We recently finished reading the book “Tubes” by Andrew
Blum. This book talks about the internet and the things that make it work, the
cover of the book even says that it’s “a journey to the center of the internet”.
Most people, when asked how the internet works, would describe something to
magic or just plainly say that it “just works”. This book is meant to show
people what really happens on the internet that allows to do stuff such as
search for cat videos or trade stocks without having to leave our home. This
book fascinated me because I’m very interested in networking and the
infrastructure that may be behind things like a Google search. In the past, I’ve
been known to search for videos of data centers (such as This one showing a
Google data center) so I would not be considered a beginner when it comes to
knowledge of what the internet is and how it works. The most interesting thing
I learned was when the author starts thinking in gigabytes and gigabits as individual
bits, so one gigabyte is equal to about 1,000,000,000 bytes (if you use base-10
and not binary) or about 8,000,000,000 bits. If I had to pick a part of the
book I didn’t like, it would most likely be several parts mainly because I knew
the information already and was slightly bored with reading it and learning it
again. Overall, there weren’t many terms that I didn’t know. Even when he was
talking about the SFP+ cable/NIC, I was familiar with it because of my
experience and the fact that I often frequent the /r/homelab subreddit, where
people show off their home servers, datacenters, and networks. This book was
very thorough and did not leave me with any questions after reading, and any
questions could have been answered with a simple Google search. I would
absolutely recommend this book to a friend, especially one that wants to know
more about the internet and about how things like Google and Facebook can
provide you with content from any place in the world. I think this book is
significant mostly because it helps us computer science students realize that a
lot of what computers do today is reliant on networking, and often networking
through the internet. This book allows us to get an idea of what the internet
is like without having to take a look at things like the OSI model and how the
different networking equipment works with packets. This book was most likely
chosen as a textbook because it gives us this general idea of how the internet
works and let us get exposure to what some of us may end up working with as a
career in the future. My interest in the internet and networks has probably
stemmed from working with my home networking as well as being exposed to the
makeup of a corporate network where I was an intern. At my internship, I got an
idea of how the network was structured and where it came from, with its
different subnetworks and physical locations. I was also exposed to networking
and the internet through CyberPatriot, a national cyber defense competition.
One of my roles my senior year was to be my teams networking specialist. We
used Cisco’s “packet tracer” to build out virtual networks and troubleshoot
problems in routers and switches while getting exposed to a real command line
interface that was allowing us to make these changes in the scenario. Overall,
this was a fun book to read, and I would recommend it to anyone wanting to know
more about how the internet works.
Monday, October 31, 2016
Monday, October 17, 2016
The Filter Bubble of the internet
The “filter bubble” is the internet
phenomenon where people are stuck in their own bubble of like-minded thought on
the internet because of specialized algorithms that are meant to target the
user and serve up ads that that person may like. For this project, we were
tasked with getting on a friend’s computer and surfing the internet to see what
ads and suggestions they are served up. I spent some time on my roommate’s
computer. Logan and I are very alike, but we still have some very sharp
differences when it comes to what we like and enjoy on the web. I spent some
time on Logan’s MacBook and was interested in the results of this experiment.
Logan
and I both like riding longboards, but I only recently started while he had
been doing it for many years now. Logan also watches lots of skateboarding and
longboarding videos on YouTube. Because of this, the suggested videos for Logan
are almost primarily videos from his favorite channel or those similar to it.
My YouTube recommendations usually have something to do with computers, drones,
science, or guns. These differences show you what we usually watch online, and
shows that YouTube remembers the videos we watch and uses them to recommend new
videos to watch. The websites we use daily are not learning what we like and
using it to target ads toward us. It’s similar to the computers described in
chapter 8 of “The Pattern on the Stone” where the author writes about computer
that learn and adapt. Computers are learning our patterns of thoughts and likes
and are adapting the advertising to be more relevant to us. The algorithms are
sometimes similar to those described in chapter 5 of “The Pattern on the Stone”
where the author writes about what algorithms are and how they are used. These
specific algorithms are being used to track out movement across the web and
figure out what we like.
