- What are the pros of using Digital Platforms? 7.1 (Slide 4)
- What is a network effect and what are some examples? (Slide 5)
- What are the pros and cons of Cloud computing? 7.1 (Slide 7)
- What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
- What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
- What is threat modeling?
- What are some regulations involved with data protection and cybersecurity?
- What is Ransomware, and why are hospitals often targeted?
- What are some methods to protect yourself online?
- What are the three types of artificial intelligence, and what are some examples of each?
- Who is Alan Turing, and what is the Turing test used for?
Ross Faber says
The pros of using digital platforms are central locations of stored information providing companies access to systems from anywhere. Digital platforms also allow customers access to business with more convenience than ever.
The network effect is when a digital system is enhanced by more and more active participants engaging with the system. Social media sites are a great example of this as they are only valuable so long as users are engaging with extreme frequency within the platform.
What are the pros and cons of Cloud computing? 7.1 (Slide 7)
Cloud computing provides easy access from nearly anywhere in the world but also presents certain security risks as hackers can access information without “physically” infiltrating any location.
SaaS is software as a service. An example is Salesforce. Paas is platform as a service. AWS is an example.
API’s allow digital systems to communicate with each other. Without API’s, we could not connect multiple systems together. By being able to connect multiple systems we find more efficient and convenient ways of sharing data.
Threat modeling is the identification of potential threats and planning to prevent and mitigate the risk associated with such threats.
The EU has the GDPR or General Data Protection Regulation. It promotes the privacy of citizens in relation to their digital identities.
Ransomeware is malicious software that aims to take over a digital system and hold it hostage. Hospitals are often targets because they have access to funds and being in control of their systems is often literally life or death.
To protect yourself online, you should be mindful of information you post, what data you are saving (i.e. credit card information), geotagging in photography, etc.
Artificial Narrow Intelligence: narrow range of ability designed to perform specific tasks. Siri or Alexa would be an example of this.
Artificial General Intelligence: wide range of ability and is designed to learn with the addition of new information. Supercomputers would be an example of this.
Artificial Super Intelligence: the level of AI that exceeds human capability.
Alan Turing invented the first computer. The Turing test is used to examine a computers ability to achieve intelligent behavior.
Jieun Han says
Yes, we should protect our selves online by careful not exposing our information too much
Satish Mishra says
Hello there, Ross.
Thanks to a digital platform, we can now accomplish things while staying at home. There are several digital platforms available for ordering meals and goods, which we all use on a daily basis. and wondering what the future holds for the next generation of digital platforms.
Anna Bauza says
Hey Ross:
I find it mind blowing that anything on the internet including cloud systems can be hacked and no one seems to have developed any kind of protection to prevent the hacks from occurring. It seems to me that all the focus is only about how to make money and steer people to buy from their companies with little thought to keeping information private even when sites want to store your personal information on their site.
Ndeye Sall says
Hey Ross,
It’s 100% important to protect our online identities. There are so many ways for our important information to be posted need to be protected.
Zawahi Mustafa says
Hello Ross,
Great responses, it was straightforward and easy to read and understand. Great Job!!
Molly Lehr says
Hey Ross,
I agree with you that in order to protect yourself online, you need to be mindful of the information you post. It’s so important.
Stefanie Meier says
Rob-
I agree with you, convenience is such an easy kill when it comes to digital platforms. I think COVID really helped out with the digital platforms being even more convenient than ever.
Stefanie Meier says
Ross* lol, autocorrect on new comp.
Anthony Isaac says
Ross,
I liked how you explained what the pros and cons were for cloud computing. It very easy to access it from anywhere in the world but, that also means that anybody from anywhere could also access it very easy and they don’t even have to been in the same place as you.
Brandon Lee says
Hi Ross! I can agree with you that it is in our best interests to protect ourself online. I like how you provided examples such as geotagging in photography. Great Post!
Stefanie Meier says
Some of the pros to using digital platforms are reducing environmental impacts, benefiting from minimal costs, and the advantage of the most advanced technology. The network effect is the indirect value goods and services gain as more people use them. An example of this would be Google or FaceBook. Pros of cloud computing are collaboration, scalability, cost, and ease of use. Cons of cloud computing are Security, data integrity, availability and privacy. SaaS is software as a service; utilizes the internet to deliver applications, which are managed by a third-party vendor, to its users. PaaS is platform as a service; provide cloud components to certain software while being used mainly for applications. PaaS delivers a framework for developers that they can build upon and use to create customized applications. IaaS is Infrastructure as a Service; IaaS is fully self-service for accessing and monitoring computers, networking, storage, and other services. IaaS allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright.
Threat data is what data on the internet you are trying to protect as well as who are you trying to protect it from. The CCPA is an example of a regulation within data protection and cyber security as i8t gives residents in certain places the right to be informed as to how their information is being used, shared, or sold. Ransomware is a malware that locks your computer and prevents you from accessing anything until you pay. Hospitals are the perfect target for this due to the absolute necessity for computers as this could prevent surgeries, the ability to read up to date information, drug historys, etc. If ransomware takes over a hospital computer and any of the above occur, lawsuits will occur as well as death. Some methods to protect yourself online are using VPN’s, creating strong passwords that are not easily guessable, do not open random attachments, do not click links that may be sent to you, and enable an ad blocker. The three types of AI are narrow, general, and super. An example of narrow
AI would be the help box that pops up in microsoft word to help you. It is limited in what it can do. General AI would be speech to text, or even self driving cars. An example of Superintelligence AI is hard to come by. ASI is supposed to “outsmart” even the smartest human beings. Alan Turnig was a British mathmatecian who made major contributions to computer science to include AI. The Turnig test is used to ensure a computer or AI system is able to think like a human.
Jieun Han says
Yes, I agree that AI cannot exceed the capabilities of humans.
Satish Mishra says
Hello there, Stefanie. The digital platform has made our lives easier and businesses more convenient. There are so many businesses that thrive only on social media and make a fortune. Instagram and Facebook are two examples.
Anna Bauza says
Hey Stefanie:
It’s wild how Alan Turing was such an advance visionary from the 1912 but it took several years for the computer explosion to finally hit and people to begin using. I wonder what he would think of how far technology has come due to some of his work.
Zawahi Mustafa says
Hello Stefanie,
Your responses to the questions are great, I do agree that Super AI are hard to come by and they are being developed to outsmart even the smartest human beings. (I think it would be scary if it ever happens or whenever it happens). Great job!
Molly Lehr says
Hey Stefanie,
I wonder how long it will be before Superintelligence AI is a common thing. It’s really scary, but exciting to think about.
Ross Faber says
Hi Stefanie,
Nice job summing up what the network effect is. These weekly blog posts are a great example of that, too. Posting sooner gets higher engagement and better quality responses.
Zachary Whitehair says
– Some of the pros of digital platforms is that it makes it easier for companies to find customers, monetize underutilized assets, and reduce transaction costs.
-The network effect is the indirect value goods and services gain as more people use them. One example of this is google or Facebook.
-Some of the pros of cloud computing include collaboration, scalability, cost and ease of use. Cons include security, data integrity, privacy, and availability.
-SaaS uses the internet to deliver services managed by a third party. PaaS delivers a framework for developers to create their own applications. LaaS is fully self service allowing for access to computers, networks, storage and other services.
-APIs are an application programming interface and it builds value by allowing systems and solutions to communicate with each other.
-Threat modeling is the process of determining what data you want to protect and who you want to protect it from.
-Some regulations related to cyber security and data protection include the Gramm-Leech-Bliley act and the Federal Information Security Management Act.
-Ransomware locks up information and holds it for ‘ransom’ by asking for money in exchange for access to the information and data. Hospitals are a good target because they have a lot of up to date personal information.
– Some methods to help protect yourself online include being careful what you click. Links from unverified sources can be harmful to your data.
-One type of AI is narrow AI such as Siri or the vision recognition systems in self driving vehicles. Another type of AI is general AI and examples include HAL from 2001 or Skynet from the Terminator. The last type of AI is Superintelligence and some examples include Google’s self driving Prius and the AI that won Jeopardy.
-Alan Turing is a famous mathematician and he developed the Turing test which is a test of a machine’s ability to exhibit intelligent behavior indistinguishable from a human.
Bita Bagheeri says
Hi Zachary,
I thought it was interesting that you mentioned clicking certain sites. This is very important and happens to many people because they fall for or are coerced into going into certain sites that they should not have. This can be dangerous because your personal data can be leaked.
Ashanna Khan says
Hi Zachary, it’s amazing how every user contributes to google and Facebook making them two of the major networks. Just imagine what they would be without us, the users, absolutely nothing.
Joanna Flores says
Hi Zachary, I think it’s super important that you mentioned how clicking on certain links, and how this can be harmful to ones data. Phishing scams are so big right now and if one isn’t up to par with the information we’re learning in class on how to protect yourself this can put your system at risk for ransomware.
Stefanie Meier says
Hi Zachary
I think it’s crazy how often we are in contact with some sort of AI. I mean, I use Siri almost every day to ask the weather or something if my hands are busy. In fact, we are getting Robot K9’s at work!
Jieun Han says
Q. What are the pros of using Digital Platforms? 7.1 (Slide 4)
The goodside of digital platfors is accumulating information in one central location and allows for companies access information anywhere. It provides convenience to both customers and business.
Q. What is a network effect and what are some examples? (Slide 5)
The network effect is especially effective when a digita system consists of many participant employing the system. Twitters and Instagrams can be a good example because they become more popular when there are many users.
