Telecommunication
1. Introduction
Computer and telephone networks inflict a gigantic impact on today's society. From letting you call John in Calgary to letting you make a withdraw at your friendly ATM machine they control the flow of information. But today's complicated and expensive networks did not start out big and complicated but rather as a wire and two terminals back in 1844. From these simple networks to the communication giants of today we will look at the evolution of the network and the basis on which it functions.
2. The Beginnings
2.1. Dot Dot Dot Dash Dash Dash Dot Dot Dot
The network is defined as a system of lines or structures that cross. In telecommunications this is a connection of peripherals together so that they can exchange information. The first such exchange of information was on May 24, 1844 when Samuel Morse sent the famous message "What hath God wrought" from the US Capitol in Washington D.C. across a 37 mile wire to Baltimore using the telegraph. The telegraph is basically an electromagnet connected to a battery via a switch. When the switch is down the current flows from the battery through the key, down the wire, and into the sounder at the other end of the line. By itself the telegraph could express only two states, on or off. This limitation was eliminated by the fact that it was the duration of the connection that determined the dot and dash from each other being short and long respectively. From these combinations of dots and dashes the Morse code was formed. The code included all the letters of the English alphabet, all the numbers and several punctuation marks. A variation to the telegraph was a receiving module that Morse had invented. The module consisted of a mechanically operated pencil and a roll of paper. When a message was received the pencil would draw the corresponding dashes and dots on the paper to be deciphered later. Many inventors including Alexander Bell and Thomas Edison sought to revolutionize the telegraph. Edison devised a deciphering machine. This machine when receiving Morse code would print letters corresponding to the Morse code on a roll of paper hence eliminating the need for decoding the code.
2.2. Mr. Watson, Come Here!
The first successful telephone was invented by Alexander Graham Bell. He along with Elisha Gray fought against time to invent and patent the telephone. They both patented their devices on the same day-February 14, 1876- but Bell arrived a few hours ahead of gray thus getting the patent on the telephone. The patent issued to Bell was number 174,465, and is considered the most valuable patent ever issued. Bell quickly tried to sell his invention to Western Union but they declined and hired Elisha Gray and Thomas Edison to invent a better telephone. A telephone battle began between Western Union and Bell. Soon after Bell filed suit against Western Union and won since he had possessed the basic rights and patents to the telephone. As a settlement Western Union handed over it's whole telephone network to Bell giving him a monopoly in the telephone market. During his experiments to create a functional telephone Bell pursued two separate designs for the telephone transmitter. The first used a membrane attached to a metal rod. The metal rod was submerged in a cup of mild acid. As the user spoke into the transmitter the membrane vibrated which in turn moved the rod up and down in the acid. This motion of the rod in the acid caused variations in the electrical resistance between the rod and the cup of acid. One of the greatest drawbacks to this model was that the cup of acid would have to be constantly refilled. The second of Bell's prototypes was the induction telephone transmitter. It used the principle of magnetic induction to change sound into electricity. The membrane was attached to a metal rod which was surrounded by a coil of wire. The movement of the rod in the coil produced a weak electric current. An advantage was that theoretically it could also be used both as a transmitter and a receiver. But since the current produced was so weak, it was unsuccessful as a transmitter. Most modern day telephones still use a variation of Bell's design. The first practical transmitter was invented by Thomas Edison while he was working for the Western Union. During his experiments Edison noticed that certain carbon compounds change their electrical resistance when subjected to varying pressure. So he sandwiched a carbon button between a metal membrane and a metal support. The motion of the membrane changed the pressure on the carbon button, varying the flow of electricity through the microphone. When the Bell Vs. Western Union lawsuit was settled the rights to this transmitter were also taken over by Bell.
2.3. Please Wait, I'll Connect You.
The first network of telephones consisted of switchboards. When a customer wanted to place a call he would turn a crank on his telephone terminal at home. This would produce a current through the line. A light at the switchboard would light up. The caller would tell the operator where he wanted to call and she would connect him by means of inserting a plug into a jack corresponding to the desired phone. In earlier years he found that he could use the ground as the return part of the circuit, but this left the telephone very susceptible to interference from anything electrical. So in the mid 1880s Bell realized that he would have to change the telephone networks from one wire to two wire. In 1889 Almon Brown Strowger invented the telephone dial which eliminated the use for telephone operators.
2.4. The Free Press Reported That President Carter.......
French inventor Emile Baudot created the first efficient printing telegraph. The printing telegraph was the first to use a typewriter like keyboard and allowed eight users to use the same line. More importantly, his machines did not use Morse code. Baudot's five level code sent five pulses for each character transmitted. The machines did the encoding and decoding, eliminating the need for operators. After some improvements by Donald Murray the rights to the machine were sold to Western Union and Western Electric. The machine was named the teletypewriter and was also known by it's nickname TTY. A service called telex was offered by Western Union. It allowed subscribers to exchange typed messages with one another.
3. From The Carterfone to the 14,400
3.1. I'll Patch Her Up On The Carterfone, Captain.
The first practical computers used the means of punched cards as a method of storing data. These punched cards held 80 characters each. They dated back to the mechanical vote-counting machine invented by Hermen Hollerith in 1890. But this type of computer was very hard and expensive to operate. They were very slow in computing speed and the punch cards could be very easily lost or destroyed. One of the first VDTs (Video Display Terminal) was the Lear-Siegler ADM-3A. It could display 24 lines of 80 characters each (a remarkable feat of technology).
One of the regulations that AT&T passed was that no other company's equipment could be physically connected to any of it's lines or equipment. This meant that unless AT&T invented a peripheral it would not be legal to connected to the telephone jack. In 1966 a small Texas company called Carterfone invented a simple device that could go around these regulations. The Carterfone allowed for a company's radio to be connected to the telephone system. The top portion of the Carterfone consisted of molded plastic. When a radio user needed to use the telephone, the radio operator at the base station placed the receiver in the Carterfone and dialed the number. This allowed the user to call through the radio. AT&T challenged the integrity of the Carterfone on the phone lines and lost the battle in court. In 1975 the FCC passed Part 68 rules. They were specifications that, if met would allow third party companies to sell and hook up their equipment to the telephone network. This turned the telephone industry upside down and challenged AT&T's monopoly in the telephone business.
3.2. So Gentelmen A' Will Be 65
With more and more electronic communication and the invention of VDTs the shortcomings of the Baudot code were realized. So in 1966, several telecommunications companies devised a replacement for the Baudot code. The result was the American Standard Code for Information Interchange, or ASCII. ASCII uses 7 bits of code, allowing it to represent 128 characters without a shift code. The code defined 96 printable characters (A through Z in upper- and lowercase, numbers from 0 to 9, and various punctuation marks) and several control characters such as carriage return, line feed, backspace etc. ASCII also included an error checking mechanism. An extra bit, called the parity bit, is added to each character. When in even parity mode, the bit would have a value of one if there was an even number of ones and zero if there was an odd number of ones. IBM invented it's own code which used 8 bits of code giving 256 character possibilities. The code was called EBCDIC, for Extended Binary Coded Decimal Interchange Code and was not sequential. The Extended ASCII was designed so that PCs could again attain compatibility with the IBM machines. The other upper 128 characters of the EASCII code include pictures such as lines, hearts and scientific notation. In 1969 guidelines were set for the construction of serial ports. The RS-232C standard was established to define a way to move data over a communications link. The RS-232C is commonly used to transmit ASCII code but can also transmit Baudot and EBCDIC data. The connector normally uses a 25 pin D shell connector with a male plug on the DTE (Data Terminal Equipment) and a female plug on the DCE (Data Communications Equipment).
3.3. Hello Joshua, Would You Like To Play A Game...
In the 1950s a need arose to connect computer terminals across ordinary telephone lines. This need was fulfilled by AT&T's Bell 103 modem. A modem (modulator/demodulator) is used to convert the on-off digital pulses of computer data into on-off analog tones that can be transmitted over a normal telephone circuit. The Bell 103 operated at a speed of 300 bits per second, which at that time was more than ample for the slow printing terminals of the day. The Bell 103 used two pairs of tones to represent the on-off states of the RS-232C data line. One pair for the modem that is calling and the other pair for the modem answering the call. The calling modem sends data by switching between 1070 and 1270 hertz, and the answering modem by switching between 2025 and 2225 hertz. The principle on which the Bell 103 operated is still in use today.
During the sixties and seventies the concept of mainframe networks arose. A mainframe consisted of a very powerful computer to which thousands of terminals were connected. The mainframe worked on a timesharing process. Timesharing was when many users on terminals could use limited amounts of the host computer's resources, thus letting many parties access the host at the same time. This type of network, however, was very expensive, and since on time sharing you could only use small amounts of the host's total computing power (CPU), the use of the terminal was slow and sluggish.
In the late seventies the personal computer was introduced to the public. A personal computer consisted of a monitor, a keyboard, a CPU (Central Processing Unit), and various other connectors and memory chips. The good things about PCs were that they did not have to share their CPU and that the operating costs of these systems were much less that that of their predecessors. The computers could, with a software package, emulate terminals, and be connected to the mainframe network.
Bell laboratories came up with the 212a unit which operated at the speed of 1200 bits per second. This unit, however, was very susceptible to noise interference.
3.4. Hey Bell! I Can Hang Myself Up!
After the breakup of the AT&T empire that controlled the modem industry, many other companies started to create new designs of modems. Hayes Microcomputer Products, took the lead in the PC modem business. Hayes pioneered the use of microprocessor chips inside the modem itself. The Hayes Smartmodem, introduced in 1981, used a Zilog Z-8 CPU chip to control the modem circuitry and to provide automatic dialing and answering. The Hayes unit could take the phone off the hook, wait for the dialtone, and dial a telephone number all by itself. The Hayes Smartmodems sometimes had more powerful CPUs than the computers that they were connected to. The next advancement was the invention of the 2400 bits per second modem. The specifications came from the CCITT, an industry standard setting organization composed of hundreds of companies world wide. The new standard was designated as V.22bis and is still in use today. Other CCITT standards that followed were the V.32 (9600 bps), the V.32bis (14400 bps), the V42 (error control), and the V42bis (data compression). Virtually all modems today conform to these standards.