One of
the other websites that I surfed while on Logan’s computer was Netflix. I was
not surprised to see similar results as those on my recommendations, as we often
watch the same shows together. One difference was that Netflix realized that I
enjoyed documentaries specifically about topics related to science and
computers. The algorithm that Netflix uses probably looks not only at what we
watch, but how long we watch it. If we start a show but only watch a few
minutes before turning it off, Netflix should assume that we did not like the
show and should not give us recommendations similar to the show we did not
like. The algorithm that Netflix uses was actually not created by them. There
was a competition from 2006 to 2011 that challenged teams to create the
algorithm that Netflix uses now, or at least is based off of. You can still see
the website for the competition at http://www.netflixprize.com/. Netflix awarded $1 Million to the grand prize
winning team. Over one thousand teams entered and competed for the grand prize.
The big
questions about this type of targeted advertisement is privacy. How can a company
like Facebook be so spot on with its advertisements? Facebook tracks us as we
go onto nearly every page on the internet. If a webpage has a “like” button or
a way to comment through Facebook, then they can see that you have visited that
page. You could support a strong argument that some of these algorithms and
websites know us better than we know ourselves, which seems to scare some
people and not phase other people. Do you think we deserve more privacy from
internet giants such as Facebook and Google?
Monday, October 3, 2016
Meaning of “Pattern on the Stone”
We recently finished reading the book “Pattern on the Stone”
in my computer science class. Overall, during reading this book, I felt pretty
engaged with the book. The topics engaged me and interested me. The most interesting
I learned was how the author of the book built a tic-tac-toe machine using
physical items such as sticks and strings. This helped me step back and realize
that computers work through the same logic that sticks and strings can, and it’s
not some sort of magic that happens that I will never understand. I also enjoyed
when the book explained error correcting, as this is a vital part in error
correcting memory that is used in servers, which I am very interested in, and
own one myself. Would I recommend this book to a friend? Yes, I would, but only
if that person already has a basic understanding of computers, as some of the
topics covered in this book go more in depth and someone who doesn’t know
anything about computers may get lost. I think this book was chosen as a
textbook for this course because it helps introduce us to some of the basics of
how computer work, the cover literally says “the simple ideas that make
computers work”. This book helps expose us all to the concept of computer
science and what basic concepts we will deal with throughout our studies and
our careers. One of the chapters that I enjoyed reading was the chapter that
dealt with machine learning and artificial intelligence, mostly because I
believe this is one of the next big things in computer science. In the future,
and even in some systems today, artificial intelligence and machine learning
will play a hand in how our digital lives function. Today it might be as simple
as being to recognize a car or face from one of your photos and group those
pictures together, but in the future, machine learning and artificial
intelligence will be relied upon for our everyday lives. Instead of Siri being
just a thing you talk to, it will be a thing to have a conversation with, and
it will know you as a person and how to make itself more useful to us, even if
it’s just a piece of code sitting on our phones. Artificial intelligence and
machine learning is already being tested and implemented in the military today.
I recently went to a Landon Lecture where the president, CEO, and chairman of Northrop
Grumman, the company behind the B-2 stealth bomber. He discussed how his
company was actively using machine learning to teach its new test bomber how to
land and take off from air carriers as well as coordinate mid-air refueling. Northrop
Grumman has been able to successfully take off and land on an aircraft carrier
completely autonomously. This is the type of stuff that we only dreamed about
years ago, with movies like terminator, and now this is happening in the real
world. “the Pattern on the Stone” was published about 18 years ago in 1998, the
year I was born. The fact that the knowledge and the thought in this book is
still relevant to this day proves that this book is a good choice of book for a
textbook, and a good read for anyone wanting to know more about how computers
work at the most basic level. Overall, there was no part of this book that I
didn’t like if you don’t count the rare page where I became disinterested, and
I would recommend reading the book “Pattern on the Stone” by W. Daniel Hillis.
