Wednesday, July 31, 2013

Scott Hommel's CMSY 129 SPRING 2013 HTML5 Site

If I Could Travel Anywhere...


Scott Hommel's CMSY-129 Spring 2013 HTML5 Site

I would love to go to Europe. I've never been across the pond, and I would love to see the English countryside,
Irish pubs, and Ancient Rome. European trips can be expensive, but if I saved money for a year or two I'm sure I
could afford it. You only live once and I would love to see Rome, the United Kingdom, Belgium, and all Europe has
to offer.

Monday, July 29, 2013

Portfolio Assignment 10

Scott Hommel
7/29/2013
CMSY-129-N091
Portfolio Assignment 10
HTML5


     HTML5 apps are marketed as being "write once, run anywhere" and do not need to be rebuilt for each operating system. However it is debatable whether or not HTML5 apps will ultimately overtake the native app stores, such as the Apple App Store and Google Play. BI Intelligence did a side-by-side comparison of  HTML5 vs. Native Apps in a recent report that illustrates the strengths and weaknesses of the two respective platforms. They found that the native apps still provide a better user experience and performance and have a superior monetization model. However, according to the report HTML5 apps update quicker, have more available programming expertise, and stack up better against fragmentation challenges. This article relates to this week's reading in regards to its discussion of HTML5 apps, as we read about basic HTML5.

I know some basic HTML commands and I remember when XHTML was supposed to be the next big thing in computer programming, however it looks as though that distinction now goes to HTML5. I was previously unaware of any HTML5 apps, and I would be interested to test one out and see how inferior the user experience actually is if the reports are true. I'm not sure what language is used to code native apps for the iOS, but I can't help but wonder if the emergence of HTML5 apps will make the app creation process more accessible for a larger group of programmers. It would be great to have more people focusing on applications that can run across multiple platforms, as some of these apps really do make like more convenient and interesting.





Works Cited
Luger, Josh. "The HTML5 Vs. Native Apps Battle Broken Down." Business Insider. N.p., 24 July 2013. Web.

     29 July 2013. <http://www.businessinsider.com/battle-between-html5-vs-native-apps-2013-77>.

Portfolio Assignment 9

Scott Hommel
7/29/2013
CMSY-129-N091
Portfolio Assignment 9
E-Commerce
    
     AOL co-founder Stephen M. Case started the Revolution growth fund with two former colleagues, investing $40 million in Bigcommerce. An e-commerce startup, the software of Bigcommerce "helps companies create and manage online stores." A firm believer in the future of e-commerce, Mr. Case states that "now every entrepreneur can have Amazon-like e-commerce capabilities." 
The Revolution growth fund has also invested in Optoro, a Maryland-based startup that helps brick and mortar retail shops sell unsold or returned goods online. Mr. Case and the Revolution growth fund are focused on a different type of e-commerce than B2C sites like Amazon. This article relates to the chapter 9 reading in regards to e-commerce and B2B electronic exchange. This article illustrates how far e-commerce has come, and where it might be headed in the foreseeable future.

     When I typically think of e-commerce I think of B2C sites, such as Amazon.com and MusiciansFriend.com. It's interesting to read about another form of e-commerce, businesses selling to entrepreneurs and other businesses. I think Stephen Case is right, Bigcommerce may be the next big thing to hit the internet. We live in a DIY age where more and more people are starting their own businesses, selling goods online, and using resources such as Ebay and other online auction sites to earn a living. Providing these entrepreneurs with the software to create a better e-commerce experience would seem to be a very lucrative investment. I had never heard of Bigcommerce before reading this article and I'll be sure to pay attention to them and any other Revolution growth fund future endeavors in the news.


Works Cited

Alden, William. "Revolution Fund Invests $40 Million in E-Commerce Start-Up."DealBook. The New York
     Times, 25 July 2013. Web. 29 July 2013. <http://dealbook.nytimes.com/2013/07/25/revolution-fund-invests-

          40-million-in-e-commerce-start-up/?_r=0>.