Q. What are the pros and cons of Cloud computing? 7.1 (Slide 7)
The pros are convenience of saving information and price but the cons of cloud computing is the risk of leaking information unvoluntarily. Once they are leaked, it is hard to erase them considering the online environments.
Q. What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
SaaS is a software service like salesforce. PaaS is a platform service like AWE.
Q. What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
API enables digital system communicate eachother. As more and more users use them, the value of information is multiplied
Q. What is threat modeling?
it is the identification of threats, and planning to erase and mitigate the risk associated with them.
Q. What are some regulations involved with data protection and cybersecurity?
The EU’s GDPR or general Data
Q. What is Ransomware, and why are hospitals often targeted?
Ransomeware is a malicious virus and hospitals are targeted because it is accessible to funds.
Q.What are some methods to protect yourself online?
Becareful with what data people are posting
Q.What are the three types of artificial intelligence, and what are some examples of each?
The first one is Artifical Narrow Intelligence and Siri is an example. The second one is Artifical General Intelligence and supercomputers can be example.
The last one is Artifical Super intelligence and it is beyond human capabilities.
Q. Who is Alan Turing, and what is the Turing test used for?
Alan Turing is the first computer. It examines computer’s ability if they exceed human intelligent behaviors.
Ndeye Sall says
Hey Jieun,
I definitely agree you have to be careful about what you post. You never know who could be accessing your information and could potentially find out information that could risk your safety.
Joanna Flores says
Hi Jieun, I really liked how you mentioned under the cloud computing question, as a pr the breach, or information accidentally being leaked. It really makes you think twice about what you upload because although it may be private a single breach could upload pictures, information etc. that you may not want online.
Satish Mishra says
– The benefits of digital platforms include the ability to connect people, organizations, and resources to ease essential interactions between firms and consumers while also increasing corporate management power.
– The network effect is a phenomenon in which the value of a commodity or service increases as the number of persons or participants increases. Etsy and eBay are two examples.
– The utilization of computing resources, software, and data storage over the internet rather than local machines is referred to as cloud computing. The benefits of cloud computing include the ability to share data and resources as well as work with others via exchanging papers over the internet. The disadvantages of cloud computing include the possibility of sensitive information being exposed in a variety of ways, including illegal access by workers or hackers.
– Infrastructure as a service (IaaS) – Infrastructure as a service (IaaS) is a pay-as-you-go cloud computing service that offers crucial processing, storage, and networking resources on demand. Software as a Service (SaaS) is a method of distributing programs as a service through the Internet. Instead of installing and maintaining software, you just access it over the Internet, liberating yourself from the complexities of software and device maintenance. PaaS – Platform as a service (PaaS) is a comprehensive cloud development and deployment environment with resources to offer everything from simple cloud-based apps to sophisticated, cloud-enabled business systems.
– APIs, or Application Programming Interfaces, provide as a bridge between software applications and service providers, facilitating the secure movement of information. It helps developers by making their jobs easier, saving time, fostering creativity, and increasing efficiency.
– Threat modeling is the activity of identifying threats, weaknesses, and vulnerabilities that may negatively impact the security of an application, system, IT landscape, or business process.
– Some regulations involved with data protection and cybersecurity are Defense Federal Acquisition Regulation Supplement (DFARS), and Payment Card Industry Data Security Standard (PCI DSS).
– Ransomware is malicious software that attempts to seize control of a computer system and hold it hostage. Hospitals are frequently targeted because they have access to finances and control over their systems is frequently literally life or death.
– The methods to protect us online are don’t opening mail from strangers, making sure your devices are up to date, using strong passwords, using two-factor authentication, and don’t click on strange-looking links.
-The three types of artificial intelligence are
I. Narrow artificial intelligence- Narrow range of ability designed to perform specific tasks Virtual Assistants like Siri by Apple, Alexa by Amazon, Cortana by Microsoft, etc.
II. Artificial General Intelligence: It has a broad variety of abilities and is meant to learn as new knowledge is added. Supercomputers are one example of this.
III. Artificial super Intelligence (ASI): It is a type of AI that can outperform human intelligence by manifesting cognitive capabilities and creating its own thinking abilities. Smart cars, face recognition, and Netflix is a few examples.
– Alan Turing is a visionary British mathematician who proposed the first artificial intelligence. The ability of a machine to demonstrate intelligent behavior comparable to, or indistinguishable from, that of a person.
Mia Quagliariello says
Hi Satish! I agree with your reasoning as to why hospitals are big ransomware victims. Not only do they rely on access to their records, but it is a serious matter as those records can literally mean life or death for those who’s data is involved.
Ross Faber says
Hi Satish,
The ability for digital platforms to eliminate geographical location as a barrier to connect people has forever changed how we live our lives. This is an incredible advance but leaves many new risks to manage. Understanding threat modeling, data, and how to protect and manage your digital footprint is critical in mitigate these risks.
Zachary Whitehair says
Hey Satish,
Great job on your post. I liked the way you talked about IaaS ,SaaS, and PaaS, it helped me to clearly understand the difference between each service,
Anna Bauza says
Connectivity globally, devices are portable, innovative ways for businesses to connect with consumers.
Ecommerce, Ebay, Etsy, Amazon, and Facebook.
Pros of cloud computing: collaboration, scalability, cost, and ease of use. Cons: security, data integrity, availability, and privacy.
Saas is a software which is a service using the internet to deliver applications that are managed by a third-party vendor. Paas is a platform service providing cloud components to certain software which is used for applications. Paas provides a framework for developers to build upon and use to create custom applications. Iaas is a infrastructure service which is fully a self service for accessing, monitoring computers, uses networks, storage and other services. Businesses can purchase resources as needed instead of purchasing hardware.
APIs are software that connects to computer components, web based that interacts between front and backend IT systems using the web. They extract more value from existing assets, drive new innovations, easier access across and multiple ecosystems.
Threat modeling is identifying and communicating information about the threats that may impact a particular system or network.
California Consumer Privacy Act (CCPA)
Few Federal cybersecurity regulations – 1996-Health Insurance Portability and Accountability Act (HIPAA), 1999-Gramm-Leach-Bliley Act, 2002 Homeland Security Act, includes, Federal Information Security Management Act (FISMA).
Ransomware – malicious software designed to block access to a computer system until a sum of money is paid. Because healthcare organizations are dependent on accessing their data of patient records, and billing to maintain their operations.
Use unique passwords and constantly change them, update browsers and apps, use a password management software, and two factor identification, use antivirus software, and VPN.
ANI – Artificial narrow intelligence – alexa.
AGI – Artificial general intelligence – supercomputers and self-driving cars.
ASI – Artificial superintelligence – facial recognition.
Alan Turing was the father of AI and computer science. Turing test is used to determine if a machine can demonstrate human intelligence.
Bita Bagheeri says
Hi Anna,
I agree that updating passwords for sites is very important. You have to make sure you are using passwords that will be hard to guess and not commonly used. You also have to make sure the correct password to access the site that you want.
Olivia Jardel says
Anna,
I like how you mentioned constantly changing passwords as a measure to protect ourselves online. I don’t normally change my passwords until they are breached or if i forget them, so changing them on a consistent basis would be something good for me to start doing.
Brandon Lee says
Hi Anna! I like how you brought up that we should change our passwords every so often. It’s definitely something that I always forget to do. Especially for the numerous amount of websites and apps that require a password, it is hard to remember it sometimes.
Bita Bagheeri says
1. The pros of using Digital Platforms include faster innovation, higher quality solution, and increased reliability.
2. A network effect is a phenomenon whereby a product or service gains additional value as more people use it. Some examples are Amazon and Uber.
3. Pros of cloud computing include collaboration, scalability, cost, and ease of use. Cons include security, data integrity, availability, and privacy.
4. Saas is software as a service. It is a third party provider, subscription based, and reduced risk of privacy. Paas is platform as a service where third party providers deliver hardware and software tools to users over the Internet. Iaas is infrastructure as a serivce. It runs any application anywhere, brings products to market quickly, and protects customer assets.
5. APIs connect computer software components. APIs extract more value from existing assets, drive new innovations, and has easier access across multiple ecosystems.
6. Threat modeling involves identifying and communicating information about the threats that may impact a particular system or network.
7. Some regulations involved with data protection include the CCPA. Regulations for cybersecurity include HIPAA, Gramm-Leach-Bliley Act, and 2022 Homeland Security Act.
8. Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Hospitals are often targeted because they rely on access to obtaining data records of patients.
9. Some methods to protect yourself online include creating strong passwords, using a password manager, updating passwords, etc.
10. The three types of artificial intelligence are Narrow (ANI), General (AGI), Superintelligence (ASI).
Narrow (ANI)- Siri
General (AGI)- Supercomputers
Superintelligence (ASI)- Face ID
11. Alan Turing is the father of AI and computer science. The Turing test was used to see whether computers are capable of thinking like humans.
Jessica Mejia says
HI Bita, I agree the network effect is a phenomenon. The platforms like the ones you mentioned are super successful and used daily. I am a consumer myself.
Ndeye Sall says
What are the pros of using Digital Platforms? 7.1 (Slide 4)
– The pros include a way for people and prospective employers to reach you and see what you’ve been up to in the field.
What is a network effect and what are some examples? (Slide 5)
– The network effect is an effect where a product or service becomes more useful and prominent as it gains popularity and traction. An example would be social media apps.
What are the pros and cons of Cloud computing? 7.1 (Slide 7)
-The pros of cloud computing are collaboration, scalability, cost, and ease of use. The cons are security, data integrity, availability, and privacy.
