' Reading Response:
https://www.blogger.com/comment.g?blogID=2759599872455292147&postID=7967432130580806965&page=1

Comment on Lauren Acquarole's Muddiest Point:
https://www.blogger.com/comment.g?blogID=4181925387762663697&postID=1777411810725835238&page=1

Week 13- Muddiest Point

I've seen lots of debates and arguments about whether privacy is actually included in the constitution. When it comes to the Constitution, I am definitely a "Translator" (so much better a term than 'loose interpretationist, which implied a lack of care or understanding). As Lawrence Lessig said, it is up to us to determine what the principle of the original wording was, what "root" right they were trying to protect, and how does that translate into the modern world?

What I want to know, then, is (1) what the official government policy is right now regarding computers and privacy, (2) where you find that in writing, (3) who is responsible for determining and disseminating the "party line," (4) does the supreme court and/or legal precedent have any influence on it.

Week 13 - Reading Response

No Place To Hide
The link didn't work so I googled it and read the last chapter of the book. Talk about horrifying. I was aware that the downside of lovely things like cell phones and the internet, etc. was that more of my information was being made available to anyone who might care to get into it, and I have tried to avoid an electronic footprint as much as possible. This class, to a certain extent, has utterly obliterated my efforts. That being said, I made mistakes in the past, too, like using my MAC card to pay for minutes on my anonymously registered prepaid cell phone, (there went ALL that effort). I think perhaps the scariest thing in this chapter is the "Smart Dust" and I can't get over the idea that something that small could monitor my activities and report them back, for years at a time, without battery replacement or any alternate power source. That's absolutely horrifying.

And as for the argument that "if you're not doing anything wrong, you don't have anything to worry about." Yeah, sure. But even if you aren't doing anything wrong now, who's to say the laws won't change and all of a sudden all those years of doing whatever innocent thing you enjoyed is now being used to indict or persecute you. I know it's extreme to say what if they misidentify you, but my brother Emmett got caught for underage drinking in Montgomery County PA when he was 16. It was his second offense, and as a result they suspended his driver's license (since he didn't have one, it was to start whenever he got it). When the Montco court system entered the information, however, they suspended my COUSIN Emmett's license (also 16, but WITH a license). And that's a relatively innocent mistake, relatively easy to correct--translate that to a terrorist watch list and unless you happen to be a Senator or Congressman, good luck getting off the list. I learned about the "I'd rather 9 guilty men go free than one innocent man be imprisoned" quote at a very young age, and I really took it to heart. On this issue, I err on the side of Civil Liberty. If they do their job well enough, the guilty guys won't get away.

Total Information Awareness
More scary-ness...This is an excellent resource for information, however, as it seems to aggregate stories from a pretty wide variety of sources, both governmental and media. Lawrence Lessig talked a little about government information tracking programs in Code 2.0 , and I seemed to gather that it would merely involve coding the programs to retain anonymity unless a "hit" was made. I understood the main problem to be that no one in their right mind trusts the government, so we want to see the code to ensure that we are truly anonymous; the government, on the other hand, doesn't show anything they don't have to, and so refuses to show the code on the grounds of national security. Ridiculous, I know.

Video on You Tube
" This video is no longer available due to a copyright claim by Viacom International Inc." (YouTube)