Monday, September 19, 2016
RSA encryption
RSA Algorithm
The idea for a public-private key
cryptosystem originally came from Whitfield Diffie and Martin Hellman in 1976,
when they published the concept. The original algorithm they created used a
shared key created from a number, modulo a prime number. Over the years, many
people worked on trying to create a function that would be easy to do one way,
but very hard to invert (do it the other way). The final algorithm was
completed when, one night, Ron Rivest had a “good deal” of wine at a Passover dinner.
Rivest then went home and spent the night finalizing the formula and had the
paper to present it almost ready by the next day.
How does
it work? RSA uses a public key and a private key to encrypt data. The public
key is meant to be public and to be spread and known by anyone wanting to send
a message to the owner of the public key. The private key is mathematically linked
to the public key and allows a message encrypted using the public key to be
decrypted by using the private key that it is linked with. The keys for RSA
encryption are created by using math on two distinct prime numbers to mathematically
calculate the private and public keys.
What makes
this special? RSA encryption allows us to encrypt data and ensure that only the
user holding the private key can decrypt it. It also allows us to be able to
spread around a public key so that someone that wants to send a message us able
to encrypt it and ensure that it’s for our eyes only. The algorithm is also
designed to be very easy to encrypt data, but trying to crack the encryption is
very hard without the private key, giving the users greater security.
Could we
do this algorithm manually? Yes, you could do the math behind calculating the
keys and encrypting/ decrypting manually, but the math would be very long and
tedious. For the keys to be as secure as possible, you must select large prime
numbers and this would be very difficult for a human to do the calculations, so
they are almost exclusively done by computers.
I’m
currently very excited to read chapter 6 of “The Pattern on the Stone” because
that chapter talks about “secret codes”. I’m hoping they cover a little about
RSA type encryption because it’s very commonly used today. I had lunch with
Eugene Vasserman, a professor at KSU about a year ago and when handing me his
business card, he pointed out the PGP encryption public key on the back of the
card. by using this PGP public key, I could encrypt a message that would be
just for Prof. Vasserman, much like RSA.
A video
I would recommend watching to get more information about the math behind the
RSA algorithm is Here: https://www.youtube.com/watch?v=wXB-V_Keiu8.
This video is from Khan Academy and helps to explain the math and reasoning
behind the way it encrypts data and why we encrypt data using RSA instead of
having a shared private key between two people so that they may share messages.
The video uses the example of a bank sending messages, and if the bank had to
have a specific key for each member, it would have too many keys to keep track
of, but if it can have one key to decrypt all messages it receives, this allows
the bank to communicate much more effectively. I would highly recommend checking
out the video for a great explanation, and maybe searching YouTube for other
videos to explain RSA encryption in more depth.
Monday, September 5, 2016
CIS 115 Personal Biography
My name is Josh Riess and I’m from Overland Park, Kansas. I’m
currently a freshman at Kansas State University majoring in Computer Science. I
chose to come to Kansas State because of the spectacular college of engineering
as well as the location, close enough to drive back in a day, but not too close
where my parents would be inclined to pop in on me. I am interested in computer
science because of the security aspect of it, as well as the fact that I have
always been fascinated with computers and how they work and what I can do with
them. My hobbies include working on my home network and servers, Scouting,
camping, and hiking. My favorite thing is to mess around with my home network
and try to set up servers with different services that all work together. I
have an older sister and a younger brother and a loving mother and father. I
worked at CommunityAmerica Credit Union for the past 2 summers as well as after
school for my senior year. I worked as a paid intern in the Solution Center,
their help desk that also did so much more than a normal help desk. I spent my
first months doing things such as moving computers around for employees moving
locations, placing PCs for new employees, and pulling hardware for employees
that left the credit union. We also had another company in our building named
TruHome Solutions. TruHome contracted the Information Services department of
CommunityAmerica to do their support and manage their infrastructure needs. In
the final few months of my internship, I ended up taking phone calls from the
solution center phone queue as well as taking tickets from the email ticket
system. I would spend my entire 5 hours at work taking calls from employees and
trying to fix them. I had at my disposal a program that allowed me to remotely
connect to someone’s computer and take control of it, I even had the ability to
lock their keyboard and mouse if need be. On other days, I would spend 5 hours
in the back up position, watching the email ticket queue and taking calls if
the on call person was swamped and needed my help. This internship gave me lots
of good experience and also a fall back plan for if I can’t find a job later on
in life, because I’m sure they’ll be happy to have me back and not have to
train someone new from the ground up. After I graduate, I plan on finding a job
related to Cyber Security. The actual job I will look for depends on if I
decide to try to get the SFS scholarship for students planning on going into
the cyber security field (link Here). If
I succeed in getting the scholarship, I would be required to work in the
government for 2-3 years, depending on how long I am on the scholarship. The
textbook chapters that I am most looking forward to getting in to are chapters
6 and 8. Chapter 6 in “Memory: Information and Secret Codes” and chapter 8 is “Computers
That Learn and Adapt”. For my news related to technology and computers, I
usually go to Google News and look at the “Technology” tab. I also have tabs
added for Hacking, Cyber Security, and Servers. For my information specifically
about Cyber Security, I rely on an email that I get every day called “The
Cyberwire”. I signed up for their emailing list a few months ago, and I receive
information on the world of hacking/cyber security every day. In addition to
just the facts, The Cyberwire also adds some explanation for the information.
Wednesday, May 11, 2016
ONW senior reflection
- What I learned
- In my four years in the eCommunication program, I've learned many things that will help me in my future. Some of the more notable things I've learned have been things such as collaborating with team members to get work done and establishing a professional presence online.
- How I learned these things
- I've learned these things mostly through experience working with clients and online on this blog. Many of the events I attended helped me get out of my comfort zone, such as our senior show. I also got lots of expierence from working with clients on projects.
- Why these things are important
- These things are important because they give me an edge when applying and interviewing for jobs. These things have also helped me in my Scouting career, where it is not unusual for me to be shaking hands and chatting with CEOs and other executives. I have really learned to establish a professional presence wherever I go.
- My greatest strengths
- I believe my greatest strength is that I have taken the path least traveled upon. I have spent my high school career doing things that will help me in my future, and allow me to create a better resume and have that professional experience that I will need for future jobs.
- What am I going to do with what I've learned
- With what I've learned, I'm going to continue on with my internship for now, and am likely to find a different internship the summer after my freshman year, giving me the opportunity to work at several different companies at many different roles before I even graduate college.
- Is there anything I would change?
- There's little that I would change with my time in eComm, but I have said in the past that it would be nice to be able to check out a macbook computer with adobe software from the school to be able to work at home on school related things.
- Conclusion
- In conclusion, I throughly enjoyed my time in the eCommunication program, and would definitely recommend the program to anyone interested in learning how to create a professional presence online and work with clients.
Labels:
assignment,
eComm,
Final,
School,
web design
Monday, April 11, 2016
Scout day at the K
Yesterday was the Heart of America Council's Scout day at the K. Our council took over the Royals stadium for the day, and over 10,000 scouts and scouters were in attendance for the game. I was fortunate enough to be invited to the suites that the council had reserved for families of board members and influential members of the council. Below are some pictures from my seat. A scout from my troop, troop 122, was also recognized in the Buck O'Neil Legacy Seat for his actions that saved the lives of 2 people after their canoe had capsized on a quick-moving river.
