Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

27 June 2025

Future of Internet Access

The internet, a cornerstone of modern civilization, remains out of reach for a significant portion of the global population. While traditional methods like fiber optics, wired connections, and satellite internet have propelled connectivity forward, their high deployment costs, intricate installation processes, and inherent limitations, especially in remote or underserved areas, highlight a pressing need for transformative alternatives. The true democratization of internet access hinges on the advent of innovative, "plug-and-play" solutions that offer low expense, minimal setup, and robust speeds, bypassing the conventional infrastructure hurdles.

One of the most compelling contenders for future internet access is Light Fidelity (Li-Fi), a revolutionary technology utilizing visible light communication (VLC). Unlike Wi-Fi, which relies on radio frequencies, Li-Fi transmits data through LED light, effectively turning every light fixture into a high-speed broadband source. Its advantages are manifold: potentially gigabit speeds, unparalleled security due to its inability to penetrate opaque surfaces, and immunity to electromagnetic interference, making it ideal for sensitive environments. For end-users, a Li-Fi enabled device could offer instant connectivity upon entering an illuminated area, embodying the ultimate "plug-and-play" experience with virtually no complex setup or new cabling required.

Another promising avenue lies in harnessing the existing, yet underutilized, TV White Space (White-Fi). These are the unused broadcasting frequencies in the television spectrum that possess remarkable propagation characteristics, allowing signals to travel long distances and navigate obstacles more effectively than standard Wi-Fi. White-Fi has the potential to provide widespread, non-line-of-sight wireless coverage, establishing cost-effective middle and last-mile connections where laying physical fiber is economically or logistically prohibitive. This technology could empower communities with broad access using easily deployed transceivers.

Furthermore, the evolution of Millimeter Wave (mmWave) fixed wireless access (FWA), particularly with the advent of 5G and future 6G technologies, offers a genuine fiber alternative. While mmWave signals are typically short-range, their capacity for immense bandwidth is unparalleled. When deployed as FWA, a compact, easily installed receiver at a home or business can capture ultra-fast signals from a nearby base station. This setup minimizes the need for extensive physical digging or complex wiring, providing a rapid, high-speed, and low-setup broadband solution for residential and commercial users.

While less about direct "plug-and-play" access for consumers, advancements in quantum computing could profoundly reshape the internet's underlying infrastructure. Quantum technologies might enable incredibly secure communication networks through quantum cryptography, or drastically improve network optimization and data processing capabilities, leading to more efficient and faster data transmission across the globe. Though not an end-user access method, quantum breakthroughs could form the secure, high-capacity backbone of tomorrow's internet, indirectly enhancing the speed and reliability of all access points.

The collective promise of Li-Fi, White-Fi, and mmWave FWA, alongside the potential for quantum-enhanced network security, points towards a more democratic and resilient internet future. These innovations offer a path to bridge the digital divide by providing high-speed, low-cost, and easy-to-deploy connectivity, transforming internet access from a privilege into a truly universal utility.

