martes, 3 de diciembre de 2013

CLASSWORK

Eliza: answers based on keywords, she also make questions to see what else to say its dumbest of any other.

CleverBot: is more rude at the moment of answer the question you can see that is not a real person or its a psychotic, the design use more colors and better than Eliza but still a machine.

Exsys Expert Systems: Many of these systems are  not publicly available.
START:  a ‘Natural Language Question Answering System’.Web-based question answering system. Currently, the system can answer millions of English questions about places (e.g., cities, countries, lakes, coordinates, weather, maps, demographics, political and economic systems), movies (e.g., titles, actors, directors), people (e.g., birth dates, biographies), dictionary definitions, and much, much more.
Baby Rose: a web application which communicates with users in natural language.  A baby robot where users can teach new words this is more used to help people,Help Rose with word associations,Teach Rose with Q & A, Help Rose with Q & A associations.
Google Translate:  Translate a word or sentences in others languages. 
20 Questions:  the game is about answer some questions that the robots ask and the user have to answer so the computer can guest about the character.
Tic-Tac-Toe:   beat the computer. What does this tell you about the nature of some games?
Connect-4: Another example of game-playing 'intelligence'.
Wheel of Emotion Attempts to predict the user's emotion based on a sentence they type.

http://www.itgstextbook.com/chapter16-ai-robotics.html

viernes, 15 de noviembre de 2013

Classwork 37

  1. Write a short paragraph for each issue addressed by this video:

  1. Brain emulations is a process of "copying" a conscious mind from a brain to another storage by scanning and analyzing a real brain completely  Its also called the "mind copying or mind transfer" because it transfer the same information in the brain to a it system. 

  2. Rule-based AI is a form where the human's knowledge can get achieved. Thanks of this knowledge more people would learn new things, so this means that knowledge in people may improve. Also this means that the knowledge is going to will be provided everytime someone needs it. 
  3. Ethics of digital minds
  4. Prospect of AI catastrophe.


  1. What are the potential benefits and risks of advanced AI?
Its very interesting the advancements of the artificial intelligence but sometimes it is not positive because it can harm the human being and make them  feel not useful. The benefits can be in education, and health but also a robot can have bugs and dont do the things that he is suppossed to.
  1. Can you name the sci-fi films and TV series featured in the video? List them.
Matrix
Astro Boy
Metropolis
Corto circuito
I robot
El robot del bicentenario 

  1. Identify the robots and other technological gadgets shown in the video.
Robots, special machines.

jueves, 14 de noviembre de 2013

Classwork

Define captchas:
A captcha is a type of challenge-response test used in a computing to determine whether or not the user is human or not.

Spam bots:

A program that is used to send spam in order to help the users.

Positive impact:

Used to know if the user is human or not, and protect them from viruses or other malicius things in the web.

Negative impact:

Sometimes the captchas and spam doesn't work correctly and perjudice the properly user.

viernes, 23 de agosto de 2013

Database – Issue: Privacy vs Security


Explain the difference between data matching and data mining.

Data mining is the process of analyzing data from different perspectives and summarizing it into useful information and the data matching describes the efforts of a company to compare two sets of data. The data mining is for collecting the data and make inferences about it, and the data matching is compare the data collected between each other. 

Issue: security

Describe how data was lost in South Carolina tax databases.

The data wasn't lost, it was stolen by a Russian hacker. He used to hacked the financial information of all the people in the database and he sell the credit card numbers and personal information in a webpage. Depending of on the amount of money that the person have, it was the price of the information.


List the sensitive data that was lost in this security breach. How is this information going to be misused?

Credit card number
Tax returns
Debit card number
Bank number account
Social security number

Draw a conceptual map of database security breach. How is this information going to be misused?



jueves, 8 de agosto de 2013

DataBase Issue: Privacy



2.How does Target use data matching on its customers? Describe the information it uses.
It achieves all the products that the customer had been purchasing and with all that data collected they have 5 or more in common according to a pregnancy prediction.

