Effects of Cyberbullying on Children and Teens

Effects of Cyberbullying on Children and Teens Bullying are a serious problem within today’s teens and youths. One type of bullying is called Cyberbullying. As the more technology is created, the easier it is for students to bully each other.

Effects of Cyberbullying on Children and Teens
Effects of Cyberbullying on Children and Teens

Within this paper, it will be explored in great detail about what is cyberbullying and what the difference between boys and girls is. The effects on children and teens. What has been tried to combat bullying? As students going into any field regarding children like Education, it is important to comprehend that society is going to know what these children are experiencing. My essay should be for school-aged children/

Emerging Use of Technology in Critical Infrastructure

Emerging Use of Technology in  Critical Infrastructure

Technology Review #2: Emerging Application of Technology in a Critical Infrastructure

Emerging Use of Technology in Critical Infrastructure
Emerging Use of Technology in Critical Infrastructure

The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications of an emerging application of technology in the context of a critical infrastructure sector. Your selected technology may be hardware, software, or systems that rely upon both hardware and software. Your research will also include an examination of the cybersecurity implications of using this technology in critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable sources for your literature survey are journaled articles, papers published in conference proceedings, and research studies published in dissertations.

 

Digital Technologies in New Forms of Participation and Surveillance

Digital Technologies in New Forms of Participation and Surveillance Digital Technologies enable new forms of participation just as they enable new forms of surveillance.

Digital Technologies in New Forms of Participation and Surveillance
Digital Technologies in New Forms of Participation and Surveillance

Critically discuss the statement, give details, base the arguments and the analysis on the references. You do not have to follow the attached template if you think that there is a better way to structure the essay.

2,800-3,200 word essay by the deadline of 23rd April 2019

Critically discuss the statement: Digital Technologies enable new forms of participation just as they enable new forms of surveillance.

Digital Technologies in New Forms of Participation and Surveillance Introduction

It is often thought that digital technologies not only empower advanced ways of communication but also form new ways of surveillance. This essay will critically analyze the correlation between these two factors through a thorough investigation of their implementation and impact throughout time. Furthermore, this academic paper will establish the justification to the debate, of whether or not one factor alters another.

  1. Say what the debate is going to be about
  2. Vaguely touch on the points of discussion

Para 1:

During the last two decades, the community of the globe has been presented to the world wide web, which brought a powerful change in how people live their lives now in comparison to twenty years ago. This innovative mechanism has brought change to a few important aspects of our lives. Firstly, accelerating the speed of communication – step one was the emails and fax machines, which thought to be the most advanced technologies that could ever be invented at the time, following to nowadays of instant messaging through What’s App, Facebook Messenger, and other social media platforms. It is legitimate to notice that previously if people were ought to discuss something, they were meant to either meet face to face or send post letters, which could have taken weeks to be delivered. Secondly, shopping has now become much more mobile and convenient, people from all around the world can save their time purchasing the needed products just by clicking a few buttons.

Digital Technologies in New Forms of Participation and Surveillance

This factor not only facilitates the process but also creates many workspaces, for those who are delivering, sorting and managing the goods from the online stores. Thirdly, business developments and startups have are now open up to the access to the online community, this facilitates the marketing strategies for entrepreneurs, as nowadays they can simply open up an Instagram account of the shop and deliver the information and sell products through it.

  1. How do digital technologies enable new forms of participation?
  2. Examples
  3. Reading 1
  4. Explanation
  5. Reading 2
  6. Explanation
  7. Benefits
  8. Disadvantages

Digital Technologies in New Forms of Participation and Surveillance

Para 2:

  1. How do digital technologies enable new forms of surveillance
  2. Examples
  3. Reading 3
  4. Explanation
  5. Reading 4
  6. Explanation
  7. Reading 5
  8. Explanation
  9. Reading 6
  10. Explanation
  11. Benefits
  12. Disadvantages

Para 3:

  1. Which of the following enables more to the public
  2. Reading 7
  3. Explanation
  4. Reading 8
  5. Explanation

Conclusion

5G Wireless Technology Brief Research Survey

5G Wireless Technology Brief Research Survey You are required to write a report surveying the state-of-the-art in 5G-wireless technologies.

