Predicting the Digital Future

Predicting the Digital Future

  1. This week in class we spent time recapping the semesters terms, theories, and technologies and analyzed the current state of our digital age. Through focusing on the issues of interoperability and information overload, we critiqued our technological age and analyzed possible trends for the future of technology.
  2. As Introp continues to progress in our digital landscape, it presents a world of possibilities but also challenges. Increased Interop presents more need for cloud computing, raises privacy/security concerns due to the increase of file sharing between devices and also promotes an increase in such things as SaaS (Software as a Service). The future of interoperability is endlessly intriguing but also frightening, and such videos as Microsoft’s “Future World Vision” depicts a startling vision of how interconnected life may become.
  3. Such videos show a would governed by interoperability, and this raises concerns as to whether a world so dependent on technology would become a utopia or technocracy? Such videos show the possible of a world that is seamlessly interconnected, similar to John Berrett’s vision of The Internet of Things. With a world so plugged into the internet, one must begin to analyze the possible downfalls, including the increase in information overload.
  4. A massive increase of connectivity between objects, results in a overwhelming spew of information in out daily lives. To be able to function productively in a  world consumed by big data, the internet would need to have a significant increase in filtering tools. However, such filters could lead to the issue of having filter bubbles that further divide our access to information. Information overload also creates a demand for higher levels of personalized technologies, which would inevitable be run by algorithms, creating a further digital divide. 

    Overall, The future of the internet is unpredictable, and endlessly full of possibilities. Such things as convergence and transmedia allow us to see examples of how the world can become so accessible across multiple platforms, and how entertaining, and resourceful options of such interoperability are. Do you think the future of our digital age will evolve into a utopia where technology can be used to better serve humanity? Or, do you believe technology will process into a technocracy and inevitable be humanities downfall? Either way, only time can tell, and to pass the time, read the article below to see what others predict will be the future of technology.


Design Thinking

This week for class EID100 we had the task of creating an informational app. The app I created is entitled ShopShopper. Showshopper is an app that users can access to have a one stop concert browsing experience. The app works by users clicking on any concert venue listed in the Toronto area, and being able to view a monthly schedule of upcoming shows. Interested in seeing how it works? Click on this link to see ShowShopper

I came up with the idea for ShowShopper through the process of design thinking. It all came together in a few simple steps

1. I read the outline provided on the AppBuilder website and became familiar with how to build and app and what makes an app successful.

2. I explored the AppBuilder site and familiarized myself with how it works, and what it offers.

3. Upon browing the AppBuilder site, I found the platform somewhat confusing and I immediately concluded that I wanted to create an app that was easy to use, and served a simple purpose.

4. I thought of what intrigued me, and what I would find useful in an app.

5. I determined I wanted to focus on music and creating something that could help users search for events happening in the city. This is because I commonly search for show and find the process time consuming. I wanted to create an app that could cut down steps for concert searching and make the experience of looking for shows more efficient.

6. Next I thought of an interesting name to brand my app. I came up with ShowShopper and from there started the process of creating my app.

Tutorial Activity – Google Search Tips and Tricks

1. How to search for an exact word or phrase?

To search for an exact word or phrase place quotation marks around the word(s) you intend to search ex. “prince cavalier” puppies

2. How to search for something on a specific site?

Precede your query with the phrase site: or to find results from a specific site or type of site. For example: site:edu or

3. How to correctly search for a definition?

Put define: in front of any word to get its definition.

4. How to search for a specific product available within a specific price range?

To specify a particular number range, type .. then a space, then the numbers in your range. For example, “300…500”

5. How to search for a specific file type?

Search for specific types of files, such as PDFs, PPTs, or XLS, by adding filetype: and the 3-letter file abbreviation.

6. How to include or ignore words in your search?

Highlight common words and characters¬† if they are essential to your search¬† by putting quotation marks around them. You can also use the minus sign (-) to specify particular items you don’t want in your results. Ex. Cake recipe -eggs

7. How to find related pages?

Use the related: operator to find pages that have similar content by typing related: followed by the website address.

8. How to find a topic, searching all available synonyms of a word?
Get results that include synonyms by placing the ~ sign immediately in front of your search term.

9. How to find the time in another country?

To see what time it is anywhere in the world, search time and the city or country.

All answers provided above can be found on Google tips and tricks

Cybersecurity and Cybercrime

  1. This week in class we defined and discussed  various types of cyber crimes that exist online, and explored  tips towards how to surf the web safely. Some of the common cyber crimes that exist today include malware, phishing, spoofing, and spam. Below is a video defining each of these terms in depth. 
  2. University of Essex IT: Spam, Phishing, Spoofing, Malware and other stupid "IT" words talk
  3. Although knowledge of such cyber crimes may be common fact to most, there remains a common misconception surrounding Macs and these invasions. Although it has been a tossed around tale that Mac users are immune to viruses, I has recently been uncovered that these tales are a myth.  Nobody is complelty safe online, not even our  trusted Macs. 
  4. Now, although we are all vulnerable to such things as identity theft, cyber stalking, spam and so forth. There are ways to protect ourselves from such attacks, and lower the possibility of something like this happening. 
  5. The first step for everyone would be to install a well trusted web browser. Some of the most common platforms include those of Firefox and Chrome. The second, which was mentioned in class is always surf with this saying in mind, ” Think twice, Click once”. What this means is, be cautious of what you share, and who you share it with. Keep personal information private, be suspicious of websites asking for your information, and always carefully reread any links before clicking. Below are some more common tips to keep in mind, as well as some statistic regarding cyber crime in Canada. 
  6. Now that we are all somewhat familiar with how to surf safety online, I ask you, do you feel you take enough precautions protecting your identity online?