I am a computer scientist because my family encouraged me.
My father buoyed my confidence by introducing me to basic computer skills. When
my sisters failed to install a program or locate a file, I helped because my
father had taught me how. As I grew older, my father supplied me with
complicated software along with expensive scanners and pen tablets. His actions
showed me that I was a competent and intelligent computer user. My
brother solidified my decision to become a computer scientist. I enrolled in my
first computer science class because my brother expressed confidence in my
abilities. When I become discouraged, he shared his own experiences and difficulties.
My family showed me that I was capable before I recognized my own abilities. Build
up a computer savvy girl by showing her she’s capable.
I am the second Purser to have taken CS404 at BYU. My blog is thus a improved version on my brother's from 5 years ago.
Tuesday, October 9, 2012
Saturday, October 6, 2012
Keep Out Some Ones, Not Everyone
As a teenager, I never locked
anyone out of my room with skull and cross bones. I did, however, guard my
privacy zealously; my space was a haven that would not be polluted. Though I
never intended to isolate myself, my attitude did more than isolate my space: I
kept everyone out. Hackers prompt an attitude like mine: keep everyone out. In The Cuckoo’s Egg, Cliff Stoll speaks of
computer networks and the hackers who pollute them: “[Networks are] a fragile
community of people, bonded together by trust and cooperation. If that trust is
broken, the community will vanish forever.” Hackers break trust and prevent
valuable social interactions.
Stoll personally watched trust
leave a community as a hacker infiltrated his system, a system miniscule when
compared to our world of connectivity. Stoll’s idea of computer networks as
communities of people applies more to our world than his. The internet is a
platform for spreading ideas and interacting as never before. The internet is
also a platform for destroying trust and invading privacy. Predators and
hackers seek to take advantage of the world’s vast connections. Their threat is
serious. We cannot parade our private information around in perfect trust.
However, we cannot allow the possibility of intruders keep us from
participating.
Thursday, September 27, 2012
Private is Public
Google me. You will discover that I won an essay contest, got a 30+ on my ACT, ran slowly in all my 5k races, and made All-State Academic in cross country. I never posted this information. I’ve never met the people who did. Strangers have the power to make private information public without permission. Most information is dormant like mine: unheard, unseen and completely harmless. But for those in the public eye, private is public. Google 47 percent. You will discover that Mitt Romney made some incriminating remarks about Obama’s supporters. Surely Romney never posted this information nor met the person who did. But months after these remarks were posted, Romney’s campaign was impacted. Privacy is near unattainable in the information age. Choose a public life only with full knowledge of the risk.
Tuesday, September 18, 2012
Wield Social Media Well.
No tool is inherently good or bad. A
few months ago, a handful of people created a film promoting an anti-Islamic viewpoint
and posted a trailer to YouTube. As a result, violent radical minorities in the
Middle East and Africa protest against the United States. All fifty states are
held at fault for a film very few were involved in. Whether or not that is
fair, we cannot undo another’s wrong. As a few use the internet as a platform
for hate, the majority must work on a higher plane. Our responsibility is to refrain
from hateful speech and promotes positive messages. While others may ‘project
their experience’ on others, we must be a voice of understanding. We wield
the power of the Internet. Social media impacts our world. Actively work to
make that impact positive.
Tuesday, September 11, 2012
“Teachers unions are having a harder time
getting what they want,” according to NPR. Unions are a product of the
industrial revolution, a way of uniting workers to benefit from organization. Today
unions retain the high costs of traditional organization against the possibility of more opposition. Unions represent the interests of a few against the
public. As the public gains power against union interests, unions lose power. Pockets
of opposition can organize themselves more easily than ever before, through
social media sites and other online venues. These pockets of opposition are not
as tightly knit or as large as a union. But their opinions are more easily heard
and harder to defeat. They bond in comment sections under newspaper articles,
videos, and blogs. They become more than just neighborhood gossips as they
reach larger audiences. If unions don’t find ways to incorporate these new
voices, the costs of staying organized will be too high to remain organized.
In case you missed the link I'm responding to:
In case you missed the link I'm responding to:
Thursday, September 6, 2012
Winners and Losers
I am a winner in the Information Age, more by luck than choice.
My brother suggested I take an introductory programming course so on a whim I
enrolled. As a result, I found zeal in place of the monotony I have always known
in school. I excel in my classes now, but at first I struggled because I lacked
confidence; I nearly quit. When I became a teaching assistant, I saw that many
struggle, but few admit it. Girls lose largest in this environment. Many of the
girls I talk to expect to fail and see failure in their successes. They freely
admit that they are not smart enough or talented enough to excel when I have
already seen them excel. Other girls my age tell me, “I could never do what you
do,” but they never try. The winners in the Information Age do not take the
time to recognize aptitudes, encourage success, or empathize in failure. The winners create losers out of girls like
me.
Subscribe to:
Posts (Atom)