week 7

Learning Aims and Objectives:
Aim: In this weeks page, students will learn the implications of online communication. Students will examine the risks and benefits of using instant messaging and Voice over IP (VOIP).  Students will explore cloud computing and ubiquitous computer and how these appear in our every day lives.

Objectives:
1. By the end of this weeks page students will be able to identify and provide examples of issues associated with the use of online communication systesm for person and business's uses.

2. By the end of the weeks page students will be able to explain where cloud computing is used and how ubiquitous computing appears in our every day lives. 

Implications of online communication

 

 

DISCUSSION TIME!!!
Instant messages can also include basic images, the most common of which are faces which show different expressions. These are referred to emoticons. Smiley faces are represented as :) and sad faces are represented as :( .

Fahlman is credited with originating the first smiley emoticon, which he thought would help people on a message board at Carnegie Mellon to distinguish serious posts from jokes. He proposed the use of :-) and :-( for this purpose, and the symbols caught on. The original message from which these symbols originated was posted on September 19, 1982.
The message was recovered by Jeff Baird on September 10, 2002[6] and is quoted:
"
From: Scott E Fahlman


I propose that the following character sequence for joke markers:

:-)

Read it sideways. Actually, it is probably more economical to mark
things that are NOT jokes, given current trends. For this, use

:-(
"

 


To give an apreciation to Scott Fahlman create a document to explain what he is credited with creating, to a person that would not known who he is, or, what he brought in to almost everybodys lives.
As we know emoticons are used everywhere and there are now more advanced emotions available for use, in your document include the modern day versions of these smileys and exaplain why you think that these are such a sucess.

Social networking

Social networking websites have developed, evolved and ultimately changed the way that we communicate with each other. The use of Social media has enabled people to communicate interactively and in real time from anywhere across the world. Groups of people can exchange and share information quickly a benifit of this is cost as the only cost is that of a broadband connection. Social networking provides a great way of staying upto date with friends and businesses.

It is well worth remembering that you must be careful in what you post on social media as this can be seen by potential employers.




 

Instant Messaging

Instant messaging is used widely and is a great way to exchange text messages, this is an alternative to the telephone conversations and the costs are very much cheaper. Messages are sent in real time, and the responses are received instantaneously.
We must remember that there are some disadvantages to the use of Instant Messaging (IM) these are:
When using text the emotions that are present when it is written are better expressed in person and these can be misinterprested by the recipients. Some may see it as jest/humerious others as an attack or agressive.

It is also very important that we use caution when sending an instant message as it is sent quickly, viruses can be attached to them an this can then spread very quickly.

Im Virus
http://pcworld.com/

 

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) allows users to interact in real time over the internet using voice and video messaging. Skype is one of the most widely used VOIP services used across the globe. When used across the globe via businesses programmes like Skype can enable companys to reduce thier travel costs, travel time (and therefore loss of productivity during this time) and the cost of hiring a venue.
We must remember however that with any new technology, VoIP has its limitations these are things like
Reliability, VoIP service is reliant on the quality and reliability the internet connection at the location that it is being used at.
Other issues that are linked to limitations of VOIP
If there was a power cut VOIP systems will not work as they require electricity to run. Traditional phones do not require electricity.
The voice quality can sometimes be distorted or there may be long pauses.The
Security of the system as VOIP uses the internet hackers can intercept information and steal identity's,attach viruses, and phishing are all threats.

Cloud and Cloud Computing

The term Cloud computing means the use of a computer service on other company's computers, these are commonly known a hosts. There are a number of well-known hosting companies that offer cloud computing these include, Microsoft and Google. Cloud users are able to use software access data and storage on the host computers, which will be at a remote location, the joy of this is that those with PC's and systems that are limited can still use the software, storage and data. To access these services users will use a web browser or mobile app, without ever directly accessing the servers that the information is stored on. cloud storage is related to cloud computing – it is where only the storage, access and retrieval facilities are provided by the host provider, often via the internet.

The term ‘the internet of objects’ is credited as first being used by Kevin Ashton in 1999. Find out about the context in which Ashton used the term. Is it still relevant today?

FACTIOD:
The term ‘cloud’ is often used as a metaphor for the internet. The exact origin of where the term cloud computing comes from is unclear but many believe it relates to drawings which used clouds to denote networks in diagrams of computing and communications systems.

Ubiquitous computing systems

We must first understand what Ubiquitous means! ‘existing everywhere’. Processors can be embedded in any device, including clothing, appliances, vehicles, buildings and people, to connect them to the internet so that the data generated by the processors will be readily available.

FACTOID:
When Mark Weiser coined the phrase "ubiquitous computing" in 1988 he envisioned computers embedded in walls, in tabletops, and in everyday objects.

DISCUSSION:
Let us consider following, Is the hardware getting smaller and smaller?
What is the smallest computer you own?
What is the smallest computer you know?

Using your research skills, explore the following areas;
1. Smart Dust
2. Nanotechnology

Because we now know what the term Ubiquitous means lets look in to is application.

borg
http://vignette1.wikia.nocookie.net



We use computers now in most parts of our daily lives, in most cases we dont even realise that we are.

In groups of 2, create a list of the Ubiquitous computing systems you interact with in a single day.

Some of the most common elements of Ubiquitous computing are in action in the videos below.


    
An area that is also linked to ubiquitous computing is "Pervasive Computing" as per the video below.

 

RFID

The use of modern technology in our day to day activities are suprising, you will have used it today to enter the school, college and even work or as part of your journey.
RFID chips are a common addition to most cards used to gain entry to a location or to allow right of passage. RFID stands for Radio Frequency Identification Chip, these are a small chip that talks to another device to enable the owner of the chip to undertake an action.

DISCUSSION:
Lets review in a group where these may be used in schools and colleges?

Over the past few decades this technology has been used to enable people to make the crossings over and under the Thames as trouble free as they could via the use of the Darttag. This device that was located in the frount of the car acted like a key, so when a car got close to the barrier, the sensors would receieve a responce from the RFID chip to say that this car is owned by an individual that has pre-paid for the crossing, so allow them through.


This is also the same concept for owners of gaurages, when a car with an RFID chip in it approaches the gaurage the door will open automatically without the user pressing any buttons, or getting out to open the door.


Other examples of RFID in action would be the use of cat flaps, only allowing cats with the correct chip in its collar to enter the house.

Domestic fridges have RFID chips in them to allow the fridges to monitor and track the contents and if they get low to create an order to replenish the items.

RFID chips are often used in retail stores where high value products are sold, these chips can be attached to clothing

or these can be found on the CD's and DVD cases

 

Problems with ubiquitous computing

 

Privacy issues: Probably the most important problem is that ubiquitous computing environments pose serious privacy risks. By watching everything a user does these systems have the potential to leak all our actions, preferences, and locations to others unknown to us, now or in the future.


Last Updated
2024-08-28 10:14:06

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 6
Prev
Week 7
Prev
Week 8
Prev

Next

Next
Webmaster Spelling Notifications