lunes, 20 de marzo de 2023

Artificial intelillence in 30 years

 

Artificial intelligence has come a long way in the past few decades, and it’s difficult to predict exactly what the field will look like 30 years from now. However, based on current trends and research, it’s likely that AI will continue to advance at a rapid pace, with numerous applications across a range of industries. One major area of focus will likely be the development of more advanced machine learning algorithms, which can analyze vast amounts of data to make more accurate predictions and decisions. This will have important implications in fields such as healthcare, finance, and transportation, where AI can help identify potential risks or opportunities that would be difficult for humans to spot.

Another area of interest is the development of more sophisticated natural language processing technology, which would allow computers to better understand and communicate with humans. This could be particularly useful in fields such as customer service, where AI-powered chatbots could provide more personalized and efficient assistance to customers.

In terms of human applications, one possibility is the development of brain-computer interfaces, which would allow people to control machines directly with their thoughts. This could have a wide range of potential applications, from allowing people with disabilities to use computers more easily, to enabling soldiers to control drones on the battlefield without the need for a physical controller.

However, there are also important ethical and societal considerations that must be taken into account as AI technology advances. Ultimately, the future of AI is both exciting and uncertain, and it will be up to researchers, policymakers, and society as a whole to determine how to best harness the power of this technology while mitigating its potential risks.

martes, 21 de septiembre de 2021

Introduction to Networking

 

What is networking?

The word networking has its origin from the union of Net, which means network and  working, which means working. Networking is, then, that social-professional circle that can give you several opportunities for growth and reference with your company or your business if you are an entrepreneur.

 

Networking is taking advantage of a certain space and time to meet people who can contribute to your learning in working life.

Rock content. (February 3, 2018). Know the virtues of Networking and start applying it.

https://rockcontent.com/es/blog/que-es-networking/

 

Importance of networking

 Since a few years, it has become even more evident that small and medium-sized enterprises frequently use networks to access and acquire information relevant to their international growth.  Itis an indispensable requirement for a successful internationalization to be part of the relevant networks, since being marginalized or outside a network, affects more negatively than being a foreigner. For these authors "markets are networks relationships in which companies are linked to each other through varied, complex, and invisible patterns; and relationships offer spaces for learning, building trust and commitment, which are preconditions for internationalization."

María Alejandra González Pérez, Semana. (September 2, 2014). Networking and internationalization: The relevance of networks.

https://www.semana.com/opinion/columnistas/articulo/importancia-del-networking-creacion-participacion-redes/200495/

 

Responsibility of networking.

Although Corporate Social Responsibility (CSR) still does not enjoy much visibility in the economic press, it is increasingly difficult to deny its importance in the growth and competitiveness strategies of organizations. Indeed, the competitive factor and the differentiating advantage granted by a correct management of CSR are increasingly perceived by consumers as elements that determine their choice when buying or using the services offered by companies. CSR is the visible part of the business contribution to sustainable development that entails three essential aspects today: the economic, social and environmental.

Business commitment. (August 6, 2010). Social responsibility in social networks.

https://www.compromisoempresarial.com/opinion/2010/08/la-responsabilidad-social-en-las-redes-sociales-fpeligro-u-oportunidad/

Law 9048

Law 9048 on Computer Crimes establishes reforms and modifications to the Criminal Code, which establishes new criminal types such as identity theft, impersonation of electronic pages and installation or propagation of malicious computer programs.  Other crimes such as the violation of correspondence and personal data, extortion, computer fraud, computer damage and espionage are also contemplated.  With the above, it seeks not only the protection of natural persons, but also of legal persons.

Anna Georgina Velásquez Vásquez, UCR. (August 21, 2012). Experts believe that Computer Crimes Law.

https://www.ucr.ac.cr/noticias/2012/08/21/expertos-creen-que-ley-de-delitos-informaticos.html

 

Article 167

This one is about corruption.

Anyone who maintains or promotes the corruption of a minor or incapacitated person, for erotic, pornographic or obscene purposes, in public or private exhibitions or shows, even if the minor or incapacitated person consents to it, shall be punished with a prison sentence of three to eight years.

