<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7828540870117009160</atom:id><lastBuildDate>Sun, 08 Sep 2024 00:36:37 +0000</lastBuildDate><category>technology</category><category>religious</category><title>Musings of One of the Many</title><description></description><link>http://musingsofoneofthemany.blogspot.com/</link><managingEditor>noreply@blogger.com (StephenK)</managingEditor><generator>Blogger</generator><openSearch:totalResults>23</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-6497026830098908795</guid><pubDate>Fri, 18 Aug 2023 00:26:00 +0000</pubDate><atom:updated>2023-09-04T15:00:11.860-05:00</atom:updated><title>Orem City Candidates</title><description>&lt;p&gt;Crystal Muhlestein&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;All for shared values, families, neighborhoods, and community.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Lower fees and fiscal responsibility.&lt;/li&gt;&lt;li&gt;Supports family housing - position on high density housing is unclear, might be opposed due to emphasis on family housing.&lt;/li&gt;&lt;li&gt;Bachelor&#39;s degree from BYU.&lt;/li&gt;&lt;li&gt;Works in health care, and substitute teacher at elementary school.&lt;/li&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Not responding to Facebook posts or email.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Matt McKell&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;CPA and tennis coach.&lt;/li&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Fiscal responsibility.&lt;/li&gt;&lt;li&gt;Supports family housing, protecting neighborhoods.&lt;/li&gt;&lt;li&gt;Not responding to email.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Greg Duerden&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Veteran.&lt;/li&gt;&lt;li&gt;Married with kids, grand kids, and great grandkids.&lt;/li&gt;&lt;li&gt;Supported separation of Orem schools from Alpine.&lt;/li&gt;&lt;li&gt;Supports transition to Constitutional Charter City.&lt;/li&gt;&lt;li&gt;Was against Woodbury apartment development Promenade near UVU and Lakeridge Jr. High.&lt;/li&gt;&lt;li&gt;Strongly opposed to high density housing.&lt;/li&gt;&lt;li&gt;Responds to email. I agree with his response to my inquiry.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Chris Killpack&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Served mission with the Church of Jesus Christ of Latter-day Saints. Also served as mission president of the Utah Orem mission.&lt;/li&gt;&lt;li&gt;Stronger Orem endorses Chris.&lt;/li&gt;&lt;li&gt;Manages a business on State Street.&lt;/li&gt;&lt;li&gt;Responds to email.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Jeffrey Lambson&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Opposed splitting Orem from Alpine school district.&lt;/li&gt;&lt;li&gt;Supported pause of high density housing construction.&lt;/li&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Coach of various sports.&lt;/li&gt;&lt;li&gt;Supports smart, reasonable development where it makes sense and keeping it away from areas where it doesn&#39;t make sense. Sounds like he supports high density housing if it&#39;s in the right location.&lt;/li&gt;&lt;li&gt;Stronger Orem endorses Jeff.&lt;/li&gt;&lt;li&gt;Responds to email.&lt;/li&gt;&lt;li&gt;I agree with his response to my email.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Archie Williams III&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;No profile on state website.&lt;/li&gt;&lt;li&gt;Facebook page notes that he&#39;s a commander at National Royal Rangers Ministry, heavy equipment operator at Geneva Rock Products, and a few other miscellaneous jobs.&lt;/li&gt;&lt;li&gt;Single with kids.&lt;/li&gt;&lt;li&gt;College includes Salt Lake Baptist College and Orange Coast College.&lt;/li&gt;&lt;li&gt;Pro-life, anti-marijuana, anti-illegal drugs, against gay marriage.&lt;/li&gt;&lt;li&gt;Supports unions.&lt;/li&gt;&lt;li&gt;Supports raising the minimum wage.&lt;/li&gt;&lt;li&gt;Didn&#39;t post a profile on the state voting website nor a video interview.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Spencer Rands&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Opposes high density housing that are poorly planned. Supports responsible growth and development.&lt;/li&gt;&lt;li&gt;Supports ample funding of public safety departments.&lt;/li&gt;&lt;li&gt;Doesn&#39;t respond to email.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Heather Fry&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Supports Family City USA.&lt;/li&gt;&lt;li&gt;Seems like she&#39;s against high density housing.&lt;/li&gt;&lt;li&gt;Responds to email, although her response to my email was severely lacking.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Jenn Gale&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Swim coach at Orem High.&lt;/li&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;Studying public administration at BYU.&lt;/li&gt;&lt;li&gt;Supported upgraded Orem rec center and library hall.&lt;/li&gt;&lt;li&gt;Stronger Orem endorses Jenn.&lt;/li&gt;&lt;li&gt;Believes Orem residents should be inclusive and compassionate toward all people.&lt;/li&gt;&lt;li&gt;Responds to email.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;David Garber&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Wants to abolish zoning, licenses, and regulation. Supports privatizing city-run businesses.&lt;/li&gt;&lt;li&gt;Married.&lt;/li&gt;&lt;li&gt;Member of and served a couple of missions for the Church of Jesus Christ of Latter-day Saints.&lt;/li&gt;&lt;li&gt;Responds to email.&lt;/li&gt;&lt;li&gt;I approve of his response to my inquiry.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Mike Carpenter&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Married with kids.&lt;/li&gt;&lt;li&gt;&quot;appropriately manage the remaining growth and potential redevelopment within the city while maintaining the characteristics that have made this such a desirable place to live&quot;&lt;/li&gt;&lt;li&gt;Responds to email.&lt;/li&gt;&lt;li&gt;I agree with his response to my email.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Wade Sewell&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;BYU alumni.&lt;/li&gt;&lt;li&gt;Wants an apparently vastly more limited government.&lt;/li&gt;&lt;li&gt;Not happy about city&#39;s response to people that are late on their utility bills.&lt;/li&gt;&lt;li&gt;Doesn&#39;t respond to email.&lt;/li&gt;&lt;li&gt;Didn&#39;t submit a video to Orem city as a candidate.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://musingsofoneofthemany.blogspot.com/2023/08/orem-city-candidates-crystal-muhlestein.