Portfolio Assignment 8

Scott Hommel
7/28/2013
 CMSY-129-N091
Portfolio Assignment 8
Internet Security


     Charlie Miller and Chris Valasek are two white-hat hackers that worked to find bugs in Microsoft and Apple software. After receiving a federal grant to conduct research on "car hacking" however, the pair is now set to publish detailed techniques and blueprints for hacking into cars like the Toyota Prius and Ford Escape, that utilize onboard computer systems. They found that when sitting inside these cars with a laptop connected to the vehicle's computer network they were able to control the car's breaks, steering wheel, and acceleration. They hope the data will "encourage other white-hat hackers to uncover more security flaws in autos." 
Any real terrorist threat would come from a remote attack outside of the vehicles, and apparently there was an investigation in 2011 that proved automobiles could be hacked remotely using Bluetooth systems and wireless networks. The U.S. government has initiated an auto cyber-security research program in their effort to stay two steps ahead of malicious hackers. This article relates to the week's reading in regards to hacking and white-hat hacking in particular, while introducing a new hacking concept; car hacking.

     I have heard of carjacking, but car "hacking" is a new term for me. I have driven a Ford Edge with an onboard computer before, and to be honest I found it impractical and not very user-friendly. I am pretty sure cars with such technology are more difficult and/or more expensive to repair as well, should something malfunction related to the car's computer. The added risk of car-hacking seems to further negate the convenience or benefit of having a computer in the car. While hacking into cars remotely may not yet be simple enough for the average criminal mind, the possibilities are frightening and one would hope that the government is able to work alongside car manufacturers to ensure that black-hat hackers cannot remotely hack into automobiles with malicious intentions.


Works Cited

Finkle, Jim. "Software Experts Attack Cars, to Release Code as Hackers Meet." Yahoo! News. Yahoo!, 28 July
     2013. Web. 29 July 2013. <http://news.yahoo.com/software-experts-attack-cars-release-code-hackers-meet-

          130811715.html>.

Monday, July 22, 2013

Portfolio Assignment 7

Scott Hommel
7/22/2013
CMSY-129-N091
Portfolio Assignment 7
 Machine and Network level security

     This article discusses facial pattern recognition, a form of biometric authentication that we read about in this week's chapter. Facebook uses facial recognition when tagging friends in photos and Samsung's Androids have a "face unlock feature", to ensure that only the phone's owner can unlock it. Apparently Google has banned facial pattern recognition technology at the moment, not allowing the technology to be used for the company's smart glasses. 
Software companies such as Orebus Inc. continue to work on such technologies however, believing that Google will lift the technology ban eventually and allow it to be used with Google Glass. In fact, in 2011Google bought Pittsburgh Pattern Recognition, a startup company focused on facial pattern recognition technologies. There seems to be a consensus that once privacy concerns are addressed and as the technology evolves, Google will be on board with the technology along with the rest of the computer industry as this form of biometrics will become commonplace.

     This was an interesting article to read, and it had never occurred to me that Facebook uses this technology when tagging friends in photos. I have tagged friends many times, without even thinking about the technology that was involved in the process. I am an iPhone user, so I was also unaware that some Androids have a face unlock feature. It seems that this is the way technology is headed, and I'm sure Google will be onboard with facial pattern recognition when they feel the time is right. Biometrics used in everyday technologies is only the beginning, as we inevitably head towards a completely hands-free, automated way of computing once the algorithms for voice recognition and other protocols improve.


Works Cited

 Hsu, Jeremy. "How Face Recognition Tech Will Change Everything." DNews. Discovery Communications,
     LLC, 11 June 2013. Web. 22 July 2013. <http://news.discovery.com/tech/biotechnology/how-face-rec-tech-

          change-everything-1306111.htm>.

Wednesday, July 17, 2013

Portfolio Assignment 5

Scott Hommel
7/17/2013
CMSY-129-N091
Portfolio Assignment #5
Twitter Article
  
    This week's Twitter activity went well. I already had an account set up so I only needed to find a good article and then connect with my classmates. I will say that I don't typically have conversations on Twitter, I normally use Facebook for that, so the conversing and replying directly to tweets was new for me. As far as micro-blogging sites, Facebook continually updates its layout so that it seems to be right on par with Twitter as far as the instantaneousness of the experience via the news feed.