What are the differences between SaaS, PaaS, and IaaS? 7.1 (Slide 10-12)
-IaaS is infrastructure as a service, SaaS Is software as a service, and PaaS is a platform as a service.
What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
-APIs are application programming interfaces that connect computer components. T
What is threat modeling?
– Threat modeling is the discovering and communicating of possible threats.
What are some regulations involved with data protection and cybersecurity?
– Some regulations include CCPA, HIPPA, Homeland security, etc.
What is Ransomware, and why are hospitals often targeted?
– Ransomeware is important data held as ransom. Hospitals are targeted because they hold important information regarding patients.
What are some methods to protect yourself online?
– Encrypted passwords, antivirus, ad blocker, backup files, etc.
What are the three types of artificial intelligence, and what are some examples of each?
– Narrow (ANI), General (AGI), and Superintelligence (ASI).
Who is Alan Turing, and what is the Turing test used for?
– Alan Turing is the father of AI and computer science. The Turing test is used to identify if computers are able to think like humans.
Jessica Mejia says
Hi, Yes digital platforms can be used for many things like to connect with people, employers, and sell services.
Jessica Mejia says
• The pros of using digital platforms is that it’s easier for companies to connect with consumers and to find people. For consumer it reduces over head cost meaning consumers can order directly from the supplier then by going to a local store and paying extra for the item.
• Network effect is the indirect value of goods and services gained as more people use them. An example would be Facebook, Uber Eats, and Snapchat.
• The pro of cloud computing is that it’s easy to use, you can do collaborations, it’s cost effective, and a con would be privacy, the availability, data integrity, and security.
• The differences between SaaS, PaaS, and IaaS are that SaaS (Software as a Service) is a cloud application service, common option for business to utilize in the cloud market. PaaS (Platform as a Service) provide cloud components to certain software for applications. IaaS (Infrastructure as a Service) is self-service for accessing and monitoring computers, networking, storage, and other service.
• API (Application Programming Interface) – Connects computer software components. APIs build value by connecting individuals and business.
• Threat modeling is the data you want to protect also think about from who.
• Some regulations involved with data protection would be password protections and data encryption. Cybersecurity regulations would be Gramm-Leach-Bliley Act.
• Ransomware is designed to deny the user or organization the access to files on their computer. Hospitals are targeted because they are vulnerable. They can’t afford to lose access to patient records.
• Some methods to protect yourself online would be to use unique passwords and logging out from services especially if it’s a public computer.
• The three different types of AI are narrow AI, general AI, and superintelligence. An example of narrow AI is interpreting video feeds from drones carrying out visual inspections on infrastructure. An example of general AI is when AI will match a human’s intelligence. An example of superintelligence is when it exceeds human intelligence exceeds human knowledge.
• Alan Turing is the father of AI and computer science. He cracked the code that enabled Allies victory. The turing test is a test of a machine’s ability to exhibit intelligent behavior.
Ashanna Khan says
Hi Jessica, you did a good job on this post. Your explanations and examples for the different types of artificial intelligence was very clear and made it a lot more understandable.
Zawahi Mustafa says
-Some of the pros of using digital platforms are that it’s easier for companies to connect with consumers. Also it monetizes underutilized assets, and reduces transaction costs.
– A network effect is the indirect value goods and services gain as more people use them. An example would be Facebook.
– The pros of Cloud computing include easy access to data information from nearly anywhere in the world. The cons of cloud computing presents certain security risks like hackers that can easily gain access to such information without physically infiltrating any location.
The differences between Saas, Paas, and Iaas:
Saas: Software as a Service ex. Dropbox
Utilized options for businesses in the cloud market. It utilizes the internet to deliver applications that are managed by a third party vendor to its users. The majority of Saas applications are run through the web browser. They do not require any downloads or installations.
Paas: Platform as a Service ex. Google app Engine
It provides cloud components to certain software while being used mainly for applications. It delivers a framework for developers that they can use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third party provider while the developers can manage the management of the applications.
Iaas: Infrastructure as a Service ex. Amazon web server
Cloud infrastructure is made of highly scalable and automated compute resources. IaaS is fully self-service for accessing and monitoring computers, networking, storage, and other services. IaaS allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright.
– APIs are what allows digital systems to communicate with each other. Without APIs it would not be possible to connect multiple systems together. When having that ability to be able to connect with multiple systems it becomes a more efficient and convenient way of sharing data.
– Threat Modeling is thinking about data you want to protect and who you are protecting it from. “ What are you worried about getting hacked?”
The CCPA is an example of a regulation within data protection and cyber security as it gives residents in certain places the right to be informed as to how their information is being used, shared, or sold.
-Ransomware is a malware that locks your computer and prevents you from accessing anything until you pay.
-Hospitals are the perfect target due to the absolute necessity for computers as it could prevent surgeries given the ability to read up to date information, drug histories.
– Some ways to protect yourself online would be to create strong passwords, don’t share personal information like SSN. Do not open emails with attachments you are unaware of and also make sure you enable ad blockers.
-The three types of artificial intelligence are narrow, general and super:
Example of narrow: opening up tuportal and clicking the help chat at the bottom of the page, a robot would assist you but it’s limited to how much it can help you.
Example of General: using your phone to speak like speech to text. Or self driving cars like Tesla
Example oF Super: it’s supposed to outsmart the smartest human, it is still in development.
-Alan Turing was a British mathematician that made major contributions to computer science to include AI. The Turnig test is used to ensure a computer or AI system is able to think like a human.
Olivia Jardel says
Zawahi,
Great idea mentioning enabling ad blockers on your computer as an extra step to protect yourself online. I feel like that is something that most of us may overlook or forget about.
Ashanna Khan says
1. The pros of using Digital Platforms are, faster innovation, faster time to launch, frequent updates, increased focus on business problems, more business model opportunities
2. A network effect refers to any situation in which the value of a product, service, or platform depends on the number of buyers, sellers, or users who leverage it.
Examples: Amazon, TicketMaster, Uber
3. Pros of Cloud computing are collaboration, scalability, cost, and ease of use.
Cons of Cloud computing are security, data integrity, availability, and privacy.
4. IAAS gives access to the resources like virtual machines and virtual storage. PAAS give access to run time environment to deployment and development tools for application. SAAS give access to the end user.
5. API stands for Application Programming Interface. APIs build value by allowing for faster innovation. Barriers to change are reduced and more people can contribute to an organization’s success. They offer two-fold benefits: the company can create better products while standing out from the competition
6. Threat modeling is a proactive method of uncovering threats not usually considered or found through code reviews and other types of audits.
7. Privacy and Personal data protection – California Consumer Privacy Act (CCPA)
Federal cybersecurity regulations – Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley-Act, Federal Information Security Management Act (FISMA)
8. Ransomware is a type of malware from crypto virology that threatens to publish the victim’s personal data or permanently block access to it unless a ransom is paid. Hospitals are often targeted because they are more likely to pay to prevent disruption to patient care, since they are so heavily dependent on access to data — such as patient records — to maintain their operations
9. Some methods to protect yourself online are antivirus, ad blocker, avoid dodgy plugins, back-up files, disable macros, don’t freely open attachments, firewall and VPN.
10. Three types of artificial intelligence are:
Narrow (ANI) – Siri, Google Assistant
General (AGI) – IBM’s Watson, AlphaGo
Superintelligence (ASI) – Bots
11. An English mathematician, logician, and cryptographer, who was responsible for breaking the Nazi Enigma code during World War II. The Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether a computer is capable of thinking like a human being.
Christopher Elko says
Hello Ashanna, I think you did an excellent job describing all the terms in this set, minus your definition of ASI. That aside you can learn a lot from the descriptions you have offered and I think you did a great job summarizing what we learned in class.
Kevin Desouza says
ANI is a computer performing a single task very well.
AGI is a computer performing task on par with humans.
ASI is a computer capable of surpassing human intelligence.
Mia Quagliariello says
Hi Ashanna! I really liked your examples of the network effect, I have heard a lot about TicketMaster lately with demand driving their prices up and it makes me think of how different prices would be without certain demand or the amount of users since it is one of the only places to get tickets nowadays.
Olivia Jardel says
-Digital platforms allow for a larger reach to people that companies may not otherwise have had access to. Digital platforms are also more cost effective to run and increase the ease of transactions.
-The “network effect” is a term to describe the reach of a network, the more people that are a part of something, the more power it has and the more enjoyable it becomes for the user. An example of this would be a social media platform, like Facebook for example. However, if you aren’t friends with anyone on Facebook, the things someone does on Facebook have little to no meaning unless interacting with people, i.e. “friends” you add. You want to add people to your friends list so that they are able to see what you are doing, sharing, and so you can enjoy your platform experience to the fullest extent.
-Some of the pros of cloud computing is that anything used on the cloud, it is widely accessible from anywhere in the world as long as you have an internet connection. The cost is also relatively cheaper as opposed to housing data traditionally. However one of the major cons are that sometimes servers can go down for routine maintenance, and the entire cloud that houses your data can be out of commission for a certain amount of time.
-Saas, software as a service, provides services such as cloud application services that companies sell and use. Paas, platform as a service, provides platforms for software applications. Iaas, infrastructure as a service, is a type of service that offers services such as networks, storage, and operating systems to users.
-An API is how a program is connected to an application. It is the action that facilitates interactions between the front end and back end systems. API’s add value because they allow more systems and applications to be able to communicate with eachother instantly.
-Threat modeling is a process where you evaluate potential threats to your security, and pose solutions in order to reduce those threats.
-Some well-known regulations regarding data protection are the Health Insurance Portability and Accountability Act, otherwise known as HIPAA, the Gramm Leach Bliley Act, and the Homeland Security Act.