The next big computer invention was the fax modem. It uses the on-off data transmission just as a modem but for the purpose of creating a black and white image. Each on-off signal represents a black or white area on the image. The image is sent as a set of zeros and ones and is then reconstructed on the receiving end.
4. LANs
4.1. I Donnwanna File-Share!
Network Operating Systems (OS) are actually a group of programs that give computers and peripherals the ability to accept requests for service across a network and give other computers the ability to correctly use those services. Servers share their hard disks, attached peripherals such as printers and optical drives, and communication devices. They inspect requests for proper authorization, check for conflicts and errors and then perform the requested service. There is a multitude of different types of servers. File servers are equipped with large hard drives that are used to share files and information, as well as whole applications. The file-server software allows shared access to specific segments of the data files under controlled conditions. Print servers accept print jobs sent by anyone on the network. These servers are equipped with spooling software (saving data to disk until the printer is ready to accept it) that is vital in the situations where many requests can pour in at the same time. Network Operating Systems package requests from the keyboard and from applications in a succession of data envelopes for transmission across the network. For example, Novell's NetWare will package a directory request in an IPX (Internetwork Packet Exchange) packet, and the LAN adapter will then package the IPX request into an Ethernet frame. In each step information about data and error control data is added to the packet.
4.2. Eight Go In One Comes Out
The Network Interface Card or LAN adapter, is an interface between the computer and the network cabling. Within the computer it is responsible for the movement of data between the RAM (Random Access Memory) and the card itself. Externally it is responsible for the control of the flow of data in and out of the network cabling system. Since typically computers are faster than the network, the LAN adapter must also function as a buffer between the two. It is also responsible for the change of the form of data from a wide parallel stream coming in eight bits at a time to a narrow stream moving one bit at a time in and out of the network port. To handle these tasks the LAN adapters are equipped with a microprocessor and 8-64K of RAM. Some of the cards include sockets for ROM chips called Boot ROM. These chips allow computers without hard drives to boot operating systems from the file server.
4.3. Take Your Turn!
Ethernet and Token Ring network adapters use similar systems of electrical signaling over the network cable. These signals are very similar to the Baudot and Morse codes. A technique called Manchester encoding uses voltage pulses ranging from -15v to +15v in order to transmit the zeros and ones. The network cable has only one drawback, it can only carry signals from one network card at a time. So each LAN architecture needs a media-access control (MAC) scheme in order to make the network cards take turns transmitting into the cable. Ethernet cards listen to the traffic on the cable and transmit only if there is a break in the traffic when the channel is quiet. This technique is called Carrier-Sense Multiple Access With Collision detection (CSMA/CD). With collision detection, if two cards start transmitting at the same time, they see the collision, stop, and resume some time later. Token Ring networks use a much more complex process called token passing. Token Ring cards wait for permission in order to transmit into the cable that forms an electrical loop. The cards use their serial numbers in order to find the master interface card. This card starts a message called a token. When a card with information to send receives the token, it sends the data across the network. After the addressed interface card receives the information and returns it to the originating card, the token is given back to the master to be passed onto the next card. The ARCnet network uses a very similar system to that of the Token Ring. Instead of using a token, the master card keeps a table of all active cards and polls each one in turn, giving permission to transmit.
4.4. Tied In A Knot
Various types of cabling are used to connect the LAN adapters to the servers. Unshielded twisted pair wires offer rather slow speed, are very inexpensive, are small, and can only span very short distances. These cables use the RJ-45 connector. Coaxial cable offers fast speed, is rather expensive, has a medium sized diameter, and can span medium distances. Coaxial cable uses BNC connectors. The shielded twisted pair cable offers fast speed, is more expensive than the coaxial cable, has a large diameter, and can only span short distances. These cables use the IBM data connector. The fiber optic cable is the fastest possible type of data transfer, costs astronomical amounts of money, has a tiny diameter, and can span very long distances. This cable uses the ST fiber optic connector. Wiring hubs are used as central points for the cables from the network interface cards.
5.5. Loves Me, Loves Me Not, Server Based, Peer To Peer...
There are two general types of LANs. The Server-based networks rely on one major server to store data, offer access to perhiperals, handle the printing and accomplish all the work associated with network management. The Server-based networks have a high start up cost, but offer high security as well as ease of operation. These networks become more economical as more computers are added to the network. In Peer to peer networks the network responsibilities are divided among many computers. Some act as file servers, others as print servers, some as CD-ROM servers, tape drive servers, etc. The Startup cost of these networks is much cheaper, but when more computers are added to the network, some of the servers may not be able to handle the extra activity.
5. Links Between LANs
5.1. She Just Won't Send Sysop!
Most networks have very short information transfer ranges. But, in an ever shrinking world the need for links between LANs has never been higher. This section will explain the components and information needed to link LANs. When an electric current travels over a long length, it's charge decreases, and it is susceptible to electromagnetic interference. To combat the length problem a component has been devised. A repeater is a little box that is inserted between a cable. It's primary function is to amplify the weakening pulse and send it on it's way. Bridges are used to analyze the station address of each Ethernet packet and determine the destination of the message. The Routers strip the outer Ethernet packets of a data packet in order to get the data. This data is sent to other routers in other places of the world and then repackaged by those routers. The removal of the excess data packets by the routers decreases the time required to transfer that data. If networks use the same addressing protocol, bridges can be used to link them, however, if they use different addressing protocols, only routers may be used. During these times MANs (Metropolitan Area Networks) are in use and development today. These use routers that are connected preferably via a fiber optic cable, to create one large network.
5.2. Pluto Calling Earth!
Any networks larger than 1000m typically rely on telephone digital lines for data transfer. These networks are called Circuit Switched Digital Networks . Circuit Switched Digital Networks utilize a switching matrix at the central office of a telephone company that connects local calls to long distance services. The Telephone companies now offer dial up circuits with signaling rates of 56, 64, and 384 kilobits per second as well as 1.544 megabits per second. Another type of LAN to LAN connections are packet switching networks. These are services that a network router calls up on a digital line. They consist of a group of packet switches that are connected via intraswitch trunks (usually fiber optic) that relay addressed packets of information between them. Once the packet reaches the destination packet switch, it sends it via another digital connection to the receiving router.
Thursday, October 18, 2012
SMART HOUSE
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usuall
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usually people think that computer just using in a
company and office. It is a misleading concept as we have a SMART
HOUSE. The complete SMART HOUSE System has been available since
early 1993. In a SMART HOUSE, people build a relationship between
computer and home. The SMART HOUSE is a home management system
that allows home owners to easily manage their daily lives by providing for a
lifestyle that brings together security, energy management, entertainment,
communications, and lighting features. So, the SMART HOUSE system is
designed to be installed in a new house. Moreover, the system can be
installed in a home undergoing reconstruction where walls have been
completely exposed. The SMART HOUSE Consortium is investigating a
number of different option to more easily install the SMART HOUSE system
in an existing home. Moreover, the SMART HOUSE system has been
packaged to satisfy any home buyer's needs and budget. The system appeals
to a broad segment of new home buyers because of the diverse features and
benefits it offers. These segments includes professionals, baby boomers in the
move up markets, empty nesters, young middle-class, two - income families,
the aging, and all who are energy conscious and technologically astute.
Therefore, the SMART HOUSE system is suitable to install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System
offers several energy management options that have the potential to reduce a
home owner's utility bill by 30% or more per year depending on the options
installed. For examples, a smart house can turn lights on and off
automatically, it can help save on your electric bill. Moreover, the heating and
air conditioning can be more efficiently controlled by a computer, saving
tremendously on the cost of maintaining a consistent temperature within a
large house. The exact level of savings will pay vary by house due to local
utility rate structures, size of home, insulation, lifestyle, etc.
Secondly, it is an easily operating system. Home owners can control
their SMART HOUSE System using a menu driven control panel, touch-tone
phone, personal computer, remote control or programmable wall switch. All
SMART HOUSE controls are designed to be simple and easy to use. Because
smart houses are independence, they can help people with disabilities
maintain an active life. A smart house system can make such tasks easier by
automating them. Lights and appliances can be turned on automatically
without the user having to do it manually. For people with short term memory
problem, a smart house can remind them to turn off the stove or even turn the
stove off by itself.
The SMART HOUSE System is initially programmed by a trained
technician who configures the system using electronic tools designed to guide
the technical through the necessary steps of System programming. These
tools use a menu driven format to prompt the technician for the appropriate
inputs to customize the System to meet a specific buyer's needs.
Then, the home owner can create some house modes that are
preprogrammed settings that allow home owners to activate a sequence of
events with a single action. House modes can be named to represent general
activity patterns common to most homes -- Awake, Asleep, Unoccupied,
Vacation, etc. All can be programmed and changed to meet a home owner's
needs. An example of a house mode is an AWAKE mode which can be
programmed in the morning to do such things as: turn up the heat, turn up the
water heater, change the security system settings, turn on the lights start the
coffee and turn on the TV, etc.
Thirdly, in a power outage, home owners will not able to use their
system, which is the case with all electrical products, simply because
electrical power is required in order for the SMART HOUSE system to
operate. However, the system controller will re-boot itself when the power
comes back on and the system's programming will be maintained. When the
system fails, the home owners will be able to manually operate their home's
products and appliances. The SMART HOUSE System is specifically
designed so that if the system fails, the house still provides, at a minimum, all
of the functionality provided by a conventionally wired home. For example,
outlets will revert to what is called " Local control " so that they still provide
power to anything plugged into them.
In conclusion, SMART HOUSE System will be the new trend of the
home construction in the following decades. It will make closer the
relationship between computer and people. It seems to be supported by some
people who believe in environment protection because it can reduce the waste
in utility and save more money for people. It also saves times for people by
the centralized system that can be controlled easily.
1
Some people think that it is difficult to find a relationship between
home and computer. Usuall
Questions of Ethics in Computer Systems and their Future
1) Identify and discuss security issues and considerations evident for Information Systems
And computerization in the brokerage industry. ( Think about how the Internet has
already influenced trading.)
"The technology is getting ahead of regulators" claims David Weissman, director of money
and technology at Forrester Research Inc., in Cambridge, Mass.