3. Applying data mining, the article states that 25 products where identified to “predict pregnancy”. List some of these products that the article mentions.
Target noticed that woman that are waiting for a baby buy things like cocoa butter,supplements with calcium, magnesium and zinc,sanitizers, and other types like this.
4. Can you think of any other reason for a person to buy these products? Would you be offended that a company assumes that you (or a person in your family) have a condition based on the products you buy?
Sometimes I do buy this products like the cocoa butter, and supplements  and sanitizers. This products are completely normal for personal use, and if a pregnant woman buy this it doesn't mean that every woman buying this it's pregnant. I would not get offended if a company start sending coupons, but it would be awkward.
5. How did Target’s strategy changed when it found out that people were bothered about this?
They still send coupons about pregnancy and baby stuff but mixed with other coupons about different things like wine promotions, just to don't freak out the client.
6. Write a paragraph about the benefits and disadvantages for Target.
Target had create a good strategy for customers because if they send coupons to a pregnant woman when she needs them, she will definitely go buy there. That's a point for Target but if the woman is not pregnant and everything was just coincidence, many she will get offended for the “non-privacy” that the company is offering her. Also this could be in some way creepy for a woman that a company knows about their stage, and she could demand them for privacy rights.
7. What conclusion can you draw from Target’s reaction to the reporter’s plan to write this story?
Target didn't want to write this story. They think that if the customer knows that he had been “followed” and “spy” they would not want to shop there anymore, that's why they didn't want to publish this story.
8. Discuss if it is acceptable or not, that social networks collect data about their users’ interests, to enable them to sell more accurate advertising systems. (3 paragraphs)
The social network is always collecting data about their users, but sometimes it's optional for us to put it or not. One example of this is Facebook, you are not forced to publish everything, it depends on you. I personally think that is acceptable, but they have the obligation to respect the customer, if they collect data to do things like sending coupons to a pregnant woman they have to be aware that is not obvious.

The most important thing that a company should do is to protect the customer, if they don't expose the client everything would be fine because they would not feel damaged. Also a company have to give the client everything they need, in this case if a woman is pregnant and she needs pregnant stuff, the coupons would be fine for her because that's what she needs.

In conclusion I will say that it's acceptable for me to collect data of their users because it's a way to know them better and in some way please the client. Both sides are wining, the company is selling more but respecting the integrity of the client and the client is getting what he wants.


viernes, 2 de agosto de 2013

PRIVACY

2.Why is privacy important?
Privacy is important because it's your own right to be left alone.  No one have the right to public their life if they don't want to. Privacy helps the people to maintain  their autonomy and individuality from other people mouth.

3. What are the positive aspects of the police keeping a DNA database for suspects and victims?
The main positive thing is that if a suspect left DNA in the criminal scene, the police would already have the prove that he was the guilty one and the victim would be safe. And of course the justice would win.

4. What could be the negative aspects?
One negative aspect could be that someone that is innocent could be injure for something he didn't did just because they have samples of DNA.

5. Define data mining.
"Data mining, an interdisciplinary sub field of computer science, is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligencemachine learningstatistics, and database systems."

6. Discuss if it is acceptable or not, that social networks collect data about their users’ interests, to enable them to sell more accurate advertising systems.
 Yes it's acceptable because in order to know about the user they have to be supported with data about them, this benefits the user too because the social network can help him with the needs that he have. Of course everything has to be taken with respect for the client, and given that data should be optional.The social network is always collecting data about their users, but sometimes it's optional for us to put it or not. One example of this is Facebook, you are not forced to publish everything, it depends on you. I personally think that is acceptable, but they have the obligation to respect the customer, if they collect data to do things like sending coupons to a pregnant woman they have to be aware that is not obvious.

The most important thing that a company should do is to protect the customer, if they don't expose the client everything would be fine because they would not feel damaged. Also a company have to give the client everything they need, in this case if a woman is pregnant and she needs pregnant stuff, the coupons would be fine for her because that's what she needs.

In conclusion I will say that it's acceptable for me to collect data of their users because it's a way to know them better and in some way please the client. Both sides are wining, the company is selling more but respecting the integrity of the client and the client is getting what he wants.


http://en.wikipedia.org/wiki/Data_mining

viernes, 26 de julio de 2013

Virtual Revolution

1. Write 4 examples of online news media.

Online journalism (eluniverso.com), video blogs (Youtube.com), photo blogs (Tumblr.com) and Forums (Taringa.net).

2. Write examples of the impact of online news media.

New journalism is growing up, new writers of journals are starting to succeed because their opinion is spread it through the web. The people can get involved in the news too because in the web they are allowed to post and express a directly opinion and so on. The news are more faster because if everyone that see something can publish it in a faster way in the web and everyone could see them by using the internet.