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-5706034954832526437</guid><pubDate>Sat, 17 Jul 2010 12:31:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.753-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Programmatic Encryption in Java</title><description>I&#39;m working on a program in my spare time that requires, among other things, storing a user&#39;s password. To avoid storing the password in plain text, I dug around the internet and cobbled together code that will encrypt and decrypt the password. Here&#39;s the code:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;import javax.crypto.Cipher;&lt;br /&gt;import javax.crypto.SecretKeyFactory;&lt;br /&gt;import javax.crypto.spec.PBEKeySpec;&lt;br /&gt;import javax.crypto.spec.PBEParameterSpec;&lt;br /&gt;&lt;br /&gt;private static final char[] password = new char[] {/*array of any number of&lt;br /&gt;   random characters*/};&lt;br /&gt;private static final byte[] salt = new byte[] {/*array of 8 random bytes*/};&lt;br /&gt;private static final String ENCRYPTION_ALGORITHM = &quot;PBEWithMD5AndDES&quot;;&lt;br /&gt;private static final PBEKeySpec key = new PBEKeySpec(password, salt, /*random &lt;br /&gt;   number, doesn&#39;t really matter what the number is*/);&lt;br /&gt;&lt;br /&gt;private String decrypt(String value) {&lt;br /&gt; return crypto(value, Cipher.DECRYPT_MODE);&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;private String encrypt(String value) {&lt;br /&gt; return crypto(value, Cipher.ENCRYPT_MODE);&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;private String crypto(String value, int mode) {&lt;br /&gt; String result = &quot;ERROR&quot;;&lt;br /&gt; try {&lt;br /&gt;  Cipher cipher = Cipher.getInstance(ENCRYPTION_ALGORITHM);&lt;br /&gt;  cipher.init(mode, SecretKeyFactory.getInstance(&lt;br /&gt;    ENCRYPTION_ALGORITHM).generateSecret(key),&lt;br /&gt;    new PBEParameterSpec(key.getSalt(), &lt;br /&gt;key.getIterationCount()));&lt;br /&gt;  result = new String(cipher.doFinal(value.getBytes()));&lt;br /&gt; } catch (Exception e) {&lt;br /&gt;  log.info(&quot;cryption failed: &quot; + e.getMessage());&lt;br /&gt;  e.printStackTrace();&lt;br /&gt; }&lt;br /&gt; return result;&lt;br /&gt;}&lt;br /&gt; &lt;br /&gt;&lt;/pre&gt;</description><link>http://musingsofoneofthemany.blogspot.com/2010/07/programmatic-encryption-in-java.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-2422868168763004532</guid><pubDate>Mon, 16 Nov 2009 15:36:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.754-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>RESTful Web Services using Eclipse and Jersey</title><description>Axis2 wraps everything in XML, and some people prefer Eclipse over Netbeans, but developing a RESTful web services project in Eclipse without Axis is possible even though it is not straight forward. Here are instructions to create a RESTful web services project in Eclipse without Axis:&lt;br /&gt;&lt;br /&gt;Setup&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Download Eclipse IDE for Java EE Developers (as opposed to Java Developers) from &lt;a href=&quot;http://www.eclipse.org/downloads/&quot;&gt;http://www.eclipse.org/downloads/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download Glassfish from &lt;a href=&quot;https://glassfish.dev.java.net/downloads/v2.1-b60e.html&quot;&gt;https://glassfish.dev.java.net/downloads/v2.1-b60e.html&lt;/a&gt; and follow the instructions on the web page.&lt;/li&gt;&lt;li&gt;Download Jersey 1.1 from &lt;a href=&quot;https://jersey.dev.java.net/servlets/ProjectDocumentList&quot;&gt;https://jersey.dev.java.net/servlets/ProjectDocumentList&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Install the Firefox &quot;Poster&quot; add-on&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;Create the RESTful web service project&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Create a new Dynamic Web Project that uses GlassFish v2.x for the Target Runtime&lt;/li&gt;&lt;li&gt;Right-click in the Servers view and create a new GlassFish v2.x server&lt;/li&gt;&lt;li&gt;Create a new package in the Java Resources folder&lt;/li&gt;&lt;li&gt;Create a new Java class in the new package in the Java Resources folder (hereafter referred to as class A)&lt;/li&gt;&lt;li&gt;In the Properties for the project, on the Java Build Path page, in the Libraries tab, click on &quot;Add External JARs&quot;&lt;/li&gt;&lt;li&gt;Find the jsr311-api*.jar in the folder you installed Jersey to, and add it as an external JAR&lt;/li&gt;&lt;li&gt;Add the @Path(&quot;insert_a_path_here&quot;) annotation right before the declaration of class A&lt;/li&gt;&lt;li&gt;Add a method to class A that has the @GET annotation and the @Produces(&quot;application/xml&quot;) annotation right before the method declaration&lt;/li&gt;&lt;li&gt;Create another class in the same package as class A (hereafter referred to as class B)&lt;/li&gt;&lt;li&gt;Add the @XmlRootElement(name=&quot;insert_a_name_here&quot;) right before the declaration of class B&lt;/li&gt;&lt;li&gt;Add some random fields to class B and generate getters and setters for them&lt;/li&gt;&lt;li&gt;Add the @XmlElement annotation from the javax.xml.bind.annotation package right before the getters&lt;/li&gt;&lt;li&gt;Modify class A to return a new instance of class B&lt;/li&gt;&lt;li&gt;Replace the contents of the web.xml file in the WebContent/WEB-INF directory with &lt;br /&gt;&lt;/li&gt;&amp;lt;web-app version=&quot;2.5&quot; xmlns=&quot;http://java.sun.com/xml/ns/javaee&quot; xsi=&quot;http://www.w3.org/2001/XMLSchema-instance&quot; schemalocation=&quot;http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd&quot;&amp;gt;&lt;br /&gt;  &amp;lt;servlet&amp;gt;&lt;br /&gt;      &amp;lt;servlet-name&amp;gt;ServletAdaptor&amp;lt;/servlet-name&amp;gt;&lt;br /&gt;      &amp;lt;servlet-class&amp;gt;com.sun.jersey.spi.container.servlet.ServletContainer&amp;lt;/servlet-class&amp;gt;&lt;br /&gt;      &amp;lt;load-on-startup&amp;gt;1&amp;lt;/load-on-startup&amp;gt;&lt;br /&gt;  &amp;lt;/servlet&amp;gt;&lt;br /&gt;  &amp;lt;servlet-mapping&amp;gt;&lt;br /&gt;      &amp;lt;servlet-name&amp;gt;ServletAdaptor&amp;lt;/servlet-name&amp;gt;&lt;br /&gt;      &amp;lt;url-pattern&amp;gt;/resources/*&amp;lt;/url-pattern&amp;gt;&lt;br /&gt;  &amp;lt;/servlet-mapping&amp;gt;&lt;br /&gt;  &amp;lt;session-config&amp;gt;&lt;br /&gt;      &amp;lt;session-timeout&amp;gt;&lt;br /&gt;          30&lt;br /&gt;      &amp;lt;/session-timeout&amp;gt;&lt;br /&gt;  &amp;lt;/session-config&amp;gt;&lt;br /&gt;  &amp;lt;welcome-file-list&amp;gt;&lt;br /&gt;      &amp;lt;welcome-file&amp;gt;index.jsp&amp;lt;/welcome-file&amp;gt;&lt;br /&gt;      &amp;lt;/welcome-file-list&amp;gt;&lt;br /&gt;  &amp;lt;/web-app&amp;gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Right-click on the project and choose Run As-&amp;gt;Run on server.&lt;/li&gt;&lt;li&gt;Open the Poster plug-in in Firefox and run a GET request on http://localhost:8080/insert_name_of_dynamic_web_project_here/resources/insert_the_path_specified_in_the_annotation_for_class_A_here (modify port numbers as necessary depending on output of GlassFish application deployment in the &quot;Console&quot; tab)&lt;/li&gt;&lt;li&gt;You should get a XML response with the data from class B&lt;/li&gt;&lt;li&gt;El fin!&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;br /&gt;Note: if you want to return a list of objects, use the following annotations before the getter that returns the list:&lt;br /&gt;&lt;br /&gt; @XmlElementWrapper&lt;br /&gt; @XmlElements({@XmlElement(name=&quot;element_name&quot;)})&lt;br /&gt;&lt;br /&gt;where element_name is &quot;suggestion&quot; in the example XML below:&lt;br /&gt;&lt;br /&gt;&amp;lt;suggestions&amp;gt;&lt;br /&gt; &amp;lt;suggestion&amp;gt;a suggestion&amp;lt;/suggestion&amp;gt;&lt;br /&gt; &amp;lt;suggestion&amp;gt;another suggestion&amp;lt;/suggestion&amp;gt;&lt;br /&gt;&amp;lt;/suggestions&amp;gt;&lt;br /&gt;&lt;br /&gt;Also note that the web.xml and sun-web.xml contain the two parts of the URL before the part specified by the @Path annotation.