If one is to believe the quote above it sounds very ominous for the regulators and the government
to attempt to even bring this media under any kind of regulation. But, what is it that they the
government agencies truly are looking to regulate? If you take to the argument that this media,
the Internet is truly a public access network, then the control to which they would like to extend
to it would be the most regulated public access system in history. What I believe the attempt here
is to regulate through censorship. Since it is almost impossible to censor the phone networks
without actually eaves dropping on your phone, they have decided to regulate and censor your
written word. The danger in this is what you write as an opinion may be construed by that
government regulator as a violation of some regulatory act. The flip side to this is if you did this
through another medium such as the phone system nothing would ever come it. The bigger
question here is how much government do people want in there lives? The Internet was brought
into the picture for the public as the next great technology of this century. It is without a doubt as
big if not bigger than any other public means of communication that has come before it. With
that in mind I think the government is trying to extract it's pound of flesh for what they believe is
missed revenue dollars that could be made in the form of tax regulations.
"There are probably insiders touting stocks on the Internet either anonymously or under
assumed names," said Mary Schapiro, president of the National Association of Securities
Dealers, which oversees the NASDAQ market. The argument that they are both (the government
and NASDAQ) currently running with is the "protection of the investor". When one looks at
NASDAQ's complaint it is fairly superficial, for them it is clearly a loss of income for their
trading enviorment, for the government it is a loss of taxes that could be derived from those
trades. Are we to believe that both of these agencies only have the best intentions at heart for
those investors that might be duped. These issues have been around for along time through the
use of other mediums like the phone system, direct mail marketing, "cold calling" from "boiler
plate" houses, and even unscrupulous brokers who work in legimate brokerage houses. People
today are still the victims of these types of scams through the use of the older technologies. So
how is it that since the older scams are still being used is one to believe that they will have
anymore success tackling the complex nature of the Internet and the myriad of scams that could
generate from it. The success rate of convictions from past indiscretions is low at best, one only
has to look at the mountain of arrests for "insider trading", that the government launched during
the late 1970's through the middle 1980's to realize for all the hype of cleaning up Wall Street not
a whole lot ever came from the scourging. What it seems to me is Ms. Shapiro would be better
suited to try and align her NASDAQ forum with the Internet technology to take advantage of the
technology rather than trying to use the government to bully people into being afraid to use the
technology. Her second quote of "there is a tremendous amount of hype," comes off as nothing
but sour grapes and a big opportunity to use her position to knock the Internet. If she honestly
believes she's done everything to insure her customer base that her system of doing business is
any bit as less likely to fall victim to insider trading and traders touting of stocks beyond what
they should be touted as, she is sadly mistaken. The average investor is going to use every
opportunity presented to them if they think it will give them the advantage in investing. Just look
at places like Harry's at Hanover Square, a popular bar in the Wall Street area where depending
on the afternoon one would only need walk around the bar to hear the broker types hyping their
own stocks to each other and just about anyone in sight. Are they ready to regulate this very
common practice done for the last 30 years, or how about the broker's who spend weekends on
golf courses singing the praises of their stock to customers and brokers alike, who then come in
on Monday and trade off the weekends knowledge or what they heard at the bar. How do they
regulate this kind of "insider trading" activity, they have no way to help or protect the person
who is not privy to these kind of conversations or dealings. The availability of the Internet to
trade on this information to a larger market base I believe does even the playing for a lot of
people who do invest. I don't believe that those who would use the Internet for financial
information are that wild in their approach of their investing to fall for the super-hype of
someone they don't know. For those do they would have fallen for it through any media out their
because their approach is to win at all costs regardless whether it is legal or not.
In closing, the argument presented by NASDAQ and the government is a weak one at best, I
don't believe any government agency should be pressured into regulating any medium because
of private industry's displeasure with that medium. Also regulations passed based on private
industry demand usually leads to more problems than ever before. On only has to look at the
great S&L bank failures that occurred after the government stepped in to help the S&L industry
out. We will never know the true value of all the losses (in the S&L failures) derived from when
government agencies answer the call with regulations to help out an industry that pushed for
regulation to prop up a dying industry. The American people and the government should stand
up and take notice of what the government tried to do in regulating banking in the 1980's, could
very well be the debacle of the late 1990's with trying to regulate the Internet to save some parts
of the Wall Street industry. Maybe this medium of the Internet will sound the death bells for
some parts of a lot of industries, but I believe it is only the start of many great things to come for
everyone involved who takes advantage of it.
2) Provide what regulations and guidelines, if any, you feel need to be implemented for this
situation.
Based on the preceding question any regulations passed to help the Wall Street industry I
believe would create situations even more serious than the S&L failures, or the "insider trader"
failures of the 1980's. You always run a fine line between what is a regulation for the good of the
consumer and what are regulations designed to protect an industry. I believe there are enough
regulations out there to protect the Wall Street industry as it presently exists, to have to conjure
up regulations for every medium that could possibly come down the road to protect every
industry or private citizens enviorment is just too much government agency in everyone's face.
Not only will the federal government want their piece of the action, let's not forget cash strapped
states like New York will also be looking for their's to. I will discuss this more in question #3.
3) Discuss ethics and surveillance concepts that pertain to this situation.
The ethics problems I would like to discuss from both sides of the equation. From the
standpoint of the trader the ethics problems are fairly obvious. He has to do his job within the
present guidelines that regulate his/her profession. They are not to trade on information that has
been illegally gotten through whatever means. This includes what I mentioned in Question #1
about information obtained through means that the general public is not privy to, all those bar
dates and golf dates where the information about stocks is bantered about like idle gossip at a
garden club party. This technically is considered "insider trading", but how does the government
intend to alleviate this problem through any kind of surveillance, they can't. No more than they
could alleviate the problem through the use of the phone network short of tapping their phones
and monitoring their conversations. When does monitoring for wrong doing and the infringement
of your Constitutional rights start to crossover. The danger here is obvious, for every regulation
the government perceives as needed the American citizen gives up a little more of there right to
privacy and free speech. For the trader types this comes in the form of what he says or writes
about on a particular stock, he has to worry that it won't be construed as classified information
that was some how derived from an illegal source. From the public side's responsibility and the
perception they have to worry about is that what they traded cannot also look like they received
some kind of special information that help them trade successfully and earn a profit.
For both sides the questions of ethics in trading can only be answered by those that are
involved. The majority of the industry does do everything above board, and I believe there are
enough regulations and surveillance out there already to keep a fairly tight lid on all of those
people who choose to be involved. Nothing is every 100%, but with is being done to police the
industry is enough of a deterrent not to be persuaded to do the "insider trading" thing. You will
always have those that will break the law for the pursuit of the dollars, some will even break the
law for the thrill of getting over on the system, but for the vast majority this is not the means by
which they invest, and with that they should not be penalized by overzealous government
regulators and an industry looking to extract dollars out of a technology. You will never be able
to stop the criminal types who will use the Internet for criminal advantage, anymore than you can
stop all street crime. You cannot regulate the Internet for prevention of crime any better than you
can regulate all people from doing criminal things, there is that small minority that will always
continue to find the easy or criminal way around everything. To regulate the Internet to attempt
to protect the public is just another form of censorship. The government would be riding a very
fine line behind this concept of protection and the rights of the individual to express an opinion.
If I publish on my Internet page that I made a great but of stock this week, that is my opinion and
only my opinion. Should the government come along or any other private group come along and
attempt to either sue me or censor me in some form or fashion just for my opinion. Should I
worry that someone reading my page decides to act on what I wrote. If he/she does I would have
to say that they are rather foolish to act on my opinion and invest their money. On the same
token I would never react and invest on someone's say so without first thoroughly checking out
all the facts. Do people go out and kill because they see a violent movie I don't think so! Then
why would the government say they need to protect the public's interest by possibly watching
my home page or anyone else's out there. Do they listen to your phone calls, do they read your
mail, do they read your E-mail, do they tell you what books to read, what movies to see, then
why would I want them surfing the Internet to under the guise of public protection. I'm an adult
and would like to be treated as such, I can make correct decisions not only about how my money
is spent but where. If I find something out on the Internet that I feel is so criminal I would alert
people to the fact that whatever was out there to watch out for. You would be surprised how well
Internet people do police the net and warn there friends and others about it.
Don't buy into the government hype of public protection, for all the mediums I just listed
above the scams as they are related to Wall Street are still happening big time, and they already
regulate those technologies for our protection! It's not regulation they are looking to do, it is
ownership of the Internet they are trying for, and with the help of big business, who sits there
and cries foul, they may very well achieve this. Talk about two groups in need of finding some
ethics big business and the government are sorely lacking. This the first major technology that
has leveled the playing field for even the littlest user. Don't buy the hype where ever you can try
to keep the regulators out, by voting, writing your congress, or whatever it takes legally. We are
intelligent enough to make our own decisions!!
4) The year is 2016. Describe how information Technology and computerization have
impacted individuals and Society in the past 20 years.
Let's look at from an everyday perspective: First you'll be gently awaking by an alarm that
you set by your voice the night before and playing what you want to hear again that decision was
made the night before. You'll enter a kitchen where on voice command you order your cup of
coffee and whatever breakfast you want because your computer run appliances will be able to do
this for you. Next you go to your printer and get a copy of the newspaper you want to read
because you will have programed to extract information from five or six different sources that
you want your news from and it will be waiting for you to read. If you real lazy you could have
your computer read it to you in a smooth digitized voice that you've selected. After finishing in
your computerized bathroom that not only knows how hot you like your shower but also
dispenses the right amount of toothpaste on to your tooth brush. After dressing from your
computerized closet that selected all your clothes for the week, you'll enter your computerized
car which is all activated by your voice. There also is a satellite guidance system for the times
you might get lost but you've already programmed the car to know how to get you to work.
Work will be only a three day a week affair with the other two days working out of your home.
Your office will be totally voice activated. You'll run all of the programming you'll need for the
day by voice activating the programming.
You'll conference call to other office sites but it be in complete full motion video. The next
step will be 3D holograms but that hasn't quite come to market yet. You'll instuct your computer
by voice to take ant E-mail you need to send and it will be sent in real-time. The rest of the office
also is capable of call forwarding you any phone calls or messages because the central computer
in the office will know your where abouts in the office at any time as you pass through any door.
