Samantha's Blog

"Be who you are, and say what you feel. Because those who mind don't matter, and those who matter don't mind." -Dr. Seuss

Trapped


Violet is not normal, she’s different from everyone else, and no one, not even her own mother understands her. No one likes her,  she was known as the quiet girl. It wasn’t always this way though. When her father was there, she was a lively little girl, she loved to cook with him. He was her idol, he stood up for everything he believed, especially the Guardians. He never liked them for one reason that Violet never found out. One day he just disappeared, her mom told her it was a car accident, but where was he really? Will Violet ever find out where he went? Why did her father disappear?

When we were making the Tinkercad habitat design I developed my team working skills when we were working as a group to create the design, we had to assign jobs to each person in the team.

Trapped

Habitat Design

Habitat Design

As a group and as a collaborator, I think we did quite well, we all shared our ideas, combining our thinking on to one piece of paper, and then we built it on Tinkercad.

I think the final design was really good, we thought of the dimensions and what would be reasonable, we also thought about what necessities people would need in a person’s daily life. We included everyone’s ideas and made a great final product.

I think that when we were working together in a group, we were including everyone, everyone was helping with the design, the dimensions, and thinking of ideas. One thing that was quite challenging for us was when we were trying to figure out the dimensions, we always debated how big everything was, but in the end, we all would agree on one size.

Awesome Features

My Design

Emily’s Design

Final Design

First Draft of Design

 

Growing and Shrinking Eggs

I think that my design is pretty much repeatable by another person because I have clearly written out the procedure of how to do the investigation, I have also shown what this experiment requires in terms of equipment, I have also included a data table that shows what you would need to record along the way.

I realize that in my procedure it says ‘4. Leave for until next class.’ I know that if I write that there will be no limit on time because the science classes start at different times in the week, so it can not be exactly 1 hour, this may or may not affect the data I was collecting, because we don’t know if the amount of time the egg is put into the liquid affects the mass.

Something I can improve for this design is that I could make it much more detailed and neater because with more detail people will understand how to do the investigation more. Since I didn’t have much space on the pawroteI wrote the words everywhere and it is now really messy, and people may be confused by this, not knowing which is what step.

Additional data that I collected that helped me understand moreof this investigation was to see what happened to the eggs that were in water into corn syrup, and the ones that were in corn syrup in water. I wanted to see if egg 1 and egg 2 (the eggs in that were in corn syrup) in the water would grow and if egg 3 and egg 4 (the eggs in that were in water) would shrink. Finding out the answer to that really helped me understand what was happening inside the egg.

 

River Field Study – Data Collection 3

November 20, 2018

Today we went back to the Wenyu River to do the field study of the month. But, yesterday, we were warned by Mr. Frank that there was a huge fence along one bit of the river, so the people who had sites by the bridge and the concrete path had to change their sites. Our group was one of the many people who had sites their so we decided to change where the site located outside of the fence. The purpose of these field studies is to see the changes in dissolved oxygen as the year goes on.

The Fence

The data we collected this time was a lot different compared to the data we collected before. The weather was much colder than before so the water became cold. For example, the temperature in the three locations were 15 degrees, 14 degrees, and 13 degrees, but now it has dropped to 7 degrees, 8 degrees, and 6 degrees. The also dissolved oxygen went up (although I suspect that the data we collected was wrong because there was a huge difference in a month and the equipment wasn’t working so well with the computer). In January, when we come back, I wonder if the amount of dissolved oxygen will go up or down?

The Data Table ( October Data Incorrect) 

Data Collection

What? So What? Now What?

The world today is an imperfect place, we have many small problems and many big problems. Some examples are like overpopulation, climate change, global warming, etc. But, the problem I want to focus on today the problem of how fast technology is advancing.

In my narrative, people in that time have found many ways to improve technology. That may not necessarily mean it is good, there are good types of technology and bad types. People have invented vaping which is basically another way of smoking, and big data could be tracking us right this moment. After reading all the articles in our big data unit, I was inspired by all the information I was getting, and so now I am writing a story about technology.

I think this problem will continue on in the future if we don’t do anything about it. Little by little, we could be creating something that might have a mind of its own and destroy all of humanity! This may not be likely, but it could happen. I am not saying that technology is a bad thing and we should ban it, but we should be careful with it because you never know if it could be dangerous. Also, if we continue on, we may not be as aware of the things that are happening around us, you may be so distracted by a video and not realize you are in danger!

According to the graph below, it says that people are gaining a lot more access to electricity around the world, that means a lot more people have electronics, and sometimes it may not be so safe for certain people.

According to the graph below, it says that people are gaining a lot more access to electricity around the world, that means a lot more people have electronics, and sometimes it may not be so safe for certain people.