</description><link>http://musingsofoneofthemany.blogspot.com/2009/11/restful-web-services-using-eclipse-and.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-7137760093766486063</guid><pubDate>Fri, 23 Oct 2009 04:49:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.754-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Scalable Online Discussions</title><description>Large discussions such as the debate over national health care in the United States could be aided if people could discuss issues with each other more effectively. Generally, the pros and cons are not all gathered together into one central location - news outlets and blogs post their opinions on options they believe are best, and some even discuss both sides of the issue, but both have difficulty doing a complete treatment of the discussion. Invariably, points are left out either through ignorance or bias. But if a central discussion page were to be created that would allow all people to publish the points in the debate as they see fit, if the points were consolidated to eliminate duplication, if points were ranked by importance, and if methods were made available to allow people to collaborate about conflicts regarding the combination of points and their relative importance, the discussion could be rationally made and more people could be educated and convinced as to the rightness of the right side of the discussion.&lt;br /&gt;&lt;br /&gt;Discussions of all kinds could take place, from the best way to fix local community problems to choosing the appropriate response to actions by multinational companies and states. Some problems need to be resolved, such as preventing a few people from stifling the opinions of others by removing points simply because they have a majority of users of the site, and to provide proper communication methods to allow people to quickly and effectively discuss resolutions to conflicts. Perhaps the site hosting the discussion pages could provide voice communication so that people can talk to each other. Methods would be put in place so that groups can choose a moderator that would take charge of giving people the floor, and methods to replace moderators with a vote in case the moderator is stifling the opinions of the opposing side of the discussion and to take the floor away from someone that is either intentionally not contributing to the discussion or is attempting to filibuster and the moderator is not already taking the floor away from said person. Such a communication system would also have to support perhaps millions of listeners and participants. The system could also allow the division into groups so that more people can voice their opinions rather than having to wait in a line of 10,000 people.</description><link>http://musingsofoneofthemany.blogspot.com/2009/10/scalable-online-discussions.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-5839166996965076206</guid><pubDate>Sun, 18 Jan 2009 21:54:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.754-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Why I Have Not Bought an iPhone</title><description>I haven&#39;t posted in a while, so here&#39;s a post.&lt;br /&gt;&lt;br /&gt;I haven&#39;t been keeping up with technology recently. Although I wrote some posts about the &quot;fighting&quot; between the hackers and Apple, I have no intention of owning an iPhone. Despite the dramatic price reduction of the 3G over the original, the cost is still to high for me to get one, and the benefit is low.&lt;br /&gt;&lt;br /&gt;At the moment, I have a cell phone that cost about $100 that I bought specifically for its camera. With a convenient camera that is small and I should always have with me, if I&#39;m ever in a minor accident, I can just swap information with the other driver, take some pictures proving it was not my fault, then move on. The cops don&#39;t seem to care about minor accidents, or at least the minor accident I was in a couple of years ago in a private parking lot that resulted in a dent in the van I was driving. They told me that all they could do is say that the other driver and I were present.&lt;br /&gt;&lt;br /&gt;The phone I bought also has some nice features like a calendar, but I still use my paper planner for organizing my time and keeping track of that which I need to do. I find writing in a paper planner to be more convenient than trying to type on a tiny keyboard that is not sufficiently large to allow me to assume the hand positions necessary to type quickly.&lt;br /&gt;&lt;br /&gt;As for being able to browse the internet, I have not suffered from not being able to check my email during the times that I am away from a computer. I figure that if someone urgently needs to contact me, they can call me. If they need to contact me, but it does not matter how soon I respond, they can send an email. I try to make sure that I check my email at least once a day (which is easy given my need to use a computer for work and school) which is a sufficient response time for most email communication.&lt;br /&gt;&lt;br /&gt;Although the internet can help if I become lost between destinations, or if I want to find a store nearby my current location for something I need, another device does a better job in both cases: a GPS navigation system. A GPS system knows exactly where I am and what I need to do to get there. The GPS system my wife gave me for Christmas can also find places of interest near my current location, wherever that may be, in those rare circumstances that I need to find a store I was not planning on finding before I left a location with a computer.&lt;br /&gt;&lt;br /&gt;All in all, I do not see a benefit of owning an iPhone that makes it worth the additional cost over my current cell phone ($100 to buy a phone with a decent camera, $0.18/minute which averages to about $20/month for me since I hardly use phones).&lt;br /&gt;&lt;br /&gt;As a side note, I was thinking today how nice it would be if there was a service somewhere in the world that provided free encrypted file storage. To make the system feasible, each client would have to have special software that handled the encryption and decryption of the file system, including managing the keys, so that the user does not have to deal with them. To the user, it would be as if they were using a network file server. To the company running the servers, they would be seeing a bunch of encrypted data passing back and forth between its servers and its clients. The client software would handle the keys and not share them with the servers so that no one that has access to the servers can view the data the clients store there except the clients that own the data. The software used by the clients would have to be open source so that people could be confident that the company hosting the servers has not programmed the clients to send the keys to the company so they can view the data.&lt;br /&gt;&lt;br /&gt;As for which encryption would be best, I&#39;m not sure. RSA would do the job, but it isn&#39;t necessary since the same person that encrypts the data will decrypt the data. The person would have to be able to copy down the encryption key so that if the client&#39;s computer dies, they can still get setup on another computer and access their data. The benefit of such a service lies in the backing up of the data on the remote servers. People would not have to backup their data on their own, and they would have the added benefit of being able to access all of their data from any location that has access to the internet without the problems of USB drives (the limited number of writes before they die, viruses, compatability).