Thursday, December 5, 2013

Online games system

The Internet has brought a lot of revolutions on the way games are being played. With the advent of Macromedia Flash, the games have had a different dimension all together. There are games which are played online, thanks to Macromedia flash. Two or more players can be playing a game even if they are miles apart from each other. This brings out

1.1. Project milestones
The project will be assessed in different phases for analysis of the project.

1.1.1 User interface
The first milestone will be the development of the user interface. The user interface should be as professional as possible so that users will find it easy to find controls within the user interface unlike other interfaces which are complicated for no reason.

1.1.2 Coding
The other phase will be the coding phase. This will be involved with writing all the code for the project. The coding will be considered complete if all the modules and the parts of the system are coordinating well. The coding will be based on the programming languages used will be Java and CS4. The two languages make a good option for developing the system because they work optimally for graphics and game animations. Java is the open source programming that is commonly used for Internet applications.

1.1.3 Documentation
    The documentation of the project will be done for the various reasons. This forms one of the other milestones that need to be considered. There are two important documents which must be written which include research specification document and the user manual. The completion of these will be an important milestone since they guide the student in developing the system.

1.2 Project deliverables
After the system is complete I expect that I have a system which is working. There will be a gaming program that will allow students to play together in different places in the college.
Another deliverable is that of documentation for the project. The documentation will contain a description of the work done to come up with the project. It will also contain some sample code for the project. The security measures taken to protect intrusion of the system by unauthorized access will also be explained in the documentation. These measures will be handy to those who will be handling security of the system.
Security is crucial because the system might be hijacked by other patrons with ill motives and show unwanted videos like pornographic videos. Without proper security measures taken, safe system will be difficult to attain. The documentation will also include the tools that were used to develop the system. This will be handy when the system will be further improved. The coders will use the documentation to look for the appropriate software to develop and improve the system. This is especially important when the original coders will not be there to improve the system (DeLoura, 2000).
The other deliverable will be the user manual. This is the document that will explain all the procedures of using the system. It will explain how the modules work and how they are integrated with each other.
1.3 Evolution of project management plan
The scheduled tasks will be followed and if there are changes to be made, it will be adjusted in the Work breakdown structure. There will be provisions for changes and this is well taken care of in the Work Breakdown Structure.


2.1 Risk assessments
There is a lot of risk management in game development. As a student there are some risks I face in executing this project. Right from domestic issues to academic issues, these issues could have been detrimental to my project development if careful consideration and control could not have been taken. The risk factors are discussed in the sections that follow

2.1.1 Work overload
This semester has been a little bit trick and cumbersome on my side as a student. This semester alone, I have had six assignments, three presentations to make and one exam for the end of semester. All these require equal concentration. To make it even harder is the fact that I am a family. My wife is a full time student. I am therefore required, naturally to work hard for her fee and upkeep of the entire family. I am therefore forced to keep a full time job so that my family will get basic needs. I am therefore forced to budget for the family, fees for both my wife and I and also for the family upkeep. This is straining for me. But I have no option but to go for it because it is the right thing to do at the moment. The children need me as their father and this has also forced me to dedicate some few hours everyday for their care. What is more, I have the bills to pay and the exam to write at the end of the semester. What is required of me is the skill of time management and financial management managing to the last coin. I have had to learn these at the course of this project. It has put my project at the highest risk ever. Time is my hardest asset to manage given all these tasks and obligations.

2.1.2 Technical requirements and tools
Given that this is an online system that is to be developed, I have a challenge and equal risk that I need to manage very well being for the good of this project. I have little knowledge on the web programming. I have limited knowledge on scripting languages like PHP and JavaScript. I also have limited knowledge on publishing the website and AJAX. This added the constraints I already have on my time management. This means that I have to learn these technologies first. I have had to schedule some time to learn these new technologies. There are sometimes that have forced me to get an expert in these areas of programming because some need explanations. This is especially true for some technologies like PHP and web publishing and more recently, AJAX. This forced me to sleep less hours, as minimal as 2 hours a day. This is risk because I will lose concentration in class. In developing games, technical risks fluctuate because even changing the jumping distance of a game can greatly affect the fun of it altogether. This is because we are dealing with the psychological interactions of the customer. This type of risk may occur if the programming language used changes or is updated so that I will be forced to learn the new features. This will lower the quality of the project to be produced in the sense that the new techniques that I should know may be too complicated to comprehend. Poor understanding of any technology will lead to production of low quality products.