Somethings that people could do to find a safe way to use technology, is to take a break from technology once in a while. According to Polyvision in Hong Kong, if you don’t really need your laptop now, or if you really need to use it, after thirty minutes of being on electronics go outside and take a walk, looking at the natural green trees outside breathing fresh and help you adjust. To prevent from accidentally giving your information away, you shouldn’t always go to any website you see.

To know more about this matter, here are some other sources:

https://data.worldbank.org/indicator/EG.ELC.ACCS.ZS

https://ourworldindata.org/grapher/share-of-the-population-with-access-to-electricity

https://cs.stanford.edu/people/eroberts/cs181/projects/technology-dangers/issues.html

https://www.eia.gov/todayinenergy/detail.php?id=31552 

Foragers to Future

Foragers to Future Icon Poster

When I was picking out my icons, the feedback I got from someone was I should have included something about my prediction of the future, and why I thought that the icons were fit for that time. So, I found some really good icons for the future and I explained why I thought it represents that time best. The feedback I got made me learn that I should always explain my thinking or else others may not why I chose to do something.

This poster is to show my understanding of foragers, farmers, factories, and the future. I chose some icons that I thought would represent the times well and explain why I chose them.

River Field Study – Data Collection 1

Last time the equiptment didn’t work, so this time we plugged in the Optical DO Probe into Mr. Frank’s computer and it started working. We collected data from all the stations this time. I wonder what we can do to make this process faster?

Data collected.

Big Data Essay

 

Do you have any idea what happens to the data you share? How can people access your personal information? Why do they do it? The little things you never think about may be much more significant than you think they are. By sharing your data with others, whether it is online or offline, can be dangerous. How can it be risky? First, the companies can use the shared knowledge for their own good. Another reason is that, by getting only a small bit of data from you, they can collect even more data about you. Ultimately, people can use this data to track our every move. Sounds creepy, right? There are many other ways that bad things that can happen to your data, endangering your privacy.

By protecting our privacy, we can keep ourselves safe. By sharing this information with different companies, they can use the data that you share with them for other things, exposing your pictures and data to the world. According to Privacy International, many companies are trying to collect our data because, “knowledge is power, and everybody’s job becomes easier the more they know about everybody else.” They do ask permission to access your data for their own use, but it is likely that they are using it for something else (Privacy International, 2015). In addition to that, a video by Wall Street Journal says, in China by uploading something on a database, “under terms of service that basically allow tech companies to do what they want with images.” Withmore data, the algorithms will become better, and with all the CCTV cameras everywhere, “China has lots of data to feed its algorithms.” China is planning to build 450 million more surveillance cameras all around China by 2020 (WSJ, 2017). By giving your information to these companies, you could be in danger, and people you do not know can see your pictures. But by keeping your information to yourself, you can stay safe without worrying about problems with stolen data. Which means that people will do anything to get your data, because that is how they make money, by looking at your data to get inspiration for new products, the more products they have the more powerful they are. For example, in the video by the Wall Street Journal, they say that Baidu uses our photos “to build a range of products.” (WSJ, 2017). All the databases you use have at least one bit of information about you. But with just that one bit of data, they can uncover some things that you may want to keep secret.

As stated before, some people can find other information about you by just having one small piece of information, for example, having your name. In “The Power of Privacy” by The Guardian, the journalist Aleks Krotoski travels to Las Vegas to meet a professional digital detective named Max Miller. By only giving him her name, Max could find a whole stack of information, from her social media pictures to her addresses. But that was all just “scratching the surface,” says Max Miller. That only took a few hours of work. When sharing your data, you are creating your own digital footprint. “But doing it from the beginning, as you can see when you register that domain when you start creating these corporations, you’re starting that footprint. So, you need to control it from the beginning.” Then Aleks goes to Los Angeles to find Khalil Sehnaoui and Marton Bos, two hackers, finding them to hack into her computer. Khalil sends an e-mail to Aleks pretending to be her director saying there is a “good article on the front page of The Guardian,” when Aleks clicks on the link and logs into The Guardian, Khalil gets her credentials, then he can redirect her computer to a different website. Five years ago, they would do “USB based attacks where we would drop them around parking lots.” By plugging one into your computer, they can take over the person’s entire computer, including recording the sounds that are nearby and taking photos from their camera. “If it’s too good to be true, either in an email format or something you found on the ground or somebody sent you, it probably is.” Says Marton (The Guardian, 2016). One example of a big hack was in 2017, Equifax was hacked, about 143 million people’s information was lost, your identity could have been stolen (James Norrie, 2017). People have been hacking into companies’ data and stealing them for a very long time, and they could have developed new ways to hack into people computers. There are still some errors in these algorithms, so we cannot always rely on these companies to protect our data, we could get into big danger.