</description><link>http://musingsofoneofthemany.blogspot.com/2009/01/why-i-have-not-bought-iphone.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3087064012295180098</guid><pubDate>Sun, 28 Sep 2008 21:13:00 +0000</pubDate><atom:updated>2011-02-11T16:50:48.362-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">religious</category><title>Patience</title><description>&lt;div&gt;Before I begin talking about patience, I would like to reassure you all that my blog is not turning into a religious pulpit. I will occasionally blog about technology and any other topic that suits my fancy. I include posts that consider religious topics because the doctrines of Christ will lead us to live better lives and improve our productivity at our jobs and in anything else we do.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Patience can be misapplied. The case of Eli (1 Samuel 2) could be interpreted in a few different ways. One interpretation of why he didn&#39;t restrain his sons is that he was trying to be patient with them. Perhaps he was trying to prevent hurting their feelings or making them look bad by removing them from their office. Perhaps he thought they would repent and do better so he left them in the office so he wouldn&#39;t have to remove them and then put them back in soon. Or maybe he was trying to preserve his own reputation: what would people think if he removed his own sons from their office? Would they think that he wasn&#39;t a good father and therefore unfit to be the high priest? We can be sure that Eli should have honored God more than his sons, for that was God&#39;s accusation (1 Samuel 2:29).&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We should be patient in some, if not all, cases. How do we know when to be patient and when not to be patient? Should we always be patient with those that afflict us that are not within our responsibility, and determine on a case-by-case basis for those that are under our responsibility? The Lord suffered all manner of false accusations and physical harm, and he was patient in all His suffering. Whatever we come up with, we can be sure of one thing: we must honor God above all else in our actions and thoughts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://musingsofoneofthemany.blogspot.com/2008/09/patience.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-4137648295553382485</guid><pubDate>Fri, 14 Mar 2008 16:13:00 +0000</pubDate><atom:updated>2008-03-14T11:31:53.062-05:00</atom:updated><title>Immigration and the United States</title><description>The reasons that immigration shouldn&#39;t be opened to anyone that wishes to come include: the need to filter out terrorists, the possible disruption of the economy, and the need to document all those that come so they cannot easily change their identity and hide amongst the people.&lt;br /&gt;&lt;br /&gt;As for the need to filter out terrorists, how effective is that? The government of the country of origin could give us a criminal history of the person, but could terrorists somehow sneak into the country? Immigration has become stricter since the terrorist attacks of September 11th, 2001, but how far should the Government go in filtering immigrants?&lt;br /&gt;&lt;br /&gt;As for the possible disruption of the economy, the economy has proven to fix itself in many instances. If work becomes scarce, people will move to places with higher demand for labor. The problem of welfare freeloaders could be exacerbated. Many already complain that immigrants are taking their jobs. Such complaining comes from those that are too lazy to find other employment or to rise to the competition that the immigrants supply. Utah County is experiencing a labor shortage that could be alleviated by immigrants that are willing to work. If one believes they aren&#39;t getting paid fairly, he should find another job that pays better and switch rather than fight his current employers for higher pay. If everyone acts like this, those that don&#39;t pay enough will either have to pay more or go out of business due to a shortage of employees. The trucking industry seems to be in such a position. It has been difficult for them to attract drivers: potential drivers don&#39;t seem to believe that the pay compensates for the cost to them to be drivers (time away from family, boredom, long hours). The market will correct itself if everyone plays the market right. In some cases, it is necessary to involve the Federal Government to correct some things. For example, food safety, workplace safety, and the enforcement of contracts. But it would be better for the Government to not meddle with prices or wages: the market will take care of those things.&lt;br /&gt;&lt;br /&gt;The need to document people as they enter is necessary since they don&#39;t have a birth certificate in the United States, another way must be found to uniquely identify them. Perhaps an immigration record would suffice.&lt;br /&gt;&lt;br /&gt;One of the possible reasons Rome finally collapsed in the 500&#39;s or 600&#39;s was the desire of the Romans to not let the Germanic peoples become part of the empire of Rome. Are we making the same mistake? Shouldn&#39;t we be friendly to all? We can be friendly to all and still maintain our interests.</description><link>http://musingsofoneofthemany.blogspot.com/2008/03/immigration-and-united-states.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-1115231465232760372</guid><pubDate>Sun, 09 Mar 2008 23:06:00 +0000</pubDate><atom:updated>2011-02-11T16:50:48.363-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">religious</category><title>Not All Religions Lead to Heaven</title><description>Many people believe that in the end it doesn&#39;t matter which religion you follow, you&#39;ll get to heaven anyway. But Matthew 7:13-14 says, &quot;Enter ye in at the strait gate: for wide &lt;i&gt;is&lt;/i&gt; the gate, and broad &lt;i&gt;is&lt;/i&gt; the way, that leadeth to destruction, and many there be which go in thereat: Because strait &lt;i&gt;is&lt;/i&gt; the gate, and narrow &lt;i&gt;is&lt;/i&gt; the way, which leadeth unto life, and few there be that find it.&quot; And verses 21-23 of the same chapter say: &quot;Not every one that saith unto me, Lord, Lord, shall enter into the kingdom of heaven; but he that doeth the will of my Father which is in heaven. Many will say to me in that day, Lord, Lord, have we not prophesied in thy name?  and in thy name have cast out devils?  and in thy name done many wonderful works? And then will I profess unto them, I never knew you: depart from me, ye that work iniquity.&quot;&lt;br /&gt;&lt;br /&gt;One isn&#39;t necessarily following Christ by joining a religion that professes to believe in Him. To know which religion to join: ask God.</description><link>http://musingsofoneofthemany.blogspot.com/2008/03/not-all-religions-lead-to-heaven.