23 January 2023

Social Media Culture

Social media networks are widespread on the internet. However, this experience is good for some people but very bad for others. The bad experiences often lead to hightened states of depression. Social media invariably is all about popularity. But, this popularity is also overshadowed by not only influence but also the level of negative sentiments one can receive from people. In most cases, the person that subscribes or follows a person is totaly a stranger. This strangeness and unfamilarity of people leads to a very cold and defensive state of interaction especially among women. Removing someone from your follower/subscriber count may mean nothing for one person while could mean the world to another. In other cases, not getting reply from a person can be quite an issue for others. Other cases might involve blocking which the person might take quite personally. In general, people of celebrity status have had it quite easy as they already can gain plenty of followers from just influence or even hiring a separate marketing agency to manage their social accounts. However, other people likely would have to work towards it. People often may only reply to you based on your popularity as that would increase their follower count. Social media also seems to be a network of hierarchies. In many cases, it reflects the way people climb the social ladder, in associating with people who are more popular or influencial. When people get a very high follower or subscriber count they also have a tendency of becoming quite bigheaded and proud of their achievement. You never really know whether you are talking to a human or a bot on social media. And, whether someone's post is a scheduled post or something they directly replied to. In fairness, this could also be a reason why so many people are less empathetic. Social media as a result tends to be more about playing the game. It also seems to be a very cold place to hang out. Some people obviously don't care for popularity, influence, nor take the whole experience that seriously and this likely also negatively impacts their experience. Often the way the person looks also effects their popularity. Social media networks tend to be a breeding ground for shallow people, like an ego network. Recommendations are also geared towards popularity of content which further compounds the biases. No doubt social media can be addictive. But, it has also become a battle ground for people who want to display their frustrations, their hypocrisy, and be who they want to be outside of the confines of the real world. This often leads to some people being very unempathetic towards the people they interact and communicate, often with an unconscious bias. In many respects, social media reflects the real world, only worse. It also can be an opportunity to take a glimpse through the looking glass as to the reality of character and ideological mindset of people, especially as so many feel they can say whatever they like and treat people however they like without much regard for consequence. They are also great for mining data and analyzing human behavior. Take a step away from social media and see how the world suddenly feels simpler, more productive, likely less stressful, and frustrating.

7 June 2021

Why Microsoft Products Are Terrible

  • Tight coupling approach to products and services
  • Documentation bias towards own products and services
  • This only works on windows
  • Plagiarism and stolen code from other vendors
  • Security risks and software glitches
  • Business model built on stolen products, services, ideas, and code
  • Market hijacking
  • Consolidation rather than any significant innovation
  • Windows copied from Mac
  • DOS copied from DEC
  • Bing copied from Google
  • Explorer copied from Netscape
  • All windows versions come with design flaws
  • Lack of separation between OS and application
  • Unrepairable codebase
  • Waste of resources
  • The dreadful blue screen of death
  • Unreliable as cloud servers
  • Trying to do everything but master of none
  • Terrible network management
  • Terrible at internet related services and products
  • Enjoys copying other competitors
  • Lots of security vulnerabilities
  • Forced sales targets for substandard products and services
  • Marketing gimmicks that breed lies and failed promises
  • Buying open source solutions to kill off the competition
  • Doesn't support open source community
  • Works on the vulnerabilities of ignorant customers
  • Ease of use can be subjectivity and at the detriment to lack of quality
  • Ignorant users are happy users
  • Forcing updates and patch releases for security failures in quality
  • Bad practices and foul play
  • Forcing users to use windows instead of linux or mac
  • Vendor lock-in and further use of the cloud to apply the same methodologies
  • Business as usual with anti-trust
  • Rigged tests and distorted reality
  • Bogus accusations
  • Censorship
  • Limited memory protection and memory management
  • Insufficient process management
  • No code sharing
  • No real separation between user-level and kernel-level
  • No real separation between kernel-level code types
  • No maintenance mode
  • No version control on DLL
  • A weak security model
  • Very basic multi-user support
  • Lacks separation of management between OS, user, and application data  
  • Does not properly follow protocol standards
  • Code follows bad programming practices
  • Anti-competitive practices to block open source innovation and technological progress

5 June 2021

Unpredictable Google

Google services are the worst. One minute they are available for use. The next minute they are going through a decommissioning process. Then there is that aspect of their page ranking algorithms which keep changing effecting the publisher revenue. Not to mention the way they have recently been giving preferential treatment through a preferred advertising supplier network. One minute an API is available to use, next minute it is gone. The same is the case on GCP. Nothing seems to stay for very long before it is changed with a total lack of regard for the user. No time frames given for planning a migration. Not to mention the fact to find any information one has to literally hunt for it. One would think if they are a search company they would know how to make their searchable and findability functions user-friendly - but no. And, it takes ages to remove anything from their search engine. The company is also slack in following basic privacy and regulatory compliance. The company just gives off an air of arrogance like they can get away with everything without really being very responsible with user data. There seems to be a complete disconnect across the internal organization which shows in their products and services initiatives. Over the years, with multiple court cases in the international community, Google has been slowly but surely losing the sense of credibility of their services with users. Large company like Google eventually meets its faith when more issues with reliability and security of their services come into question while increasing frustration for their users for their lack of responsive customer care and dodgy business practices. A perfect example of a company that just doesn't care about the end-user.