3. Explain how online news media are different from traditional news media.

Is different because in the online news media you are allowed to express your point of view at the moment, it's easier for the viewer to say if they are against or not than in a traditional news media that someone have to approved your comment or not. Also the new media can be instantly scattered at the moment it happen, and in the traditional news you have to wait to the next morning to read the news.

4. Analyze the similarities between the revolution caused by the printing press by Gutenberg and by that caused by online news media.

Both inventions really help and revolutionized the world, because in the time where people don't have news and the printed paper doesn't exist, this was an amazing discovery but now that the years have passed and the technology had advanced too, we have to use other methods to spread the new faster than it was. Both are valid and they can be complemented, like in some news paper, they still have the traditional way but also they have their online news media.

5. Identify different problems that new trends in online news media could cause. Try to related them to social & ethical issues.
The reliability of the news can be damaged because as everyone can read in the web, everyone it's able to post a new. Also that if someone have a webpage that publish information, and this information is hurting the integrity of someone, the person can not injured someone because you don't know who was behind the computer. Another thing is that sometimes the online news media attempt to the security of a person because sometimes it's so explicit that expose the person to the hurt, like when an artist is seeing in some street and someone publish that and all the fans are there in minutes. The online news media double-edged sword because it can really help the society but it depends how the society wants to use it. 

Sources:
http://es.wikipedia.org/wiki/Johannes_Gutenberg
http://depts.washington.edu/ccce/digitalMedia/newsimpact.html



jueves, 11 de julio de 2013

Trends with benefits

Analysis of Social & Ethical Issues.-

Reliability: The reliability of the social network have been affected because they didn't know if the information was real or not, it could be fake or simple rumor.

Integrity: The integrity because Pete use the video camera and his cellphone to have personal information about the rape of the girl, and because of that the image of the girl is affected. 

Security: The security because the software doesn't have any protection of all the users because everyone can post whatever they want even if they are going against of someone else. 

Privacy and anonymity: The privacy and anonymity because the network shared information of everyone without they authorization. For example the problems or the rumor that were in the network require anonymity or at least privacy but they didn't.

Authenticity: The authenticity was affected too, because you don't how its behind a user. For example in the episode they post the picture of Pete dead but it was posted it from his account that means that he didn't was.

Equality of access: In this case the access was for everyone that have the software in their phones, that means that the access was made with equality. 

Surveillance: This social ethical issue was in the episode because the people was being watch over even if they don't know about and they use the technology to follow the people for example the students didn't know that they were filmed by Pete in the school. 

Control: The software or network was out of control because everyone can post whatever they want but, Pete was the one that have more control about it because he was the one that spread all the information or rumors. 

Policies and standards: In the social network were not policies promoting the appropriate use of it. That means that they don't really have any of the standards to have a pacific social network. 

People and machines: The interaction with the students and the network (cellphone) was all the day, because everytime they want they can enter and know information about someone. The relation between technology and human in this case was dangerous because it damage the reputation of the people and the big consequence was a death.

http://www.bodine.phila.k12.pa.us/kaufman/ITGSweb/socialethical.htm

lunes, 1 de julio de 2013

Classwork

  1. What is the difference between Desktop Publishing and Word Processing software?
The word processing software main job is to allow to type an article, edit the necessary and offer some extra features like spell checkers, and simple margin and page layout features. And the Desktop publishing is like a printing press on a personal computer, you have the full control of every layout and its more professional than the word processing software.
  1. One similarity is that they are WYSIWYG. Explain.
"What You See Is What You Get" this means that the document would be exactly as you see it in the computer. Means that the display simulates the appearance and represents the effect of fonts and line breaks on the final pagination using a specific printer configuration, so that, for example, a citation on page 1 of a 500-page document can accurately refer to a reference three hundred pages later
  1. Explain why the PDF format is often used for distributing digital documents.
Because the PDF format is the most full service of all, and its better for the digital document to be saved in that format. If you use another one, the document may be changed by the format. With the PDF there is no change in the document.

  1. Fonts can be divided in three categories: serif, sans serif and script. Post an example of each font with a description of each and where it is used.




    http://www.cameratim.com/computing/desktop-publishing-guide/word-processing-versus-desktop-publishing

viernes, 28 de junio de 2013

Classwork




Define what video editing software is and the basic hardware requirement you will need.