On account of giving away your data, not only these things can put us in danger. Alas, people could people could be using surveillance cameras to track where we move, what we do, and who we are with. Therefore, if this data falls into the wrong hands, according to Privacy International, people all over can track us, “letting powerful institutions learn things about us, and wider groups make decisions about us in secret.” (Privacy International, 2015). Hence, if you are against the government, they can track you down, find you, and there is a possibility of imprisoning you. Wall Street Journal says that surveillance cameras in China can scan through big crowds for “persons of interest.” The authorities and some companies can almost identify anyone by just seeing their face using surveillance cameras. Baidu Scientist Lin Yuanqing says, “Basically that means almost everyone who has an ID, for everyone over 18 years old, the government will have your face in the database.” (WSJ, 2017) Consequently, if the government has your name, using that, they can find out more about who you are. But do you know what they are using this information for? It could be used for good or bad, it depends.

Still, people may think that there are machines that can prevent our data from being hacked. As said on Phys. Org, you can protect your iPhone by having a lock on it so that it is not so easy for the government or other people to get into your phone (Bree Fowler, 2016). But on the other hand, people can still figure out your password by hacking into your other devices to find the password. The machines that protect big companies’ data storage are not perfect either, as they can be tricked. According to Privacy International, errors do occur, and ordinary people have been wrongly accused of being terrorists (Privacy International, 2015). My grandma has experienced having someone trick her for money in Hong Kong. Someone called her to say that her son, my dad, was kidnapped and she had to give them money to set him free. Fortunately, she called my aunt and asked her if my dad was kidnapped, and turns it was all a hoax. That person must have gotten her phone number from someone else, and this means we cannot always rely on these machines to store our data.

In conclusion, protecting your privacy is significant, because you can prevent having your private information being stolen by companies. With your information lost on the internet, it can reach people that may harm you. Furthermore, there is a chance of having your privacy “getting hacked”. These things can happen either by accident or on purpose. Lastly, by sharing your information, people that have your data can do some simple things to see your every move.  But in the end, it is still your choice to choose whether you want to keep your data to yourself. Even if you choose to share your data, you can just do a few simple things to protect it. By downloading Disconnect, you can see who is trying to track you and even have them blocked. Properly protecting your data can help you realize the benefits of both sides. The next step is your choice.

 

Works Cited

Disconnect. “Take Back Your Privacy.” Disconnect, disconnect.me/.

WSJDigitalNetwork. “Next-Level Surveillance: China Embraces Facial Recognition.” YouTube, YouTube, 27 June 2017, www.youtube.com/watch?v=Fq1SEqNT-7c.

Privacy International. “Big Data | Privacy International.” YouTube, YouTube, 12 May 2015, www.youtube.com/watch?v=HOoKhnvoYkU&t=2s.

TheGuardian. “The Power of Privacy – Documentary Film.” YouTube, YouTube, 28 Jan. 2016, www.youtube.com/watch?v=KGX-c5BJNFk.

Fowler, Bree. “How to Protect Your Data and Avoid Being Hacked.” Phys.org – News and Articles on Science and Technology, Phys.org, 5 Apr. 2016, phys.org/news/2016-04-hacked.html.

Norrie, James. “Big Data Needs Bigger Security.” U.S. News & World Report, U.S. News & World Report, 11 Sept. 2017, 3:55, www.usnews.com/opinion/economic-intelligence/articles/2017-09-11/equifax-hack-shows-why-big-data-needs-bigger-security.

Stories of the Future: Day Zero

I think the three most important problems that need to be solved by 2050:

Global warming

Waste, for example the wasted food, plastic, paper etc.

The extinction of animals.

Two wonders I have about the future:

Will ever find another planet we can live on?

Will be able to create technology that may be dangerous for us (technology that has a mind of its own)?

Optimist or Pestimist?

I am a pestimist.

Looking back at today, I think the topics water, food, and communities connect because those are our basic needs. We need water because we need to stay hydrated, we need food because nutrients, and we need shelter from dangerous things. We run out of these things we could die really easily.

I used to be  a pestimist, and I still am, because I thought about how slow we have progressed, and that it takes a really long time to find a solution to a huge problem. So, I don’t think that it would be really likely that our world would change that much.

Headline:

I think that today was a really good experience for me, because I could experience the things that people used to do or are still doing, that helped me learn a lot.

 

Music Composition

Music Composition Statement

In the beginning when I first started, I was walking throughout the school finding different sounds to record. Then, when I got all of my recordings, I had to change the recordings in Audacity. I found it hard to compose a piece of music all by myself, but once I got started, I found out how to do it. I then combined the recordings I thought were fit for the style of music I wanted, and put them together on Garageband. Finally, I added some loops to complete the composition.

 

« Older posts

© 2018 Samantha's Blog

Theme by Anders NorenUp ↑