Your day is over you'll leave instructions fro your computer to watch certain events throughout
the night and if need be you could be reached at home. You'll be paid in credits to the credit
cards of your choice, there will no longer be money exchanged. To help you protect against fraud
on your cards when you spend money you'll use your thumb print as you would your signature
now. At night you'll come to a far less stressed enviorment because the computer appliances in
your house have taken a lot of the mundane jobs that you use to do away. You'll be able to enjoy
high definition TV and be able to receive some 500 channels. After checking with your voice
activated home computer to see if there is any phone messages or E-mail, you'll retire to bed of
course in you climate controlled home that knows what settings you like in what parts of the
house. Oh, yes you won't even have to tell your voice activated computer not to run your
computerized sprinkler system for your lawn because it will have realized from the weather
report that it will rain.
1) Identify and discuss security issues and considerations evident for Information Systems
And computerization in the brokerage industry. ( Think about how the Internet has
already influenced trading.)
"The technology is getting ahead of regulators" claims David Weissman, director of money
and technology at Forrester Research Inc., in Cambridge, Mass.
If one is to believe the quote above it sounds very ominous for the regulators and the government
to attempt to even bring this media under any kind of regulation. But, what is it that they the
government agencies truly are looking to regulate? If you take to the argument that this media,
the Internet is truly a public access network, then the control to which they would like to extend
to it would be the most regulated public access system in history. What I believe the attempt here
is to regulate through censorship. Since it is almost impossible to censor the phone networks
without actually eaves dropping on your phone, they have decided to regulate and censor your
written word. The danger in this is what you write as an opinion may be construed by that
government regulator as a violation of some regulatory act. The flip side to this is if you did this
through another medium such as the phone system nothing would ever come it. The bigger
question here is how much government do people want in there lives? The Internet was brought
into the picture for the public as the next great technology of this century. It is without a doubt as
big if not bigger than any other public means of communication that has come before it. With
that in mind I think the government is trying to extract it's pound of flesh for what they believe is
missed revenue dollars that could be made in the form of tax regulations.
"There are probably insiders touting stocks on the Internet either anonymously or under
assumed names," said Mary Schapiro, president of the National Association of Securities
Dealers, which oversees the NASDAQ market. The argument that they are both (the government
and NASDAQ) currently running with is the "protection of the investor". When one looks at
NASDAQ's complaint it is fairly superficial, for them it is clearly a loss of income for their
trading enviorment, for the government it is a loss of taxes that could be derived from those
trades. Are we to believe that both of these agencies only have the best intentions at heart for
those investors that might be duped. These issues have been around for along time through the
use of other mediums like the phone system, direct mail marketing, "cold calling" from "boiler
plate" houses, and even unscrupulous brokers who work in legimate brokerage houses. People
today are still the victims of these types of scams through the use of the older technologies. So
how is it that since the older scams are still being used is one to believe that they will have
anymore success tackling the complex nature of the Internet and the myriad of scams that could
generate from it. The success rate of convictions from past indiscretions is low at best, one only
has to look at the mountain of arrests for "insider trading", that the government launched during
the late 1970's through the middle 1980's to realize for all the hype of cleaning up Wall Street not
a whole lot ever came from the scourging. What it seems to me is Ms. Shapiro would be better
suited to try and align her NASDAQ forum with the Internet technology to take advantage of the
technology rather than trying to use the government to bully people into being afraid to use the
technology. Her second quote of "there is a tremendous amount of hype," comes off as nothing
but sour grapes and a big opportunity to use her position to knock the Internet. If she honestly
believes she's done everything to insure her customer base that her system of doing business is
any bit as less likely to fall victim to insider trading and traders touting of stocks beyond what
they should be touted as, she is sadly mistaken. The average investor is going to use every
opportunity presented to them if they think it will give them the advantage in investing. Just look
at places like Harry's at Hanover Square, a popular bar in the Wall Street area where depending
on the afternoon one would only need walk around the bar to hear the broker types hyping their
own stocks to each other and just about anyone in sight. Are they ready to regulate this very
common practice done for the last 30 years, or how about the broker's who spend weekends on
golf courses singing the praises of their stock to customers and brokers alike, who then come in
on Monday and trade off the weekends knowledge or what they heard at the bar. How do they
regulate this kind of "insider trading" activity, they have no way to help or protect the person
who is not privy to these kind of conversations or dealings. The availability of the Internet to
trade on this information to a larger market base I believe does even the playing for a lot of
people who do invest. I don't believe that those who would use the Internet for financial
information are that wild in their approach of their investing to fall for the super-hype of
someone they don't know. For those do they would have fallen for it through any media out their
because their approach is to win at all costs regardless whether it is legal or not.
In closing, the argument presented by NASDAQ and the government is a weak one at best, I
don't believe any government agency should be pressured into regulating any medium because
of private industry's displeasure with that medium. Also regulations passed based on private
industry demand usually leads to more problems than ever before. On only has to look at the
great S&L bank failures that occurred after the government stepped in to help the S&L industry
out. We will never know the true value of all the losses (in the S&L failures) derived from when
government agencies answer the call with regulations to help out an industry that pushed for
regulation to prop up a dying industry. The American people and the government should stand
up and take notice of what the government tried to do in regulating banking in the 1980's, could
very well be the debacle of the late 1990's with trying to regulate the Internet to save some parts
of the Wall Street industry. Maybe this medium of the Internet will sound the death bells for
some parts of a lot of industries, but I believe it is only the start of many great things to come for
everyone involved who takes advantage of it.
2) Provide what regulations and guidelines, if any, you feel need to be implemented for this
situation.
Based on the preceding question any regulations passed to help the Wall Street industry I
believe would create situations even more serious than the S&L failures, or the "insider trader"
failures of the 1980's. You always run a fine line between what is a regulation for the good of the
consumer and what are regulations designed to protect an industry. I believe there are enough
regulations out there to protect the Wall Street industry as it presently exists, to have to conjure
up regulations for every medium that could possibly come down the road to protect every
industry or private citizens enviorment is just too much government agency in everyone's face.
Not only will the federal government want their piece of the action, let's not forget cash strapped
states like New York will also be looking for their's to. I will discuss this more in question #3.
3) Discuss ethics and surveillance concepts that pertain to this situation.
The ethics problems I would like to discuss from both sides of the equation. From the
standpoint of the trader the ethics problems are fairly obvious. He has to do his job within the
present guidelines that regulate his/her profession. They are not to trade on information that has
been illegally gotten through whatever means. This includes what I mentioned in Question #1
about information obtained through means that the general public is not privy to, all those bar
dates and golf dates where the information about stocks is bantered about like idle gossip at a
garden club party. This technically is considered "insider trading", but how does the government
intend to alleviate this problem through any kind of surveillance, they can't. No more than they
could alleviate the problem through the use of the phone network short of tapping their phones
and monitoring their conversations. When does monitoring for wrong doing and the infringement
of your Constitutional rights start to crossover. The danger here is obvious, for every regulation
the government perceives as needed the American citizen gives up a little more of there right to
privacy and free speech. For the trader types this comes in the form of what he says or writes
about on a particular stock, he has to worry that it won't be construed as classified information
that was some how derived from an illegal source. From the public side's responsibility and the
perception they have to worry about is that what they traded cannot also look like they received
some kind of special information that help them trade successfully and earn a profit.
For both sides the questions of ethics in trading can only be answered by those that are
involved. The majority of the industry does do everything above board, and I believe there are
enough regulations and surveillance out there already to keep a fairly tight lid on all of those
people who choose to be involved. Nothing is every 100%, but with is being done to police the
industry is enough of a deterrent not to be persuaded to do the "insider trading" thing. You will
always have those that will break the law for the pursuit of the dollars, some will even break the
law for the thrill of getting over on the system, but for the vast majority this is not the means by
which they invest, and with that they should not be penalized by overzealous government
regulators and an industry looking to extract dollars out of a technology. You will never be able
to stop the criminal types who will use the Internet for criminal advantage, anymore than you can
stop all street crime. You cannot regulate the Internet for prevention of crime any better than you
can regulate all people from doing criminal things, there is that small minority that will always
continue to find the easy or criminal way around everything. To regulate the Internet to attempt
to protect the public is just another form of censorship. The government would be riding a very
fine line behind this concept of protection and the rights of the individual to express an opinion.
If I publish on my Internet page that I made a great but of stock this week, that is my opinion and
only my opinion. Should the government come along or any other private group come along and
attempt to either sue me or censor me in some form or fashion just for my opinion. Should I
worry that someone reading my page decides to act on what I wrote. If he/she does I would have
to say that they are rather foolish to act on my opinion and invest their money. On the same
token I would never react and invest on someone's say so without first thoroughly checking out
all the facts. Do people go out and kill because they see a violent movie I don't think so! Then
why would the government say they need to protect the public's interest by possibly watching
my home page or anyone else's out there. Do they listen to your phone calls, do they read your
mail, do they read your E-mail, do they tell you what books to read, what movies to see, then
why would I want them surfing the Internet to under the guise of public protection. I'm an adult
and would like to be treated as such, I can make correct decisions not only about how my money
is spent but where. If I find something out on the Internet that I feel is so criminal I would alert
people to the fact that whatever was out there to watch out for. You would be surprised how well
Internet people do police the net and warn there friends and others about it.
Don't buy into the government hype of public protection, for all the mediums I just listed
above the scams as they are related to Wall Street are still happening big time, and they already
regulate those technologies for our protection! It's not regulation they are looking to do, it is
ownership of the Internet they are trying for, and with the help of big business, who sits there
and cries foul, they may very well achieve this. Talk about two groups in need of finding some
ethics big business and the government are sorely lacking. This the first major technology that
has leveled the playing field for even the littlest user. Don't buy the hype where ever you can try
to keep the regulators out, by voting, writing your congress, or whatever it takes legally. We are
intelligent enough to make our own decisions!!
4) The year is 2016. Describe how information Technology and computerization have
impacted individuals and Society in the past 20 years.
Let's look at from an everyday perspective: First you'll be gently awaking by an alarm that
you set by your voice the night before and playing what you want to hear again that decision was
made the night before. You'll enter a kitchen where on voice command you order your cup of
coffee and whatever breakfast you wa
And computerization in the brokerage industry. ( Think about how the Internet has
already influenced trading.)
"The technology is getting ahead of regulators" claims David Weissman, director of money
and technology at Forrester Research Inc., in Cambridge, Mass.