2.1.3 Deadline constraints
    From the risks discussed above, it is clear that I have more than enough risks to manage. I have had a problem in meeting deadlines that have been set by others like my lecturers in the other subjects and those that have been set by me. The deadline dates for submitting the proposal for example found me still contemplating on the project I was suppose to do. There are other instances that I have had to attend some other classes but in those classes, I do other tasks for my project this is the far it has gone for me. I have had to carry some other assignments home so that I am able to finish and submit them on time. This is challenging to my family who also need undivided attention. This has gone to the verge of affecting my relationships with those that are dear to me.

2.1.4 Language barrier
 The other constraint that has been detrimental for me is the fact that English is not my first language. This has been a barrier to me. Most of the tools that I used needed configurations to b e made. The language for the configuration was to be in English. This proved to be a daunting risk that I found it hard to overcome it. Learning a technical skill using a language that is foreign to you is a tale that you will leave to tell it some time later. It is even harder if the task you are performing is to be submitted in that very foreign language. I have had to strive to know some technical skills using English and learn writing my reports. Some short language courses I had done before were handy in the completion of this project.

 3.0 Technical process
There a number of techniques that will be employed to finish the product. These techniques are critical to project completion and project quality achievement.
3.1 Methods, Tools and Techniques
3.1.1 Tools and Techniques

ToolTechniqueDescriptionGanchatt Project Tool
The development of scheduling will be done through the use of Gantt project software. This software generates the tasks and their time of start and end dates. Ganchatt is software used to automate task scheduling and assigning the resources in the project. The screen shot below show the use of resources in the project.

Java
Java is an open source programming language from Sun Microsystems. This language is platform independent and is stable in developing large computer systems. The development of this project will use this language because of a wide range of techniques that will be available in the use of this language. These techniques will include the following
Java Database Connectivity (JDBC)
This is a technique which will allow me to connect with the database. These techniques will be handy especially because the application will require the use of database as one of the modules. The technique required here is that of connecting to MySQL database in Java.

MySQL
MySQL is database management software that is also open source. This database is stable and can be used to store large amount of data. MySQL blend well with Java programming language to come up with a strong application which will be stable in many of its uses.
Macromedia  flashIt is a software application from the Macromedia company that is used to develop web applications that are interactive in nature 3.2 Work product documentation
This project will have to come up with many documents before its completion.
Software Requirements Specification (SRS)
This is a document which will give a detailed description of all the requirements that is needed for the project. The SRS is normally prepared by the system analyst. It will define the functionalities required of the system and the operating environment and parameters for the system.

3.3 Quality Assurance
A number of software activities will be performed to ensure that all the requirements are met. The activities to be performed include the following

3.3.1 Unit testing
To ensure that the individual units are working, all code will be unit tested to check if individual units are working as per required by the programmer. They should be able to give the correct results are output. Proper results will be determined by use of the design limits of the client (the calling function) as specified in the design specification defining the server function. Unit testing is more or less equivalent to box testing and sometimes may require use of symbolic debuggers and software stubs. The main purpose of this testing is to ensure that the modules are working correctly given the fact that the internal working of the modules are already known.

3.3.2 Integration testing
This type of testing has two levels of testing. The first type of testing is that of testing the capability of the software. This is being able to send a message through a DMA port or being in a position to acquire a row of CCD. At this level of testing, all modules are treated as a black box and it is at this level that all classes and functions that are conflicting are resolved. Test cases must provide unexpected parameter values when the design documentation does not explicitly specify calling requirements and client functions. The second level of testing is arrived at when enough modules have been tested to arrive at a scenario, for example the ability to receive and to issue some certain command. During this phase, the modules and the composite builds are integrated with the engineering hardware. This will enable us to evaluate the performance of the system with the hardware that will be working from.

3.3.3 System testing
The purpose of the system testing is to make sure that the hardware and software are rightly working together. The purpose of system testing will be to make sure that the whole gaming system is working rightly well. The system should be said to have completed after the results from the tests are as specified in the STP.

3.3.3 Validation testing
The purpose of validation testing is to ensure that the hardwaresoftware system meets the scienceinterface requirements that are allocated to the software just as identified by the requirements Traceability method. It is the work of the engineers to make sure that the hardware and the software are working well and that the hardware is available for the testing to take place.

A Software Test Plan (STP) will be created to meet all the requirements that are stipulated in the documentation of the system. The STP will contain sections that are separate from each of the Software Sub-Section (SSS). This plan will provide insights on how to manage the software and the testing function with a summary of the testing activities that will be carried out, and the resources that will be required so that testing can be performed. This plan will contain the procedure of the testing specifications found in the sections that are discussed in the sections that follow.

4.0 Data collection methodologies
The techniques that will be used for data collection will be secondary. This will include the use of the websites of games and online journals that will be available online. The use of primary methods is not ideal because the system is supposed to be international. The use of the website is international because it will be played internationally. The secondary data collection methods are indicated below
4.1 Primary data research methods
To get enough data for this project to roll out, both primary and secondary methods of research will be used. The primary tools of data research are given below

Questionnaires
Questionnaires will be used to get the first-hand reactions and views from the user himself. The questionnaires will be distributed in the computer science department and the faculty of science if enough copies are made. The questionnaire structure is presented in Appendix D.

Interviews
This will be done by getting the students face-to-face to get their views on this new system. This is necessary because they are the users and getting the user requirements right is the first strategy in winning loyal users.

Online chatrooms
This is the newest method of getting views from people. Many students and game players use the Internet most of their free time. It is here that I target to get them and their views.
4.2 Secondary methods

Online journals
These are journals about gaming systems that have been developed and the extent in which these games have been existing. This will give more understanding of what to avoid in the development of the new system.

Social networking sites
This will be used to get the views of what users want with online games. Most players are normally young Turks and they are the people who will help get a clear understanding of the requirements that they want.

Games websites
I will also strive to get information from the websites of online games so that I get the insight of the same. They will also give updates of the new features that are being added to the system.

Online web forums
These are forums which will be used to get the views of the use of other systems on the Internet. These views will help the student to get the preferences of the system and help in improving the online game system.

Software piracy

Software piracy is defined as illegal distribution or production of software products for business or for personal use. This act is considered illegal and is punishable in the courts of law. Many countries are reported to have copyright laws which also cover software, although their applications vary from each country. In the country like Iran, there is validation of unrestrained software distribution which has led to fears among many countries that it can be used politically by states. Software applications and fonts one buys do not belong to him but what is bought is the right to use the bought software on ones computer. The copy of the software bought should not be used on another machine or even given to other users like friends and colleagues (Kennedy, para 6).

Existing and proposed laws on piracy
In the United States, in the proposed US Uniform Computer Information Act, there is a model law that has been applied in Virginia and Maryland which gives software manufacturers powers to close down unlawful software copiers without involvement of the courts. The same power is found in Title II of the US DMA, in which the Online Copyright Infringement Liability Limitation Act powers the copyright holders to order an online service provider to obstruct admission to pirated materials. If the online service provider accepts and follows the instructions given by the copyright holders, it is awarded by safe haven giving it protection against infringement claims. Failure to comply does not result in being liable to any infringement claims, but may depend on the immunity by the Communications Decency Act. Attempts by an individual to bypass a technological barrier like a password which have been used by software manufacturer to control access to a work are considered illegal. Although the action which can be taken against such a person is still not clear, the US Copyright Office is at present reviewing anti circumvention rule provided by DMCA. Anti circumvention rules currently in use are software planned to filter web sites that are considered inappropriate, copy protection mechanisms that do not work or viruses that interferes with the functions of software (Danchev, para 5).
   
Most software which are pirated are manufactured in the US and Europe therefore people coming from third world countries find it economically unfit to pay for all the licenses for all the software products needed but instead to just buy one license and duplicate it at no extra cost. Critics in the developing countries have described this restriction by developed countries as an indirect technology exchange tax in their countries imposed to prevent technological development. Most of the times, these people do not accept copyright laws which are put in place by developed countries. France on the contrary did not support other copyright enforces and went a head to issue ruling that allowed bank secrecy to infringe copyright.

Effects of software piracy
Piracy of software has reduced the verge of information required to obtain huge amounts of information. Great networks have been formed which are committed to distribute information and the same networks can be used in distribution of pirated materials. Detection of pirated materials is not easy since the people using them are capable of altering the brand and the contents of the material pirated and is being shared (Westervelt, para 8).

