1 September - PowerPoint PPT Presentation

About This Presentation
Title:

1 September

Description:

Are there things they shouldn't do? NY Times, August 30 ... Why do you perceive a website or a technology to be safe? Why do you trust anything or anybody? ... – PowerPoint PPT presentation

Number of Views:43
Avg rating:3.0/5.0
Slides: 21
Provided by: poze
Learn more at: http://wwwx.cs.unc.edu
Category:

less

Transcript and Presenter's Notes

Title: 1 September


1
1 September
  • Perception vs. Reality

2
Current Event IPod Cellphone
  • Mobile phone and music player
  • Over-the-air music download
  • Question What should mobile phones do?
  • What do they do today?
  • Are there things they shouldnt do?

NY Times, August 30 http//www.nytimes.com/2005/08
/30/technology/30apple.html?themcth
3
Perception vs. Reality
  • Why do you perceive a website or a technology to
    be safe?
  • Why do you trust anything or anybody?

4
Trust
  • What is trust?
  • Definition
  • assured reliance on the character, ability,
    strength, or truth of someone or something
    (Merriam-Webster)
  • What/who do you trust?
  • People, companies, organizations, brands
  • How do you characterize them?

5
Creating trust
  • Stores or products?
  • Generate trust through
  • Brands
  • History
  • People?
  • Generate trust through
  • Reputation
  • Behavior

6
Destroying trust
  • What breaks that trust?
  • Mistrust lack of confidence
  • How do confidence and trust relate?
  • Can you regenerate trust?
  • People?
  • Brands?
  • Counterfeiting and trust

7
Cybertrust technologies
  • What technologies do you NOT trust?
  • Why?
  • Is it that you worry about the technology or the
    data?

8
The Weakest Link
  • Why do people check bank statements, credit card
    bills, or restaurant charges?
  • The quality of the system is only as good as the
    weakest link
  • What is the weakest link?
  • people
  • GIGO garbage in, garbage out

9
Using Technology to Predict
  • Significant work in modeling
  • economies, weather, elections
  • How much do you trust the model?
  • Risk assessment cost/benefit analysis
  • What are examples where you make risk assessments?

10
Elections
  • 1948

11
Computer Predictions
  • 1952 Stevenson and Eisenhower considered dead
    heat
  • Univac used on CBS to predict result
  • built by Eckert and Mauchley, builders of Eniac,
    the first computer
  • CBS treated it as a novelty
  • Mock-up shown on tv

12
That evening
  • 830 pm Univac predicts Eisenhower landslide 438
    93
  • 915 pm algorithm adjusted to give Eisenhower
    8-to-7 odds
  • Later CBS confessed the truth
  • Actual results 442-89
  • Electoral vote within 1
  • Popular vote within 3

13
Predictions
  • Factors that make them accurate?
  • Inaccurate?

14
And in cyberspace
  • What makes you trust a web site?
  • Name
  • How do you get a URL?
  • How do you create a name on a web site?
  • What is a link?
  • Certification
  • How do you put a picture on a web page?
  • Lets take a peak

15
Symbols on the web
VeriSign uses a Flash program a little harder
to fake, but not much
16
Leads us to next week
  • Build your home page, during which you will learn
  • HTML
  • How the computer processes it
  • About files and file access
  • Assignments
  • Make sure you have your ONYEN
  • Bring your laptop
  • Wireless or an ethernet cable
  • Fully charged battery

17
Computer in the Arts
  • About the work
  • When was the work written or produced?
  • Whats the genre?
  • The role of computers
  • A character or a tool?
  • Central to the plot or peripheral?
  • How computers are portrayed
  • Intelligent or simplistic?
  • Threatening, helpful or neutral?

18
2001 A Space Odyssey
  • Produced in 1968 as science fiction
  • What was happening in 1968?
  • Intel founded
  • Sony introduces Trinitron technology
  • Keyboard, mouse windows demonstrated
  • First artificial intelligence program
  • Apollo Guidance Computer
  • Tentacle Arm

19
1968 Apollo Guidance Computer
  • Introduced in Apollo 7
  • Steered Apollo 11 to lunar landing in 69
  • Primitive interface

20
1968 Tentacle Arm
  • 12 joints
  • Designed to reach around items
  • Developed at MIT
  • Controlled by DEC PDP-6 computer
  • Max 1.2 Mbytes
  • .125 MHz
  • Powered by hydraulic fluids
Write a Comment
User Comments (0)
About PowerShow.com