If one is to believe the quote above it sounds very ominous for the regulators and the government
to attempt to even bring this media under any kind of regulation. But, what is it that they the
government agencies truly are looking to regulate? If you take to the argument that this media,
the Internet is truly a public access network, then the control to which they would like to extend
to it would be the most regulated public access system in history. What I believe the attempt here
is to regulate through censorship. Since it is almost impossible to censor the phone networks
without actually eaves dropping on your phone, they have decided to regulate and censor your
written word. The danger in this is what you write as an opinion may be construed by that
government regulator as a violation of some regulatory act. The flip side to this is if you did this
through another medium such as the phone system nothing would ever come it. The bigger
question here is how much government do people want in there lives? The Internet was brought
into the picture for the public as the next great technology of this century. It is without a doubt as
big if not bigger than any other public means of communication that has come before it. With
that in mind I think the government is trying to extract it's pound of flesh for what they believe is
missed revenue dollars that could be made in the form of tax regulations.
"There are probably insiders touting stocks on the Internet either anonymously or under
assumed names," said Mary Schapiro, president of the National Association of Securities
Dealers, which oversees the NASDAQ market. The argument that they are both (the government
and NASDAQ) currently running with is the "protection of the investor". When one looks at
NASDAQ's complaint it is fairly superficial, for them it is clearly a loss of income for their
trading enviorment, for the government it is a loss of taxes that could be derived from those
trades. Are we to believe that both of these agencies only have the best intentions at heart for
those investors that might be duped. These issues have been around for along time through the
use of other mediums like the phone system, direct mail marketing, "cold calling" from "boiler
plate" houses, and even unscrupulous brokers who work in legimate brokerage houses. People
today are still the victims of these types of scams through the use of the older technologies. So
how is it that since the older scams are still being used is one to believe that they will have
anymore success tackling the complex nature of the Internet and the myriad of scams that could
generate from it. The success rate of convictions from past indiscretions is low at best, one only
has to look at the mountain of arrests for "insider trading", that the government launched during
the late 1970's through the middle 1980's to realize for all the hype of cleaning up Wall Street not
a whole lot ever came from the scourging. What it seems to me is Ms. Shapiro would be better
suited to try and align her NASDAQ forum with the Internet technology to take advantage of the
technology rather than trying to use the government to bully people into being afraid to use the
technology. Her second quote of "there is a tremendous amount of hype," comes off as nothing
but sour grapes and a big opportunity to use her position to knock the Internet. If she honestly
believes she's done everything to insure her customer base that her system of doing business is
any bit as less likely to fall victim to insider trading and traders touting of stocks beyond what
they should be touted as, she is sadly mistaken. The average investor is going to use every
opportunity presented to them if they think it will give them the advantage in investing. Just look
at places like Harry's at Hanover Square, a popular bar in the Wall Street area where depending
on the afternoon one would only need walk around the bar to hear the broker types hyping their
own stocks to each other and just about anyone in sight. Are they ready to regulate this very
common practice done for the last 30 years, or how about the broker's who spend weekends on
golf courses singing the praises of their stock to customers and brokers alike, who then come in
on Monday and trade off the weekends knowledge or what they heard at the bar. How do they
regulate this kind of "insider trading" activity, they have no way to help or protect the person
who is not privy to these kind of conversations or dealings. The availability of the Internet to
trade on this information to a larger market base I believe does even the playing for a lot of
people who do invest. I don't believe that those who would use the Internet for financial
information are that wild in their approach of their investing to fall for the super-hype of
someone they don't know. For those do they would have fallen for it through any media out their
because their approach is to win at all costs regardless whether it is legal or not.
In closing, the argument presented by NASDAQ and the government is a weak one at best, I
don't believe any government agency should be pressured into regulating any medium because
of private industry's displeasure with that medium. Also regulations passed based on private
industry demand usually leads to more problems than ever before. On only has to look at the
great S&L bank failures that occurred after the government stepped in to help the S&L industry
out. We will never know the true value of all the losses (in the S&L failures) derived from when
government agencies answer the call with regulations to help out an industry that pushed for
regulation to prop up a dying industry. The American people and the government should stand
up and take notice of what the government tried to do in regulating banking in the 1980's, could
very well be the debacle of the late 1990's with trying to regulate the Internet to save some parts
of the Wall Street industry. Maybe this medium of the Internet will sound the death bells for
some parts of a lot of industries, but I believe it is only the start of many great things to come for
everyone involved who takes advantage of it.
2) Provide what regulations and guidelines, if any, you feel need to be implemented for this
situation.
Based on the preceding question any regulations passed to help the Wall Street industry I
believe would create situations even more serious than the S&L failures, or the "insider trader"
failures of the 1980's. You always run a fine line between what is a regulation for the good of the
consumer and what are regulations designed to protect an industry. I believe there are enough
regulations out there to protect the Wall Street industry as it presently exists, to have to conjure
up regulations for every medium that could possibly come down the road to protect every
industry or private citizens enviorment is just too much government agency in everyone's face.
Not only will the federal government want their piece of the action, let's not forget cash strapped
states like New York will also be looking for their's to. I will discuss this more in question #3.
3) Discuss ethics and surveillance concepts that pertain to this situation.
The ethics problems I would like to discuss from both sides of the equation. From the
standpoint of the trader the ethics problems are fairly obvious. He has to do his job within the
present guidelines that regulate his/her profession. They are not to trade on information that has
been illegally gotten through whatever means. This includes what I mentioned in Question #1
about information obtained through means that the general public is not privy to, all those bar
dates and golf dates where the information about stocks is bantered about like idle gossip at a
garden club party. This technically is considered "insider trading", but how does the government
intend to alleviate this problem through any kind of surveillance, they can't. No more than they
could alleviate the problem through the use of the phone network short of tapping their phones
and monitoring their conversations. When does monitoring for wrong doing and the infringement
of your Constitutional rights start to crossover. The danger here is obvious, for every regulation
the government perceives as needed the American citizen gives up a little more of there right to
privacy and free speech. For the trader types this comes in the form of what he says or writes
about on a particular stock, he has to worry that it won't be construed as classified information
that was some how derived from an illegal source. From the public side's responsibility and the
perception they have to worry about is that what they traded cannot also look like they received
some kind of special information that help them trade successfully and earn a profit.
For both sides the questions of ethics in trading can only be answered by those that are
involved. The majority of the industry does do everything above board, and I believe there are
enough regulations and surveillance out there already to keep a fairly tight lid on all of those
people who choose to be involved. Nothing is every 100%, but with is being done to police the
industry is enough of a deterrent not to be persuaded to do the "insider trading" thing. You will
always have those that will break the law for the pursuit of the dollars, some will even break the
law for the thrill of getting over on the system, but for the vast majority this is not the means by
which they invest, and with that they should not be penalized by overzealous government
regulators and an industry looking to extract dollars out of a technology. You will never be able
to stop the criminal types who will use the Internet for criminal advantage, anymore than you can
stop all street crime. You cannot regulate the Internet for prevention of crime any better than you
can regulate all people from doing criminal things, there is that small minority that will always
continue to find the easy or criminal way around everything. To regulate the Internet to attempt
to protect the public is just another form of censorship. The government would be riding a very
fine line behind this concept of protection and the rights of the individual to express an opinion.
If I publish on my Internet page that I made a great but of stock this week, that is my opinion and
only my opinion. Should the government come along or any other private group come along and
attempt to either sue me or censor me in some form or fashion just for my opinion. Should I
worry that someone reading my page decides to act on what I wrote. If he/she does I would have
to say that they are rather foolish to act on my opinion and invest their money. On the same
token I would never react and invest on someone's say so without first thoroughly checking out
all the facts. Do people go out and kill because they see a violent movie I don't think so! Then
why would the government say they need to protect the public's interest by possibly watching
my home page or anyone else's out there. Do they listen to your phone calls, do they read your
mail, do they read your E-mail, do they tell you what books to read, what movies to see, then
why would I want them surfing the Internet to under the guise of public protection. I'm an adult
and would like to be treated as such, I can make correct decisions not only about how my money
is spent but where. If I find something out on the Internet that I feel is so criminal I would alert
people to the fact that whatever was out there to watch out for. You would be surprised how well
Internet people do police the net and warn there friends and others about it.
Don't buy into the government hype of public protection, for all the mediums I just listed
above the scams as they are related to Wall Street are still happening big time, and they already
regulate those technologies for our protection! It's not regulation they are looking to do, it is
ownership of the Internet they are trying for, and with the help of big business, who sits there
and cries foul, they may very well achieve this. Talk about two groups in need of finding some
ethics big business and the government are sorely lacking. This the first major technology that
has leveled the playing field for even the littlest user. Don't buy the hype where ever you can try
to keep the regulators out, by voting, writing your congress, or whatever it takes legally. We are
intelligent enough to make our own decisions!!
4) The year is 2016. Describe how information Technology and computerization have
impacted individuals and Society in the past 20 years.
Let's look at from an everyday perspective: First you'll be gently awaking by an alarm that
you set by your voice the night before and playing what you want to hear again that decision was
made the night before. You'll enter a kitchen where on voice command you order your cup of
coffee and whatever breakfast you want because your computer run appliances will be able to do
this for you. Next you go to your printer and get a copy of the newspaper you want to read
because you will have programed to extract information from five or six different sources that
you want your news from and it will be waiting for you to read. If you real lazy you could have
your computer read it to you in a smooth digitized voice that you've selected. After finishing in
your computerized bathroom that not only knows how hot you like your shower but also
dispenses the right amount of toothpaste on to your tooth brush. After dressing from your
computerized closet that selected all your clothes for the week, you'll enter your computerized
car which is all activated by your voice. There also is a satellite guidance system for the times
you might get lost but you've already programmed the car to know how to get you to work.
Work will be only a three day a week affair with the other two days working out of your home.
Your office will be totally voice activated. You'll run all of the programming you'll need for the
day by voice activating the programming.
You'll conference call to other office sites but it be in complete full motion video. The next
step will be 3D holograms but that hasn't quite come to market yet. You'll instuct your computer
by voice to take ant E-mail you need to send and it will be sent in real-time. The rest of the office
also is capable of call forwarding you any phone calls or messages because the central computer
in the office will know your where abouts in the office at any time as you pass through any door.