Application software that is apply in the post production of the film process, the application is used to edit the video in cuts and remove the parts that you don't need to. You will need the computer , CPU ,hard drives, cd room.


Describe the concepts of Capture, Shot and timeline.


Capture: to put information or pictures into a form that can be used by a computer.

Shot: a unit of action photographed without interruption and constituting a single camera view.

Timeline: The description of the time.


Explain basic features of what the software can do: arrange, special effects, enhancements  rendering, titles, sounds.

 
Arrange is to order the shots or capture following the timeline, the special effects can be chroma key or morphing, enhancements is to improve the quality of the image in this case video, the sound is to putting in sequence with the image so they are in the same time.






Describe the special effect techniques chroma key and morphing.

Chroma keying, is a special effects / post-productiontechnique for compositing (layering) two images or video streams together based on color hues (chroma range). Morphing is a special effect in motion pictures and animations that changes (or morphs) one image into another through a seamless transition. Most often it is used to depict one person turning into another through technological means or as part of a fantasy or surreal sequence.

lunes, 17 de junio de 2013

CLASSWORK

1.The compare and contrast of the raster graphic and the vector graphics is that raster graphics are composed of pixels, while vector graphics are composed of paths.The raster graphic is a combination of pixel with many colors and the vector graphic composed of paths, or lines, that are either straight or curved. Both can give color or make an image. 

2.


3. The application software that can handle vector graphic are Adobe Illustrator ,Corel Draw and Inkscape.


4. The application software that can handle raster graphic are Adobe Photoshop, Microsoft Paint and Color it!


5.The advantages of vector graphics are that data can be represented at its original resolution and form without generalization.Allows for efficient encoding of topology, and as a result more efficient operations that require topological information, e.g. proximity, network analysis.


6.The advantages of raster graphics are due to the nature of the data storage technique data analysis is usually easy to program and quick to perform.The geographic location of each cell is implied by its position in the cell matrix. Accordingly, other than an origin point, e.g. bottom left corner, no geographic coordinates are stored.



7.The vector graphics rescale better because the raster images cannot be scaled up in size because they will look pixelated when printed.That's why the RASTER images have a better resolution than the VECTOR images because of the pixels.


8. One typical scenario where vector images are used is for logos.


9.One typical scenario where raster images are used is in video games, graphing calculator games, and many mobile phone games are mostly pixel art.

martes, 11 de junio de 2013

Scenario 1

A photojournalist covers a war. Many of her photograph show the carnage of war including dead bodies. Because the photographs cover a large amount of blood, the newspaper would be breaking the law of their country if they printed the picture. The editor of the paper suggests altering the picture to remove the pools of blood from the ground, thus, making acceptable for printing. He argues that it is better to show some of the impact of the war (by using the altered photograph) than to show no pictures of the war at all.

Advantages:

*The newspaper would avoid problems with the government, modifying the image (taking away impact).
*Prevent children from being affected by seeing these "strong images".
*Avoid military families to see what happened in the war in a strong way.
* Prevent daily becoming a tabloid newspaper.
*The newspaper will not loose ethic.

Disadvantages:

*It doesn't shows the reality of the event, (the war).
* The newspaper would not bring as much attention as a tabloid by eliminating impact on the photo.


Conclusion:

*In conclusion, we can say that it is better to remove the impact on the photo, because if they are demanded, the loss will be bigger instead of the gain, and also the ethic of the newspaper could be affected.



lunes, 10 de junio de 2013

How to detect digital fakes?

Common logic
The logic is necessary to detect a fake photo, if something is utopia but it's in the photo probably had been modify.

Lighting
The light conditions is different from the original photograph because it depends on the place that the photo had been taken, and if you see over brightness in a photo its probably a fake picture.


Eyes and Positions
The eyes because eyes have very consistent shapes, and if someone edit a picture the eyes get distorted from the real one's and it's easy to find out the fake.

Specular HighlightsSurrounding lights reflect in eyes to form small white dots called specular highlights. The shape, color and location of these highlights tell us quite a bit about the lighting.

http://www.scientificamerican.com/article.cfm?id=5-ways-to-spot-a-fake&page=5