Emergence of quality in free alternative software is useful in reducing the use of pirated materials in the whole world. Piracy of software is viewed by some software manufacturers as a minor crime as compared to buying or illegally copying a rivals software. Piracy is also cited as having played a significant role in enabling young generation discover computers, and also acted as a foundation in the development of the information technology industry in Romania. Microsoft Company accepts that piracy of its Windows operating systems has enabled it gain huge market recognition in China and this will raise its revenues when the users finally purchases the license. The company owner Bill Gates was quoted saying that windows software will favorable compete well with Linux in the presence of piracy than when it is not there. He further said that piracy of their products make people to get addicted to them so much until they cannot go for other products (Kennedy, para 8).

Forms of piracy
There are various forms of piracy which include licensed user copying for the unlicensed users, illegal distribution through internet, illegal use of software over a network, distributing specialized education versions to unauthorized users, and distribution of inauthentic software or fonts. When an individual duplicates software without buying the right number of licenses is termed as copyright infringement. Activities which are considered as software piracy includes copying software for a friend, under quoting the number of computers using software, and even including copies of fonts like that of adobe when sending files to someone (Danchev, para 7).

There is an act of piracy particularly when distributing software through internet. One needs to be very careful when ordering software over the internet. Many people selling software through internet or those who trade from auction sites distribute the software illegally and they are fully aware of it. Over 90 of software traded over the internet auction sites are done through the black market and this is the reason why their prices are relatively low. Some web sites offer free software downloads to their customers and this is considered illegal. With such free downloads, there is no surety that the software downloaded is secure and will function well once installed (Westervelt, para 10). The only time when free downloads are allowed is when there are tryout promotions and this are exclusively found in the Web sites of the companies producing the software and they are used for a specified period. To buy a software with the protection and full functionality, it is recommended that the software be bought from the firm itself or authorized resellers (Kennedy, para 9).

Pirated materials affect everyone including manufacturers, retailers, and finally the users. Unlawful copying and distribution of software products affects the economy. Attempts to curb piracy are underway with Microsoft trying to teach partners and the users about the dangers of obtaining software from unscrupulous sources. Purchasing software from reputable and trusted sources and avoiding too good deals are the only ways of preventing time and money on poor quality and pirated products. One also needs to know the dangers associated with software piracy. By using pirated materials, you are exposing yourself to dangers of having potential desktop licensing problems.

3D DESIGN AND ID

THREE DIMENSIONAL (3D) DESIGN
The objects are constructed on three planes namely X, Y and Z. 3D objects can be subjected to transformation, rotation and scaling. 3D interaction occurs when users are able to move and perform interaction in 3D space.

INTERACTION DESIGN (ID)
Interaction Design allows users to carry out their tasks and perform functions by exchanging information with computer systems in 3D space. It is a perceptive type of interaction because humans can interact with three dimensions in the real world. The various types of tasks users can perform through Interaction Design are selection and manipulation of objects in virtual space, navigation, and system control. Users can perform the tasks through interaction techniques in virtual space and by utilizing interaction devices.

Interaction Techniques   
3D interaction occurs when physical tools are controlled in 3D spatial context to control a corresponding virtual tool. Interaction with the virtual world in 3D allows users to make use of natural and intrinsic knowledge of how information exchange takes place with physical objects in the real world. Texture, sound, and speech are used to enhance 3D interaction.
The classification of 3D interaction techniques are based on the task group it supports. The major classification of 3D interaction techniques are

Navigation Techniques
Selection and Manipulation Techniques
System Control Techniques
Navigation Techniques
Navigation techniques support tasks related to navigation. Navigation tasks have two components, namely travel and way finding. Travel deals with the movement from the current location to the desired point. Way finding deals with the finding and setting routes to get to a travel goal within the virtual environment.
Selection and Manipulation Techniques
Selection and manipulation techniques support object selection and manipulation. Direct-hand manipulation is the most natural technique as manipulating physical objects with the hand is spontaneous for humans. A virtual hand that can select and re-locate virtual objects is also used. 3D widgets are used to put controls on objects.

System Control Techniques
The tasks associated with issuing commands to the application in order to change system mode or activate some functionality come under system control techniques. Graphical menus, Voice commands, Gestural interaction, and Virtual tools with specific functions are the techniques that support system control tasks in three-dimensions.

