You are on page 1of 2

1.

Search Sleuth
a. Hillsong United released I Heart Revolution: With Hearts As One, in
Australia on 8 March 2008, on a flash drive embedded in a rubber
wristband. http://www.newburycomics.com/rel/v2_viewupc.php?
storenr=103&upc=88697208582
b. Malaysia uses the MyKad smart card for national identification.
http://www.secureidnews.com/2007/10/15/malaysias-national-id-cardmykad-has-multiple-smart-card-uses
c. Based off the efforts of engineer Daryl Anderson, HP released the first
LightScribe drive in 2004.
http://screenprintingnews.blogspot.com/2004_12_01_archive.html
d. The SanDisk Plaza offers digital books, music, games, and education
tools for download to its Cruzer Freedom drive.
http://en.wikipedia.org/wiki/SanDisk
e. Phase-change alloys are currently used in rewritable optical data
storage.
http://www.nature.com/nmat/journal/v6/n11/abs/nmat2009.html
f. IBM introduced using a hard disk for accounting projects in 1956.
http://www.infoworld.com/t/storage/hard-disk-drive-turns-50-749
2. Green Computing
a. Searching for environmentally friendly server cooing shows quite a
few results. Green Revolution Cooling (grcooling.com) describes a
method of fluid submersion using nonconductive white mineral oil that
is both eco-friendly and non toxic. Their GreenDEF coolant is effective
at 40C, while air needs to be at 24C. Energy is also saved by
removing server and power supply fans (not necessary with liquid
submersion), an additional 10% - 25% energy savings.
b. Facebook maintains a Data Center in Sweden, on the edge of the Arctic
Circle. While I could not find any analyst data on this method, the Data
Center is low carbon and uses sub-zero winds naturally produced in the
region to cool its servers. They also harness sustainable energy
collected from a hydroelectric dam.
3. Reputation Defender claims, through patented technology and patented,
proprietary strategies, to displace potentially damaging content in search
results by making good content rank higher. They do not really go into detail
about how they do this. DefendMyName goes into more detail by describing
the process. They state that they do the following: evaluate each persons
situation to develop a plan of action. Among their options are deleting
harmful information and deterring (and identifying) anonymous attackers
a. MySpaces privacy and content standards are as follows: they only
collect information that is voluntarily submitted or anonymous
information that does not identify you in any way (i.e. device or
browser details). They do not claim ownership rights that their users
submit, display or post, but recognizes that by doing so grants
MySpace a limited license to use/modify/delete said content. They may

reject, refuse to post, or delete anything in violation of the user


agreement (offensive, illegal, violates the rights of, or harms a person
or entity. Prohibited content includes that which promotes racism or
hatred towards a group or individual; harasses or promotes
harassment; is sexually/violently exploitative; contains nudity,
excessive violence or is offensive; information that can create a
privacy/security threat; is illegal/unauthorized copying/distribution of
someone elses copyrighted work; involves spamming or junk mail;
contains restricted access pages; promotes criminal activity.
b. Facebooks community standards prohibit the following; content that is
seen as a risk of physical harm or a safety threat, or the
promotion/planning of actions that could result in a harm or threat;
threats of self-harm; bullying/harassment of individuals; hate speech;
graphic content; the publishing of personal information without
someones consent, or claiming to be someone else; violation of
copyrights and trademarks; and contacting someone for commercial
purposes without their consent.
4. I attempted to visit the sites listed in the exercise question.
Malepatternfitness.com is closed to public traffic, and
fitness.families.com/blog is closed to comments. Diet-Blog does not receive a
lot of traffic (no post that I read had received more than 8-9 comments), and
Athlete Blog Central only has two blogs that have been updated in the past
six months (one 14 days ago, and one about three months ago). Athlete Blog
Central links to blogs authored by professional and amateur athletes, who
detail their careers, as well as offers insight into their personal lives at times.
Diet-Blog details diet-related topics such as exercise, eating the right foods,
and making better food choices. The Fitness Families blog seems to deal with
the emotional/social aspect of fitness and dieting.
5. Carnivore was the third version of what some believed was a software
program called Etherpeek, which was widely available. After this was
Omnivore, which targeted e-mail traffic over specific ISPs and either save a
back of or print a copy. Omnivore was replaced by the DragonWare Suite,
which Carnivore was part of. Carnivore worked as a packet sniffer, which
looks at all of the traffic coming over a network and either captures all
packets, or only those containing specific information. Meant to be used
against suspected criminals and terrorists, it was seen as a gratuitous
invasion of privacy, and a violation of free speech. It was later replaced with
programs such as NaruInsight (www.narus.com)

You might also like