As you know, the world is quickly becoming more and more involved with all things digital. Businesses are assumed to need a robust Web presence, police rely on digital databases, schools are experimenting with replacing textbooks with digital course support, and on and on.
A lot of this goes on behind the scenes. There’s a lot more to it than texting, online shopping, and streaming media. For example, Amazon now sells cloud services to support the Web operations of other businesses and the federal government. And they are developing self-guiding small helicopter drones to do deliveries of smaller packages in US cities (thus eliminating a bunch of driver jobs, I expect–now there’s some food for thought).
The point is that to function effectively in the future world, and to take advantage of new opportunities, you will need to know about how to work with information technology. Everywhere, I’m hearing about how educational institutions, businesses, and government are looking to hire people who can work effectively with information technology. This means full-time computer professionals who set up and maintain networks, or who analyze huge mountains of data, or who design web sites, or who know how to set up automation systems, etc., etc. But it also means accountants who can write short computer scripts to customize accounting software to a local situation, or small office managers who can maintain and reconfigure a local computer network without having to call in an expensive service company, or a teacher who can intelligently set up a lesson on the new tablets that the school district is trying out, or a park ranger who can create a self-guided tour map.
This is not just about programming. The majority of computer professionals are not programmers. They are doing all sorts of things besides programming. But knowing something about programming is really helpful just to get a basic understanding of how all this stuff works. Learning Java is a possible place to start messing around with programming. Or, if you think you are going to be in the business world, you should learn to write macros in the Excel spreadsheet software. (Macros are little programs that enable the software to do some specific task you want it to do.)
You get the point, I hope. Opportunity is greater for those who know more, who have skills, who can think in computerese.
Some students I know have learned quite a bit of computerese on their own, from books, free online courses, YouTube videos, and their friends. But most people reading this post — which probably means YOU — will not do any of those things on your own, simply because it’s hard to get motivated and stick with it on your own unless you’re really an independent, committed sort.
So, for most of you out there, to get up to speed, you really need to part of a class offered by ISU or some other traditional institution. Find something that seems interesting and potentially useful. At ISU, there are three main areas that offer courses that might do the trick:
- For College of Business majors, check out the courses in the Business Information Systems or Accounting Information Systems sequence.
- For students with any major, check out beginning courses in the School of Information Technology.
- For students with any major, check out the beginning courses in the Computer Systems Technology sequence offered by the Department of Technology, such as TEC 151.
ISU students who want to talk about these things, or would like some advice, feel free to write me anytime: Kenton.Machina@IllinoisState.edu
This blog will be taking a rest soon. Thanks for reading!
Best wishes to ISU students, for a good semester’s end.
First and foremost, I want to thank you for reading our post over this last semester. I hope you all enjoyed them as much as I have enjoyed writing them. This is my last post for the year so I thought Id tell you about an IT hobby of mine and how I learned to do it. For the last year or so I had begun programming Android Apps and its something I have done for several hours a week since I started.
Unfortunately it is unlikely you can just jump into programming for Android, but it isn’t something that is incredibly difficult either. First, you need to learn to write code in Java. This may seem like a daunting task, but I assure you that it will not take long to get the hang of. I started by taking my first Java class but that isn’t where I learned most of what I know. Tutorial videos easily found on the internet will help you to learn the basics. This is the video that should get you started on the right path even if you have never even thought of writing code.
The tutorials are very simple to understand and he will walk you through every step including teaching you how to get started with what you need to begin programming. Even if the programs you write in the beginning don’t seem like they are very useful, they provide the building blocks you can use later to make something incredible. I still look up a few of the basic videos when i get stuck on a problem. Like with most things, the best way to learn is to jump in and practice. It’s free and you have nothing to lose!
After you get the basics of Java down, you can start looking into programming for Android. The rules are basically the same with a few different methods. Don’t worry, your not alone on this. There are many different tutorials out there to help with this as well. The best part is, it doesn’t take much to share what you have done whether you offer it for free on the Android Marketplace or you charge a dollar and try to make profit from it. There is no overhead but the time it takes for you to learn how to do it.
Programming is simply a game of solving problems whether they be mathematical or just a game you dreamed up. Just look at the success of Angry Birds. I hope you give it a shot and good luck finishing up the rest of this semester. Have a great rest of the year!
It’s nearly Thanksgiving, and nothing puts me more in the spirit of giving thanks than the thought of an enormous, globe-spanning distributed network of computers at my beck and call. This is a lie, though; I don’t have a network like that, and if I did, ‘thanks’ is probably not what I would be giving, and the only thing I would anticipate receiving would be a prison sentence. The kind of network I just described is called a ‘botnet’, and yes, they are generally illegal. I am certainly not condoning the creation of a botnet, but I feel it is important to know about them, since they represent one of the most powerful weapons a malicious ‘hacker’ typically has in their arsenal. Also, as a sort of morbid curiosity, it is difficult to deny the ingenuity of their operation.