Your day is over you'll leave instructions fro your computer to watch certain events throughout
the night and if need be you could be reached at home. You'll be paid in credits to the credit
cards of your choice, there will no longer be money exchanged. To help you protect against fraud
on your cards when you spend money you'll use your thumb print as you would your signature
now. At night you'll come to a far less stressed enviorment because the computer appliances in
your house have taken a lot of the mundane jobs that you use to do away. You'll be able to enjoy
high definition TV and be able to receive some 500 channels. After checking with your voice
activated home computer to see if there is any phone messages or E-mail, you'll retire to bed of
course in you climate controlled home that knows what settings you like in what parts of the
house. Oh, yes you won't even have to tell your voice activated computer not to run your
computerized sprinkler system for your lawn because it will have realized from the weather
report that it will rain.
1) Identify and discuss security issues and considerations evident for Information Systems
And computerization in the brokerage industry. ( Think about how the Internet has
already influenced trading.)
"The technology is getting ahead of regulators" claims David Weissman, director of money
and technology at Forrester Research Inc., in Cambridge, Mass.
If one is to believe the quote above it sounds very ominous for the regulators and the government
to attempt to even bring this media under any kind of regulation. But, what is it that they the
government agencies truly are looking to regulate? If you take to the argument that this media,
the Internet is truly a public access network, then the control to which they would like to extend
to it would be the most regulated public access system in history. What I believe the attempt here
is to regulate through censorship. Since it is almost impossible to censor the phone networks
without actually eaves dropping on your phone, they have decided to regulate and censor your
written word. The danger in this is what you write as an opinion may be construed by that
government regulator as a violation of some regulatory act. The flip side to this is if you did this
through another medium such as the phone system nothing would ever come it. The bigger
question here is how much government do people want in there lives? The Internet was brought
into the picture for the public as the next great technology of this century. It is without a doubt as
big if not bigger than any other public means of communication that has come before it. With
that in mind I think the government is trying to extract it's pound of flesh for what they believe is
missed revenue dollars that could be made in the form of tax regulations.
"There are probably insiders touting stocks on the Internet either anonymously or under
assumed names," said Mary Schapiro, president of the National Association of Securities
Dealers, which oversees the NASDAQ market. The argument that they are both (the government
and NASDAQ) currently running with is the "protection of the investor". When one looks at
NASDAQ's complaint it is fairly superficial, for them it is clearly a loss of income for their
trading enviorment, for the government it is a loss of taxes that could be derived from those
trades. Are we to believe that both of these agencies only have the best intentions at heart for
those investors that might be duped. These issues have been around for along time through the
use of other mediums like the phone system, direct mail marketing, "cold calling" from "boiler
plate" houses, and even unscrupulous brokers who work in legimate brokerage houses. People
today are still the victims of these types of scams through the use of the older technologies. So
how is it that since the older scams are still being used is one to believe that they will have
anymore success tackling the complex nature of the Internet and the myriad of scams that could
generate from it. The success rate of convictions from past indiscretions is low at best, one only
has to look at the mountain of arrests for "insider trading", that the government launched during
the late 1970's through the middle 1980's to realize for all the hype of cleaning up Wall Street not
a whole lot ever came from the scourging. What it seems to me is Ms. Shapiro would be better
suited to try and align her NASDAQ forum with the Internet technology to take advantage of the
technology rather than trying to use the government to bully people into being afraid to use the
technology. Her second quote of "there is a tremendous amount of hype," comes off as nothing
but sour grapes and a big opportunity to use her position to knock the Internet. If she honestly
believes she's done everything to insure her customer base that her system of doing business is
any bit as less likely to fall victim to insider trading and traders touting of stocks beyond what
they should be touted as, she is sadly mistaken. The average investor is going to use every
opportunity presented to them if they think it will give them the advantage in investing. Just look
at places like Harry's at Hanover Square, a popular bar in the Wall Street area where depending
on the afternoon one would only need walk around the bar to hear the broker types hyping their
own stocks to each other and just about anyone in sight. Are they ready to regulate this very
common practice done for the last 30 years, or how about the broker's who spend weekends on
golf courses singing the praises of their stock to customers and brokers alike, who then come in
on Monday and trade off the weekends knowledge or what they heard at the bar. How do they
regulate this kind of "insider trading" activity, they have no way to help or protect the person
who is not privy to these kind of conversations or dealings. The availability of the Internet to
trade on this information to a larger market base I believe does even the playing for a lot of
people who do invest. I don't believe that those who would use the Internet for financial
information are that wild in their approach of their investing to fall for the super-hype of
someone they don't know. For those do they would have fallen for it through any media out their
because their approach is to win at all costs regardless whether it is legal or not.
In closing, the argument presented by NASDAQ and the government is a weak one at best, I
don't believe any government agency should be pressured into regulating any medium because
of private industry's displeasure with that medium. Also regulations passed based on private
industry demand usually leads to more problems than ever before. On only has to look at the
great S&L bank failures that occurred after the government stepped in to help the S&L industry
out. We will never know the true value of all the losses (in the S&L failures) derived from when
government agencies answer the call with regulations to help out an industry that pushed for
regulation to prop up a dying industry. The American people and the government should stand
up and take notice of what the government tried to do in regulating banking in the 1980's, could
very well be the debacle of the late 1990's with trying to regulate the Internet to save some parts
of the Wall Street industry. Maybe this medium of the Internet will sound the death bells for
some parts of a lot of industries, but I believe it is only the start of many great things to come for
everyone involved who takes advantage of it.
2) Provide what regulations and guidelines, if any, you feel need to be implemented for this
situation.
Based on the preceding question any regulations passed to help the Wall Street industry I
believe would create situations even more serious than the S&L failures, or the "insider trader"
failures of the 1980's. You always run a fine line between what is a regulation for the good of the
consumer and what are regulations designed to protect an industry. I believe there are enough
regulations out there to protect the Wall Street industry as it presently exists, to have to conjure
up regulations for every medium that could possibly come down the road to protect every
industry or private citizens enviorment is just too much government agency in everyone's face.
Not only will the federal government want their piece of the action, let's not forget cash strapped
states like New York will also be looking for their's to. I will discuss this more in question #3.
3) Discuss ethics and surveillance concepts that pertain to this situation.
The ethics problems I would like to discuss from both sides of the equation. From the
standpoint of the trader the ethics problems are fairly obvious. He has to do his job within the
present guidelines that regulate his/her profession. They are not to trade on information that has
been illegally gotten through whatever means. This includes what I mentioned in Question #1
about information obtained through means that the general public is not privy to, all those bar
dates and golf dates where the information about stocks is bantered about like idle gossip at a
garden club party. This technically is considered "insider trading", but how does the government
intend to alleviate this problem through any kind of surveillance, they can't. No more than they
could alleviate the problem through the use of the phone network short of tapping their phones
and monitoring their conversations. When does monitoring for wrong doing and the infringement
of your Constitutional rights start to crossover. The danger here is obvious, for every regulation
the government perceives as needed the American citizen gives up a little more of there right to
privacy and free speech. For the trader types this comes in the form of what he says or writes
about on a particular stock, he has to worry that it won't be construed as classified information
that was some how derived from an illegal source. From the public side's responsibility and the
perception they have to worry about is that what they traded cannot also look like they received
some kind of special information that help them trade successfully and earn a profit.
For both sides the questions of ethics in trading can only be answered by those that are
involved. The majority of the industry does do everything above board, and I believe there are
enough regulations and surveillance out there already to keep a fairly tight lid on all of those
people who choose to be involved. Nothing is every 100%, but with is being done to police the
industry is enough of a deterrent not to be persuaded to do the "insider trading" thing. You will
always have those that will break the law for the pursuit of the dollars, some will even break the
law for the thrill of getting over on the system, but for the vast majority this is not the means by
which they invest, and with that they should not be penalized by overzealous government
regulators and an industry looking to extract dollars out of a technology. You will never be able
to stop the criminal types who will use the Internet for criminal advantage, anymore than you can
stop all street crime. You cannot regulate the Internet for prevention of crime any better than you
can regulate all people from doing criminal things, there is that small minority that will always
continue to find the easy or criminal way around everything. To regulate the Internet to attempt
to protect the public is just another form of censorship. The government would be riding a very
fine line behind this concept of protection and the rights of the individual to express an opinion.
If I publish on my Internet page that I made a great but of stock this week, that is my opinion and
only my opinion. Should the government come along or any other private group come along and
attempt to either sue me or censor me in some form or fashion just for my opinion. Should I
worry that someone reading my page decides to act on what I wrote. If he/she does I would have
to say that they are rather foolish to act on my opinion and invest their money. On the same
token I would never react and invest on someone's say so without first thoroughly checking out
all the facts. Do people go out and kill because they see a violent movie I don't think so! Then
why would the government say they need to protect the public's interest by possibly watching
my home page or anyone else's out there. Do they listen to your phone calls, do they read your
mail, do they read your E-mail, do they tell you what books to read, what movies to see, then
why would I want them surfing the Internet to under the guise of public protection. I'm an adult
and would like to be treated as such, I can make correct decisions not only about how my money
is spent but where. If I find something out on the Internet that I feel is so criminal I would alert
people to the fact that whatever was out there to watch out for. You would be surprised how well
Internet people do police the net and warn there friends and others about it.
Don't buy into the government hype of public protection, for all the mediums I just listed
above the scams as they are related to Wall Street are still happening big time, and they already
regulate those technologies for our protection! It's not regulation they are looking to do, it is
ownership of the Internet they are trying for, and with the help of big business, who sits there
and cries foul, they may very well achieve this. Talk about two groups in need of finding some
ethics big business and the government are sorely lacking. This the first major technology that
has leveled the playing field for even the littlest user. Don't buy the hype where ever you can try
to keep the regulators out, by voting, writing your congress, or whatever it takes legally. We are
intelligent enough to make our own decisions!!
4) The year is 2016. Describe how information Technology and computerization have
impacted individuals and Society in the past 20 years.
Let's look at from an everyday perspective: First you'll be gently awaking by an alarm that
you set by your voice the night before and playing what you want to hear again that decision was
made the night before. You'll enter a kitchen where on voice command you order your cup of
coffee and whatever breakfast you wa
Protecting A Computer
About two hundred years before, the word "computer" started to appear
in the dictionary. Some people even didn't know what is a computer.
However, most of the people today not just knowing what is a computer, but
understand how to use a computer.
