Mystic Aquarium

Posted by admin on Apr 23, 2010 in ICM 501a

Here is my journey to Mystic Aquarium. I hope that you enjoy the video.


RFID: A look into the future

Posted by admin on Nov 30, 2009 in ICM 501a, Module 7: Future of Interactive Communication


Technology, currently, is continuously changing. Throughout the last decade, the vast majority of people were competing to get the latest technology they could afford; on the other hand, what seems top-notch technology seven years ago, for example, is out-of-date in today’s world. Countless inventions and innovations are simply dying, for instance, CDs, fax machines, and even desktop computers. Moreover, other people are trying to predict the future of technology. Professor Alex Halavais, in his lecture on the media futures, “The future“, mentioned that it is really important to predict the future of technology, specifically the future of interactive communication technology. In addition, He indicated that one of the ways to predict the future is by creating a scan for the future. He also stated that one of the most important technologies is “RFID” that is strongly nominated to be evolved in the future. In this post, I am going to discuss two major points: the first one is the potential utilizations of RFID technology in the future, and second one is the challenges of using RFID technology in the future.

Potential utilizations of RFID

According to Wikipedia, RFID “is the use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves”. In addition, Simon Morton, in his interview with BBC New “Barcelona clubbers get chipped‘, stated that “implanting microchips that emit a Radio Frequency Identification (RFID) into animals has been common practice in many countries around the world”. When I put this possibility in mind and imagine the future of RFID  active tags, I can simply infer that, in the future, I will not be carrying my ID with me, or when I travel, I don’t have to have my passport with me, because it is all in a small microchip inserted in a part of my body. Imagine when you go to the bank, for example, there is no need of any identification. Or, even the possibility of storing all your important data in one of your arms. Furthermore, when I think about the “mobile-enabled culture” that Howard Rheingold, in his book “Smart mobs“, described it, I think of RFID as a possible technology to be developed that might become next generation of mobile devices. Perhaps,  a microchip that has the ability to send and receive text messages and voice calls. This microchip gets its signal from a satellite and has a voice recognition system that converts the voice to text and sends it, without the need to type the letters, for example. Whatever the use of RFID technology in the future, I am pretty sure that it will be extraordinary.


Challenges of using RFID

Furthermore, there are certain challenges of using RFID technology in the future. The range of RFID microchips is the main challenge, as Howard Rheingold, in his book “Smart mobs“, indicated that “RFID tag” is ”an inexpensive microchip with short-range radio broadcast capability”. In addition, if RFID microchips used in the future, privacy concerns might be the second challenge. People who have the RFID microchips injected in their body that contain all important data about them will be terrified from unauthorized access to their private data. In addition, governmental and commercial data collection will be a major issue in the future, since the use of RFID microchips will make the data collection processes a piece of cake.



I have mentioned that there are major inventions and innovations that are basically on its last legs. Everyone is wondering “what comes after the digital revolution” (Neil Gershenfeld, 2006). In addition, I have indicated that there are certain technologies, such as RFID, that might be the possible coming revolution. RFID might be used in different ways, such as passport, credit card, or even as in integrated cell phone. However, there are several disadvantages of using RFID technology in the future. For example, the cost, range, and privacy concerns are the main challenges of using RFID technology in the future. After all, I believe that RFID technology is a strong candidate to be a major medium of communication in the future.

Tags: , , , , , , ,


Legal issues for “Snacktivity”

Posted by admin on Nov 16, 2009 in ICM 501a, Module 6: Legal Issues

My teammate Wel comm has just published a post about: Legal issues for snacktivitymom.com. Due to the fact that I am working in a group, that also includes Thinking Allowed, and we did our work as a team from our last meeting, we decided that  Wel comm posts and we link to him. In addition, the founder of the “Snacktivity” is Wel comm’s wife; therefore, he has better ideas about the legal issues of the website. Hopefully, you will enjoy his post.