5G Wireless Technology Brief Research Survey
5G Wireless Technology Brief Research Survey

You may refer to my IEEE paper uploaded in the “files” section and some of the references therein, write a brief research survey (around 10 pages), and submit a report following the format of my survey article. However, this being a report, it needs to have a cover page and table of contents. (There’s no limit on the number of sources if more are applicable) All new 5G mobile technology is expected to be operational by 2020. This time, it is, therefore, crucial to know the direction of research and developments enabling 5G technology.

Surface Plasmon Lasers on Nanophotonics

Surface Plasmon Lasers on Nanophotonics The paper on Nanophotonics

Topics:

Surface Plasmon Lasers on Nanophotonics
Surface Plasmon Lasers on Nanophotonics
  1. Surface Plasmon lasers.

The paper should include:

  1. i) Broad overview
  2. ii) Current-state of the technology

iii) Some areas of application (i.e. computing, data storage, imaging, communication, chemical/biological sensing, manufacturing, entertainment, etc) enabled by the technology

  1. iv) Challenges to the development of the technology
  2. v) Relevant references

The paper should be about 10-20 pages, typed, double-spaced with font size 12. Nanophotonics and plasmonics is the study of light at the nanometre-scale. Light can only be focused to a spot roughly half its wavelength in size (a few hundred nanometers for visible light).

The Ipv6 Datagram Flow Label Field

The Ipv6 Datagram Flow Label Field The flow label is included in IPv6 in order for it to operate in a connection-oriented manner for sending the IPv6 datagram.

The Ipv6 Datagram Flow Label Field

Its size is 20 bits and “may be used by a host to label those packets for which it is requesting special handling by routers within a network” (Stallings and Case, 2013, p. 239). According to Forouzan (2013), “In its simplest form, a flow label can be used to speed up the processing of a packet by a router.

The Ipv6 Datagram Flow Label Field
The Ipv6 Datagram Flow Label Field

In its more sophisticated form, a flow label can be used to support the transmission of real-time audio and video” (p. 676). Routers that support flow labels typically have a flow label table that it consults each time it receives a packet with a flow label to know how to process the packet (Forouzan, 2013).

The Ipv6 Datagram Flow Label Field

An interesting observation about flow label tables is that they are not automatically populated from the flow labels themselves, but rather from other means (Forouzan, 2013). There are many various applications for the flow label. A flow label allows for the router to quickly route the packet using just the flow label table rather than consulting its forwarding table or implementing its routing algorithm to know the packet’s next destination (Forouzan, 2013). Jaeggli (2018) discussed how major operating systems set the flow label to non-zero values; Ethernet, switches, routers, and other devices have implemented the flow label for scalability and as an addition to a hash component.

The Ipv6 Datagram Flow Label Field

Compatible and Mapped Addresses

Compatible addresses are addresses of 96 bits of zero in the IPv6 address followed by the 32 bit IPv4 address. According to Oracle (2010), “The compatible format is used to represent an IPv6 node. This format enables you to configure an IPv6 node to use IPv6 without having a real IPv6 address.” Compatible addressing is used when a computer using IPv6 sends a message to another IPv6 computer (Forouzan, 2013). Mapped addresses, in contrast, are used when one machine that has already moved to using IPv6 sends a message to a machine that still only uses IPv4. Oracle (2010) further stated, “The mapped address format is used to represent an IPv4 node. The only currently defined use of this address format is part of the socket API. An application can have a common address format for both IPv6 addresses and IPv4 addresses. The common address format can represent an IPv4 address as a 128-bit mapped address.”

The Ipv6 Datagram Flow Label Field Combined Protocols

Three protocols that are part of the IPv4 network layer that have been combined into one protocol with IPv6 are ICMP, ARP, and IGMP. The combined protocol in IPv6 is named ICMPv6 (Forouzan, 2013). Because of the combining of three protocols into one, ICMPv6 is more complex. Forouzan (2013) described the categories of messages for the ICMPv6 protocol as error-reporting, informational, neighbor-delivery, and group-membership. This combining of three into one reminds me of the biblical idea of the trinity. Though God was not combined into one God from three separate gods (as is the case with ICMPv6), we nevertheless see three persons in one God. A good example of this is found in the commissioning passage in Matthew 28:18-20. Jesus stated,

“All authority in heaven and on earth has been given to me. Go therefore and make disciples of all nations, baptizing them in the name of the Father and of the Son and of the Holy Spirit, teaching them to observe all that I have commanded you. And behold, I am with you always, to the end of the age.” Baptism into the triune God is a wonderful illustration of the trinity.