The power of micro-blogging social networking sites is on display in the article I read about Twitter and Facebook being used to organize anti-government protests in Turkey. The Turkish government wants Twitter to establish a Turkish office so that the government will have a domestic liaison and correspondent to address their issues. Twitter is not planning on establishing an office in Turkey, nor do they have a reason to do so. 

I think it only shows how weak Turkey's government must be, if they feel so threatened by the website. Web censorship of any kind seems immoral to me, when it involves  restricting citizen communications and withholding important information. If the Turkish government was operating properly, justly, and morally, they would have nothing to hide, there would be no protests, and they would have no need to attempt web censorship. I think it's great that countries like Turkey are using web technologies to their advantage and creating real social reform in the world.


Works Cited
"Turkey Seeks to Tighten Control over Twitter." BBC News. BBC, 27 June 2013. Web. 17

     July 2013. <http://www.bbc.co.uk/news/technology-23079607>.

Tuesday, July 16, 2013

Portfolio Assignment 4

Scott Hommel
7/16/2013
CMSY-129-N091
Portfolio Assignment 4
Evaluating Web sites

     I've had this idea for awhile now, and I would like to create a guitar and bass tablature site. Tablature is simple music notation for guitar, used to transcribe rock and pop music. I do a lot of tabbing while on the job at School of Rock, and I'm always amazed at some of the inaccurate tabs found online. I've seen people incorporate tabs into instructional videos online, and that's what I would eventually like to get into. I already have the Blogger name registered and everything; perfect pitch tab. I envision putting some tablature on the site in word document format at first, and eventually getting into videos.

Ultimate Guitar (http://www.ultimate-guitar.com/) is one of the authorities when it comes to online guitar tablature. Like other sites, Ultimate Guitar's strength comes from its vast community of contributors. The catalog is extensive because users can submit and review tabs. What really sets this site apart from some others is its rating system. Skeptical guitarists can quickly have their doubts subside upon viewing a tab's star rating which ranges from one to five (poor to excellent). In addition to the number of stars, the number of reviews given for a particular tab help validate it.

There is no doubt that Ultimate Guitar is an authority when it comes to tablature, and because the tabs are submitted by like-minded musicians with the common goal of teaching and learning new songs, there is no objectivity or hidden agenda. As I said before, because people from all over the world contribute to the site its scope and depth is unparalleled  and the design is no busier than it needs to be. The home page is quite cluttered with advertisements and things of that nature, however the tab search bar is dead center and is the first thing visitors see. One advantage to having so many contributors is the added traffic and advertising potential; the downside is quality assurance and not being able to keep up with regulation of the outside contributions. In addition to the rating system, I really like that the tabs have a transpose feature and are easy to print. If I could change one thing, I would de-clutter the layout to draw attention to some of the site's other features.

Guitare Tab (http://www.guitaretab.com/) has a far less-cluttered display. The same qualities regarding authority, objectivity, and scope apply to this site as they do to Ultimate Guitar. Though the design is not lacking, I do call the functionality of this site into question. This search engine algorithm did not seem as efficient as that of Ultimate Guitar's. Using the same search as on Ultimate, I requested "guns n roses paradise city" from Guitare Tab's database. It took me an extra few steps however, as I was not directly led to a 5-star tab as I was on Ultimate Guitar. There is a similar rating system used by this site, though I would say Ultimate has a superior design and functionality. One thing I did like about this site was that it includes drum tablature, but I didn't like that searches seemed slightly more time-consuming on guitaretab.com.

