Explore Task

Yesterday working on my explore task I accomplished a good portion of my research section of the explore task. I plan on doing self driving ships, and the autonomous vehicles of the marine environment. In class I watched videos and read research articles on my topic. The videos I watched discussed the information I am collecting and provided visuals to further explain.  Tomorrow I look to continue my research and get close to finishing the first part of the explore task and have information ready to go with sources

Submarine Cables


1. Is it true that sharks biting the cables is a problem?

Yes, sharks and other fish are thought to be attracted to the cables because of the electromagnetic signals released.

2. Cables can break just by wearing out - but what are some other things that cause them to break?

Natural underwater events like faults can cause landslides and seismic activity that effects the cables.

3. Who uses submarine cables?

Companies who manage the transfer of telecommunication data. 

4. How thick is a cable?

The average modern day cable is roughly one inch or 25 mm in diameter 

5. How does fiber-optic technology work with the cables?

Each cable contains one or more optical fibers. The cables are directly linked from one country to the rest of the world.

6. What did you find most interesting about the cables?

The fact they are so long and can withstand the oceans. The process of installing the cables is quite fascinating also.

IP Blog

What is a protocol?A protocol is a set of rules  for routing and addressing packets of data so they have the ability to travel across networks and arrive at the correct destination.  What is an Internet Protocol (IP) address?String of numbers that uniquely identifies each computer   How is it organized hierarchically?Network and host portion  How many bits are in an IPv4 address?32 bits How many IPv4 addresses does that mean there are?  4,294,967,296 What is the difference between IPv6 and IPv4.  IPv6 is 128 bits instead of 32 Why do we need IPv6?Not enough available IP addressees  What is an IP packet?Composed of header and payload  What is the difference between an IP address and an IP Packet?Identifying numbers 
What is the purpose of the Domain Name System (DNS)?Tracked and regulated

Koans Blog

Koan 7 Bits Move Faster Than Thought:

To summarize this Koan, the best explanation would be the idea on of how computers can travel and send information faster then a human ever could. The article discuses the processes of data sharing and how information is now communicated and sent faster then ever. Many companies can now outsource their inputs and outputs to places far far away thanks to bits. Now thanks to computers everything can be communicated long distances at lighting fast speeds. You could drive up to a drive thru

Koan 6 Nothing Goes Away:

The article discuses the storage of information that has been input by internet users for years. This information is nothing secret and can easily be accessed by many. The information stored can be used for audits and data retention. Companies and organizations like Walmart also store your data to make a profile about you and your behaviors. The profile helps companies target you based on your purchase or activity history.

Marconi Maritime

I learned that radio towers were all shutdown or taken over during this time of war
I learned that power surges were common when decoding machines were running 
I learned that morse code is easy to use and learn

 The machine I took a photo of here was
a decryption machine used to decode the incoming communications. This machine used large amounts of power dimming nearby lights in the town. I chose this because of it's importance in the war.
 The photo here is a radio receiver this was used to receive incoming communications. It's importance to the cause was crucial to war efforts.
This is another form of equipment used by the
This machine was used for writing code and had special keys used for doing specific task
This photo here is a fake man performing what it would like like of the time

This is the inside of the decryption machine
The interior was highly complicated with a large amounts of circuits.

Government and Private Citizens Data

I believe that encryption of messages like on Facebook and Instagram is important for many security reasons of the customers (users). People who use these softwares expect that their information is kept private and that it can be used as if talking face to face. Users should not be afraid to share viewpoints for fear of backlash by law enforcement or companies. Then again this can definitely be exploited by sick people using it for criminal purposes. The encryption could hide potential terroristic threats, sexual offenses, and exploiting minors.  This can be dangerous cause there is no way to stop this if the messages are never reviews or seen. Also none of these messages could be used in a court case for prosecution as evidence which is important.

Internet is for Everyone

Internet is for everyone - but it won't be if legislation around the world creates a thicket of incompatible laws that hinder the growth of electronic commerce, stymie the protection of intellectual property, and stifle freedom of expression and the development of market economies. Let us dedicate ourselves to the creation of a global legal framework in which laws work across national boundaries to reinforce the upward spiral of value that the Internet is capable of creating.

The reason I chose this challenge because it relates to our real world issues especially in countries like China where the internet is controlled by the government and many opinions and foreign sources are blocked from the citizens. China can use this to their advantage because there is no negative foreign influences on their citizens. This also relates to the United States and it's efforts like network neutrality giving companies the ability to control our speeds when they want and charge ridiculous pric…