Privacy Invasion

Posted by admin on Nov 16, 2009 in ICM 501a, Module 6: Legal Issues
I want privacy

I want privacy

Technological advancements, in today’s world, have enabled many people to live decently. Numerous inventions and innovations have improved the standards of people’s life. The invention of the Internet, for instance, had a major impact on everyone. Who could possibly imagine that the internet will evolve to be one of our daily routines? In addition, certain internet laws were created to accompany the rapid growth of the Internet. For instance, the war over intellectual property, nowadays, has gone far away more than anyone could expect. There is, absolutely, countless legislation that protects the intellectual rights of the companies, for example; however, nobody cares about the massive collection of personal data that being gathered by many companies. In this post, I am going to discuss two points; the first one is the invasion of people’s privacy and the second one is an argument about the importance of storing personal data.

Privacy invasion

Louise Story (2008), in her article, “To aim ads, web is keeping closer eye on you“, indicated that there are certain companies that collect personal information of the vast majority of the users who use the Internet and “use that information to predict what content and advertisements people most likely want to see”. Additionally, she mentioned that “people who spend more time on the Internet, of course, will have more information transmitted about them.” Well, most of the corporations, including huge corporations, such as Google, are invading the privacy of online users. In fact, according to the Big Brother, Big Business video, from CNBC, many people believe that “if they obey the law and mind our own business, there is no reason for any one to pay much attention to them”. On the contrary, “details and personal information is being collected everyday and used in a way we cannot imagine”. I was stunned to know that even the “internet searches are being recorded” and the emails. I totally believe that what these companies should be sued and questioned. There is no need to keep the “user’s emails after the user deletes it” (Big Brother, Big Business, CNBC). 

Storing personal data

On one side, according to the Big Brother, Big Business video, some people claimed that certain huge companies, such as AOL, that store personal data help governmental agents, such as the FBI, to identify certain criminals. For example, AOL usually helps to enforce the law by storing personals data, such as emails, for two months after the user deletes it, according to the Big Brother video, CNBC. The fact that AOL, and other companies that store personal data, helps to eliminate the mystery of certain crimes is really astonishing. On the other side, Michelle Kessler and Kevin Maney (2006), in their article “AOL’s tech chief quits after breach of privacy“, indicated that “AOL said it is creating a task force to re-evaluate its privacy policy. The team will debate how long AOL should save search records and how to further protect records by, for example, removing all sets of numbers that look like credit card numbers”. Well, there are certain concerns with storing personal information about any user and one of them is a security breach can always happen to any database. These breaches can be conducted by employees who work with those companies. In fact, this is not the first time that AOL has a breach; Michelle Kessler and Kevin Maney stated that “AOL has run into privacy trouble before. Last year, an ex-employee pleaded guilty to stealing 92 million customer e-mail addresses, which he sold to spammers”.


To sum up, I have indicated that the privacy of most users who use the Internet regularly is in jeopardy. Most of the online users have the right to have privacy of whatever they do online. I believe that normal people who obey the law and don’t violate it should not be monitored. In addition, I believe that companies who store private data without the permission of users should be sued and questioned. Moreover, I have indicated that there are certain advantages of storing these kinds of entries; for example, these data entries helped to enforce the law and detect certain criminals. On the contrary; the disadvantages are even greater. A single breach to the databases that contain the data could murder the privacy of several users.  After all, I strongly believe that privacy laws that protect people or online users should be strongly changed. 


Tags: , , , ,


Users’ needs expand

Posted by admin on Nov 3, 2009 in ICM 501a, Module 5: Interactive Production

My teammates Thinking Allowed and Well comm have published an expand on the users’ needs assignment that I have already published. Due to that fact that we met little bit early and we finalized the assignment before we see professor Halavais latest post on the “Users and Personae“, we decided that we will expand on the assignment in different posts in order to incorporate professor Halavais guidelines.

Copyright © 2019 The World Through My Eyes All rights reserved.
Desk Mess Mirrored v1.3 theme from BuyNowShop.com.