Article 196

Anyone who, with danger or damage to the privacy or privacy of a third party, and without their authorization, seizes, accesses, modifies, alters, suppresses, intervenes, intercepts, uses, opens, disseminates, or diverts from their destination documents or communications addressed to another person shall be punished with a prison sentence of three to six years.

a) The persons in charge of the collection, delivery or safeguarding of documents or communications.

b) Persons responsible for administering or supporting the computer or telematics system or network, or who, due to their functions, have access to that system or network, or to electronic, optical, or magnetic containers.

Article 214

Anyone who, to procure a profit, forces another, with intimidation or serious threats, to make a disposition of property harmful to himself or to a third party shall be punished with imprisonment of four to eight years.

Article 217

A term of imprisonment of three to six years shall be imposed on anyone who, to the detriment of a natural or legal person, manipulates or influences the entry, processing or result of data from an automated information system, whether through the use of false or incomplete data, the misuse of data, programming,  using any computer operation or technological artifice, or by any other action that affects the processing of system data or that results in false, incomplete or fraudulent information, with which it seeks or obtains an economic or undue benefit for itself or for another.

Article 229

A term of imprisonment of one to three years shall be imposed on anyone who, without the authorization of the owner or exceeding that which would have been granted and to the detriment of a third party, deletes, modifies, or destroys the information contained in a computer or telematic system or network, or in electronic, optical or magnetic containers.

Article 288

Anyone who improperly procures or obtains secret political or national police or security information concerning the means of defence or foreign relations of the nation or affects the fight against drug trafficking or organized crime, shall be punished with imprisonment for four to eight years.

Costa Rican system. (September 21, 2021). Reform of several articles and modification of section VIII, called computer and related crimes, of Title VII of the Criminal Code.[AJ1] 

http://www.pgrweb.go.cr/scij/Busqueda/Normativa/Normas/nrm_texto_completo.aspx?param1=NRTC&nValor1=1&nValor2=73583&nValor3=90354&strTipM=TC


 [AJ1]

lunes, 20 de septiembre de 2021

 


Network adapter

The network card, also known as a network board, network adapter, LAN adapter, physical network interface,1 or its English terms network interface card or network interface controller (NIC), whose literal translation from English is "network interface card" (TIR), is a hardware component that connects a computer to a computer network and that makes it possible to share resources (such as files,  entire hard drives, printers, and the internet) between two or more computers, i.e., in a network of computers.



Wikipedia. (September 14, 2021).     Network adapter

https://es.wikipedia.org/wiki/Tarjeta_de_red

 

Attenuation

In telecommunication, the attenuation of a signal, whether acoustic, electrical or optical, is called the loss of power suffered by it when transiting through any means of transmission.  For example, sound attenuation is the distribution of wave energy among an increasing volume of air.


            Wikipedia. (September 14, 2021). Attenuation

https://es.wikipedia.org/wiki/Atenuación

 

Bus network

A bus network is that topology that is characterized by having a single communications channel (called bus, trunk or backbone) to which the different devices are connected. This way all devices share the same channel.

It is the third of the major topologies. The stations are connected by a single cable segment. Unlike a ring network, the bus is passive, no signal generation occurs on each node or router. In the bus topology all nodes (computers) are connected to a common circuit (bus). The information that is sent from one computer to another travels directly or indirectly, if there is a controller that routes the data to the correct destination. The information travels through the cable in both directions at an approximate speed of 10/100 Mbps and has at its two ends a resistance (terminator). A large number of computers can be connected to the bus, if a computer fails, communication is maintained, the same does not happen if the bus is the one that fails. The type of cabling used can be coaxial, twisted pair or fiber optics. In a bus topology, each computer is connected to a common segment of network cable. The network segment is placed as a linear bus, that is, a long cable that goes from one end of the network to the other, and to which each node of the network is connected. The cable can go through the floor, walls, ceiling or various places, as long as it is a continuous segment.

Wikipedia. (September 14, 2021).     Bus Network

https://es.wikipedia.org/wiki/Red_en_bus

 

Coaxial cable

The coaxial cable, coaxil, coaxcable or coax, is a cable used to transport high frequency letric signals that has two concentric conductors, a central one, called a core, in charge of carrying the information, and an external one of tubular appearance, called mesh, shielding or braid, which serves as a reference of earth and return of the currents. Between them is a dielectric insulating layer, on whose characteristics the quality of the cable will depend mainly. The whole assembly is usually protected by an insulating cover (also called an outer jacket).