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-7026663302100134677</guid><pubDate>Thu, 13 Dec 2007 05:04:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.754-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Open Source and Free Software</title><description>Neither the Open Source movement nor the Free Software movement are strong enough to topple the commercial software industry. The progress on software projects developed by the community can be slow at times, and it can be difficult to keep up with commercial products. The people who work on community software must have jobs to generate income since it is difficult to profit from community software, thus they can dedicate only a limited amount of time to developing community software. Granted, some companies have employees who spend their working days developing community software, but those companies must also pay attention to their profits to stay in business. Therefore, the work done on community software by such companies is limited. Due to these limitations, community software will not replace commercial software as long as we live in a capitalistic society. Someday, I hope we all can live in ideal society, but today is not that day.</description><link>http://musingsofoneofthemany.blogspot.com/2007/12/open-source-and-free-software_12.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-1398281964125176859</guid><pubDate>Thu, 06 Dec 2007 01:30:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.755-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Family Internet Safety</title><description>Some of the advice to parents to help them protect their children from the perils of the internet is wrong - like advice on filtering and supervision.&lt;br /&gt;&lt;br /&gt;Filters can be more harmful than helpful. Sometimes filters go too far and block sites that contain extremely helpful information. Having objectionable sites blocked is beneficial, but smart browsing is more useful than filtering.&lt;br /&gt;&lt;br /&gt;As for supervision, putting the family computer in a place that is clearly visible and frequently passed by is helpful in encouraging users to avoid objectionable material, but reviewing the browser&#39;s history and talking to the parents of friends about the methods they have implemented to keep their kids safe to make sure your kids are safe is too much. All you can do with the browser&#39;s history is realize your kids have visited sites, but it doesn&#39;t tell you their reaction to the sites. The kids might have closed the window immediately, or the kids might have lingered on the site for a while. As for talking to the parents of your children&#39;s friends, what will you do if they don&#39;t do much to keep your kids safe? Will you tell your kids they can&#39;t go over to the homes of their friends because the parents of their friends don&#39;t filter the internet, even though their friends browse smartly? The solutions presented by filtering and supervision are best solved by properly teaching your kids smart browsing. As your kids learn to browse smartly, they will be prepared to avoid evil as they use the internet at locations outside of your control - including the homes of friends and the public library.</description><link>http://musingsofoneofthemany.blogspot.com/2007/12/family-internet-safety.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-8035137417603059225</guid><pubDate>Tue, 20 Nov 2007 18:04:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.755-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>iPhone Wars</title><description>The hackers have made more headway in the war against locked iPhones. Now iPhone users can unlock their iPhones without rendering the phones unusable.&lt;br /&gt;&lt;br /&gt;Apparently, the hackers have pledged to modify every new update Apple publishes so that the unlocked phones are never rendered useless again. But a security issue arises: how does one know the hackers aren&#39;t adding anything malicious to the updates? They could modify the updates to grant them access to the phones. How would one know? Anything that can affect your computer can affect your iPhone, like viruses and spyware. Is slightly better customer service worth the risk of an insecure phone?&lt;br /&gt;&lt;br /&gt;In other news, the iPhone will be released in China at some point in the future. It makes me happy to know that people around the world are benefiting from the improvements of technology. On the other hand, many people in the world are unable to enjoy life as they go without adequate food and shelter.&lt;br /&gt;&lt;br /&gt;More news on the iPhone:&lt;br /&gt;http://www.wired.com/gadgets/miscellaneous/news/2007/11/iphone_china&lt;br /&gt;http://www.itwire.com/content/view/15433/1103/1/0/</description><link>http://musingsofoneofthemany.blogspot.com/2007/11/iphone-wars.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-8165736906378302149</guid><pubDate>Tue, 13 Nov 2007 00:33:00 +0000</pubDate><atom:updated>2007-11-12T19:01:39.300-06:00</atom:updated><title>Global Competition</title><description>&lt;span style=&quot;font-weight: bold;&quot;&gt;Global Competition&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The world is flatter. This is good because those of us in the United States seem to be falling asleep. We aren&#39;t as competitive as we used to be. Many expect that they will be guaranteed a well paying job, but that isn&#39;t true - it never has been true. More so now than ever, we are involved in a global competition for jobs. We all must strive to perform better than each other if we want to be paid well. This will drive progress.&lt;br /&gt;&lt;br /&gt;In an ideal world, we wouldn&#39;t compete with each other. Everyone would have a job they enjoy and that they can excel at without competing with others for it. But we don&#39;t live in an ideal world. We live in a world with naturally lazy people that try to satisfy their desires with the least amount of effort. If all those who choose to be lazy are allowed to do so, society would be severely hindered in its progress. Would the hunters and gathers have become anything more if they had succumbed to laziness? With the incentive of financial power, many are enticed to compete so they can fuel their natural desire for power. Progress is a natural side-effect of competition that benefits many. Compare our life today with life of hunters and gatherers: we can communicate with people all over the world; we live in comfortable buildings; we take food for granted; and we understand more about the world around us.&lt;br /&gt;&lt;br /&gt;Everyone will have a job. The number of jobs that can be filled is infinite. When jobs are replaced by technology or outsourcing, more jobs are created. The computer replaced many jobs, but many jobs have been created by the computer: computer scientists, information technology departments, computer factories, and many more. Outsourcing will have the same effect. As jobs are shipped overseas, more jobs will be created at home. The limiting factors are entrepreneurship and education. Those who lag behind the changing environment risk difficulty in finding a job, but not all jobs can be outsourced: on-site construction, counseling, management, and many more. As Thomas Friedman pointed out, those with higher education move up in their jobs to care for the more difficult parts of the job as the menial parts of the job are sent to those who can accomplish them. For example, he pointed out an artist that concentrated on sketches as artists in India filled in the colors and shading. The artist concentrates on the creativity, and artists in India concentrate on completing the picture. The ideas will start at home, and their development will occur abroad. Much knowledge remains to be discovered; therefore, the levels that can be achieved are limitless.