340 likes | 456 Views
Risks. “Thou shalt take calculated risks when computing” Colin “Swagster Supreme” Donar Connor “The Rock” McDowell Kegan “The Brains” Schuchaskie Feb. 2014. Reliability. re·li·a·bil·i·ty [ri-lahy- uh -bil-i-tee] noun
E N D
Risks “Thou shalt take calculated risks when computing” Colin “Swagster Supreme” Donar Connor “The Rock” McDowell Kegan “The Brains” Schuchaskie Feb. 2014
Reliability re·li·a·bil·i·ty [ri-lahy-uh-bil-i-tee] noun the ability to be relied on or depended on, as for accuracy, honesty, or achievement. Not all computers are reliable. They also can sometimes make mistakes, almost always, at the fault of the programmers.
Reliability Pentium Floating Point Unit Bug Like in the case of the Intel Pentium Floating Point unit bug. The Processor came up with incorrect values ,when dividing, beyond the 4th decimal. For example: (824633702441.0)*(1/824633702441.0)= 1 solved by the pentium processor = 0.999999996274709702 Y2K This is yet another programing error. This happened in 1999 when everyone was worried that the computers would malfunction because they weren’t yet year 2000 (Y2K) compatible.
Past, Present, And Future of Reliability There will be reliability problems for as long as there is room for human error. Reliability is a problem that will probably, never go away.
News for Intel’s Pentium Bug <http://www.theinquirer.net/inquirer/feature/2256771/intels-pentium-processor-turns-20-years-old-today>
Security Software Security - Software security encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application
Security Network Security - Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
Past, Present & Future of Security • Security whether it be software or network has always been needed. Since the creation of the internet, people have used it with malicious intent, and you must be well equipped to handle such attacks. • Ever since the 1970’s the effort to have computer security has been made. • Encryption is one of the earliest techniques used to protect computer networks from hackers and other malicious computer users. • With the evolution of technology, security is becoming much easier to use and more effective, but also the technology that causes these security breaches are becoming harder to stop and even harder to detect.
News Articles Related to Security Target Works on Security-Heavy Credit Cards, After Breach • http://news.cnet.com/8301-1009_3-57618283-83/target-works-on-security-heavy-credit-cards-after-breach/ Kickstarter hacked, user data stolen • http://news.cnet.com/8301-1009_3-57618976-83/kickstarter-hacked-user-data-stolen/
Nanotechnology (Nanotech) Technology that is extremely small, highly useful, and innovative. As well as powerful at a atomic and molecular level. Nanotechnology by definition is any type of device that is roughly between 1 - 100 nanometers in size. To give perspective a sheet of newspaper is about 100,000 nanometers thick
Nanotech There are however many ethical issues with such technology as it can be used for committing crimes, or since they are a self replicating device can malfunction and infinitely multiply causing what some call “grey goo” to envelope the world. Yet that is a far off doomsday fear. Other types of worries about the ethics of such powerful technology is that it could be used as a weapon of mass destruction as opposed as a tool for the betterment of mankind, as well as the question of who gets to use this type of technology arises.
History of Nanotech The idea of nanotechnology was first developed in 1959 Then in the 1980’s nanotechnology became an emerging field. As the science grew the practice of manipulating atoms using nanotechnology became more common. Then in the 2000’s controversies arose in regards of the implements of this technology and how it will be used. In the future nanotechnology will be used to heal the sick as the nanobots attack viruses at their level. It can be used to keep food fresher longer, as well as aid everyday life in huge ways other than what is already listed as the possibilities are endless with this technology
News Related to Nanotech Oxford Nanopore unveils portable genome sequencer – MinION http://phys.org/news/2014-02-oxford-nanopore-unveils-portable-genome.html New 'pomegranate-inspired' design solves problems for lithium-ion batteries http://phys.org/news/2014-02-pomegranate-inspired-problems-lithium-ion-batteries.html
Nanotech Reliability Security 10 10 10 20 20 20 30 30 30 40 40 40 50 50 50
Nanotech – 10 Points QUESTION: • How big is standard nanotechnology? ANSWER: between 1-100 nanometers in size BACK
Nanotech – 20 Points QUESTION: • What year was the idea for Nanotechnology developed? ANSWER: 1959 BACK
Nanotech – 30 Points QUESTION: • When did nanotechnology become an emerging field in science? ANSWER: 1980’s BACK
Nanotech – 40 Points QUESTION: • What is the name of the doomsday event involving nanotechnology? ANSWER: “Grey Goo” BACK
Nanotech – 50 Points QUESTION: • What is a major future use of nanotechnology? ANSWER: Use of nanotechnology in the medical field BACK
Reliability – 10 Points QUESTION: • “The ability to be relied on or depended on, as for accuracy, honesty, or achievement.” is the definition of what word? ANSWER: Reliability BACK
Reliability – 20 Points QUESTION: • What processor company created the pentium processor? ANSWER: • Intel BACK
Reliability – 30 Points QUESTION: • What does Y2K stand for? ANSWER: Year 2000 BACK
Reliability – 40 Points QUESTION: • What type of word is reliability? ANSWER: Noun BACK
Reliability – 50 Points QUESTION: • Solve (824633702441.0)*(1/824633702441.0)= ANSWER: 1 Congrats! you're smarter than the intel pentium processor. BACK
Security – 10 Points QUESTION: • When did the idea and practice of computer security begin? ANSWER: The 1970’s BACK
Security – 20 Points QUESTION: What is a form of computer security that involves encoding messages or information so that only certain people can read it. ANSWER: Encryption BACK
Security – 30 Points QUESTION: What makes network security different from software security? ANSWER: One has to do with applications while the other has to do with networking BACK
Security – 40 Points QUESTION: What is the definition of computer security? ANSWER: information security as applied to computers and computer networks. BACK
Security – 50 Points QUESTION: Who is the famous computer hacker that leaked government files that is now taking asylum in Russia. ANSWER: Edward Snowden BACK
Sources "Network Security." Wikipedia. Wikimedia Foundation, 19 Feb. 2014. Web. 24 Feb. 2014.” http://en.wikipedia.org/wiki/Network_security "Big Data Home." Techopedias. N.p., n.d. Web. 24 Feb. 2014. http://www.techopedia.com/definition/24866/software-securityl6 "Pentium FDIV Bug." Wikipedia. Wikimedia Foundation, 22 Feb. 2014. Web. 26 Feb. 2014. http://en.wikipedia.org/wiki/Pentium_FDIV_bug "Nanotechnology." Wikipedia. Wikimedia Foundation, 16 Feb. 2014. Web. 25 Feb. 2014. http://en.wikipedia.org/wiki/Nanotechnology "What Is Nanotechnology?" What Is Nanotechnology? Center for Responsible Nanotechnology, n.d. Web. 25 Feb. 2014. http://crnano.org/whatis.htm "Nano." Nano. National Nanotechnology Initiative, n.d. Web. 26 Feb. 2014 http://www.nano.gov/ "Reliability." Dictionary.com. Dictionary.com, n.d. Web. 27 Feb. 2014. http://dictionary.reference.com/browse/reliability?s=t