Archive | Cloud Computing RSS feed for this section

Assignment: How Stuff Works Part 2 – Asynchronous Activities

Summer's Activity on Cloud Computing:
Maury's Activity of Networking:
Amy's Activity on Wifi:
Leslie's Activity on Buses:
Daniel's Activity on Social Networking:
  • Visual Map of Social Networks


    This was interesting for a few reasons. First, I had not previously considered the idea or ramifications of using one network to connect to another network. It connects spheres of my life in ways I superficially assumed were disparate entities. Second, Google controls my life. Everything stems from how I connect to the networks, which is through my Google browser. I assume this is why Facebook shows me ads from shopping sites I have recently been to. And these are not just ads, but pictures of the actual items I looked at. This kind of connectivity can leave me with a creepy feeling, a Big Brother-knows-all kind of feeling. Lastly, I have managed to completely segregate my guilty pleasure - Twitter. I have no followers from real life. I post and read about all my favorite celebrities and gossip and fashion and entertainment news. I am sharply satirical in ways I would not be in any other space. I don't want to share this space with anyone either. It's for me to revel in the guiltiest and basest of my escapes. I get to it from my phone and never connect through any other means than directly from the app on my phone. Maybe it's a delusion, and there really is someway for Google or Facebook to know who I am on twitter and make that public for all to know, but hopefully no one will shatter my belief in a little network privacy.

    Jenny's  Activity on Networking:
    Chvonne's Activity on WiFi:
    • Cell Phone Quiz: 4/10 (Well, I know how to work a cell phone even if I don't know how a cell phone works!)
      My Activity on Memory:

      I thought that creating a Venn Diagram would be a helpful way to show where there is overlap in our memory and storage systems. Unfortunately, the process was difficult for me to do digitally. I tried Google Drawings and some online Venn Diagram makers. None of these options were very easy to use because of the number of spheres I needed - work computer, laptop, Google Drive, work's provided network space for the writing center (S Drive), work's provided network space for personal use (M Drive), three flash drives (the sailboat shaped one, the Gaston College one from the HR fair, and the red one that flips open but that I have to jiggle just right to get the computer to recognize it), a portable hard drive from when the old laptop crashed, there's stuff saved on my phone like photos, and other photos are on a memory card in a digital camera, some photos are on CDs from before around 2011,and then my Outlook email, Yahoo email, and Gmail email where I might have sent stuff by attachment to myself...

      And if you want to count the stuff that isn't stored digitally, well there are some bookshelves. And boxes in a storage unit...

      Basically, a Venn Diagram can't contain this madness. I have stuff saved everywhere. I save willy-nilly. Helter-skelter. A devil-may-care attitude, if you will. My memory network makes grown men weep.

      I need help. Lots of help. Some sort of personal trainer to come in and shout at me through a bullhorn. Organize, collate, back-up, create some sort of regimen.

      Perhaps I am doomed to exist in a chaotic network of nodes and connections? Perhaps it will be one of those summer break projects that always seem to get completed before the rush of Fall semester, right?

      Sigh. Que sera, sera.

      NO! I'm going to do something. Be pro-active! Make a list of what gets saved where! Make folders! Move and copy files and delete...

      But wait... that phrase from before reminded me of something.


      Yeah... I'm going to get right on that project, but first I should check out that video...

      Cloudy with a Chance of Connection

      Cloud Computing, A World Connected

      How Stuff Works? Assignment

      Image comes from Wajeeha blog.

      Image comes from Wajeeha blog.

      Things to Know Before Diving In (or, swimming up?)

      If you are like me and have a love/hate  relationship (with a lot of cursing involved) with your computer, techie jargon is less than fun to decipher. So, this is a brief, and not at all exhaustive, list of terms (with definitions) to refer back to whenever necessary (which I will probably be doing often).

      Intranet vs. Extranet - An intranet is a private network, usually used by companies, that is founded on internet technologies but is inaccessible to the global internet community. An extranet is an intranet that is shared between more than one organization, making it accessible to particular individuals outside of the specific company but still remains inaccessible to the main internet community (an example on the BBC website was that of inventory management) (Schofield). As a way to assist companies with intranets and extranets in relation to cloud computing, Google released the Google Search Appliance, which allows users in a company to search through their documents and other data in much the same way an internet user would search for information through a search engine (though it comes with a hefty price tag).

      Client Computer (or computer network) is the physical computer owned and operated by the client rather than the cloud operator. This could be a personal computer, work computer, or set of computers in either the home or the work place that is/are going to be linked to the cloud system (Strickland).

      Back End vs. Front End – With cloud computing, there is the Front End, which is the user interface (this can be in the form of mobile music apps like Amazon Player or iTunes), and the Back End, which is the server and cloud-computing services (Strickland; Crawford). One of the main concerns with cloud services (along with issues of security and privacy) is that as more and more users come to depend on cloud services, users will no longer need to rely as heavily on IT specialists, so those workers will find more jobs on the Back End than the Front End (Strickland, “Cloud Computing”).

      Middleware is a software that allows computers on a network to talk to one another and is part of the central server (Strickland, “Cloud Computing”). An example of this would be Oracle Fusion.