Therefore, computer become more and more popular and important to our
society. We can use computer everywhere and they are very useful and
helpful to our life. The speed and accuracy of computer made people felt
confident and reliable. Therefore, many important information or data are
saved in the computer. Such as your diary, the financial situation of a oil
company or some secret intelligence of the military department. A lot of
important information can be found in the memory of computer. So, people
may ask a question: Can we make sure that the information in the computer
is safe and nobody can steal it from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer.
The hard disk of the computer could be endangered by the flood of coffee.
Besides, human caretaker of computer system can cause as much as harm as
any physical hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own account. Nonetheless,
the most dangerous thief are not those who work with computer every day,
but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning,
hackers are not so dangerous at all. They just stole computer time from the
university. However, in the early 1980s, hackers became a group of
criminals who steal information from other peoples' computer.
For preventing the hackers and other criminals, people need to set up a
good security system to protect the data in the computer. The most
important thing is that we cannot allow those hackers and criminals
entering our computers. It means that we need to design a lock to lock up
all our data or using identification to verify the identity of someone
seeking access to our computers.
The most common method to lock up the data is using a password system.
Passwords are a multi-user computer system's usual first line of defense
against hackers. We can use a combination of alphabetic and number
characters to form our own password. The longer the password, the more
possibilities a hacker's password-guessing program must work through.
However it is difficult to remember a very long passwords. So people will
try to write the password down and it may immediately make it a security
risk. Furthermore, a high speed password-guessing program can find out a
password easily. Therefore, it is not enough for a computer that just have
a password system to protect its data and memory.
Besides password system, a computer company may consider about the
security of its information centre. In the past, people used locks and keys
to limit access to secure areas. However, keys can be stolen or copies
easily. Therefore, card-key are designed to prevent the situation above.
Three types of card-keys are commonly used by banks, computer centers and
government departments. Each of this card-keys can employ an identifying
number or password that is encoded in the card itself, and all are produced
by techniques beyond the reach of the average computer criminals. One of
the three card-key is called watermark magnetic. It was inspired by the
watermarks on paper currency.The card's magnetic strip have a 12-digit
number code and it cannot be copied. It can store about two thousand bits
in the magnetic strip. The other two cards have the capability of storing
thousands of times of data in the magnetic strip. They are optical memory
cards (OMCs) and Smart cards. Both of them are always used in the security
system of computers.
However, it is not enough for just using password system and card-keys
to protect the memory in the computer. A computer system also need to have
a restricting program to verify the identity of the users. Generally,
identity can be established by something a person knows, such as a password
or something a person has, such as a card-key. However, people are often
forget their passwords or lose their keys. A third method must be used. It
is using something a person has --- physical trait of a human being.
We can use a new technology called biometric device to identify the
person who wants to use your computer. Biometric devices are instrument
that perform mathematical analyses of biological characteristics. For
example, voices, fingerprint and geometry of the hand can be used for
identification. Nowadays, many computer centers, bank vaults, military
installations and other sensitive areas have considered to use biometric
security system. It is because the rate of mistaken acceptance of
outsiders and the rejection of authorized insiders is extremely low.
Individuality of vocal signature is one kind of biometric security
system. The main point of this system is voice verification. The voice
verifier described here is a developmental system at American Telephone and
Telegraph. Only one thing that people need to do is repeating a particular
phrase several times. The computer would sample, digitize and store what
you said. After that, it will built up a voice signature and make
allowances for an individual's characteristic variations. The theory of
voice verification is very simple. It is using the characteristics of a
voice: its acoustic strength. To isolate personal characteristics within
these fluctuations, the computer breaks the sound into its component
frequencies and analyzes how they are distributed. If someone wants to
steal some information from your computer, the person needs to have a same
voice as you and it is impossible.
Besides using voices for identification, we can use fingerprint to
verify a person's identity because no two fingerprints are exactly alike.
In a fingerprint verification system, the user places one finger on a glass
plate; light flashes inside the machine, reflects off the fingerprint and
is picked up by an optical scanner. The scanner transmits the information
to the computer for analysis. After that, security experts can verify the
identity of that person by those information.
Finally, the last biometric security system is the geometry of the
hand. In that system, the computer system uses a sophisticated scanning
device to record the measurements of each person's hand. With an overhead
light shining down on the hand, a sensor underneath the plate scans the
fingers through the glass slots, recording light intensity from the
fingertips to the webbing where the fingers join the palm. After passing
the investigation of the computer, people can use the computer or retrieve
data from the computer.
Although a lot of security system have invented in our world, they are
useless if people always think that stealing information is not a serious
crime. Therefore, people need to pay more attention on computer crime and
fight against those hackers, instead of using a lot of computer security
systems to protect the computer.
Why do we need to protect our computers ?
It is a question which people always ask in 18th century. However,
every person knows the importance and useful of a computer security system.
In 19th century, computer become more and more important and helpful.
You can input a large amount of information or data in a small memory chip
of a personal computer. The hard disk of a computer system is liked a bank.
It contained a lot of costly material. Such as your diary, the financial
situation of a trading company or some secret military information.
Therefore, it just like hire some security guards to protect the bank. A
computer security system can use to prevent the outflow of the information
in the national defense industry or the personal diary in your computer.
Nevertheless, there is the price that one might expect to pay for the
tool of security: equipment ranging from locks on doors to computerized
gate-keepers that stand watch against hackers, special software that
prevents employees to steal the data from the company's computer. The bill
can range from hundreds of dollars to many millions, depending on the
degree of assurance sought.
Although it needs to spend a lot of money to create a computer security
system, it worth to make it. It is because the data in a computer can be
easily erased or destroyed by a lot of kind of hazards. For example, a
power supply problem or a fire accident can destroy all the data in a
computer company. In 1987, a computer centre inside the Pentagon, the US
military's sprawling head quarters near Washington, DC., a 300-Watt light
bulb once was left burning inside a vault where computer tapes were stored.
After a time, the bulb had generated so much heat that the ceiling began to
smelt. When the door was opened, air rushing into the room brought the fire
to life. Before the flames could be extinguished, they had spread consume
three computer systems worth a total of $6.3 million.
Besides those accidental hazards, human is a great cause of the
outflows of data from the computer. There have two kind of people can go in
the security system and steal the data from it. One is those trusted
employee who is designed to let in the computer system, such as
programmers, operators or managers. Another kind is those youth amateurs
who experiment at night ----the hackers.
Let's talk about those trusted workers. They are the groups who can
easily become a criminal directly or indirectly. They may steal the
information in the system and sell it to someone else for a great profit.
In another hand, they may be bribed by someone who want to steal the data.
It is because it may cost a criminal far less in time and money to bride a
disloyal employee to crack the security system.
Beside those disloyal workers, hacker is also very dangerous. The term
"hacker" is originated at M.I.T. as students' jargon for classmates who
doing computer lab in the night. In the beginning, hackers are not so
dangerous at all. They just stole some hints for the test in the
university. However, in early 1980s, hacker became a group of criminal who
steal information from other commercial companies or government
departments.
What can we use to protect the computer ?
We have talked about the reasons of the use of computer security
system. But what kind of tools can we use to protect the computer. The most
common one is a password system. Password are a multi-user computer
system's which usual used for the first line of defense against intrusion.
A password may be any combination of alphabetic and numeric characters, to
maximum lengths set by the e particular system. Most system can accommodate
passwords up to 40 characters. However, a long passwords can be easily
forget. So, people may write it down and it immediately make a security
risk. Some people may use their first name or a significant word. With a
dictionary of 2000 common names, for instance, a experienced hacker can
crack it within ten minutes.
Besides the password system, card-keys are also commonly used. Each
kind of card-keys can employ an identifying number or password that is
encoded in the card itself, and all are produced by techniques beyond the
reach of the average computer criminal. Three types of card usually used.
They are magnetic watermark, Optical memory card and Smart card.
However, both of the tools can be easily knew or stole by other people.
Password are often forgotten by the users and card-key can be copied or
stolen. Therefore, we need to have a higher level of computer security
system. Biometric device is the one which have a safer protection for the
computer. It can reduce the probability of the mistaken acceptance of
outsider to extremely low. Biometric devices are instrument that perform
mathematical analyses of biological characteristics. However, the time
required to pass the system should not be too long. Also, it should not
give inconvenience to the user. For example, the system require people to
remove their shoes and socks for footprint verification.
Individuality of vocal signature is one kind of biometry security
system. They are still in the experimental stage, reliable computer systems
for voice verification would be useful for both on-site and remote user
identification. The voice verifier described here is invented by the
developmental system at American Telephone and Telegraph. Enrollment would
require the user to repeat a particular phrase several times. The computer
would sample, digitize and store each reading of the phrase and then, from
the data, build a voice signature that would make allowances for an
individual's characteristic variations.
Another biometric device is a device which can measuring the act of
writing. The device included a biometric pen and a sensor pad. The pen can
converts a signature into a set of three electrical signals by one pressure
sensor and two acceleration sensors. The pressure sensor can change in the
writer's downward pressure on the pen point. The two acceleration sensor
can measure the vertical and horizontal movement.
The third device which we want to talk about is a device which can scan
the pattern in the eyes. This device is using an infrared beam which can
scan the retina in a circular path. The detector in the eyepiece of the
device can measure the intensity of the light as it is reflected from
different points. Because blood vessels do not absorb and reflect the same
quantities of infrared as the surrounding tissue, the eyepiece sensor
records the vessels as an intricate dark pattern against a lighter
background. The device samples light intensity at 320 points around the
path of the scan , producing a digital profile of the vessel pattern. The
enrollment can take as little as 30 seconds and verification can be even
faster. Therefore, user can pass the system quickly and the system can
reject those hackers accurately.
The last device that we want to discuss is a device which can map the
intricacies of a fingerprint. In the verification system, the user places
one finger on a glass plate; light flashes inside the machine ,reflect off
the fingerprint and is picked up by an optical scanner. The scanner
transmits the information to the computer for analysis.
Although scientist have invented many kind of computer security
systems, no combination of technologies promises unbreakable security.
Experts in the field agree that someone with sufficient resources can crack
almost any computer defense. Therefore, the most important thing is the
conduct of the people. If everyone in this world have a good conduct and
behavior, there is no need to use any complicated security system to
protect the computer.
in the dictionary. Some people even didn't know what is a computer.
However, most of the people today not just knowing what is a computer, but
understand how to use a computer.
