Monthly Archives: February 2013

HW4

Exercise 1

Domain Name: BESTHISTORYSITES.NET
Registrar: FASTDOMAIN, INC.
Whois Server: whois.fastdomain.com
Referral URL: http://www.fastdomain.com
Name Server: NS1.RHOSTBH.COM
Name Server: NS2.RHOSTBH.COM
Status: clientTransferProhibited
Updated Date: 11-dec-2012
Creation Date: 31-jan-2002
Expiration Date: 31-jan-2014

The data in the BlueHost.Com WHOIS database is provided
to you by BlueHost.Com for information purposes only,
that is, to assist you in obtaining information about or related to
a domain name registration record. BlueHost.Com makes
this information available “as is,” and does not guarantee its
accuracy.  By submitting a WHOIS query, you  agree that you will use
this data only for lawful purposes and that, under no circumstances
will you use this data to: (1) allow, enable, or otherwise support
the transmission of mass unsolicited, commercial advertising or
solicitations via direct mail, electronic mail, or by telephone; or
(2) enable high volume, automated, electronic processes that apply
to BlueHost.Com (or its systems). The compilation,
repackaging, dissemination or other use of this data is expressly
prohibited without the prior written consent of
BlueHost.Com. BlueHost.Com reserves the
right to modify these terms at any time.  By submitting this query,
you agree to abide by these terms.

=-=-=-=

Registrar: FastDomain Inc.
Provider Name….: BlueHost.Com
Provider Whois…: whois.bluehost.com
Provider Homepage: http://www.bluehost.com/

Domain Name: BESTHISTORYSITES.NET

Created on…………..: 2002-01-31 14:27:32 GMT
Expires on…………..: 2014-01-31 14:27:32 GMT
Last modified on……..: 2012-12-11 23:56:09 GMT

Registrant Info: (FAST-16908473)
EdTechTeacher
Beth Holland
806 West Roxbury Parkway
Chestnut Hill, Massachusetts 02467
United States
Phone: +1.6174558716
Fax..:
Email: @edtechteacher.org
Last modified: 2012-01-02 23:06:39 GMT

Administrative Info: (FAST-16908473)
EdTechTeacher
Beth Holland
806 West Roxbury Parkway
Chestnut Hill, Massachusetts 02467
United States
Phone: +1.6174558716
Fax..:
Email: @edtechteacher.org
Last modified: 2012-01-02 23:06:39 GMT

Technical Info: (FAST-12785241)
Bluehost.com
Bluehost Inc
1958 South 950 East
Provo, Utah 84606
United States
Phone: +1.8017659400
Fax..: +1.8017651992
Email: @bluehost.com
Last modified: 2012-06-11 18:53:21 GMT

Status: Locked

Domain servers in listed order:

NS1.RHOSTBH.COM
NS2.RHOSTBH.COM

Exercise 2

I searched the Battle of Adwa in Wikipedia and found quiet a lot of information that I thought was really interesting. The Battle of Adwa was between Ethiopia and Italy in 1896 that determined the faith of Ethiopia. The battle began when Italy was on a campaign to conquer Ethiopia, but was met with a heavy resistance by the Ethiopians. The emperor of Ethiopia, Menelik, was credited for his strategic military planning that was essential for the battle. Menelik needed allies, so sent his people to Russia for weapons, which they were welcomed in high regards. Ethiopia had a large human resource that put Italy at a disadvantage. Contrary to conventional wisdom that Ethiopia just fought with spears and swords, Ethiopia had a significant amount of firearms and cannons at its disposal to match Italy’s weapon stock. After 5000 deaths of the Ethiopian soldiers and 7000 of Italy’s soldiers, the war was concluded with Italy retreating. Ethiopia remained one of the two nations in Africa to have never been colonized, along with Liberia. Battle of Adwa was a significant event in Ethiopia’s history that is still in the hearts of many Ethiopians today.

The Wikipedia post had many sources and references to back the many claims and statements. Majority of the sources and references seem to come from published books spanning from the early 1900 to early 2000. I checked out few of the authors and they were mainly professors in the US and Ethiopia. Considering the extensive list of sources/references and the author’s credibility the Wikipedia post on this topic seems to be fairly accurate on the subject matter. The post had a grasp of the many events in the battle in detail.

Exercise 3 

Jane Browning conducted an extensive amount of research for her senior projects. From her blog posts she had a lot of credible sources that she can confidently utilize for her project. She took the time and effort to gain a lot of information about the last american pirate in the Chesapeake, Edward Owens. She had gone to the Library of Congress and the National Archives to obtain information about the Cutter Service and also found old maps of the area that was useful first hand sources that were credible for her research. She also found the will letters written by Edward Owens to his family members that were testaments to his old life as a pirate, which is a great source that she can really rely on. The interview with George was also a good source, as he is related to Edward Owens even though he is a far decedent of the pirate, because he provided documents that pertained to Jane’s research. So overall, she had credible and reliable sources that she can utilize towards her senior project.

Digitization, Searching, and Finding – HW3

Research question: As we dive into the 21st century are we moving away from conventional warfare such as guns, and stepping into a new form of cyber warfare?

I found a great article through ProQuest that relates to my research question. The article is from March 9, 1998 and it discusses the dangers that face the United States regarding cyber attacks. It goes into an interesting story about a high school student from Cloverdale, California that attempted to hack into the Department of Defense. The DoD said they have never seen “organized and systematic attack” before. Asked why the student attempted to attack the Pentagon, he said “It’s power, dude, you know, power.” This article shares a glimpse of what is coming to many parts of this country and to the world, in regards to cyber attacks/warfare.

Lately, there have been an outburst of news from many media outlets conveying a message that there are many cyber attacks targeting government agencies, companies, and individuals. It seems like a frequent event these days and it looks as if it’s all new, but it’s far from that. Cyber attacks have been around for well over a decade now and have been gaining steam, in terms of sophistication and frequency. There are different types of cyber attacks, spanning from the typical individual that is attempting to score few dollars, to state sponsored organizations intent to gain secret information from other governments. We have truly stepped into an era that makes anyone with a computer a vulnerable target for an attack. A cyber attack/warfare has the ability to cause great amount of damage to our financial sectors, power grids, communications, weapons and much more that threatens our national security. We are at the tipping point where governments and individuals will use the cyber world to conduct warfare. Conventional warfare with guns and bullets are costly, in terms of actual lives and money. To some extent, they also clearly reveal the identity of the parties involved, but with cyber warfare it makes it difficult to identify the parties involved, as they could be thousands of miles away with a computer. Government will be inclined to way their options when it comes to declaring the old conventional form of warfare or the new form of warfare.

I will be utilizing many articles that are available online to do an in-depth research on cyber warfare. I will go into many examples that showcase the defensive and offensive measures our government and other organizations have taken when it comes to this topic. I truly believe this topic that I raise will, in some way, touch all of us in our lifetime and is a serious issue that will need a great amount of discussion at the national and world stage.

 

Link:  http://search.proquest.com/docview/897676018/13C4474290C6F787F97/3?accountid=14541

 

Image:    

HTML HW2

List of tablets considering to buy soon:

1. iPad

2. Surface Pro

3. Asus Transformer Pad Infinity 

4. Samsung Galaxy Tab 10.1

List of tablets not considering to buy:

  • Kindle Fire HD
  • Nook HD

 

Link: http://www.pcmag.com/article2/0,2817,2413145,00.asp

 

Image: