Friday, February 14, 2020

Thoughts Essay Example | Topics and Well Written Essays - 1000 words

Thoughts - Essay Example The search that can be acceptable among all the people should define clearly what is involved and what is not. This will save the members of society from the intentional interference by the police. The current use of domestic drones has risked the people’s privacy a great deal (Lyle, 2012). Since they are very small and invisible, they can be anywhere anytime. This makes people insecure as their most private details can be easily accessed. The police have been trespassing people’s private places without and searched all places without permission from the owner (Supreme Court of the United States, 2012). They have as well seized private properties in the name of being abandoned. This is not lawful as it is against the rights of citizens. It tortures the minds of law abiding citizens as it does not differentiate between criminals and the obedient citizens. Through this form of search in place, many innocent people have been held responsible for the crimes they never commi tted (Orin, 2011). This is because if anything forbidden by the law is found in a curb, the immediate residents are held responsible. As the law even maintains that accused person is innocent until proved guilty, the police should wait for the permission from the property owners. ... This will definitely lead to a better meaning of search and hence a new definition. Response to question 2 I agree with this paragraph. The search which has no boundaries is likely to retrieve people’s privacy. This is because it does no abide with the directives of the fourth amendment which states that people should be secure in their persons, effects, papers and houses (Orin, 2011). Any search which does not guarantee people these forms of privacy is classified as intrusion. The boundaries that should be put in place are those which will improve the security of the nation while protecting the privacy rights of the people. The boundaries to be observed in searches should ensure that the unreasonable searches and seizures are not allowed. This will ensure that people’s privacy is effectively respected. These are the boundaries that should be observed in the modern definition of search. As the governments cannot stop collecting information for security reasons, this sho uld be done in a way that respects people’s privacy (Orin, 2011). The use of domestic drones though should be restricted; it should not be eliminated completely because they are crucial in maintaining security (Lyle, 2012). Other technological applications that collect information should not be fixed in private areas so as to avoid collection of information that violates people’s privacy. This way the current definition of search will be the most accurate and beneficial to protect the privacy of all law abiding citizens. This calls for the maintenance of the definition and its application so as to enable the security personnel to respect the privacy of all individuals by making sure that unreasonable

Sunday, February 2, 2020

Cloud Computing Essay Example | Topics and Well Written Essays - 1500 words

Cloud Computing - Essay Example Although this technology has many advantages to a global society, it has a number of risks that make it disadvantageous in its application. The development of the cloud computing technology spans a long historical period that has seen it the common phrase today in the in information technology today. In the 1950s the mainframe computer technology had many drawbacks that necessitated the need of sharing resources within computer networks in public institutions. During this time, the mainframe computers were slow and expensive and it was virtually impossible to provide each person with a mainframe computer. Consequently, the need for sharing information arose in public institutions where the number of computers were much less than the number of clients. To achieve this, the static terminals, which were used for communicating but had no processors, were invented to ensure that the CPU clock speed and the resources within the mainframe memory could be shared among various clients. Betwee n the year 1960 and 1990, cloud computing became more common as scientists suggested that it was possible to connect the whole world through the use a few data centers and numb terminals located from all over the world (Furht, and Armando 10). At this stage, this technology was foreseen as an invention that would globalize the world and connect all human beings within a cohesive network. The period between 1990 and 2000 has been a period of rapid transition of cloud computing technology. Telecommunication service providers adopted the virtual private network (VPN) in which their clients could access networks remotely. Also, this was the time when the cloud computing symbol was used by service providers to mark a separation between the core network and the client side of the network. After the proliferation of the internet technology, the internet formed common network where information could be shared and distributed within virtual computer systems. In 2000, companies such as the Am azon modernized their data centers and provided high capacity networks where information could be accessed by many clients in their online presence. Today, this technology has been adopted within the business systems to synchronize global business operations and form high capacity networks that can provide data to all clients in the world (Furht, and Armando 15). Cloud distributors have become popular as they adopt hardware Virtualization and utility computing that have become the drivers of the cloud computing technology. The cloud computing architecture is divided into two ends that separate the storage and the access sides. Strickland (2) regards the two sides of the cloud computing architecture as the front end and the back end. The front end side is constituted by the client’s computer network and the associated applications that facilitate access of the networks. Mozilla Firefox and the internet explorer are just some of the applications that are commonly used by client s to access the internet on the front end. On the other hand, the back end side constitutes the computers, servers and the autonomous data storage systems that allow the formation of a cloud that can be accessed from the front end. The internet forms a link between the front end and the back end as it forms the channel of communication between the clients and storage servers.