&lt;br /&gt;&lt;br /&gt;In the end, the flattening of the world is beneficial for all. Those abroad now have higher paying jobs, and those with more education can concentrate their efforts on increasing knowledge and wisdom.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Persistence of Hierarchal Organization&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Library of Congress contained about 20.5 million books at the end of the year 2006 (http://www.loc.gov/about/reports/). If one person read one book per day, that person would finish reading every book in the Library of Congress about 56,126 years after beginning. It is impossible for one person to know everything in this life. Because one person will not know everything, groups of &quot;followers&quot; develop around the respective experts of various fields. If someone wants advice about something, he will seek out someone he knows that he considers the most knowledgeable about the subject.&lt;br /&gt;&lt;br /&gt;Instead of replacing hierarchies, the flattening of the world will improve them as current experts are replaced with better experts. People don&#39;t have time to read hundreds of blogs to find answers. They prefer to read one blog that is correct and complete than dozens of blogs that contain only part of the information being sought, or that are inaccurate.</description><link>http://musingsofoneofthemany.blogspot.com/2007/11/global-competition.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3075887466724711532</guid><pubDate>Wed, 07 Nov 2007 01:33:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.755-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Software Patents</title><description>Lets say you alone develop and sell software that becomes wildly popular. As you dream of the things you will buy with your coming fortune, a software company develops software that does the same things your software does, except the company sells its software for less and does a better job marketing and maintaining the software. As your dreams of luxury begin to fade with the realization that the software company will inherit your coming fortune, you wish that you could stop the company from stealing your idea. Something exists to prevent others from stealing your idea, and it has been around for many years: patents.          &lt;p class=&quot;MsoNormal&quot;&gt;I&#39;m for software patents. If people cannot patent their software ideas, they will be less likely to research better methods without the ability to make money from their improvements.&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;Software patents not only help large companies, they also help small companies and individuals. If a small company develops a unique software program and patents it, they can profit from it while the larger companies must either pay royalties or find a better way to do the same thing - thus driving progress.&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;Software patents don&#39;t hurt those who don&#39;t patent their ideas. If someone can prove the idea existed before a big company came up with the idea, the big company will be unable to patent the idea.&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;In an ideal world, better algorithms will be shared without charging money, but we live in an imperfect world. We live in a capitalistic society, and we must follow the rules of that society if we are going to progress together. Too many people would take advantage of the system if everything was free, and society would not progress if everyone was a thief.&lt;/p&gt;</description><link>http://musingsofoneofthemany.blogspot.com/2007/11/software-patents.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3949577126134809427</guid><pubDate>Sat, 27 Oct 2007 21:19:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.755-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Only Two iPhones Per Person</title><description>iPhone news: http://www.informationweek.com/blog/main/archives/2007/10/want_to_pay_cas.html&lt;br /&gt;&lt;br /&gt;Apple has taken another step in combating the hackers. Now Apple sells only two iPhones to each person. Apple can restrict the distribution of its cell phones any way it wants as long as it follows the law.&lt;br /&gt;&lt;br /&gt;Many people complain that Apple&#39;s actions are unfair. What is fair? Do people think fair means getting what they want? If a person doesn&#39;t like Apple&#39;s new policy, they should stop buying Apple&#39;s products: money speaks louder than words. But iPhone sales are doing well. The people have spoken: they like the iPhone more than they hate Apple&#39;s policies and methods of distribution.</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/only-two-iphones-per-person.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-2187858601850266715</guid><pubDate>Mon, 22 Oct 2007 22:06:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.756-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Women in Computer Science</title><description>Women should be treated equally in the field of computer science, they should be encouraged to be mothers, and they should be encouraged to pursue a career in computer science if they so desire.&lt;br /&gt;&lt;br /&gt;As long as women have the same opportunity as men to enter the field and be successful, nothing more should be done. Discrimination against women solely based on their gender is not just. But one must be careful in completely eliminating gender-based discrimination without careful consideration. Forcing equality between men and women can lead to problems worse than unjust discrimination. During the time the Equal Rights Amendment was publicly debated, good reasons were given against passing the Amendment. Although most of the reasons are unrelated to equality in the field of computer science, they hint that some undiscovered reasons may exist that we are unaware of.</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/women-in-computing.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3531596759449584803</guid><pubDate>Thu, 18 Oct 2007 02:28:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.756-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Third-Party iPhone Application Development</title><description>Apple chose wisely to allow others to develop software for the iPhone. Not only can others profit from the popularity of the iPhone, fewer people will try to hack the iPhone to develop on it, thus making it more secure as the malicious hackers can no longer rely on the efforts of others to hack into the phone. But this decision will not make the iPhone completely secure: there will always be ways to break into it. Information on any electronic device will be completely secure only when the device is melted into an unusable mass.&lt;br /&gt;&lt;br /&gt;Article on iPhone Development: http://www.informationweek.com/hardware/showArticle.jhtml?articleID=202403919&amp;amp;subSection=Macintosh+Platform</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/third-party-iphone-application.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-2026068688826233398</guid><pubDate>Mon, 15 Oct 2007 23:08:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.756-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Computer Security</title><description>&lt;span style=&quot;font-weight: bold;font-family:times new roman;&quot; &gt;Hackers vs. IT Security&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;A strange war rages between information technology security guards and hackers. IT security guards do everything to keep hackers out, but hackers continue finding ways to cause damage. The war is like a sword fight with one guy spending the fight dodging the other guy&#39;s sword without using his own sword to strike back and stop his opponent. This epitome of a defensive strategy fails to stop the attack. There are some IT security guards in the world that pursue the hackers, but the chase can waste money. The guards could spend an incredible amount of time and money chasing the hackers, or they could spend less money on improving systems to keep hackers out.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;For the number of hackers to be reduced, they must be pursued. The security guards should implement systems that can identify the hackers enough to prosecute them. The automation of the task will reduce the cost of the pursuit. The FBI should implement a nationwide monitoring system with the ability to trace a hacker the instant the FBI is notified of an attack. As soon as the hacker is traced, the FBI should find the hacker&#39;s home address, find out who in the home is the attacker, and arrest the culprit. To increase the effectiveness of prosecuting hackers, more states have more laws against hacking. The number of hackers will diminish as the threat of getting caught increases. Hackers would think twice before trying to get into a system without authorization if they believe they might be caught.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;One of the difficulties of catching hackers is realizing they are attacking. They continue to find ways to circumvent the systems put in place to identify attacks. If a hacker is just stealing information, he can easily seem like a normal person. A hacker could break into someone&#39;s account and view all the files that person has access to. More security measures should be implemented to recognize such attacks.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;&quot; &gt;Responsibility&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;    Measures must be taken to save money, and preserve privacy and reputations by preventing hackers from penetrating computers. In IT security, the responsibility to secure systems lies with many people: the users, the programmers, the hardware designers, management, and the system administrators.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;Users have a responsibility to secure their accounts. The impenetrable walls of a castle are useless if the gate is left open to invaders. They must not share their passwords with anyone, nor should they store them anywhere. Potential hackers are not limited to external people. Someone in the organization could also be a hacker. Internal hackers could easily search through unsecured documents for passwords. External hackers that penetrate the system could find passwords stored on computers and use them to avoid detection. Users must also choose passwords that are difficult to guess, excluding birthdays and names of relatives and pets.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;Programmers have a responsibility to do their best to make the software they build secure. Programmers should do their best to secure the systems and programs they build. If a programmer carelessly develops software that can be penetrated, and his carelessness causes security problems for the system the software runs on, the programmer should be held responsible for his negligence.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;Hardware designers have the same responsibility as programmers. They contribute to the construction of the impenetrable wall.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;Management has the responsibility of assuring that clear security policies are developed and followed. Managers need to make sure that the wall is impenetrable and the gate is closed and locked.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;System administrators have the responsibility of aiding management by verifying that the security policies are followed by all. They are also responsible for detecting intruders and updating software and hardware as information about security problems arise.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;br /&gt;The responsibility for securing a computer system does not lie with one person alone: it lies with all those who use or manage the system. Everyone must do their best to keep the system secure.&lt;/span&gt;</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/computer-security.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-5848912419254156569</guid><pubDate>Mon, 08 Oct 2007 22:29:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.756-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Technology and Family History</title><description>Technology has had a very strong impact on family history. It has made family history easier and more efficient. The strongest asset technology has brought to family history is the ability to instantly communicate with people from all over the world and share information. The next strongest asset technology has brought is the ability to store vast amounts of information efficiently, and the ability to efficiently retrieve and search that data.&lt;br /&gt;&lt;br /&gt;The utilization of technology can be improved. Deciphering the handwriting of other people can be difficult at times, not to mention tedious. Improvements in character recognition software can eliminate the difficulty and tedium. Users of PAF are encouraged to use multiple files to store their ancestral information, which requires switching between files and splitting files makes it difficult to link information between the files. It would be much more convenient to store all the data in one file. It can also be tedious to search through all the different databases and gather all the information on one&#39;s ancestors. In some databases, such work is inevitable. In other databases, the data is already organized into pedigrees. Increased convenience can be achieved if all the ancestors of a particular person can be downloaded into PAF with the click of a button.</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/technology-and-family-history.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-6636469062311560222</guid><pubDate>Thu, 04 Oct 2007 01:06:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.757-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Unlocked iPhones: Round 2</title><description>Find updated information about unlocked iPhones at InfoWorld: http://www.infoworld.com/article/07/09/27/New-update-breaks-hacked-iPhones_1.html&lt;br /&gt;&lt;br /&gt;    Apple is not guilty of any wrong-doing. Apple can do as it pleases if it doesn&#39;t violate its part of the service agreement. If you maintain the functionality of your iPhone by disabling automatic updates, you won&#39;t get the security fixes and your iPhone will be vulnerable to attack. Unlocked iPhones are ineligible for repair or replacement under warranty because the phone was modified to alter functionality.&lt;br /&gt;&lt;br /&gt;    It&#39;s worthless to unlock an iPhone. Unlocked iPhone owners can expect a long period of conflict with service outages as Apple and the hackers continue to battle with each other. It&#39;s worthless to suffer through the outages for slightly better customer service and a phone with a nifty interface.&lt;br /&gt;&lt;br /&gt;    In other news, LG has released a phone with a large touchscreen that works exclusively with Verizon. I would buy LG&#39;s phone, but I&#39;m happy paying less than twenty dollars a month for a reliable pager.&lt;br /&gt;&lt;br /&gt;News on LG&#39;s phone: http://www.infosyncworld.com/news/n/8405.html&lt;br /&gt;Hackers fight back: http://www.theregister.co.uk/2007/10/03/iphone_update_response/</description><link>http://musingsofoneofthemany.blogspot.com/2007/10/unlocked-iphones-round-2.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3977408231464497980</guid><pubDate>Thu, 27 Sep 2007 00:31:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.757-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Deadly Defects</title><description>Engineers should make sure that everything they design and build does not have deadly defects. For example, a fuel system control processor with a deadly defect was on Flight 143 in 1983. The plane ran out of fuel before reaching its destination. Thankfully, the plane landed without killing anyone. Humans need help to accurately measure how much fuel is in the tanks, and that help must be trusted to give an accurate measurement so enough fuel is in the tanks for the plane to reach its destination. There are stories of a deadly defect in dialysis machines. Instead of moving the blood of the user through the machine and cleaning it, the machine would start cleaning itself and kill the user as it pumps solvent through the user&#39;s body. It is imperative that engineers eliminate deadly defects.</description><link>http://musingsofoneofthemany.blogspot.com/2007/09/deadly-defects.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-7372881015694799775</guid><pubDate>Fri, 21 Sep 2007 22:25:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.757-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Technology and the Church</title><description>Technology has been a great help to the Church of Jesus Christ of Latter-day Saints, and it will continue to be a great help to the Church. Many people misunderstand and are frustrated with the speed that the Church is moving at in utilizing technology. But the cautious rate of change is wise to make sure everything is in order because moving too quickly could cause more problems than would be solved. There are problems with the software that the Church produces, but these problems are gradually being solved. It isn&#39;t unusual for software to have bugs. Perfectly bug-free software is nearly impossible to come by. Maybe there are more bugs in the Church&#39;s software than other programs, but would it be wise to spend the money to hire the quantity and quality of developers that it would take to improve the software? I don&#39;t think so. Software is a nice tool that can greatly help, but it would be unwise to invest money into something that merely supplements the mission of the Church as if it were critical to the Church&#39;s mission. The Gospel can be spread without technology. Temple work could be done without technology if needs be, and perfecting the Saints doesn&#39;t require technology either. But these missions can be aided by technology. It makes sense to me that the money should be focused more on the critical aspects of the Church&#39;s mission than the supplements that aid the accomplishment of the critical aspects.</description><link>http://musingsofoneofthemany.blogspot.com/2007/09/technology-and-church.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3249116050644392200</guid><pubDate>Thu, 20 Sep 2007 02:42:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.757-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>Unlocked iPhones</title><description>Recently, an article was published on Wired about unlocked iPhones. You can read it here: &lt;a href=&quot;http://www.wired.com/gadgets/mods/news/2007/09/unlocked_iphones&quot;&gt;http://www.wired.com/gadgets/mods/news/2007/09/unlocked_iphones&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In the service agreement to buy an iPhone, there doesn&#39;t seem to be anything against reverse-engineering the phone, using the phone with other networks, or reselling the phone to other people. The hackers don&#39;t seem to be doing anything wrong (although I wouldn&#39;t consider my observations as authoritative: I have misinterpreted legal documents before). If the hackers cancel service between fourteen and thirty days after getting it, they do not have to pay the early termination fee and they have to keep the phone. Only the initial cost is more for an unlocked iPhone.  The hackers will charge enough to recover the costs of the activation fees for AT&amp;amp;T and the cost of buying the phone plus any additional profit they make in auctioning the unlocked iPhone on eBay. If you want an unlocked iPhone, not only do you have to buy an unlocked phone (if you are unwilling to unlock it yourself), you have to pay the activation fees along with any other fees associated with connecting to a different network with an existing phone. Is the cost difference between a normal iPhone and an unlocked iPhone worth the marginal benefit of a &quot;better&quot; phone company?</description><link>http://musingsofoneofthemany.blogspot.com/2007/09/unlocked-iphones.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7828540870117009160.post-3236919600797751982</guid><pubDate>Thu, 13 Sep 2007 03:26:00 +0000</pubDate><atom:updated>2011-02-11T16:52:24.758-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">technology</category><title>The Effects of Technology on Society</title><description>I don&#39;t think technology has made people worse or better. I think technology helps expose the true character of all individuals. It has given a chance for those who would have remained in poverty to realize what they can become and become it. It shows the true character of individuals as information flows around the world about what people do with their time and about what decisions they make. Those who rise to the occasion rise, and those who don&#39;t rise to the occasion don&#39;t fail because they don&#39;t realize there is an occasion (as is the case in many instances without technology) but because they they don&#39;t want rise to it.&lt;br /&gt;&lt;br /&gt;I&#39;m not saying people cannot change, I&#39;m saying that technology doesn&#39;t change people. Only one can change one&#39;s self.</description><link>http://musingsofoneofthemany.blogspot.com/2007/09/effects-of-technology-on-society.html</link><author>noreply@blogger.com (StephenK)</author><thr:total>0</thr:total></item></channel></rss>