There are a myriad of ways to create a botnet, but the general idea is pretty simple: the ‘bots’ in the ‘botnet’ are simply computers that have been told to report to and / or receive orders from a central location. Basically just a bunch of computers that are set up with software that allows them all to be controlled by a single computer. This practice in itself is not illegal, but the circumstances that surround the creation and operation of the vast majority of botnets in existence today is where ‘botnet’ receives its negative connotation.
Most botnets are formed by distributing a piece of malicious software; these are the same kinds of worms, viruses and trojan horses that you’ve likely heard about before. These pieces of software can be very devious, installing themselves and running as a disguised process without the victim ever knowing. That’s the point, though — the victim has to remain completely unaware, otherwise they may take action against the malware. With this in mind, in order to remain stealthy, botnet software will often intentionally use fewer resources and exert less control over a victim’s system that it is actually capable.
Botnets are used for a variety of things, but most typically for spamming phishing emails, running denial-of-service attacks, and collecting personal data from victims.
Due to their extremely distributed nature, it is difficult to determine the source of a botnet, but that doesn’t mean that individual botnets can’t be identified and tracked. In a certain way, botnets can be a source of fascination and awe. Botnets are given names and sometimes even personalities and are typically ranked by either the number of infected hosts or by their level of impact. Another entertaining facet of botnets are their occasional hostile takeovers, wherein a very savvy individual or group of individuals is able to capture a bot’s software and reverse engineer it in order to procure information that would allow them to seize control of the botnet from its original creator. A bit of internal botnet warfare goes on due to the possibility for these sorts of takeovers, with some botnets possessing the ability to remotely ‘self destruct’ itself — not literally blow up, but to wipe itself or the system it was hosted on in order to prevent a reverse-engineering attempt.
There really is a lot to be said about botnets, but I hope that this overview was enough to pique your interest and lead to further investigation. Just be careful, and don’t do anything illegal, of course. Also, have a great Thanksgiving break, you’ve probably earned it.
Some of you Apple fans out there may have already purchased the iPhone 5S. Some of you may think that the Touch Id fingerprint scanner is a great and secure feature. Apple claimed it was very secure, and it took a long three days before someone was able to hack it. Many believed that these identity based technologies were going to be far more secure than knowledge based securities such as passwords and pin numbers, but is that really the case?
The technology to scan a fingerprint is just one of many different ways to use your body as security authentication. This is termed biometrics and it utilizes any measurable physical characteristic that can be automatically checked. There are scanners out there for your face, hand geometry, retina, iris, hand written signature, vein, and voice. What is the problem if all of these characteristics are basically unique to you? That is exactly the problem. There is no way to change any of these if they become compromised and they can become compromised.
You only have 10 fingers, and If someone gets this data and uses it gain access to financial information, you only have 9 passwords left. It is even worse for a retina pattern scanner. How do you get a new retina? Most of us have seen the spy movies where they gather a persons fingerprint and use it, but this is not limited to James Bond. The German hacking group CCC that broke the iPhone used inexpensive materials found in your home like glue, print toner, and transparent paper. The worst part is we leave our fingerprints everywhere including the device we are trying to protect.
This may not be a huge concern to you considering that most would not put that much effort into getting the average person’s information no matter how difficult or easy it may be. The problem may arise in your future when you become an important government official, upper management of a international company, or even a celebrity of your field. Someone may just want the information you keep on your phone bad enough to use the methods a simple Youtube search can provide.
For the majority of you who have posted pictures on your Facebook and have used the “Photo Tag Suggestion” feature. You would probably think this article is pretty interesting. For those who don’t know what I am talking about, it’s when you upload pictures onto your Facebook album and Facebook automatically matches the peoples faces in the pictures and tag your friends.
Now homeland security is trying out the same thing, except for police officers. Right now in San Diego, police officers are equipped with tablets and cell phones with an app that they can use to take pictures and look up your information. Currently the database of pictures are of people who have been arrested before. So when the police arrests someone, they take a quick picture of them and then the app uses facial recognition to match the persons face to someone who has been convicted. When this is matched, there are a number of pictures the officer can look at to compare. If there is a match then the officer just selects the picture and their information comes up including arrests.
This new facial recognition technology would help police officers retrieve data from individuals in a quicker manner. Many other states are catching on to this and they are linking the facial recognition technology to driver’s license databases. This can be good and bad depending on how the test goes. The technology is still in the works but they hope to improve it to work accurately. Currently, the app may have a potential for false positives which can have a lot of mishaps. But if you have no convictions or arrests, you shouldn’t be worried. It would also be up to the judgement of the police officers who receives the technology to choose if the images match.
When I heard about this, I thought it was very interesting because technology is growing bigger everyday. Now even the simplest thing we know can be used to help the police protect us from dangerous people. This facial recognition program has been on all of our phone cameras and regular cameras for awhile now. It’s just interesting that now they thought of the idea to use it for another good cause than just taking #SelfieSundays (Instagram Lingo).
