How Secure are our Devices?

How Secure are our Devices?

The CIA’s exploitation of vulnerabilities in Android phone use surfaced a few weeks ago via the collaborative site WikiLeaks, an online platform used to release highly confidential or censored information to the public. WikiLeaks claimed the CIA and other agencies have developed and qualified the capacity to bypass encryption and other security methods in popular messaging apps. In counter, Google has released a series of updates to its Android smartphone software to diminish the capacity of the government to obtain…

Read More Read More

Oh, Snap!

Oh, Snap!

What’s the value of an app with content that disappears? The initial estimated $25 billion of Snap, Inc. has some Wall Street investors saying “no way” to the initial pitch for the public offering of the app. While scrutiny of tech-related deals is not abnormal, this projected valuation places it above both Twitter and Facebook, who are competitors in the market of social media. After re-evaluation, the new projected places shares between $14 and $16, which values the company between…

Read More Read More

An Attack in the Dark Web

An Attack in the Dark Web

In a web of information known as the Internet, diverse content is accessible to large populations of people through web servers. On February 3, a network of websites identified as the Dark Web on a hosting provider named Freedom Hosting II was hit by a cyberattack that left a large part of the network offline. The Dark Web is commonly used by black hat hackers and those who choose to keep their identity anonymous to distribute illegal and illegally obtained…

Read More Read More

ASEAN Growth and Security

ASEAN Growth and Security

Representatives from the Association of Southeastern Asian Nations (ASEAN) discussed security and community frameworks for the regional organization consisting of ten countries at the Global Economic Forum, which took place January 17-20, 2017 in Davos-Klosters, Switzerland. Agreement among officials stated that free trade and commitment to domestic and international stability is an important aspect of maintaining security, and that economics are key to the vision of security in ASEAN. Pillars of ASEAN involve aspects of politics, culture and economics. While…

Read More Read More

Revival of the Fittest: The Impact of ICT

Revival of the Fittest: The Impact of ICT

I closed my eyes and sat back in my chair, pondering the places where I would compete and the places I would easily excel. I did not know for sure, but this I did know: I would have to walk forward in it. Times like these are easily deemed “survival of the fittest.” But in renaissance times, the times echo: “revival of the fittest.” The concept of the Information Renaissance, as proposed by Dr. Jay E. Gillette in his essay, Leadership…

Read More Read More

The Darkness of Night: A Look at the European Renaissance

The Darkness of Night: A Look at the European Renaissance

A quote I’ve loved much, cited to Thomas Fuller, reads “the darkest hour is just before the dawn.” Growing up in the fields of Iowa, the early morning drives with my dad to work on Saturdays, when the office was closed, were always something my brother and I looked forward to. The office was a place for play; full of mazes of rooms, Twizzlers on the desk, and a pendulum that traced an image in the sand below. It would…

Read More Read More

Mesmerized by Monotony

Mesmerized by Monotony

In a world driven by pattern and formation, we often misuse the concept of consistency. While consistency is good and creates predictability, humans miss the importance of transitioning between order and adventure. On December 2, CICS students participated in the “Accenture Challenge,” an all-night project dealing with an RFP that produces a ten-page group paper and presentation by 8am the following morning. The challenge is hosted by Accenture. I, along with my classmates, had the opportunity to participate. My team’s…

Read More Read More

Hooked: The Impact of the Underwater Drone

Hooked: The Impact of the Underwater Drone

“I’ve spent time in streams and lakes; I’ve stepped on enough hooks and felt enough fish against my leg to know there’s more underwater than meets the eye. Now, I’m determined to find it.” Danny Vessels and two other Hope College alumni have banded together to develop one of the first underwater drones for personal use. The Fathom One drone, available for purchase at $499 following a Kickstarter campaign launched over the summer. My personal communication with them over the…

Read More Read More

Finders, Keepers: Plagiarism in the Work of a Scientist

Finders, Keepers: Plagiarism in the Work of a Scientist

That’s when the door slams shut, the blindfold is tied… and the capture is complete. In an criminal context, this is a kidnapping. In science and academics, it’s plagiarism. The root word of plagiarism is the Greek word, “plagium.” Definition: “The capturing of a man.”   Plagiarism is the use of another individual’s information and claiming it as one’s own, which affects the credibility of the information involved in the essay or published work. In the work of a scientist,…

Read More Read More

Everything is Better in 2.0

Everything is Better in 2.0

The newest, the latest, the ever-growing… and the best part? It’s all about YOU. Web 2.0, launched originally in the early 2000’s and now, still in a period of growth over ten years later. We know it best in the social media sites we use, such as Twitter, Facebook, Instagram, and LinkedIn, where user-generated content reigns. We’re also watching it enter the education sector for students to increase their academic understanding in cohesion with Web 2.0, with thanks to the…

Read More Read More

Skip to toolbar