The Ipv6 Datagram Flow Label Field IP Header

The purpose of including the IP header is because it contains the IP address of the original source. The first 8 bytes of the datagram data are included in the header because those bytes detail the first section of the transport layer header included from the payload (Forouzan, 2013). This part of the header contains information about the port numbers and the sequence number. This additional information in the header allows the source to send the error message to the right destination.

IPv6 Address for Home Use

The first three bits of an IPv6 address from an ISP for home use are 111 (Forouzan, 2013). IPv6 addresses for home use are private addresses and correspond to the link-local block.

The Ipv6 Datagram Flow Label Field

Explain the use of the flow field in IPv6.

The book describes the flow label field as “a 20-bit field that is designed to provide special handling for a particular flow of data” p 675 and “can be used to speed up the processing of a packet by a router” (Forouzan, 2013 p.676)

What is the potential application of this field?

“This field will allow routers to treat packets differently via a special routing table called the flow label table.”

(Forouzan, 2013 p.676)  The book suggests usages such as real-time audio and video because of the technical needs of the data “high bandwidth, large buffers, long processing times…” which is a noble idea, give preference in routing to the technologies that need preference, however, were I managing the allotting of this preferential treatment I would auction the preferential treatment to the highest bidder.

IPv6.com provides a similar explanation “When routers receive the first packet of a new flow, they can process the information carried by the IPv6 header, Routing header, and Hop-by-Hop extension headers, and store the result in a cache memory and use the result to route all other packets belonging to the same flow” (IPv6 Header Deconstructed, 2019).  If I were Comcast or Verizon or some other ISP, I would price out the fastest lines and sell the preferred treatment to business customers.

A real world example is in Virginia Interstate 95 from Fredericksburg to Washington DC has High Occupancy Toll (HOT) lanes where the cost of riding in the lanes, with fewer than three people in the car, is based on the amount of traffic at any given time, the more traffic the higher the toll, which reminds me a great deal of the flow label.  If you want to skip the traffic and congestion you have to pay the toll.  The highest toll I have seen is $29.85 to go 8 miles one way one time.

Being a former commuter, I found this same practice being implemented by the Virginia Railway Express (VRE) commuter train in Virginia.  Many an afternoon I spent 30 minutes or more sitting going nowhere waiting for the Tropicana 2 mile long train to go by because that train had preferred access to the rail road…it did not wait…period and Tropicana paid a premium for that treatment.

The Ipv6 Datagram Flow Label Field

Interestingly the Obama administration tried to prevent the potential benefits of the flow label field, via the FCC and “Net Neutrality”, which is a colloquialism whose goal is as follows “Internet service providers (ISPs) should treat all data that travels over their networks fairly, without improper discrimination in favor of particular apps, sites or services” (Net Neutrality, n.d.)…it seems like the goal is directly opposed to the goal of the IPv6 flow label field.

While treating all data fairly appears a noble pursuit “The last thing we should want is [a president] or a government agency picking winners and losers on the Internet. And enforcing net neutrality is picking winners and losers even if it looks like it is just “leveling the playing field.” …it completely blocks certain business models and stops any possible innovation that might emerge if given the option of seeking differential access to bandwidth.” (Dorfman, 2014).

Consider the cost of physically installing the wires underground or under the ocean and the expectations of the rewards of this effort, as Psalms 128:2 tells us, “For thou shalt eat the labor of thine hands…”, and then a government or other authority structure of man steps in and denies you that benefit for no other reason than to be “fair” to someone else who put forth none of that effort

The Ipv6 Datagram Flow Label Field

Distinguish between compatible and mapped addresses and explain their applications.

The course book reads “during the IPv4 to IPv6 transition hosts can use their IPv4 address embedded in an IPv6 address.  To support these two formats have been design “compatible and mapped”

A Compatible Address is an address of 96 bits of zero followed by 32 bits of IPv4 address.  It’s used when a computer using

IPv6 wants to send a message to another computer using IPv6

A Mapped Address is used when a computer already migrated to version 6 wants to send an address to a computer still using version. 4” (Forouzan, 2013 p.671)

This approach reminds me of when the US Postal Service switched from a 5 digit Zip Code to a 9 Digit Zip Code.