3D INTERFACES
The 3D interfaces are the means for communication between users and systems. 3D Interfaces are used in applications that feature virtual environments, and augmented and mixed realities. 3D interfaces include media for 3D representation of system state, and media for 3D user input or manipulation. In addition to 3D representations, special input and output devices are used to support interaction.

Input Devices
Input Devices help manipulate objects and send control instructions to the computer system. They vary in terms of degrees of freedom available to them. They are classified into standard input devices, trackers, control devices, navigation equipment, and gesture interfaces. Standard input devices include keyboards, tablets and stylus, joysticks, mice, touch screens, knobs, and trackballs.

Output Devices
Output devices allow the machine to provide information or feedback to the user. They include visual displays, auditory displays, and haptic displays. Visual displays provide feedback to users in 3D visual form. Head-mounted displays and CAVEs (Cave Automatic Virtual Environment) are examples of a fully-immersive visual display. In fully-immersive displays the user can see only the virtual world and not the real one. Semi-immersive displays allow users to see both. Monitors and workbenches are examples of semi-immersive displays. Auditory displays provide information in auditory form.

Software
Most of the three dimensional design and interaction design are done through the following software
Flash Script
Adobe Photoshop
Adobe XD video
AAA Magic 3D
3DJournal Software
Python 3D Software
SOLUTIONS TO ALL QUESTIONS RELATED TO 3D AND ID
Interactive Touch Screen Technology

In this technology, users are allowed to interact with the application and apply the required change by touching the screen. Software working allows the users to draw or apply colours or select the required options by touching the screen. The screen given below shows the mode of applying colour through touch screen using Adobe XD video.

Virtual Reality Technology
Virtual reality (VR) technology allows users to interact with an environment that is a simulation of the real or an imaginary world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through special or stereoscopic displays. The screen shots given below show the mode of applying colour through touch screen using CAD.
     
Augmented reality Technology
Augmented Reality deals with the live direct or indirect view of a physical real world environment whose elements are merged with virtual computer generated imagery, creating a mixed reality. Augmented reality research explores the application of computer-generated imagery in live-video streams as a way to expand the real-world. The figure below shows the working of Augmented Reality technology.

3D Animation
The rapid display of a sequence of two dimensional or three dimensional images is called animation. 3D animations give the impression to look at characters from all angles like in real life.
Modelling
Flash is the best of animation productions which are being done on this platform. All forms of story telling, movies, short films or episodes are finding their way in flash animation. The screen given below shows the mode of applying modelling to pictures.

Texturing
Texturing is made by applying surface coloring to the image. It can be thought of as a number of thin pieces of texture that are used to generate a three dimensional image map. 3D textures are typically represented by 3 coordinates. Online ads which are getting good response are based on applying texturing to pictures. The screen below shows the texturing applied picture.

Rigging
Rigging is required to animate articulated 3D image. Rigging effects are incorporated in most of the games software. Most of the promotion strategies today incorporate the gaming aspect in their 360 degree approach. The screen given below shows the rigging effect used in game software.

Lighting
Lighting in 3D design serves the same purpose as that of real world lighting. Its main function is to bring out or push back the shapes of objects visible from the cameras view. It gives a two-dimensional image on the monitor as an illusion of the third dimension-depth. It also gives an image its personality, its character. Lightning effects are mostly used during the preparation of E-cards. The screen below shows the lightning effect applied to picture.

Animation
Most animations are sophisticated with audio, transition effects, enhanced data interpretation. Animated pictures have good response among the users and are used in advertisements and website designs. The screen below shows the mode of adding animation to picture.

ADVANCEMENTS IN ANIMATION INDUSTRY
The following are the various advancements in animation industry
Cel-shaded animation
Morph target animation
Skeletal animation
Motion capture
Crowd simulation
Cel-shaded animation
This type of animation is used to make the image hand drawn. It is also known as Toon shading. Generally, it is used to copy the style of comic book or cartoon characters.

Morph Target Animation
In this type of animation, the series of vertex positions are stored. In each key frame of the animation the vertex will move to a different position. It is used for animating cloth, skin and facial expressions. Depending on the renderer, the vertices will move along paths to fill in the blank time between the keyframes or the renderer will simply switch between the different positions, creating a somewhat jerky look.

Skeletal Animation
This type of animation works by constructing a series of bones and each bone is associated with some portion of characters visual representation.
Motion Capture
In this type of animation, the action movements are digitally recorded. It is used in video games to animate the characters of the game. It is used in films for recording the action of human actors.