-Ransomware works by locking a users access to personal information or threatening to publish some type of personal data unless the user pays a “ransom”, which is often a large sum of money. Hospitals are often targets because to people wanting money or data, hospitals are a goldmine as far as personal information on patients, bank information, health records etc. Also, healthcare professionals, more than likely because of the nature of the job, are more than likely to protect the patient(s) in this type of instance. To someone looking to make a monetary gain of a ransomware attack, it’s almost a given that a healthcare professional would turn over a large sum of money in order to protect a patient.
-You are able to protect yourself online by using very strong passwords, meaning using a combination of upper and lower case characters, numbers and special characters. Making sure that you do not repeat said passwords across multiple sites is crucial. Using a secure password manager, that requires two factor authentication, is important as well.
-The three types of artificial intelligence are narrow (ANI), general (AGI), and superintelligence (ASI). Chatbots, “Siri”, “Alexa” would be an example of ANI. AGI is AI that is able to achieve human emotions, common sense, abstract thinking etc. We as humans have not been able to fully achieve AGI, however we are teetering on the verge of breaking through to it with human like robots, etc. ASI is AI that is able to achieve thinking beyond the powers of humans and more efficient at performing all human tasks then humans are.
-Alan Turing was a cryptanalyst during World War II. The Turing test is used to determine the amount of intelligence in a computer, to see if you are able to distinguish it from a human based on responses.
Molly Lehr says
1. Some pros of digital platforms are that they make it easier for companies to find customers, monetize underutilized assets, and reduce transaction costs. They also help reduce barriers to entry and make it easier for small, flexible suppliers to reach consumers.
2. A network effect is the indirect value goods and services gain as more people use them. An example of a network effect is Facebook’s simultaneous growth of its user base and operating profit. To earn higher profits, a business can either raise prices or lower costs. More Facebook users give its advertising clients a larger audience to target with specific ads.
3. Pros of cloud computing are they reduce infrastructure costs, they allow the IT team to focus on more long-term issues, they consolidate your data, and they are more secure than operating an on-site data center. Cons of cloud computing are limited control, vendor lock-in, and slower backups and restores.
4. SaaS utilizes the internet to deliver applications, which are managed by a third-party vendor, to its users. Most run directly through your web browser, which means they don’t require any downloads or installations. PaaS provides a platform for software creation. The platform is delivered via the web, giving developers the freedom to concentrate on building the software. IaaS are cloud infrastructure services that are made of highly scalable and automated compute resources. It is full self-service for accessing and monitoring computers, networking, storage, and other services.
5. An API is a software interface between computers and/or programs. API’s build value by exposing technology assets for reuse, compounding return on technology investments.
6. Threat modeling is thinking about what data you want to protect, and who you’re trying to protect it from.
7. One regulation involved in data protection is the California Consumer Privacy Act which gives consumers more control over the personal information that businesses collect about them. A few federal cybersecurity regulations are the Health Insurance Portability and Accountability Act , the Gramm-Leach-Bliley Act, and the Homeland Security Act.
8. Ransomware is a malware that works by locking your computer to prevent you from accessing data until you pay a ransom. Hospitals are often targeted because they provide critical care and rely on up-to-date information from patient records. This makes hospitals more likely to pay the ransom to get the system back up and running as quickly as possible. Another reason they’re a good target is because employees are not trained on security awareness.
9. Some methods to protect yourself online are making sure your passwords use numbers, letters, and symbols and by making them as long as possible. You can also install anti virus and ad blocker, and firewall and avoid opening suspicious attachments.
10. The three types of AI are Narrow, General, and Superintelligence. Examples of Narrow intelligence are Google Assistant, Google Translate, and Siri. Examples of General AI are machines that exhibit human intelligence, like self-driving cars. Examples of Superintelligence are bots.
11. Alan Turing is the father of AI and computer science. The Turing Test is used in determining whether or not a computer is capable of thinking like a human being.
Christopher Elko says
Hello Molly, I think you did a great job defining Ransomware. I tend to have a very common-man way of explaining things and I think you did a much better job with your professional terminology and structure.
Oceana Gilkerson-Heinaman says
Your point about hospital employees not being trained in security threats is great, because hospitals are often too busy and too low in staff members to devote time to training employees in the matter therefore placing it lower on the list of priorities.
Christopher Elko says
Theres an absolute ton of advantages to a digital platform vs a traditional physical location for an activity. Be it work or leisure, being able to access information in advance, see updates, connect globally, and exchange information on your own time freely from anywhere are great options.
The/a Network affect is how functional/useful something is based on the amount of people using it, the more using it, the more useful/functional/profitable it is. Directly from your example in class, online media only has an audience because it has creators, and creators because it has an a audience.
Pros/cons of cloud computing, include potential reduced cost, on the user end its less maintenance, management, and (hopefully) have a 100% uptime.
Cons include the reliability factor of counting on someone else in a business element. Any risks that would normally be related to anything cyber- are now in someone elses hands. Ddosing, hacks, and their internal affairs and management may not be to your exact criteria.
Differences between SaaS, PaaS, and IaaS
SaaS, or Software as a Service, is a subscription operated access to a program, You do not own it, but have access to it for the period paid. PaaS offers hardware and software via cloud connection to an organization. IaaS is the smallest version of cloud computing, which all of these are. It has similar services as the others, without needing an in house licensing engine.
Standing for Application Programming Interface, API’s allow different computers/programs to work together/communicate to each other. It is an important work tool that enables many parts to work together as one.
Threat modeling is the understanding and exploration of what sorts of threats to a system you should expect, and planning based around those problems, to better protect yourself from likely issues.
Given the importance of data in things like banking medical and any other valuable personal form of information, governments have several kinds of regulations on who can access and for what reasons these sorts of information. Laws like the California Consumer Privacy Act, and the Health Insurance Portability and Accountability Act, help to do this.
Ransomware is a particularly nasty form of cyber crime which as the name implies holds information for ransom, denying access to it till a fee is paid. These attacks often target hospitals because that information is not something you can live without, life and death information is contained within, and as such doesn’t leave room for negotiation, or dismissal of the problem.
Theres a lot of ways to protect yourself from a lot of problems. Some good general practices are having strong passwords, authentication, setting yourself up to alerts for data breaches/account theft, owning an antivirus program to keep you actively safe.
ANI: or narrow intelligence, which is best focused on single basic tasks and usually focuses on pattern recognition. Things like Siri and Google voice are simple AI.
AGI: Or artificial general intelligence, is/will be technology on par with a human mind. Probably the closest thing to this would be that very realistic chat-bot that was decommissioned due to unsavory inputs from the internet.
ASI: Artificial super intelligence, something that we do not have yet at all, is a computer smarter than man to an infinite scale. This is basically reserved for science fiction levels of computers we don’t currently have.
Alan Turing is dubbed as the founding father of AI. One of his largest achievements was breaking the encryption of the Enigma machine during ww2. The Turing Test is used when determining weather a computer is capable of thinking like a human.
Kevin Desouza says
Examples of IaaS would be a server in a data center or Amazon Web Services. Windows Azure and Google App engine is an example of a PaaS. Lastly, email apps like gmail would be an example of a SaaS.
Adelina Chornodola says
I liked how you defined what ransomeware is, it was a simple yet detailed explanation that would be great to define to someone who didn’t know what ransomeware is. You did a great job defining all of these terms.
Oceana Gilkerson-Heinaman says
I like the point that you made about the risks of using a cyber system are now in the hands of someone else with Cloud Computing. It is important for the cloud to be trustworthy and reliable, as companies have millions or billions of dollars on the line when it comes to the security and reliability of their system.
Kevin Desouza says
1. What are the pros of using Digital Platforms? 7.1 (Slide 4)
Easier to find customers, make money off of underutilized assets, reduce transaction costs, reduce barriers to entry, and reduce search costs.
2. What is a network effect and what are some examples? (Slide 5)
When more people use a service or good the more valuable it becomes. For example, TikTok is a platform that hosts tons of users to watch clips and interact. These users add more content to the platform and make the app more exciting and fresher.
3. What are the pros and cons of Cloud computing? 7.1 (Slide 7)
Pros
Cloud computing allows for collaboration such as google sheets where multiple users and work in a single sheet. There is less equipment on sight since programs are worked remotely which can also be cost effective and easier to use.
Cons
Unfortunately, cloud computing is open to security breaches with can lead to leak of private information.
Also, these programs work by connecting online to a server in some data center. If you are cut off from the internet or there are issues with the server, you will be unable to access your work.
4. What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
IaaS, Infrastructure as a Service refers to where your data is stored and network. For example, a company’s billing information may be housed in a data center outside of the office or at Amazon Web Service.
PaaS, Platform as a Service refers to hosting and developing websites and programs.
Lastly, Saas, Software as a Service refers to a cloud-based application such as Gmail or Netflix. Applications that you access using the internet to pull data.
5. What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
APIs is a product that allows for back-end data to be used through the use of applications. Since APIs allow for access to back-end data and across multiple application, this allows a company to extract more value . For example, billing information, can be exported through APIs to forecasting programs.
6. What is threat modeling?
Threat modeling answers the following questions. You must decide on what you need to protect and from whom. You will need to understand how likely this thing will need to be protected. What are the consequences for failure and how willing are you to prevent these consequences.
7. What are some regulations involved with data protection and cybersecurity?
For Privacy and Personal Data Protection, the California Consumer Privacy Act or CCPA
For Cybersecurity, 1996 Health Insurance Portability and Accountability Act (HIPAA), 1999 Gramm Leach Bliley Act, 2002 Homeland Security Act, and Federal Information Security Management Act.
