Tuesday, October 9, 2012

Build up a computer savvy girl by showing her she’s capable


I am a computer scientist because my family encouraged me. My father buoyed my confidence by introducing me to basic computer skills. When my sisters failed to install a program or locate a file, I helped because my father had taught me how. As I grew older, my father supplied me with complicated software along with expensive scanners and pen tablets. His actions showed me that I was a competent and intelligent computer user. My brother solidified my decision to become a computer scientist. I enrolled in my first computer science class because my brother expressed confidence in my abilities. When I become discouraged, he shared his own experiences and difficulties. My family showed me that I was capable before I recognized my own abilities. Build up a computer savvy girl by showing her she’s capable.

Saturday, October 6, 2012

Keep Out Some Ones, Not Everyone




As a teenager, I never locked anyone out of my room with skull and cross bones. I did, however, guard my privacy zealously; my space was a haven that would not be polluted. Though I never intended to isolate myself, my attitude did more than isolate my space: I kept everyone out. Hackers prompt an attitude like mine: keep everyone out. In The Cuckoo’s Egg, Cliff Stoll speaks of computer networks and the hackers who pollute them: “[Networks are] a fragile community of people, bonded together by trust and cooperation. If that trust is broken, the community will vanish forever.” Hackers break trust and prevent valuable social interactions.
Stoll personally watched trust leave a community as a hacker infiltrated his system, a system miniscule when compared to our world of connectivity. Stoll’s idea of computer networks as communities of people applies more to our world than his. The internet is a platform for spreading ideas and interacting as never before. The internet is also a platform for destroying trust and invading privacy. Predators and hackers seek to take advantage of the world’s vast connections. Their threat is serious. We cannot parade our private information around in perfect trust. However, we cannot allow the possibility of intruders keep us from participating.

Thursday, September 27, 2012

Private is Public

Google me. You will discover that I won an essay contest, got a 30+ on my ACT, ran slowly in all my 5k races, and made All-State Academic in cross country. I never posted this information. I’ve never met the people who did. Strangers have the power to make private information public without permission. Most information is dormant like mine: unheard, unseen and completely harmless. But for those in the public eye, private is public. Google 47 percent. You will discover that Mitt Romney made some incriminating remarks about Obama’s supporters. Surely Romney never posted this information nor met the person who did. But months after these remarks were posted, Romney’s campaign was impacted. Privacy is near unattainable in the information age. Choose a public life only with full knowledge of the risk.

Tuesday, September 18, 2012

Wield Social Media Well.


No tool is inherently good or bad. A few months ago, a handful of people created a film promoting an anti-Islamic viewpoint and posted a trailer to YouTube. As a result, violent radical minorities in the Middle East and Africa protest against the United States. All fifty states are held at fault for a film very few were involved in. Whether or not that is fair, we cannot undo another’s wrong. As a few use the internet as a platform for hate, the majority must work on a higher plane. Our responsibility is to refrain from hateful speech and promotes positive messages. While others may ‘project their experience’ on others, we must be a voice of understanding. We wield the power of the Internet. Social media impacts our world. Actively work to make that impact positive.

Tuesday, September 11, 2012


“Teachers unions are having a harder time getting what they want,” according to NPR. Unions are a product of the industrial revolution, a way of uniting workers to benefit from organization. Today unions retain the high costs of traditional organization against the possibility of more opposition. Unions represent the interests of a few against the public. As the public gains power against union interests, unions lose power. Pockets of opposition can organize themselves more easily than ever before, through social media sites and other online venues. These pockets of opposition are not as tightly knit or as large as a union. But their opinions are more easily heard and harder to defeat. They bond in comment sections under newspaper articles, videos, and blogs. They become more than just neighborhood gossips as they reach larger audiences. If unions don’t find ways to incorporate these new voices, the costs of staying organized will be too high to remain organized.

In case you missed the link I'm responding to:

Thursday, September 6, 2012

Winners and Losers


I am a winner in the Information Age, more by luck than choice. My brother suggested I take an introductory programming course so on a whim I enrolled. As a result, I found zeal in place of the monotony I have always known in school. I excel in my classes now, but at first I struggled because I lacked confidence; I nearly quit. When I became a teaching assistant, I saw that many struggle, but few admit it. Girls lose largest in this environment. Many of the girls I talk to expect to fail and see failure in their successes. They freely admit that they are not smart enough or talented enough to excel when I have already seen them excel. Other girls my age tell me, “I could never do what you do,” but they never try. The winners in the Information Age do not take the time to recognize aptitudes, encourage success, or empathize in failure.  The winners create losers out of girls like me.