      Redundancy here is defined as the process of making copies of data for backup. Since the cloud is information on a hard drive not owned by the client (think of cloud computing as renting digital space), the owner of whichever cloud system is being used (Google, Amazon, and Apple are top contenders) then makes copies of data to different physical computers in case of a computer crashing, power outage, and the like. Redundancy is necessary to keep the cloud operator from losing a client’s data (so pitchforks aren’t necessary…most of the time). (Strickland, “Cloud Computing”)

      Grid Computing System ”is a computer network in which each computer’s resources are shared with every other computer in the system.” This provides great possibilities for researchers who require high processing power from computers than what an individual computer is capable of, especially if the grid system was the basis for the cloud system (Strickland, “Grid Computing”).

      Server Virtualization is a nifty procedure that tricks a server into thinking that it is actually multiple servers, “each with its own operating system” (OS), which in turn eliminates a lot of “unused processing power” and reduces how many computers are actually necessary (Strickland, “Cloud Computing”)

      Autonomic Computing is mostly theoretical at the moment, with labs like NEC Laboratories America doing research on how to create such systems. This type of system would hypothetically manage itself in regards to repairs and problem prevention within a networked system, which also has the potential to decrease IT jobs considerably as the system would be taking care of itself (Strickland, “Cloud Computing”).

      Authorization Format is a procedure that would give users limited access to “data and applications relevant to [their] jobs.” This is a way for clients and cloud operators to strengthen privacy, along with authentication (which is what we do when we type in passwords to Google Drive, iTunes, and a whole host of other applications that we use on a daily basis) (Strickland, “Cloud Computing”). Privacy and security are both big issues for those who are trying to decide whether cloud services are right for them and/or their companies as the client is allowing the cloud operator to take data and store it in digital space (and physical hard drive space) rented and not owned by the client.

      Onwards and Upwards to SkynetCloud

      Cloud computing, which is gaining dominance in how we deal with data across different fields (such as business, academics, shopping, listening to music, and personal communications), is the essence of a network. The cloud system is capable of linking devices from desktops, laptops, mobile phones, gaming consoles, and tablets and linking them together as a way to store data so that the client can be anywhere in the world and still have access to his or her information without the need to carry a particular device. This does raise a lot of questions and concerns (those in love with the Terminator franchise like I am will be reminded of Skynet without the rampaging, murderous robots…just yet) about security and privacy as the client is essentially handing over data to an outside party who then stores the information on physical computers elsewhere (several, if you remember from the term redundancy, as a way to keep data from being lost due to an accident or hardware malfunction).

      Conference Poster for the 2012 South by Southwest Conference.

      Archived Conference Poster for the 2012 South by Southwest Conference.

      For those who a little wary of placing their personal data in the hands of strangers on a computer they will probably never see, cloud computing may be closer to home than they realize. These systems have become especially prominent in the act of listening to music because a person can buy a song from Amazon or iTunes and listen to it on his or her phone while on the go, or the user can use the digital radio station-esque Pandora and listen to the random song list the program generates and then adapts to the user’s liking or disliking of individual songs (Strickland, “Music Clouds”; Crawford, “Amazon Cloud Player” and “iTunes Cloud”). With iTunes Cloud, users can sync their devices (generally without too much issue) together in order to create backups and share files across devices. Images, music, contact lists, videos, and other media are no longer restricted to just a computer or phone, making it easier for content to be retrieved should something malfunction or need to be replaced (Crawford, “iTunes Cloud”). This has further connection ramifications as such software turns a home into a network as computers can link together not just on internet connections, but also through Home Sharing. In effect, we and our devices both become nodes of connection, linked together through cloud computing systems.

      Cloud computing itself has the feel of science-fiction as it allows users all over the world to connect their devices to each other in a closed system where only they have access, or they may extend their reach outwards and participate in larger virtual communities founded on cloud technologies. In a major way, cloud systems are reshaping our relationship to data and data storage as we no longer need to worry about our computer crashing or not having access to documents while on a trip; cloud operators promise us that our data will be there when we need it, wherever we are (unless we are lost on some remote island or stuck in the most remote region of some mountain where cell phone service is non-existent, which is becoming less and less a possibility it seems). Cloud computing is all about interconnections, whether for personal data storage, applications, collaboration, or business efficiency. It allows any device with internet connection to link to whatever cloud computing system the user has access to, and information has become just a few clicks away. This technology, for better or worse, is enhancing the image of the world as a digital network, with us as the nodes and cloud as the connectors.

      ENGL894 Asynchronous Activity: How connected are you?

      Citations

      Crawford, Stephanie. “Does ‘to the Cloud’ Mean the Same Thing as ‘Let’s Google That’?” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.

      Crawford, Stephanie. “How the Amazon Cloud Player Works.” How Stuff Works? How Stuff Works, 20 Apr. 2011. Web. 17 Jan. 2014.

      Crawford, Stephanie. “How the Apple iCloud Works.” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.

      Schofield, Jack. “What are Intranets and Extranets?” BBC WebWise. BBC, 09 Sept. 2010. Web. 17 Jan. 2014.

      Strickland, Jonathan. “How Cloud Computing Works.” How Stuff Works? How Stuff Works, 08 Apr. 2008. Web. 17 Jan. 2014.

      Strickland, Jonathan. “How Grid Computing Works.” How Stuff Works? How Stuff Works, 25 Apr. 2008. Web. 17 Jan. 2014.

      Strickland, Jonathan. “How Music Clouds Work.” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.