Therefore, computer become more and more popular and important to our
society. We can use computer everywhere and they are very useful and
helpful to our life. The speed and accuracy of computer made people felt
confident and reliable. Therefore, many important information or data are
saved in the computer. Such as your diary, the financial situation of a oil
company or some secret intelligence of the military department. A lot of
important information can be found in the memory of computer. So, people
may ask a question: Can we make sure that the information in the computer
is safe and nobody can steal it from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer.
The hard disk of the computer could be endangered by the flood of coffee.
Besides, human caretaker of computer system can cause as much as harm as
any physical hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own account. Nonetheless,
the most dangerous thief are not those who work with computer every day,
but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning,
hackers are not so dangerous at all. They just stole computer time from the
university. However, in the early 1980s, hackers became a group of
criminals who steal information from other peoples' computer.
For preventing the hackers and other criminals, people need to set up a
good security system to protect the data in the computer. The most
important thing is that we cannot allow those hackers and criminals
entering our computers. It means that we need to design a lock to lock up
all our data or using identification to verify the identity of someone
seeking access to our computers.
The most common method to lock up the data is using a password system.
Passwords are a multi-user computer system's usual first line of defense
against hackers. We can use a combination of alphabetic and number
characters to form our own password. The longer the password, the more
possibilities a hacker's password-guessing program must work through.
However it is difficult to remember a very long passwords. So people will
try to write the password down and it may immediately make it a security
risk. Furthermore, a high speed password-guessing program can find out a
password easily. Therefore, it is not enough for a computer that just have
a password system to protect its data and memory.
Besides password system, a computer company may consider about the
security of its information centre. In the past, people used locks and keys
to limit access to secure areas. However, keys can be stolen or copies
easily. Therefore, card-key are designed to prevent the situation above.
Three types of card-keys are commonly used by banks, computer centers and
government departments. Each of this card-keys can employ an identifying
number or password that is encoded in the card itself, and all are produced
by techniques beyond the reach of the average computer criminals. One of
the three card-key is called watermark magnetic. It was inspired by the
watermarks on paper currency.The card's magnetic strip have a 12-digit
number code and it cannot be copied. It can store about two thousand bits
in the magnetic strip. The other two cards have the capability of storing
thousands of times of data in the magnetic strip. They are optical memory
cards (OMCs) and Smart cards. Both of them are always used in the security
system of computers.
However, it is not enough for just using password system and card-keys
to protect the memory in the computer. A computer system also need to have
a restricting program to verify the identity of the users. Generally,
identity can be established by something a person knows, such as a password
or something a person has, such as a card-key. However, people are often
forget their passwords or lose their keys. A third method must be used. It
is using something a person has --- physical trait of a human being.
We can use a new technology called biometric device to identify the
person who wants to use your computer. Biometric devices are instrument
that perform mathematical analyses of biological characteristics. For
example, voices, fingerprint and geometry of the hand can be used for
identification. Nowadays, many computer centers, bank vaults, military
installations and other sensitive areas have considered to use biometric
security system. It is because the rate of mistaken acceptance of
outsiders and the rejection of authorized insiders is extremely low.
Individuality of vocal signature is one kind of biometric security
system. The main point of this system is voice verification. The voice
verifier described here is a developmental system at American Telephone and
Telegraph. Only one thing that people need to do is repeating a particular
phrase several times. The computer would sample, digitize and store what
you said. After that, it will built up a voice signature and make
allowances for an individual's characteristic variations. The theory of
voice verification is very simple. It is using the characteristics of a
voice: its acoustic strength. To isolate personal characteristics within
these fluctuations, the computer breaks the sound into its component
frequencies and analyzes how they are distributed. If someone wants to
steal some information from your computer, the person needs to have a same
voice as you and it is impossible.
Besides using voices for identification, we can use fingerprint to
verify a person's identity because no two fingerprints are exactly alike.
In a fingerprint verification system, the user places one finger on a glass
plate; light flashes inside the machine, reflects off the fingerprint and
is picked up by an optical scanner. The scanner transmits the information
to the computer for analysis. After that, security experts can verify the
identity of that person by those information.
Finally, the last biometric security system is the geometry of the
hand. In that system, the computer system uses a sophisticated scanning
device to record the measurements of each person's hand. With an overhead
light shining down on the hand, a sensor underneath the plate scans the
fingers through the glass slots, recording light intensity from the
fingertips to the webbing where the fingers join the palm. After passing
the investigation of the computer, people can use the computer or retrieve
data from the computer.
Although a lot of security system have invented in our world, they are
useless if people always think that stealing information is not a serious
crime. Therefore, people need to pay more attention on computer crime and
fight against those hackers, instead of using a lot of computer security
systems to protect the computer.
Why do we need to protect our computers ?
It is a question which people always ask in 18th century. However,
every person knows the importance and useful of a computer security system.
In 19th century, computer become more and more important and helpful.
You can input a large amount of information or data in a small memory chip
of a personal computer. The hard disk of a computer system is liked a bank.
It contained a lot of costly material. Such as your diary, the financial
situation of a trading company or some secret military information.
Therefore, it just like hire some security guards to protect the bank. A
computer security system can use to prevent the outflow of the information
in the national defense industry or the personal diary in your computer.
Nevertheless, there is the price that one might expect to pay for the
tool of security: equipment ranging from locks on doors to computerized
gate-keepers that stand watch against hackers, special software that
prevents employees to steal the data from the company's computer. The bill
can range from hundreds of dollars to many millions, depending on the
degree of assurance sought.
Although it needs to spend a lot of money to create a computer security
system, it worth to make it. It is because the data in a computer can be
easily erased or destroyed by a lot of kind of hazards. For example, a
power supply problem or a fire accident can destroy all the data in a
computer company. In 1987, a computer centre inside the Pentagon, the US
military's sprawling head quarters near Washington, DC., a 300-Watt light
bulb once was left burning inside a vault where computer tapes were stored.
After a time, the bulb had generated so much heat that the ceiling began to
smelt. When the door was opened, air rushing into the room brought the fire
to life. Before the flames could be extinguished, they had spread consume
three computer systems worth a total of $6.3 million.
Besides those accidental hazards, human is a great cause of the
outflows of data from the computer. There have two kind of people can go in
the security system and steal the data from it. One is those trusted
employee who is designed to let in the computer system, such as
programmers, operators or managers. Another kind is those youth amateurs
who experiment at night ----the hackers.
Let's talk about those trusted workers. They are the groups who can
easily become a criminal directly or indirectly. They may steal the
information in the system and sell it to someone else for a great profit.
In another hand, they may be bribed by someone who want to steal the data.
It is because it may cost a criminal far less in time and money to bride a
disloyal employee to crack the security system.
Beside those disloyal workers, hacker is also very dangerous. The term
"hacker" is originated at M.I.T. as students' jargon for classmates who
doing computer lab in the night. In the beginning, hackers are not so
dangerous at all. They just stole some hints for the test in the
university. However, in early 1980s, hacker became a group of criminal who
steal information from other commercial companies or government
departments.
What can we use to protect the computer ?
We have talked about the reasons of the use of computer security
system. But what kind of tools can we use to protect the computer. The most
common one is a password system. Password are a multi-user computer
system's which usual used for the first line of defense against intrusion.
A password may be any combination of alphabetic and numeric characters, to
maximum lengths set by the e particular system. Most system can accommodate
passwords up to 40 characters. However, a long passwords can be easily
forget. So, people may write it down and it immediately make a security
risk. Some people may use their first name or a significant word. With a
dictionary of 2000 common names, for instance, a experienced hacker can
crack it within ten minutes.
Besides the password system, card-keys are also commonly used. Each
kind of card-keys can employ an identifying number or password that is
encoded in the card itself, and all are produced by techniques beyond the
reach of the average computer criminal. Three types of card usually used.
They are magnetic watermark, Optical memory card and Smart card.
However, both of the tools can be easily knew or stole by other people.
Password are often forgotten by the users and card-key can be copied or
stolen. Therefore, we need to have a higher level of computer security
system. Biometric device is the one which have a safer protection for the
computer. It can reduce the probability of the mistaken acceptance of
outsider to extremely low. Biometric devices are instrument that perform
mathematical analyses of biological characteristics. However, the time
required to pass the system should not be too long. Also, it should not
give inconvenience to the user. For example, the system require people to
remove their shoes and socks for footprint verification.
Individuality of vocal signature is one kind of biometry security
system. They are still in the experimental stage, reliable computer systems
for voice verification would be useful for both on-site and remote user
identification. The voice verifier described here is invented by the
developmental system at American Telephone and Telegraph. Enrollment would
require the user to repeat a particular phrase several times. The computer
would sample, digitize and store each reading of the phrase and then, from
the data, build a voice signature that would make allowances for an
individual's characteristic variations.
Another biometric device is a device which can measuring the act of
writing. The device included a biometric pen and a sensor pad. The pen can
converts a signature into a set of three electrical signals by one pressure
sensor and two acceleration sensors. The pressure sensor can change in the
writer's downward pressure on the pen point. The two acceleration sensor
can measure the vertical and horizontal movement.
The third device which we want to talk about is a device which can scan
the pattern in the eyes. This device is using an infrared beam which can
scan the retina in a circular path. The detector in the eyepiece of the
device can measure the intensity of the light as it is reflected from
different points. Because blood vessels do not absorb and reflect the same
quantities of infrared as the surrounding tissue, the eyepiece sensor
records the vessels as an intricate dark pattern against a lighter
background. The device samples light intensity at 320 points around the
path of the scan , producing a digital profile of the vessel pattern. The
enrollment can take as little as 30 seconds and verification can be even
faster. Therefore, user can pass the system quickly and the system can
reject those hackers accurately.
The last device that we want to discuss is a device which can map the
intricacies of a fingerprint. In the verification system, the user places
one finger on a glass plate; light flashes inside the machine ,reflect off
the fingerprint and is picked up by an optical scanner. The scanner
transmits the information to the computer for analysis.
Although scientist have invented many kind of computer security
systems, no combination of technologies promises unbreakable security.
Experts in the field agree that someone with sufficient resources can crack
almost any computer defense. Therefore, the most important thing is the
conduct of the people. If everyone in this world have a good conduct and
behavior, there is no need to use any complicated security system to
protect the computer.
Subscribe to:
Comments (Atom)