8. What is Ransomware, and why are hospitals often targeted?
Ransomware is malware attack designed to capture information or block the owner from accessing their data until a ransom is paid. Hospitals have a wealth of personal data and money to extort.
9. What are some methods to protect yourself online?
Use strong passwords that are not reused. Use Two- Factor authentication.
10. What are the three types of artificial intelligence, and what are some examples of each?
ANI, artificial narrow intelligence refers to a computer performing a single task very well such as playing chess.
AGI, Artificial General Intelligence refers to a computer performing task on par with humans such as a chatbot.
ASI , Artificial Super Intelligence refers to a computer capable of surpassing human intelligence. There are no real life examples yet except for fiction like Terminator, Matrix, or iRobot.
11. Who is Alan Turing, and what is the Turing test used for?
A British mathematician and computer scientist who developed a machine which deciphered Nazi Germanys secret messaging code.
He also developed the Turing test which involves a human messaging a computer and another person to see if they can differentiate who was the computer.
Zachary Whitehair says
Hey Kevin,
Great job on your post. I liked the way you described APIs. They are something that could definitely help a business to build additional value.
Joanna Flores says
• What are the pros of using Digital Platforms? 7.1 (Slide 4)
Some of the pros to using digital platforms are the minimal costs and makes it easier for companies to find customers.
• What is a network effect and what are some examples? (Slide 5)
The network effect is when many people add value to a good or service, for example social media pages such as Instagram or TikTok, the more people use it and upload pictures or videos the more people want to continue using the site.
• What are the pros and cons of Cloud computing? 7.1 (Slide 7)
Some pros to cloud computing the easy access for multiple users at once in one location, easily accessible for multiple people at one location allowing usage from almost anywhere as long as there is a stable internet connection, this can also lead to reduced costs, some cons are that you are nor 100% safe from data breaches, there can be times where one may not be able to access the needed files due to routine maintenance.
• What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
SaaS, software as a service, delivers applications via the internet. PaaS, Platform as a service, is hardware and software offered to clients via the cloud, and mostly refers to hosting a website. Iaas, infrastructure as a service, is a type of cloud computing that offers clients essential compute, storage and networking resources.
• What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
API, Application Programming Interface, its’s an application intermediary that allows communication between two applications. It allows for new innovations, and helps extract value from existing assets, creates efficiency and allows for time saving.
• What is threat modeling?
Is what helps identify threats or any weaknesses/vulnerabilities in the system before it negatively impacts the system, it also helps one identify what one wants to protect and from who.
• What are some regulations involved with data protection and cybersecurity?
The Gramm-Leech-Biley Act, and the Federal Information Security Management are regulations in place to help with data protection and cyber security.
• What is Ransomware, and why are hospitals often targeted?
Ransomware is malicious software created to lock people out of their computer systems, until a certain amount of money is paid out. Hospitals are often targeted because they carry such private information, and everything is logged into the system which makes it crucial for healthcare workers as they are in constant need to check patient files.
• What are some methods to protect yourself online?
Using unique passwords with at least one number, one capital letter and even special character, this way it makes it that much harder for any hacker looking to use your information with any malicious intention, or to do any ransomware. Also using the two favor identification systems in place to confirm identity.
• What are the three types of artificial intelligence, and what are some examples of each?
The three types of artificial intelligences are ANI, AGI and ASI.
ANI is Artificial narrow intelligence, and some examples include Siri, Alexa or google assistant. This basically explains the ability of a computer to complete the tasks they’re asked to do very well.
AGI, Artificial general intelligence, which is basically AI with almost if not the same capabilities as a human, such as self-driving cars.
ASI, Artificial Super Intelligence, which is any AI that surpasses the human intelligence, which we have not yet created.
• Who is Alan Turing, and what is the Turing test used for?
Alan Turing is the father of Artificial Intelligence and creator of the Turing test which helps identify if any machine is on par with human intelligence.
Adelina Chornodola says
Hi Joanna, I definitely agree that we need to have unique passwords. After I got hacked on my email I changed my password on everything making them unique and not repetitive.
Adelina Chornodola says
-The pros of using digital platforms are starting with:being able to access your data from anywhere and anything. It reduces environmental impacts and saves from.
-The Network effect is where the are increased numbers of people and participants actively engaging with the system. For example social media, such as Instagram or TikTok.
-Some pros of cloud computing is that you can save your information to the cloud and get access anytime along with saving cost, ease of use, and collaboration yet some cons are that it’s not private, unsecure, and available.
-SaaS is software as a service. SaaS products are fully managed by another company. Examples include, docusign, salesforce, hubspot, google workspace. PaaS is a platform as a service. Examples include, Google App engine, adobe magento commerce cloud. IaaS is a cloud based service, protects customers assets, can be run anywhere. Examples are Rackspace, digital ocean.
-APIS – are a set of rules that dictate how two machines talk to each other. So they allow digital systems to communicate with each other. This helps us share data.
-Threat modeling works to identify threats and communicate on how to prevent them, and reduce them in the future.
-Some regulations involved with data protection and cyber security are the EU’s GDPR and general data.
-Ransomware is a virus attack that locks your computer until paid. Hospitals are often targeted because they depend on storing data such as patient records and they are frequently targeted as hospitals rely on this data in order to keep operations.
-Some methods to protect yourself online, be careful what you post, change your passwords often, use two factor authentication.
-Three types of artificial intelligence are Artificial Narrow Intelligence, which is Siri by Apple or Alexa by amazon. Then Artificial General Intelligence has many more abilities and learns new knowledge as added, these are supercomputers. Last is Artificial Super Intelligence which is beyond human intelligence, and has its own thinking abilities. Such as FaceID on Apple iPhones, and smart cars.
-Alan Turing is the one who invented the first computer. The Turing test is made for determining whether a machine can demonstrate human intelligence.
David Trickett says
Hey Adelina,
I liked how you pointed out that changing your passwords often can help to protect yourself online, as passwords can often be breached, especially when they lack the proper strength. Your note about the EU’s GDPR was also interesting, as that legislation is very comprehensive compared to the US’s generally unstructured data protection legislation.
Well done!
Raj Rawal says
The pros of using digital platforms include better user experience, centralized data location and access from anywhere, reduce costs, and find customers.
The network effect is a phenomenon where increased number of people connect or contribute and improve the value of a product or service. The internet is the most effective example of the network effect.
Cloud computing is the utilization of computing resources, data and applications over the internet. The pros of cloud computing are sharing data over the internet in real time. The cons of cloud computing can be a higher risk of data being exposed as it is not stored locally.
SaaS is software as a service. IaaS is Infrastructure as a service. PaaS is platform as a service. And example of SaaS is G-mail, IaaS is Amazon Web Services. PaaS example is Google App Engine.
Application Programming Interface (API) connect computer software components and facilitate interactions between front & backend IT systems. These interactions are precisely how APIs build value.
Threat modeling is the process of determining what data you want to protect and who you want to protect it from. It helps in identifying threats and preventing them.
HIPAA is one of the most well know privacy/data protection acts. The 2002 Homeland Security Act is also another example of cybersecurity regulation.
Hospitals are often targeted due to the urgency it places on the institutions to protect patient information, perform health procedures, and prevent any malpratice lawsuits.
Better passwords, encrypted communications or VPNs, virus protection, better awareness of phishing e-mails.
Three types of AI – Narrow (ANI), General (AGI), Superintelligence (ASI). Siri, Amazon Alexa, IBM Watson are all examples of AI.
The father of AI and computer science is Alan Turing. He cracked the code that helped the Allies win WWII. The Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
Anthony Rosado says
HI Raj, I didn’t know about Alan Turing and how he helped the allies win WWII. This was fascinating to learn.
Mia Quagliariello says
What are the pros of using Digital Platforms? 7.1 (Slide 4)
– Digital platforms are beneficial to building an audience, providing core tools and services and matchmaking.
What is a network effect and what are some examples? (Slide 5)
– Network effect is the idea that value of a product or service increase the more people use it and the more of a ‘network’ of people it spreads across.
What are the pros and cons of Cloud computing? 7.1 (Slide 7)
– Cloud computing can provide users with a cheaper, more collaborative platform that has better ease of access compared to storing data or files locally. Its cons are issues relating to security, availability, privacy, and data integrity.
What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
– Software as a service provides and runs its own software service on its own servers. Platform as a service provides hardware and software tools for building applications and running them. Infrastructure as a service offers essential services and resources over internet
What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
– Application program interface connects computer software components and facilitates data interaction. It can extract value from existing assets as it connects programs.
What is threat modeling?
– Threat modeling is a way to determine if harm, potential threats, or vulnerabilities are present.
What are some regulations involved with data protection and cybersecurity?
– Some regulations relating to data protection include California Consumer Privacy Act, Health Insurance Portability and Accountability act, General Data Protection Regulation, Gramm-Leach-Bliley Act and the Homeland Security Act.
What is Ransomware, and why are hospitals often targeted?
– Ransomware is a type of malware that limits a user’s access to their files and data and typically have a ‘payout’ to access their data again, typically threatening the user that their data will be leaked or deleted unless they pay a ransom to the attacker.
– Hospitals are big targets as they hold valuable information that is always needed to be accessed and very critical to many people’s health and safety.
What are some methods to protect yourself online?
– Adblocking, not downloading attachments and having antivirus installed can help protect yourself online. Stronger passwords, better password management and enabling 2FA on accounts can also help.
What are the three types of artificial intelligence, and what are some examples of each?