Crowd Simulation
This type of animation reproduces the movement of a large number of objects or characters. It is used when there are more characters than those that can be animated using the other methods.

HOW TO TROUBLESHOOT VIDEO CARD PROBLEMS

Troubleshooting your windows XP operating system in times of problems can be a nightmare if one is not aware of different boot options that exist. Starting your computer in safe mode is one of the best known modes for troubleshooting video card problems ranging from corrupted drivers to incompatible drivers. For the above scenario the best boot option is safe mode. To access safe mode what one is required to do is to press F8 key on the keyboard just before the Windows XP splash screen appears, this will enable you to access the Windows Advanced Options Menu. Once you have booted the PC into safe mode you can now be able to access the Display Settings in the control panel and lower the number of pixels e.g. 800 by 600.    
If this doesnt work right click on My Computer, Properties, Click on the Hardware tab then Device Manager. The device manager will help us to access all the devices within the PC particularly the Display Adapters. Right click the Display Adapter and select properties and choose the Driver tab.
This driver tab have four options namely Driver details which gives the driver details within the system, update Driver which helps you to update the already existing drivers, Roll Back Driver which helps you to revert to a previous driver that had already been installed and finally Uninstall option which can be vital especially when one wants to uninstall a particular driver for a hardware. For the above case we can uninstall the drivers that the windows installed automatically and install an updated version of the same.

Computer and Society Paper

Computer and Internet works Copyright Infringement
Today, over a million copyrighted materials that are available in various computer servers, either private company owned servers or public domain servers worldwide are hacked into and materials are siphoned off by individuals, who disregard the copyright regulations and ownership laws. Whether this perpetration is based on a more advanced knowledge, skills and much advanced equipment is there to debate a range of laws, which have been designed to govern the digital materials. An example of such laws is Digital Copyright Law, which protects the owners and innovators of the digital materials against the access and illegal use without due right and permission from the owner. The effect of such illegal ownership by penetrating and stealing materials online is today felt worldwide and that is why the laws have been introduced to solve this problem. Laws alone cannot fight this kind of infringement use of technological skills has to be considered embraced by the firms and copyright owners, which would wish to increase security of their products to aid the already existing Digital Copyright Law.

The purpose of the copyright law is to encourage creativity and innovation by granting a temporary monopoly in the authors original creations. This monopoly takes in the form of six rights in areas, where the author retains in exclusive control of his work or material for a period of time, after which then the material will enter into public domain. Such rights include the right of reproduction and copying, the right to create derivative works, the right to distribution, to performance, to display and digital transmission performance. Some jurisdictions also recognize moral rights of the creator of a work, such as the right to be credited for the work and copyright is described under the umbrella term intellectual property along with patent and trade marks.

Managed Service Providers
Online Services Providers, such as companies associated with distribution of IP addresses and network services, web hosting and data storage firms can be employed to use their own or another vendors security software and devices to protect internet gateways by filtering the penetration and browsing monitoring the online visits and by ensuring that logging into such servers is done with passwords. The solutions tend to be customized for each clients unique business requirements and to use proprietary technology. They can either actively respond to intrusions or notify the authority after such intrusions occur. Mark Suri  stated that some requirements for using this safe harbor include the service providers limiting access to information as required by the web site operator not interfering with certain technologythat returns hit information to the web site operator and refraining from modifying content

Elsevier in the article Digital Copyright and the New Controversy Is the law molding technology and innovation stated that vulnerability assessments, information system audits, and information security risk evaluations will help characterize security issues, but not manage them (Elsevier). Managed service providers would manage the security for you. Although each of these approaches can be useful to an organization trying to protect itself and the copyrighted materials, all of them have some limitations, based on their context of use and that explains the reason why managed service providers would devote their approach assessment built upon security of the copyrighted information and this will have allowed them to assume responsibility for security management other their original role of selling IP Addresses and website hosting and data storage. He further notes that digital copyright laws could create perverse incentives for innovation and wonders if legislators may not require a better understanding of the innovation process when crafting IP laws (Elsevier).