13 July 2017

Fake News Detection


Datasets:
2016-10-facebook-fact-check
kaggle-fake-news
BuzzFeedNews-everything
liar_dataset
politifact-v2apidoc

Fact Checking Sites:
fullfact.org
politifact
opensecrets
snopes
truthorfiction
hoaxslayer
factcheck
Wikipedia
rationalwiki

Reuters Reports:
The Rise of Fact Checking Sites in Europe

Challenges:
Fake News Challenge
Rumor (Pheme)

Sources:
GDELT
Event Registry
SenticNet
ConceptNet

Word Embedding Training Sources:
CommonCrawl
Gigaword
Wikipedia
ConceptNet
SenticNet

Types of Biases:

bias - cognitive - anchoring
bias - cognitive - apophenia
bias - cognitive - attribution
bias - cognitive - confirmation
bias - cognitive - framing
bias - cognitive - halo effect
bias - cognitive - horn effect
bias - cognitive - self-serving
bias - cognitive - status quo
bias - conflict of interest - bribery
bias - conflict of interest - favortism
bias - conflict of interest - funding
bias - conflict of interest - lobbying
bias - conflict of interest - regulatory issues
bias - conflict of interest - shilling
bias - contextual - academic
bias - contextual - educational
bias - contextual - experimenter
bias - contextual - full text on net
bias - contextual - media
bias - contextual - publication
bias - contextual - reporting bias
bias - media - advertising
bias - media - concision
bias - media - corporate
bias - media - coverage
bias - media - false balance
bias - media - gatekeeping
bias - media - mainstream
bias - media - sensationalism
bias - media - statement
bias - media - structural
bias - prejudice/cultural - classism
bias - prejudice/cultural - lookism
bias - prejudice/cultural - racism
bias - prejudice/cultural - sexism

Types of Fake Content:

accounts
bias - cognitive
bias - conflict of interest
bias - contextual
bias - extreme bias
bias - media
bias - prejudice
bias - statistics
claim - cause/effect
claim - definition
claim - extreme claim
claim - fact
claim - policy
claim - value
clickbait - extremebait
clickbait - headlines
clickbait - linking
conspiracy
credibility
deception
fabricated content
false connection
false context
frequency heuristics
gossip
groups
hate speech
hoaxes
imposter
imprecision
influence
irony
junkscience
manipulated content
misleading content
misuse data
parody
partisanship
plagiarized
poll
poor journalism
proceedwithcaution
profit
propaganda
propagation
provoke
repressive state
reviews
rumor
sarcasm
satire
sentiments
source
spam
sponsored content
trolling
user
website

9 March 2017

Google Addons List

Mail Merge
Scheduler
Email Extractor
Phone Number Extractor
Name/Address Extractor
Advanced Spam Filter
Digital Signature Maker
Digital Signature Protector
Signature Recognizer
Fraud Recognizer
Drive Auditor
Attachment/Link Scanner
Malware Scanner
Bulk Forward
Bulk Send
Contacts Update
Contacts Map
Purging
Advanced Filters
Self-destructing messages
Read Tracker
Auto-Expire Attachments/Links
Unsubscriber
Auto-Responder
Draft Templates
Recall Message
Regex Evaluator
Task Manager
Docs Filters
Personal Assistant
Diary Manager
Micro eCards
Message Resource Lookup (SPARQL)
Send Guard (don't send to unintended recipients by mistake)
Smart Rules
Mail Protector
Inbox Auditor

Gmailify
Gmail Learning Center
Google App Script