– Narrow AI has narrower capabilities with examples like assistants such as Google, Siri, or Alexa. General AI are a bit more involved with capabilities closer resembling humans like Sophia. Superintelligence theoretically would surpass humans and be self-aware.
Who is Alan Turing, and what is the Turing test used for?
– Alan Turing was a computer scientist who aided in helping the allies in WWII crack the German’s codes. The Turing test is used to determine if a machine can demonstrate human capabilities and thinking.
David Trickett says
Hey Mia,
As you noted, hospitals are often the main target for ransomware attacks, and it is absolutely necessary for such institutions to have proper preventative measures against such attacks. Moreover, your point about avoiding downloading suspicious-looking attachments is certainly true, and is one of the main ways in which viruses are unsuspectingly embedded in computers.
Great job!
Alexander Neff says
Hey Mia,
I really like that you highlighted adblocking and being weary of pop-up links to protect yourself. Well done!
David Trickett says
– For companies, the benefits of using Digital Platforms are that they both make it easier for companies to find people and make it easier for people to find companies. For consumers, Digital Platforms allow you to have a direct line into a company when purchasing products, thereby saving consumers money through lower overhead costs. For industries, Digital Platforms allow for a greater reduction in the barrier to entry, allowing for more companies to compete against each other.
– A network effect is the indirect value that goods and services gain as more people use them. Notable examples of this effect are seen through services such as Twitter and Facebook, where user base growth significantly contributes to revenue growth.
– The major pros of Cloud computing are the collaboration features, scalability, and ease of use that it allows, as well as the cost benefits that are offered. The cons of Cloud computing are the inferior security, data integrity, privacy, and availability compared to local computing.
– SaaS, aka Software as a Service, are cloud application services where the applications are delivered over the internet, such as Salesforce, Dropbox, and Google’s GSuite. PaaS, aka Platform as a Service, are cloud platform services, where a framework is delivered for developers that can be built upon and used to create customized applications. Some examples of PaaS are Windows Azure, Force.com, and Google App Engine. IaaS, aka Infrastructure as a Service, delivers cloud computing infrastructure, such as servers, network, operating systems, and storage through virtualization technology, such as a dashboard or an API. Examples of IaaS include DigitalOcean and Amazon Web Services.
– APIs, aka Application Programming Interfaces, can be defined as how platforms are connected to cloud computing, and can be considered as a contract for data interaction. APIs build value by extracting more value from existing assets, driving new innovations, and allowing for easier access across multiple ecosystems.
– Threat modeling can be defined as thinking about both what data you want to protect and who you want to protect that data from. Further considerations include how likely it is that you will need to protect that data, how bad the consequences may be if you fail to protect that data, and what efforts you are willing to go to in order to protect that data.
– A regulation involved with data protection is the California Consumer Privacy Act (CCPA), while regulations involved with cybersecurity include HIPAA, the 1999 Gramm-Leach-Billey Act, and the 2002 Homeland Security Act.
– Ransomware is a type of malware that works by locking access to your computer’s data until you pay a ransom. Hospitals are often targeted by ransomware because of the reliance on up-to-date information that is needed for patient care, making it more likely that a hospital will pay to access the necessary data.
– There are multiple methods available to protect yourself online, and proper prevention is the largest factor in data security. These prevention methods include installing antivirus software, an adblocker, a VPN, and a Firewall, as well as backing up your files and being cautious of dodgy emails.
– The three types of artificial intelligence are Narrow (ANI), General (AGI), and Superintelligence (ASI). Narrow AI are systems that have either learned or been taught to carry out specific tasks, such as Apple’s Siri and Amazon Alexa. General AI is a flexible and adaptable intelligence like that of humans which is able to perform complex tasks, such as the fictional Skynet from the Terminator franchise. Superintelligence is AI that can exceed human capabilities, and while this level of AI is not yet possible, it has been conceived in movies such as Big Hero 6 through the Baymax robot character.
– Alan Turing was a cryptanalyst during World War II who cracked the code that enabled the Allied victory, and who is considered as the father of AI and computer science. The Turing test is used for determining whether or not a computer can demonstrate human intelligence. A computer is said to pass the Turing test if a human cannot tell the difference between the computer and a human being, based on responses given to questions asked to the computer.
Anthony Rosado says
Hi David, great point on how systems make it easier for business entry and allowing greater competition. A physical presence is no longer needed.
Brian Johnson says
Hi David, I found it interesting that you also mentioned certain parts of the internet like salesforce for example. I only was thinking about the search engines themselves so I liked how you put it in more detail.
Cassadi Gallagher says
Hi David, I also used Baymax as an example of ASI! I agree with you that hospitals are much more likely to pay to access their data, which is why they are often targets. So messed up! In addition, I like how you used Facebook and Twitter revenues to explain the network effect, especially because they are both great examples of information sources for people Facebook and twitter both work as news sources for many people, because soo many users put out information.
Alexandra Hyduke says
Hi David, I really enjoyed all the information you included about Alan Turing and the Turing test. I almost think its creepy how computers could pass that test.
Anthony Rosado says
• What are the pros of using Digital Platforms? 7.1 (Slide 4)
o Companies can save money and time while providing a better customer experience. This could be more efficient and effective. This provides convenience and value to customers. The industry can communicate better, quicker, and learn from one another.
• What is a network effect and what are some examples? (Slide 5)
o This is the indirect value goods and services gain as more people use them. Companies like Facebook and John Deere benefit from a network effect.
• What are the pros and cons of Cloud computing? 7.1 (Slide 7)
o The pros include collaboration, scalability, cost, and ease of use. Cons include security, data integrity, availability, and privacy.
• What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
o IaaS has infrastructure as a service. PaaS has platform as a service. SaaS has software as a service. With IaaS you manage the applications, data, runtime, middleware, and O/S. Others manage virtualization, servers, storage, and networking. With PaaS, you manage only the data and applications. Others manage the rest. With SaaS, others manage everything.
• What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
o APIs connect computer software components. They also contract for data interaction. This facilitates interactions between from & back IT systems. APIs extract more value from existing assets, drive more innovations, and provides easier access across multiple ecosystems.
• What is threat modeling?
o Threat modeling is thinking about what data you want to protect, and who you’re trying to protect it from. This protects the data that you worry might get hacked.
• What are some regulations involved with data protection and cybersecurity?
o Privacy and Personal Data Protection, the California Consumer Privacy Act (CCPA) is an example. Some federal cybersecurity regulations include HIPPA, Gramm-Leach-Bliley Act, and Homeland security Act.
• What is Ransomware, and why are hospitals often targeted?
o It is a malware that locks your computer to prevent you from accessing data until you pay a ransom. Hospitals are a target because they provide critical care and rely on up-to-date information from patient records.
• What are some methods to protect yourself online?
o Password strength, two-factor authentication, antivirus, ad-blocker, firewall, and VPN are ways to protect yourself online.
• What are the three types of artificial intelligence, and what are some examples of each?
o Narrow (ANI) IE program that prevented losses in the stock market, General (AGI) IE employment test, and Superintelligence (ASI) IE human brain compatibility – AI human, self-driving.
• Who is Alan Turing, and what is the Turing test used for?
o He is the father of AI and computer science. The test is for AI replicating human behavior that is difficult to distinguish.
Brian Johnson says
Hi Anthony, I liked how you explained threat modeling, I think that it is a smart strategic plan to protect your accounts and identity from any elite hackers.
Alexandra Hyduke says
Hi Anthony, I like the list you provided for protection laws. I think it is important for people to be aware of these laws and understand them and why they are there!
Brian Johnson says
The pro’s of using digital platforms is that they benefit companies, computers, and industries.
A network effect is a phenomenon whereby increased numbers of people or participants improve the value of a good or service. Examples would be the internet, google chrome, and firefox.
A pro of cloud computing is that it is very easy to access to, a con is that it is very easy to hack into.
The differences between IAAS, PAAS, and SAAS is that IAAS gives access to the resources like virtual machines and shortage. PAAS gives access to run time environment to deployment and develop tools for applications, while SAAS gives access to the end user.
API’s are Application programming interface and they build value from existing assets, and by driving new innovations.
Threat modeling is the process of proactively identifying and addressing potential threats to an organizations systems.
The three main regulations involved with data protection and cyber security are the 1996 Health Insurance Portability and Accountability Act, the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act.
Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Hospitals are usually targeted because they are often involved in funds and charities.
Methods to protect yourself online are to make sure your accounts are up to date, to set strong passwords, to watch out for phishing scams, keep personal information personal, to secure your internet connection, to shop safely, and read the site’s private policies.
The three types of artificial intelligence are narrow, general, and superintelligence, Narrow intelligence has a range of abilities, general intelligence is on par with human capabilities, and superintelligence is more capable than a human.
Alan Turing was an English mathematician and a computer scientist. The Turing test is a method of inquiry in artificial intelligence for determining whether or not a computer is capable of thinking like a human being.
Alexander Neff says
Hey Brian,
I really like the different laws that you highlighted protecting consumers in regards to cybersecurity. They are very important pieces of legislature. Thank you for sharing!
Suela Haxhiu says
Hi Brian,
I did not consider the financial aspect for the ransomeware target hospitals face. You always think about the data that can be breached and that valuable but the hospitals generate so much money so it is another major layer to the increase in threat vulnerabilities.
Alexander Neff says
Some of the pros of using digital platforms include efficiency of systems and processes, transparency for organizations, and ability to cut labor costs due to the efficiency implemented with the use of digital platforms. The network effect is a system becoming better with the more users that use the application. The example given is Uber. More users employ more drivers, in turn, generating revenue for the company and also more drivers making it more convenient for more users.
