Wednesday, September 30, 2009

Blog Assignment 3: Maths

Hah, computer maths, easy stuff! I could be all snooty and designate Hex values with $ and binary with % but I'll just use labels DECimal BINary and HEXadecimal.
For any outside readers this is a homework assignment, I'm not showing off here.
  1. Convert the following binary numbers to both hexadecimal (base-16) and decimal (base-10)
    a. Bin: 1011 Hex: B Dec: 11
    b. Bin: 10101 Hex: 15 Dec: 21
    c. Bin: 10010110 Hex: 96 Dec: 150
    d. Bin: 1111111 Hex:7F Dec: 27

  2. Convert the following decimal numbers to both binary (base-2) and hexadecimal (base-16)
    a. Dec: 8 Hex: 8 Bin: 1000
    b. Dec: 63 Hex: 3F Bin: 111111
    c. Dec: 113 Hex: 71 Bin: 1110001
    d. Dec: 97 Hex: 61 Bin: 1100001


  3. Suppose that we want to download a 200 MB file. How long will it take on each of the following connections?

    a. A modem that can download at 56 kilobits/second
    (1638400 bits, so ~29257.14 seconds) 8 hours, 7 minutes, 31 seconds
    b. A DSL connection that can download at 5 Megabits/second
    (320 Seconds) 5 minutes 20 seconds
    c. A high-speed connection that can download 10 Megabits/second
    2 minutes 40 seconds

  4. If we have an Internet connection that can upload 3 Megabits/second, and an MP3 is 60 Megabytes, how many MP3s can we upload in an hour? In a month (given a reliable connection)?
    (491520 bits, 24576 bits/second, 88473600 bits/hour, divides evenly to:) 180 MP3s

Monday, September 28, 2009

Net Neutrality

Just barely getting this blog post in on time!

I'm all for net neutrality, but imposing it as a legal principle has me concerned. I am pleased with the FCC commissioner's plans, but instead of discussion the current situation I decided to voice these concerns:

1. If ISPs must provide nondiscriminatory service and access for all content and traffic, what about illegal content. If a provider notices illegal activity through use of their network, they normally have the responsibility to terminate such service. Should they do nothing, which network neutrality implies, it puts them in a position where they can't do anything, and could even be held responsible, for illegal use of their network.

2. If the government begins regulating the internet, it's a slippery slope. The US government can't regulate world wide, and servers are all over the world. As much as I wouldn't trust the US government with such a task, it's not like I think providers or the United Nations can do any better.

Monday, September 21, 2009

List of related web pages so far.

Wednesday, September 9, 2009

Cloud Computing

What is cloud computing?

I used to think of cloud computing as a buzz word. Groups of computers such as beowulf clusters were formerly considered a "cloud" but it the modern usage is entirely different.

These days “cloud computing” refers to applications and storage being available and used through the network, rather than locally. This means that work in done online through the browser and information is saved out in servers somewhere that you could likely not find.


What are the benefits and disadvantages of cloud computing for an ordinary computer user?

The ordinary user may have trouble finding documents stored locally or collaborating, which can be easier through “the cloud.” In an extreme example, if a user’s computer explodes his documents in the cloud will be just fine!


What are the benefits and disadvantages of cloud computing for a start-up company?

Presently cloud computing for certain tasks (such as word processing) can be cheaper and easier to deploy than traditional desktop applications. The downsides are reliance on the network and having potentially sensitive documents out on the internet.


What are the social dangers of cloud computing? That is, why might people be uneasy about the whole world's documents being stored on GoogleDocs instead of on local machines?

Simply put, it’s not easy to trust a large corporation with your documents. For years users have been storing copies personally, used to having it physically sitting right next to them. The move to cloud computing is even less physical. The dangers associated are potential hackers and packet sniffers who could steal or copy documents in their entirety.

Wednesday, September 2, 2009

Third Day of Class

The website is just about done. It's been fun!