After looking at Songsterr.com (http://www.songsterr.com/), an upstart company that a guitar student told me about, it becomes clear that Ultimate Guitar is a little outdated with its appearance and layout. Though great for accessing quality tabs quickly, ultimateguitar.com has a poorly designed layout compared to Guitare Tab and especially Songsterr. This home page looks gorgeous, and is divided into 3 sub-headings (beginner, intermediate, and advanced tabs). This site also has drum tabs and has quite a bit of depth to it. When attempting the same search on this site as on the previous two I needed only to type "guns" before auto-fill did the rest and I was directed to a quality tab.
 With a breathtaking design, modern and obviously more current than others, the  tabs are interactive, with so many more options including the ability to choose multiple instrument tabs from a virtual mixing console. Of course, with so much going for Songsterr.com there has to be a catch and indeed there is. Being able to print a tab is very important, and this site will not let you print tablature without agreeing to a $10/month plan. It's a shame, but then I guess that's the sacrifice you have to make for a website less cluttered with advertising and distractions.

If I were to design a guitar tablature site I would want it to be more of a community site like ultimateguitar.com and guitaretab.com, rather than a monthly membership like songsterr.com. Songsterr is great for looking at tabs on the spot, but without a free print option I just can't support that site. I would start by doing some tabs myself, and try to make more of a free communal sharing site for tablature. I would be open to advertisements, but would draw the line before the site's design and appeal were compromised. I really like Ultimate Guitar's system, minus all of the distractions. With my site I would carve out a niche by focusing on certain rock sub-genres such as hard rock, 90's grunge, and 80's hair bands.





Monday, July 15, 2013

Portfolio Assignment 3

Scott Hommel
7/16/2013
CMSY-129-N091
Portfolio Assignment 3
Information Literacy and Searching the Web



     We are used to Google having the predominant market share of the highly profitable search engine industry here in the United States. However, Baidu is the top dog in China controlling over 60% off its search engine market. Google Hong Kong just simply can't compete with China's Baidu, which is basically everything Google is and possibly more, only adapted  for the Chinese by the Chinese. Due to Google's inability to keep up with Baidu, the President of Greater China Google has stepped down.

While Baidu maintains the lion's share of the market, Google's slice of the search engine pie has continued to vanish while upstarts such as Qihoo 360 continue to climb the rungs. Some critics blame Google's decision to move their servers from the mainland to Hong Kong where afterwards their "prospects dimmed considerably." Google's Android operating system is apparently failing in China as well, with opponents also pushing Google out of China's smartphone sector and as the head of Asia telecom and internet research at CLSA puts it; "Google's biggest challenge remains how to penetrate China."

Call me socialist if you will, but I couldn't help feeling pleased to read that there is a ceiling too high for multi-billion dollar industries  to reach. According to our textbook "Google has become one of the world's most profitable companies, with more than $36 billion in annual revenue." I envy the innovators and venture capitalists who have made a fortune off of riding the waves of silicon valley to a sea of fortune. However, it's nice to see that other parts of the world are able to resist such a powerful entity. No doubt it has something to do with U.S./Chinese foreign relations as I'm sure China would frown upon letting the U.S. win the search engine war on their home-turf, but it's refreshing to hear of a country defying an industry giant like Google. Now if only the Baidus and Googles of the world could unite, putting differences aside to share their technologies for the betterment of mankind, then we might really start getting somewhere in our search.

Works Cited

Baldauf, Ken. "4.4.1 Search Engine." Emerge with Computer Concepts. Vol. 4.0. Boston: Course Technology, 2013. CON 151. Print.

Carsten, Paul. "Google's Greater China President Steps down." MercuryNews.com. MediaNews Group, 15 July 2013. Web. 16 July 2013.

     <http://www.mercurynews.com/business/ci_23662221/googles-greater-china-president-steps-down>.

Week 2 Activity C: Create a Professional Presence Online

     I already had a LinkedIn profile up and running, so I used that site for my "Professional Presence" assignment. It took me awhile to adapt to the site, as I was more familiar with networking sites such as Myspace and Facebook, but LinkedIn is an entirely different experience and it doesn't take long to realize it. From getting recommendations and peers who vouch for your credentials to the exchanging of online business cards, this site is the best online forum for today's professionals.