Cloud computing provides a more efficient platform for users to store information. Anyone with access to the cloud can reach specific info needed to conduct a task. That is a pro and a con since there are security concerns involved with cloud computing and how many people can access the information.
SaaS, or Software as a service, allows users to use the process and application that is already in place for their particular enterprise. This differs from PaaS, which is a Platform as a service, because even though the platform is accessible for the user, it is still up to the user to put out the necessary applications that are needed for their enterprise. Lastly, IaaS, or Infrastructure as a service, provides the data storage, internet capabilities, and everything needed for the enterprise to create whatever their intended product or service is without having to worry about the behind the scenes tech stuff.
APIs are applications program interface and is connects the applications across different systems. They build value by making applications more user friendly for the end user, thus creating efficiency for the enterprise and streamlining processes.
Threat modeling is the act of creating passwords or storing passwords with the assumption that everything will eventually be hacked or compromised in some way. Some regulations involved with data protection include some states implementing laws that do not allow private companies to sell a customer’s information on the secondary data market. Recently, government organizations and utility companies have taken great strides in adding additional layers of cybersecurity to their infrastructure. Some methods to protect ourselves online include changing our passwords frequently, making passwords longer with a variety of uppercase, lowercase, and alphanumeric characters, as well as multiple usernames.
Ransomware is when a hacker takes information hostage and requires a “ransom” to unlock the information needed by the enterprise.
The 3 types of Artificial Intelligence include narrow, general, and super. ANI has to do with a specific task or function like self-driving cars. AGI is where the program acts just like a human and has general knowledge across multiple fields. Something that’s similar to AGI, but not quite there yet, is the Amazon Alexa. ASI is considered superintelligence and that is when a program has more intelligence than humans. Alan Turing cracked the Enigma, which was a communication between Axis Powers in WWII. His test is used to decide whether people are talking with a computer program or a human.
Cassadi Gallagher says
Hi Alex, I like how you said threat modeling is storing, creating, and managing passwords, “assumption that everything will eventually be hacked or compromised in some way.” That is so true. In this world, we have to assume we’ll be hacked, not just plan in case. In addition, I like how you said that Alexa is not quite there at AGI. I would also say self-driving cars may eventually reach AGI levels, or, who knows, maybe even ASI if they;re able to eliminate accidents and plan/multitask software in a way humans cannot.
Cassadi Gallagher says
The pros of using Digital platforms are: connecting to customers and a faster flow of information ( for companies); easier communication, less money, and a faster flow of information (for consumers); big data analytics, and a decreased barrier to entry (for industry)
The network effect says the more people/users on a site, the more valuable it is. An example is TikTok. If there weren’t a ton of people on TikTok, the appeal of so many kinds of videos by so many different people wouldn’t be there. Another example is Myspace; it was extremely popular at one point, which made it valuable. Now, Myspace isn’t popular, which made it no longer valuable.
The pros of Cloud computing are collaboration, scalability, cost, and ease of use. The cons of Cloud computing are security, data integrity, availability, and privacy.
SaaS is software as a service, or cloud application service. It uses internet to deliver applications to users, managed through third party vendor. Directly through web browser. No need for IT to download; vendor manages technical issues. Managed from central location, hosted on remote server, accessible over internet, user not responsible for updates. PaaS is Platform as a service, or cloud platform service. It provides cloud components to certain software and is used mainly for applications. Delivers framework for developers to build on. Servers, storage, and networking can be managed by enterprise or third party provider and application management by developers. Platform for software creation provided over web. Allow business to design applications built into PaaS with special software. Scaled up or down, integrates web and databases. IaaS is infrastructure as a service, or cloud infrastructure service. Highly scalable and automated compute resources. Self-service for accessing and monitoring computers, networking, storage, and other services. Provides through virtualization technology, through a dashboard or API, giving clients complete control over infrastructure. Same capabilities as traditional data center without having to physically maintain or manage. Available as service, highly scalable, complete control over infrastructure.
API is Application Programming Interface. contracts for data interaction. They connect backend and frontend IT systems. This is how “communication” occurs between parts of systems or different systems. This builds value by creating ease of use for clients/customers, creating a easy flow of information, helping companies find issues in their sites, etc.
Threat modeling is deciding which data is vulnerable, to whom, and how to protect it from those individuals. To determine a threat model, you ask what you need to protect, from who, how likely is it that you will need to protect it, how bad are the consequences of failing to protect, and how much trouble will you go to to prevent failure.
1999 Gramm-Leach-Bliley Act, 1996-Health Insurance Portability and Accountability Act (HIPAA). Federal Information Security Management Act (FISMA)
Ransomware is a type of malware, in which your computer and data are locked until you pay a ransom. Hospitals are often targeted because they have massive amounts of data, which they rely on at every moment for critical decisions. They cannot delay access to up-to-date data or else patients can die, meaning they’re more likely to pay the ransom and quickly.
Some ways to protect yourself online are to use VPN’s, manage passwords and use secure ones, and be careful what you click, because it may be unprotected.
There is Narrow AI (ANI), which is AI we see everyday, such as Siri, and it is less than human intelligence. There is General AI (AGI), which is where AI will match human intelligence and, reasonably, we shouldn’t be able to tell the difference between a human and AI, such as Sophia. There is Superintelligence AI (ASI) where AI exceeds human intelligence, such as things in movies like Baymax.
Alan Turing is known as the father of AI and computer science, and he created the Turing test. The Turing test was used to evaluate AI. A human evaluator would read conversation between humans and AI and a passing score is considered if the human cannot tell the difference at least 70% of the time. This distinguishes between ANI and AGI.
Oliver Forssell says
Hey Cassadi,
I liked your point that realizing the consequences of failing to protect data is necessary to threat modeling.
Alexandra Hyduke says
– Some pros of using digital platforms, include the ability for not just the companies but customers as well to reach information, can be cost beneficial, and they can help to store more information in one central area.
– Network effect is when a service or product gains or increases in value as more customers or people start to use it.
o Ex. Social media, Netflix, Etsy
– Based on the PowerPoint, the Pros of cloud computing include collaboration, scalability, cost, and Ease of use. Some of the cons include security, Data integrity, availability, and Privacy.
– SaaS (Software-as-a-service) is a subscription-based cloud service that you are able to use over browsers and apps. It runs its software in the cloud on its own servers and is a reduced risk. Iaas (Infrastructure-as-a-service), runs any application anywhere, can help bring products to market quickly, it is designed for costumers needs and to protect customers. Paas (Platform-as-a-service), is a pay as you go, where you purchase what you need from a provider and access it via apps. It also allows for less worry about buying or managing software.
– API’s (Application Programming Interface), help to connect computers and software components. They have value, because they are able to extract more value from existing assets, drive new innovations, and allow for easier access across multiple ecosystems.
– Threat modeling is a way to help identify any weaknesses, structural vulnerabilities, and threats that could have a negative impact.
– Some regulations in cybersecurity and data protection include CCPA, Sarbanes-Oxley, GLBA, etc.
– Ransomware is a software that is designed to block a computer system until money is paid. Hospitals are usually attacked because they keep most of all their information centralized in computers.
– Some methods to protect yourself online include making sure you log out of sites, using multiple unique passwords, having duo authentication or 2 step authentications.
– Three types of artificial intelligence:
o Artificial Narrow Intelligence (ANI): Facial recognition, voice recognition
o Artificial General Intelligence (AGI): on par with humans
o Artificial Superintelligence (ASI): smarter than humans
– Alan Turing was an English mathematician and the test is used to determine if a computer can think.
Adam Elguindi says
What are the pros of using Digital Platforms? 7.1 (Slide 4)
The pros of using digital platforms allows businesses to reach out to a wide range of people who they would not otherwise be able to reach. They also lower the cost of doing business.
What is a network effect and what are some examples? (Slide 5)
The concept of the network effect refers to the increasing number of people that a network can reach. It allows it to have more power and enjoyment for its users. An example, TikTok is a platform that allows users to watch videos and interact with others. Its users add more content to the app and make it more exciting.
What are the pros and cons of Cloud computing? 7.1 (Slide 7)
Cloud computing is a type of technology that allows users to store and access their data in the cloud. However, it comes with various disadvantages. For instance, it’s not secure, private, or available.
What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
SaaS, refers to a type of service that is offered by a company. It can be used to manage various products such as salesforce, docusign, and hubspot. Platforms as a service, or PaaS, are a type of service that are designed to allow companies to run their applications on a platform. Examples of these are Google App Engine and Adobe. Infrastructure as a service, or IaaS, are a type of cloud-based service that are designed to protect a company’s assets.
What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
APIs are a set of rules that dictate how two machines talk to each other. So they allow digital systems to communicate with each other. This helps us share data.
What is threat modeling?
A threat modeling process is a process that helps identify and prevent threats from happening. It involves coming up with a list of people and data that you want protected.
What are some regulations involved with data protection and cybersecurity?
There are various regulations that deal with the protection of personal data. Some of these include the California Consumer Privacy Act and the Health Insurance Portability & Accountability Act.
What is Ransomware, and why are hospitals often targeted?
A type of malware known as ransomware is a type of attack that takes over a user’s data and prevents them from accessing it again. It typically demands a ransom in order to access the data. Hospitals are typically targeted by ransomware due to the importance of their data. This data is very important to the safety and health of their patients.
What are some methods to protect yourself online?
AdBlock’s is very new and popular method to protecting yourself online. Having antivirus software and ad blocking are some of the most effective ways to protect yourself online. Also, having strong passwords and enabling 2FA are some of the most effective ways to keep your accounts secure.