Online Automated Piracy (Detection Software)
Belkhouche, Anastasia Nix and Johnette Hassel explained in Plagiarism detection in software designs why there is a need to have designed systems to counter piracy saying, online monitoring software with capability of detecting illegal distribution of copyrighted materials online will be best placed than just having laws on paper (Belkhouche, Nix and Hassel, 2004). Example of such software is Virage Automatic Copyright Infringement Detection (VACID), which has the capability to detect and report to the authority any copyrighted material or work that is circulating or being circulated online from one peer to another peer regardless of location of the peers or format. Belkhouche, Nix and Hassel added saying to days bulging interest of music, movies and other digital media content software have been designed to enable file sharing and distribution over the internet around the world. This has forced such media and digital content owners to step up technology geared to counter the rising tide of illegal copying and seeding(Belkhouche, Nix and Hassel). The detection system shall be liable in monitoring, recording, and analyzing suspicious sharing by monitoring traffic on the internet. They cited a case where preliminary experiment was done on a real case and the system successfully located 126 distributors (a.k.a. seeders) for some Cantonese pop songs within 90 minutes.

The positives and negatives of License and Copy Software
Using licensed software the vendor is in obligation to assist you in a timely manner in case of popup-bugs arising from the licensed software. Besides, upgrades would be downloaded easily without involving any extra cost. In the case of open source software, the developer is not liable in giving technological assistance. This warrants the user to dig deep into his pocket, if such popup-bugs arise or any maintenance problem is called for as explained by Michael Bloch (1999-2007) in the article Taming the Beast.  Bloch adds that, open Source Software is free, and their source codes are available for manipulation by the end user (Bloch, 2007. This means original source code developers would lose control of their original work in the sense that codes can be changed from the original code by any skilled person and end up creating a competing product making the original product lose its intended market and credits it deserved, as noted by Odin Kyle in The pros and cons of open source software (Kyle 2009).

Accountability and Liability in Computer Applications and Software Loss
We live in a world where not only business empires but also lives of ordinary people depend and are supported by computers. A catastrophe happens if computer systems run out of control. Emily Freeman, AIG e-Business Risk Solutions, vice president, Western region and executive director of consulting concurs says that even with the best data security, liability risks will never be zero (Freeman). Along with that there has been of late a number of cyber risks associated with doing business today. This has called for a rising need for vendors of such software to provide compensation clauses as a form of accountability and liability, in case of such loss. Tammy J. McInturff, an AIG e-Business Risk Solutions official, added in his publication Managing Cyber Risk that a case where there is a known breach which may lead to the loss of information stored in organizations and companies servers due to malicious attacks there should be liability on the part of the subject responsible for hosting such information and data and due compensation done to affected victims due to loss of unencrypted personal information such as name and address associated with a social security number, drivers license number or other data that could be used for identity theft (McInturff).

The need for licensing computer professionals
Computer Security Society is fighting a known common enemy- a learned skilled computer professional, who is every time mentioned as breaching the security protocols. Licensed professional engineers can be trusted to build bridges that go up according to plan and stay up. Robert Fabianin the article Should software professionals be licensed gave an analysis saying that some have proposed that same concept for software professionals - maybe licensing could be a means of indicating that they can be trusted to build software that goes up according to plan and stays up (Fabian). Because of lack of license, it is believed that most of them work leaving loops to be exploited later. Lack of license has also given forth to reckless pseudo-professionals who cost American business billions of dollars each year in lost productivity. Vetting computer professionals has become a costly nightmare for IT managers across the USA. Licensing will ensure real professionals with certification recognition like that of Engineering and Accountancy and such professionals would then be credited and honored with earnings and by the kind of  their noble work during their practice and at the same time be paid royalties as explained by Burleson Consulting,in the article, Government licenses for computer professionals

UPGRADING WINDOWS 3.11 95 TO WINDOWS XP

For one to undertake an upgrade of a computer several considerations have to be put in place for the upgrade to be successful. One point that is critical is what requirements are needed by the new program for example the amount of the memory required for the system to function in a stable manner, the speed of the processor, the hardware and  software compatible with the new operating system etc  . The issue of the upgrade path is also vital e.g. is it possible to upgrade windows 3.11 to windows XP. All the above examples will ensure that your upgrade is smooth and successful.
  