Labels:
boy scouts,
lifesaving,
Royals,
ScoutDayK
Monday, April 4, 2016
eMagine 2016
The 2016 eMagine media festival was held this past Saturday at Olathe Northwest High School. This festival featured the work of students from many schools in Kansas and Missouri. For the 2nd time, I ran the sound board for the festival, dedicating almost my entire Saturday to ensuring the festival went off without a hitch. I prefer working the sound board for the festival more than just attending the festival because the sound board gives me more to do than just sit there and watch. Above is an image of my view during the eMagine media festival.
Labels:
award,
eComm,
eMagine,
School,
web design
Thursday, February 25, 2016
Updates on websites
I have been working closely with the Section C5B leadership to figure out hosting, and we should have if figured out within a week or so. At the same time, I have been working on a website for the Science Scholars group at my school. Since the website was already set up with the same theme as our main website, I haven't needed to do much with regards to layout. Yesterday, I made a banner for it using other banners on the school websites as templates. There currently isn't much going on with the websites I'm working on, but I should have more updates in the weeks to come.
Labels:
boy scouts,
CSS,
eComm,
Graphic Design,
OA,
School,
web design,
wordpress
Wednesday, February 10, 2016
Another website to work on!
Just today, I talked to my friend Will, a senior in the entertainment video focus of eCommunication. He brought me into the loop on a short film he is working on. I currently don't want to give away any secrets or spoilers, so I won't talk about the short film, but I'll talk a little about the website I am working on for it.
The website could possibly be hosted in place of a current entertainment video website (more details to come), so that we don't have to set up a wordpress site from scratch. I've looked at lots of themes, but still like the zerif lite theme that I am also using for the section website. We are still currently in the beginning stages of figuring out what we want to do with this website.
The website could possibly be hosted in place of a current entertainment video website (more details to come), so that we don't have to set up a wordpress site from scratch. I've looked at lots of themes, but still like the zerif lite theme that I am also using for the section website. We are still currently in the beginning stages of figuring out what we want to do with this website.
Labels:
Code,
CSS,
eComm,
Responsive,
School,
short film,
web design,
wordpress
Thursday, January 28, 2016
Science Scholars website
As part of my senior project, I am building a website for the ONW Science Scholars. The website is a child theme of the school website, and will have a link to it on the main school website. It currently has little content, and I will be attending a Science Scholars meeting to brainstorm ideas for content for the website. Below is an image of the website right now, with the filler images and posts.
I am also waiting for the lodge and section officers to provide content that the section secretary requested from them. Once I get the content, I will be able to add even more content to the section website.
Labels:
boy scouts,
domain,
eComm,
Graphic Design,
images,
OA,
Responsive,
School,
web design,
wordpress
Thursday, January 21, 2016
Recent updates for Section Website.
In the past week, I have done some major improvements to the Section C5B website. I started by adding in pictures of the lodge flap for each lodge, as well as getting images for each of the section officers. I also posted some filler posts so that I could see what they posts would look like when we roll out the full website. Below are some screenshots of my work so far.
In preparation for moving the entire wordpress website to another server (the official website host for the section), I have researched how I could move the content over. It looks like all I have to do is install wordpress remotely through ftp on the new server, then just copy over the wp-content folder to ensure all the content makes it to the new server. I don't know if this method will keep the current users I have set up, but that isn't a big issue to fix.
Labels:
boy scouts,
Code,
domain,
eComm,
Graphic Design,
OA,
parallax,
Responsive,
School,
web design,
wordpress
Friday, January 15, 2016
Order of the Arrow Section C-5B website
Recently, I have been working on a website for the Order of the Arrow, Central Region, Section C-5B. A section is made up of several lodges, and holds events such as section conclave, and section training events. Their current website is old and has not been updated in over 3 years. For the new website I am using a hosting service called DigitalOcean that lets me easily manage DNS and install Wordpress. I took a look at several other section's websites in the central region, and saw that two of them already had the same theme, so I decided to go with that theme (Zerif lite). Below are some screenshots of my what I have done so far.
Subscribe to:
Posts (Atom)