The Ipv6 Datagram Flow Label Field

Coincidentally those extra 4 digits function similarly to protocol fields “The sixth and seventh digits point to a delivery sector, which may be several blocks, a group of streets, a group of Post Office boxes, several office buildings, a single high-rise office building, a large apartment building or a small geographic area. The last two digits represent a delivery segment, which might be one floor of an office building, a side of a street, specific departments in an office, or specific Post Office boxes.” (Zip-Codes.com, n.d.)

List 3 protocols in the IPv4 network layer that are combined into a single protocol in IPv6.

The IGMP, ICMPv4, and ARP protocol from in IPv4 have been combined into a single protocol ICMPv6 in IPv6 (Forouzan, 2013 p.679)

What is the purpose of including the IP header and the first 8 bytes of datagram data in the error-reporting ICMP messages?

The reason that the IP header and first 8 bytes of a datagram data in the error reporting ICMP message is included is to help you understand what conditions might have created the error message.  (Forouzan, 2013 p.576)

The Ipv6 Datagram Flow Label Field

If you are assigned an IPv6 address by your ISP for your personal computer at home, what should be the first (leftmost) 3 bits of this address?

“The block in the address space that is used for unicast (one-to-one) communication is called…the global unicast address block” (Forouzan, 2013 p.668) looking at the table in the course text book Global Unicast is 001 so the leftmost 3 bits would be 001.

Gene Driver Technology Research Paper

Gene Driver Technology Research Paper Your Ethics Essay will be developed around a particular application of the CRISPR Cas9® and the associated Gene Driver technology.

Gene Driver Technology Research Paper
Gene Driver Technology Research Paper

Your focus will be on the ethical issues that are specific to the application of the technology you have located.

Your Ethics Essay, to be submitted in module 2, should be between 1000 and 1500 word long, and should include:

The title, author, publication, and dates for the particular research project you are examining

A clear detailed description of the ethical issues raised by this particular project, not just gene altering in general, is specific and detailed.

What are the scientists working on the project doing to address these ethical concerns? What more could they be doing?

How do the actions of the researchers compare to the ethical guidelines you examined?

What is the community saying about these ethical concerns? Describe the stakeholders and their various positions. For example, farmers supporting GMO crops vs. environmentalists who are concerned about the spread of the altered genes to non-food crop plants.

Do you think the stakeholders understand the scientific efforts to address ethical concerns? Why or why not?

What are some potential unintended consequences from the research and the interactions with the stakeholders in the community?

Must use only one reference: Beth Rowan UC Davis Targeted meiotic recombination using CRISPR-Cas9 for crop improvement

Does technology make people have isolation issues?

Does technology make people have isolation issues?
Does technology make people have isolation issues?

Does technology make people have isolation issues?

Use an MLA style heading and header.

  1. Topic Idea
  2. Who are you trying to persuade? Describe your target audience. What do they know? What do they need to know to understand your argument?
  3. What do you know about the background of the topic?
  4. What are you arguing for/against?
  5. What will you need to learn more about?
  6. What is the counterargument?
  7. Who would counter your argument?
  8. How will you refute their counter argument?
  9. What is the outcome of your argument? What would change if people were persuaded to your point of view?
  10. What types of sources do you anticipate using for your essay?
  11. Write a tentative thesis statement.
  12. Do you have any questions?

We can write this or a similar paper for you! Simply fill the order form!

Emerging technologies Essay Assignment

Emerging technologies
Emerging technologies

Emerging technologies

Assignment Type: Written 1800-2000 words – Submitted in the usual way by 18 April 2019

Learning Outcome(s) Assessed: CLO 1,2 and 3

Description of Assignment: Extensively researched and fully referenced report on an aspect of the Internet of Things namely: The Workplace of the Future with a particular focus on the Skills that will be in demand over the next 5-10 years. Your report should use the Workplace of the Future as context to lead you into the skills you feel would be most needed and even how people will acquire, use and enhance those skills.

By describing the Workplace of the Future you will give cause to the increased focus on the skills you believe are most needed to work well in that technologically-enhanced world.

We can write this or a similar paper for you! Simply fill the order form!

Technology Review Assignment Paper

Technology Review
Technology Review

Technology Review

The purpose of this technology review is to identify an emerging application of technology, suitable for use by businesses or consumers, and then research the cyber-security implications of the technology using journal articles, papers published in conference proceedings, and research studies published in dissertations. This type of research is also referred to as a survey of the literature.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!