The best option for the upgrade particularly for the machines running Windows 95 is to upgrade the PCs to windows 98 first then upgrade to Windows XP since there is no official upgrade path from 95 to Windows XP putting into account that we want to maintain all the configurations and programs. For the above scenario, the systems specifications possessed by the PCs is not tabulated and since PCs that came with windows 95 generally have RAM less than 64 Mb plus a hard drive of  approximately 1500Mb its recommended that the RAM and hard drive be upgraded first. The hardware compatibility should also be checked first. For Windows 3.11 its also good to upgrade them to Windows 95 then 98 and finally Windows XP assuming that the PCs meet the minimum Windows XP requirements. N.B The PCs should not be formatted to ensure the configurations and data are not lost.

Windows XP comes with a lot of enhanced features as compared to the previous windows released previously in the market. These includes the ability to secure the PCs with passwords, network configuration is easy through the My Network Places, system restore is also another critical feature in available in Windows XP. The user accounts and all programs previously installed will also be available.

Wednesday, November 27, 2013

Major Department Computer Science

Every night when I sleep, I only have one dream. The dream is always the same. I am getting ready. Putting on my formal suit and leaving for work. I bid my wife goodbye and kiss both my small kids, who are gurgling with laughter. My wife is smiling. I sit in my car and wave back. Sometimes, I dream a bit further...I reach my swanky office. There is a smile on my lips. It is the smile of an accomplished and a satisfied person. And then, when I wake up, I know what I have come for. I know what I have to achieve that day. I am very clear in my heart and in my soul why I am there in the United States that very day.
My name is .. Presently I am in my senior year of Computer Science. And I am on my way to making all my dreams come true.

The U.S. is a land of opportunities. Hence, after graduating 7 years ago, in 2002, and working for seven years, I moved to the United States and did my bachelor course, yet again. After all, a dream is not so easy to reach.

But how earth-shattering it will be for a person, when they realize that they may be missing out on their major in Computer Science, just because they have not achieved the required GPA of 3.0 Worse still, all this is happening when they are just on the edge with a GPA between 2.5  2.9.
But still, rules are rules. They have to be adhered to. But why was this rule of getting GPA of 3.0 made The reason for this is that an esteemed place like the University of Arizona would like to admit only hardworking students and that stands to reason.

Hence my dream cannot be fulfilled, because I am not a hardworking person. I ask myself this question repeatedly. I am a married man, having two little kids. Both me and my wife are studying. How difficult it is to study, when our two kids are crying all day long. The only time when we can really concentrate on our studies is after midnight, after putting our kids to sleep. Both of us adjust to each others class time schedule. We both come home right after our classes to baby-sit. And we have back  to  back classes. How difficult it is for both of us to study while maintaining our hectic schedules. And I still managed to get such GPA. Can I really say that I am not working hard enough

University of Arizona has always been a dream. It is a place where intelligent minds meet. I have taken advance core courses. And I have skipped every basic course. The reason was that I wanted to finish my degree and reach a level, where I could take up a suitable job and fulfill my dream. To reach this level, getting admitted in this major course is not simply important, but really vital. My previous bachelor degree GPA and grades are maple proof of my intelligence. I have As and Bs on my transcript of the same course which I have taken now. Thus, getting low grades in this course is not a result of my lack of intelligence. It is entirely due to my family situation and my being out of practice for a long time. The same would be true of anybody in any field.  Besides, I have done very well in my project as well as my team projects.

The way I envisage studying at the University of Arizona is something like holding a huge book, which has many unread chapters. Then I see myself as an eager child, who is just learning to read. But I want to read as well as probe into the various chapters of this book. The University of Arizona with its great reputation is my path to fulfilling a great dream, not only for me, but for my family too. It could only be with the help of the University of Arizona, that I have success after college. This way I would be able to make a name for myself in our society. Not only that, after getting admission in this major degree, will I be able to provide the right upbringing to my children.
I
 have many dreams for my children. I can fulfill these dreams only after having this degree and then taking up a job as soon as possible.
   
I am still the same person as before. I am only modified to better maximize my potential, with these added family responsibilities. This only proves that once I am back in practice, I will be able to get back my good grades, as before. All that is required is a bit of practice and some time. A hardworking person like me, who is multi-tasking all the time, cannot do otherwise. I have planning and preparing to get this degree for a long time. The whole thing is completely imbibed into me. 
   
The fulfillment of my dream means a happy and secure future for my family. It is entirely dependent on my getting admission in this major. I know that the University of Arizona, which we all hold in such high esteem, will not take away this opportunity from all of us due to my getting slightly lesser GPA grades.