Here is a Jing tutorial I created that navigates my LinkedIn profile (www.linkedin.com/pub/scott-hommel/48/692/898) :



)


In addition to making more professional contacts and networking, I am beginning to use LinkedIn as more of an information site. By following "howard county government" and "howard community college", I can stay current on things that are of interest to me.



Wednesday, July 10, 2013

Portfolio Assignment 2

Scott Hommel
7/9/2013
CMSY-129-N091
Portfolio Assignment 2
Digital Ethics

     The government of Saskatchewan reportedly defended its provincial computer system against "millions of cyber attacks" last year. With 15,000 computers in the network containing sensitive information related to health and finance, the province has made cyber-security a top priority out of necessity. Trying to stay one step ahead of hackers, they are committed to employee education and training which empowers them with the awareness and tools needed to prevent breaches of security. Retired computer security expert Terry Roebuck spent many years at the University of Saskatchewan thwarting hackers and ensuring the province's security. According to him the greatest threats come from "directed attacks", where cybercriminals are looking for specific information in a specific place. They will often cross-reference information from social networking sites with staff lists, gaining personal information that hackers can then use against the company to infiltrate their system. Seemingly one of the leading authorities on cyber-security, Saskatchewan has apparently had no previous security breaches and has yet to prosecute anyone for hacking into the province's system. This article is directly related to digital ethics, and governmental computer ethics in particular. The government is responsible for "defending a country's critical infrastructure from foreign governments, cybercriminals, and terrorist groups" according to this week's reading and that is exactly what Saskatchewan is doing.

In light of what the U.S. is currently going through with Edward Snowden, it was interesting to read about how another country handles cyber-security. While the United States has declared computer hacking by other nations "an act of war", Snowden disclosed that the U.S. government was doing exactly that with other countries. One thing that really grabbed my attention was how Roebuck described some of the tactics that hackers use. Gathering personal information from social networking sites, they are able to cross-reference information with the business that their target works for. The victim may receive an email claiming to be a picture of their son or daughter, yet when they click it there is no picture but now their computer has been compromised.


Works Cited

Baldauf, Ken. "5.3 Governmental Computer Ethics." Emerge with Computer Concepts. Vol. 4.0. Boston:
     Course Technology, 2013. ISS 50. Print.

    
Zakreski, Dan. "Sask. Government Computers Attacked Millions of times Last Year." CBC News. N.p., 9 July
     2013. Web. 10 July 2013. <http://www.cbc.ca/news/canada/saskatoon/story/2013/07/08/saskatoon-

          government-computer-hacking-130708.html>.

Tuesday, July 9, 2013

Portfolio Assignment 1

Scott Hommel
7/9/2013
CMSY-129-N091
Portfolio Assignment 1
Internet and Web Technologies

     This article is about the passing of Doug Engelbart, who invented the computer mouse back in the 1960's. He is also said to have worked on "early incarnations of email and word processing." His computer studies eventually led to the formation of his own laboratory, the Augmentation Research Center, where he helped developed ARPANET and was involved with the development of the internet. He is also credited with holding the first video teleconference and, although he has received many accolades such as the National Medal of Technology, he did not make much money off of his invention of the mouse because his patent ran out before it became widely used. This article relates to the week's reading because we studied internet history, including ARPA, ARPANET, and the some of the protocols, hardware, and software that Engelbart helped create.

I enjoyed reading this article because I had never heard of Doug Engelbart before, and it's a shame that more people are not familiar with him considering all he has given to the field of computer technology. It's very interesting that his original mouse design was a simple wooden shell covering two metal wheels, and overall after reading about him he sounds like a brilliant man. I am in the middle of reading a book by Ray Kurzweil titled The Age of Spiritual Machines, and Engelbart appears to have share some of Kurzweil's futuristic visions, believing that "computers could be used to augment human intellect."


Works Cited

"Computer Mouse Inventor Doug Engelbart Dies at 88." BBC News. BBC, 07 Mar. 2013. Web. 09 July      
     2013. <http://www.bbc.co.uk/news/world-us-canada-23174052>.