Don’t forget to take the quiz and have a good weekend!
Feel free to comment on the post if you have any ideas or questions about the blog posted.
So here’s the scenario: you’ve just read about some neat piece of software or a cool operating system either here or elsewhere on the internet and you think you’d like to try it out. To complicate things, perhaps the software doesn’t run on your current operating system, or maybe in order for it to work, it needs a deployment of several systems simultaneously. For nearly anybody, that would be a tall order, and for what? Fun? A difficult justification for what is shaping up to be a monumental undertaking. I assure you, there is a better way.
As the title of this article would imply, the way to your software salvation lies in virtualization. It is likely that you have heard of hardware virtualization before; you have almost undoubtedly been exposed to virtualized hardware at some point in your life, either directly or indirectly. For example, even here on campus, a significant amount of the computers you use in labs are ‘thin clients’ that simply send control information and video data back and forth between a virtual computer that is located on a server deep within one of ISU’s data centers. Even most servers these days are virtualized to allow for scalability and load-balancing. Most applications that are touted to run ‘in the cloud’ will likely be running on virtualized hardware.
Now that you know about all these advantages to virtualization, how can you leverage virtual hardware for your own experimental purposes? Not only is the solution easy, it is also free! There are virtualization applications that you can pay for, for sure, but if all you want to do is set up a quick test environment or if you’re just beginning, some of the simplest solutions are the free ones.
The keyword to search for is ‘Virtual Machine’ software. These are applications that are designed to simulate all of the individual parts of a computer in software, so that you can essentially run a computer within your computer. On a side note, video game emulators function in a similar fashion; all of the hardware components of a console are ‘emulated’ in computer software to allow a game program made for that system to run within that environment. Back on track — two of the most prolific free applications for simulating computer systems are Virtualbox and VMWare Player. Both of these solutions have automated wizards that will aid you in setting up your virtual systems, all you need to supply is the disk image file for the operating system you want to install (Ubuntu would be a good place to start if you are lacking disk images to try). There are other free solutions as well, but generally may require a more intense set-up process. Some of these options would include an Ubuntu server running Xen, or a Windows server running Hyper-V.
However you choose to get your virtual lab set up, you’ll be able to experience a number of handy benefits. If you keep a virtual machine around that has the same operating system installed on it as your primary computer, you can use that virtual machine to give interesting software a sort of ‘trial run’ without having to install it on your own computer. It’s cleaner and more efficient to roll back a virtual machine than it would be to uninstall a pesky application that you don’t want. Testing out configurations for specific applications is handy, too; you’ll be able to see how a particular configuration will will affect your system before actually messing around with any important configurations files. A virtual ‘lab’ is often used by security professionals and hobbyist ‘hackers’ alike in order to practice and gain experience without putting themselves or others at risk of an errant or misconfigured attack. An excellent resource for practice virtual machines is the website Vulnhub.
Personally, I feel the biggest advantage that my personal use of a virtual lab offers me is the lack of apprehension before diving into a project; just spin up a virtual machine and start bashing rocks together. Now go forth and make virtual labs of your own!
Hello MAT 120 students! I am Chris Higgins, application developer and server administrator at Illinois State University, masters student, former blogger for this site, and now I am back doing a guest posting! Many thanks to Dr. Machina for reaching out and asking if I would be willing to come back and do a guest posting. I was in this same class four long years ago as a freshman, struggling to get every answer right and pass the class with the best grade I can get. Now I’m sitting in my office writing this blog post while I have various programs end editors open, spending most of my working day coding and coding away.
Programming and coding is taking the world by storm. Everywhere you go, there are hundreds of devices around you being run by some program that a developer wrote. You cannot go anywhere without computers being around you. So, why not embrace what is happening around you? Why not become part of the change? The world of information technology is rapidly growing, creating both new jobs and new technologies. There will always be jobs in IT out there, and jumping into IT just helps to lead you to success.
One of the best things you can do for yourself is learn how to code. It is like learning a new language, the sooner you learn and more you use it, the better you will be at programming. Gabe Newell quotes “the programmers of tomorrow are the wizards of the future”, and he is exactly right! I remember being young and working on my own Windows 95 computer thinking how cool it was, not even imagining the amount of progress that would be made in the coming years to where we are today. Now it is not even the nerds that say coding is in the future, famous celebrities such as singer/rapper Will.I.Am and basketball player for the Miami Heat Chris Bosh are joining the party and learning how to code. They are taking the initiative to basically enter the matrix.
I hope that I have convinced some of you to become interested in coding and working in IT, if you were not already thinking that could be your future! Always keep an eye for student IT job posts on the ISU jobs website, and don’t forget to take this weeks quiz now available on ReggieNet! Thanks for having me everyone, I hope you enjoyed the read!