 

Coaxial cable was employed in the first transatlantic telegraph cables from 1858, but its theory was not described until 1880 by the English electrical engineer and mathematician Oliver Heaviside, who patented its design that same year.


Information retrieved and created by Wikipedia

(https://es.wikipedia.org/wiki/Cable_coaxial)

 

Optical fiber

Fiber optics are the technology used to transmit information in the form of pulses of light using fiberglass or plastic wires, over long distances.

 

Optical fibers measure around the diameter of a human hair, and when combined into a fiber optic cable they allow more data to be transmitted over longer distances and faster than other media. It is the technology that allows to provide homes and companies with Internet, telephone and fiber optic TV services.

Information retrieved and created by Verizon

(https://espanol.verizon.com/info/definitions/fiber-optics/)

 

UTP

Inside a UTP cable is up to four twisted pairs of copper wires, enclosed in a protective plastic cover, with the greater number of pairs corresponding to more bandwidth. The two individual wires in a single pair are twisted around each other, and then the pairs are twisted around each other, as well. This is done to reduce crosstalk and electromagnetic interference, each of which can degrade network performance. Each signal on a twisted pair requires both wires.

SearchNetworking. (September 2019). Unshielded Twisted Pair (UTP)

https://www.techtarget.com/searchnetworking/definition/Unshielded-Twisted-Pair

Network hub

A hub is a small, rectangular, inexp-or-good device that joins multiple network-enabled devices. They are often made of plastic and receive power from a common power outlet.

 

The purpose of a hub is to form a single network segment in which all devices can communicate directly with each other.

 

Until the early 2000s, Ethernet hubs were widely used for home networks due to their simplicity and low cost. While broadband  routers have  replaced them in homes, hubs still have a useful purpose.

Kevin Stein. (2 years ago).  What are network and ethernet hubs?

https://androidzeal.com/red-internet/que-son-los-concentradores-de-red-y-ethernet/

 


Datagram

A datagram is a data packet that constitutes the minimum block of information in a datagram switching network, which is one of two types of packet switched communication protocol used to route these information units between nodes in a network over different routes, so it is said to be non-connection-oriented. The alternative to this packet switching is the virtual, connection-oriented circuit.


Wikipedia. (  January 28,  2021). Datagram.

https://es.wikipedia.org/wiki/Datagrama

 

MAC address

When you're checking your network for who's connected to it, the programs you're going to use will show you certain information about the connected devices. For example, you'll know its manufacturer, its IP address, and its MAC. Usually it does not cost too much to identify each device, but sometimes we have so many that things get a little complicated.



Yúbal Fernández, engadget. (October 6, 2017) .  What is the MAC address of your computer, mobile or any device?

https://www.xataka.com/basics/que-es-la-direccion-mac-de-tu-ordenador-del-movil-o-de-cualquier-dispositivo

 

 

Protocol

In computer science and telecommunication, a communications protocol is a system of rules that allow two or more entities (computers, cell phones, etc.) of a communication system to communicate with each other to transmit information by means of any type of variation of a physical magnitude. These are the rules or standard that defines the syntax, semantics and synchronization of communication, as well as possible methods of error recovery. Protocols can be implemented by hardware, by software, or by a combination of both.

Wikipedia. (April 5, 2021). Communications protocol.

https://es.wikipedia.org/wiki/Protocolo_de_comunicaciones

 

DNS

The Domain Name System (DNS) is the internet's telephone directory. People access information online using domain names, such as nytimes.com or espn.com. Web browsers interact using Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so that browsers can load Internet resources.



Cloudflare. (2021) What is DNS?

https://www.cloudflare.com/es-es/learning/dns/what-is-dns/

 

Server

A server is a system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, servers are those computers that share resources with client machines. There are many types of servers, such as web servers, mail servers, and virtual servers.



Information retrieved and created by PAESSLER.

(https://www.paessler.com/es/it-explained/server)

Artificial intelillence in 30 years

  Artificial intelligence has come a long way in the past few decades, and it’s difficult to predict exactly what the field will look like 3...