What are the three types of artificial intelligence, and what are some examples of each?
Three types of A.I. (artificial intelligence) – Artificial Narrow Intelligence (ANI), Artificial General Intelligence (AGI), and Artificial Super Intelligence (ASI).
ANI examples such as Alexa from Amazon and Siri from Apple
AGI examples are more like supercomputers taking in abilities and learning new knowledge
ASI examples are none because there are no life examples of a computer having more knowledge than a human
Who is Alan Turing, and what is the Turing test used for?
Alan Turing was a British mathematician who developed a machine that was able to decipher Nazi Germany’s secret messaging codes. He is the founding father of AI and computer science. Turing test is used to determine if a machine can demonstrate human intelligence.
Thao Hong says
What are the pros of using Digital Platforms?
– Some of the pros would be reduced costs, flexibility, increased efficiency in customer communication.
What is a network effect and what are some examples?
– It means an increased numbers of users/participants improve the value of a good or service. Dating apps, social media platforms would be perfect examples for these.
What are the pros and cons of Cloud computing?
– Its pros would be flexibility and accessibility, since it is mobile. However, that also means less privacy and security.
What are the differences between SaaS, PaaS, IaaS?
– SAAS: give access to the end user
– PAAS: give access to run time environment to deployment and development tools for application.
– IAAS: give access to the resources like virtual machines and virtual storage.
What are APIs, and how do APIs build value?
– APIs are application programming interface. They make it easier to develop a program by providing the building blocks.
What is threat modeling?
– It is identifying the types of threat agents that cause harm to an application or computer system.
What are some regulations involved with data protection and cybersecurity?
HIPAA, the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act.
What is Ransomware, and why are hospitals often targeted?
– It infects systems and files, rendering them inaccessible until a ransom is paid. They are often a target because of how heavily dependent they are on their access to data.
What are some methods to protect yourself online?
– Use strong password, 2FA, look out for phishing signs, look for encryption, etc…
What are the three types of artificial intelligence, and what are some examples of each?
– Artificial narrow intelligence (ANI), which has a narrow range of abilities;
Artificial general intelligence (AGI), which is on par with human capabilities; or.
Artificial super-intelligence (ASI), which is more capable than a human.
Who is Alan Turing, and what is the Turing test used for?
– Turing is the founder of the Turing Test and an English computer scientist, cryptanalyst, mathematician and theoretical biologist. The test isa method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being
Oceana Gilkerson-Heinaman says
What are the pros of using Digital Platforms? 7.1 (Slide 4)
–Digital Platforms can allow businesses to find and connect with consumers, and vice versa. They allow for a faster, more direct form of communication- one aspect of this is allowing consumers to avoid surcharges by purchasing directly from the company. Also, it is easier to target advertising based on consumer search history and big data analytics.
What is a network effect and what are some examples? (Slide 5)
–The network effect is the way that a platform is able to expand and improve based on how many users it has, and how much information it is able to gather. The network effect can also help a business with the ability to become more profitable, and have a more competitive advantage. A few examples of the network effect are LinkedIn, Instagram, and Venmo.
What are the pros and cons of Cloud computing? 7.1 (Slide 7)
–Some of the pros of cloud computing are that it allows for collaboration and scalability. It is easy to use, and allows for lower price points. Cons include security risks and privacy, data integrity, and availability.
What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
–Software as a Service is the most common of the three options. It allows businesses to provide applications to their users via the internet. SaaS is beneficial because all issues are handled by a third-party vendor, which allows businesses to focus on other tasks. Platform as a Service allows companies to create software via their platform. Developers can create applications that are scalable and easy to access. Infrastructure as a Service allows for companies to access infrastructure through the cloud, and is fully self-service. Businesses who use IaaS manage their own applications and data.
What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
–Application Programming Interfaces, or APIs, allow programs to communicate and share information. They build value by allowing for the extraction of value from existing assets, driving new innovations, allowing for easier access across ecosystems, and providing building blocks for new projects.
What is threat modeling?
–Threat modeling is the strategy of knowing what information you want to protect, and who you want to protect it from. It is important to prioritize the information that you want to protect, and consider any possible consequences of a data breach.
What are some regulations involved with data protection and cybersecurity?
–Some data protection and cybersecurity regulations include the California Consumer Privacy Act, the Health Insurance Portability and Accountability Act, the Gramm-Leach-Bliley Act, and the Homeland Security Act. These acts work to protect private information and regulate how companies can use this information to prevent putting consumers at risk.
What is Ransomware, and why are hospitals often targeted?
–Ransomware is a type of malware that locks the computer until the hackers are paid money. The user is not able to access any information on the computer. This can be detrimental for hospitals because they need to be able to access vital information for their patients. Hospitals would rather pay hackers than risk the lives of their patients.
What are some methods to protect yourself online?
–You can protect yourself online by having a strong and unique password, by not clicking unfamiliar links, backing up your files, installing a firewall, and installing antivirus programs/ad blockers/VPN
What are the three types of artificial intelligence, and what are some examples of each?
–Narrow (ANI) is the most basic form of Artificial Intelligence, and is used every day. An example of this is Google Maps. General (AGI) is more advanced, and is able to match the intelligence of a human. An example of AGI is a (more advanced) chatbot that can mimic human conversational skills. Superintelligence (ASI) is smarter than human intelligence. We are not quite there yet, but an example of ASI would be a human-like robot in a sci-fi movie that is much smarter than the humans.
Who is Alan Turing, and what is the Turing test used for?
–Alan Turing is considered the father of AI and computer science. He was a WWII-era cryptanalyst who was able to crack codes and made significant contributions to science. The Turing test is used to determine if an AI is able to mimic the conversational skills and behavior of a human by having a human communicate with AI. If the human is able to determine that the AI is AI, then it does not pass the Turing test.
Kelli Spadt says
Oceana,
I liked you mentioning Turings code cracking. I was reading about all Enigma code. It was super interesting.
Kelli Spadt says
• What are the pros of using Digital Platforms? 7.1 (Slide 4)It’s easier for companies and consumers to find each other. It is also a direct flow to a company.
• What is a network effect and what are some examples? (Slide 5)It is a positive feedback loop. Network effect refers to situations where the value of a service/platform depends on consumers. An example is Facebook or Tiktok, like you said in class no one would use it if only three people were there.
• What are the pros and cons of Cloud computing? 7.1 (Slide 7)Some pros of cloud computing is reliability, easy accessibility, and reduced cost. But some cons are data leakage, data loss or theft, and insecure API’s
• What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)Saas is a cloud-based application, very common example Gmail. With Paas developers can build their own software app example OpenShift. Iaas can be thought of as a virtual data center, the customer maintains all parts of the infrastructure.
• What are APIs, and how do APIs build value? 7.1 (Slide 7-9)It is basically a call to acting from a user interface, it builds value because it allows one program to be used by another. Enhancing business ease and better user experience
• What is threat modeling? It is a model that identifies and communicates threats that may impact a network. Which helps IT teams to understand potential threats.
• What are some regulations involved with data protection and cybersecurity? There is the GDPR which regulates personal data of the people in the EU. There is also CCPA which just covers Cali residents’ privacy rights.
• What is Ransomware, and why are hospitals often targeted? It’s malicious software that blocks access to computer systems unless money is paid. Hospitals are often targeted because they are heavily dependent on saved data. They need access to patients’ data.
• What are some methods to protect yourself online? To have a password saver and a unique password
• What are the three types of artificial intelligence, and what are some examples of each? ANI- machine learning example Siri. AGI- machine intelligence examples self-driving cars. ASI- machine consciousness no examples yet and I don’t think it will happen.
• Who is Alan Turing, and what is the Turing test used for? He is considered the father of theoretical computer science and AI. The Turing test is a test to see if a computer AI can think like a human.
Cherelle Gaillard says
Hi Kelli,
The methods you used to protect yourself online are great. In addition you can also use a VPN, have an ad blocker, and use an antivirus system.
Suela Haxhiu says
Hi Kelli,
I did not consider Siri as an ANI! It is crazy to think we have this kind of technology at our fingertips available on our smart phones.
Robert Manzo says
Hey Kelli, I agree that is it crucial to protect yourself online. I know I use VPN and ad blocker to help me to avoid being hacked. Thanks for the post.
Oliver Forssell says
Some of the pros to using digital platforms include the ability to build an audience, matchmaking, and providing core services. In addition, digital platforms alleviate some of the pressures on a company’s internal systems, as well as promote an easier consumer experience. The network effect is caused when an increased number of people or consumer participants improve the value of a good or service. The internet is an example of the network effect. Initially, there were only a few users on the service since it was of little value to anyone outside of the military and some research scientists, now it’s used globally as a source to almost every successful business. Some of the pros to cloud computing include no administrative or management hassles, easy accessibility, pay per use, and reliability. On the other hand, some cons to cloud computing are limited control of infrastructure, restricted or limited flexibility, ongoing costs, and security. SaaS is cloud-based software companies can sell and use, PaaS helps developers build custom apps via an API that can be delivered over the cloud, and IaaS builds the infrastructure of cloud-based technology. An API defines functionalities that are independent of their respective implementations. This allows those implementations and definitions to vary without copying each other. Therefore, a good API makes it easier to develop a program by providing a strong block structure. Threat modeling works by identifying the types of threat agents that could cause harm to an application or computer system. The three main cybersecurity regulations are the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act. Ransomware is a malware that works by locking a computer to prevent you from accessing data until you pay a ransom, usually demanded in alternate cyber currency. Hospitals are targeted because healthcare organizations are so heavily dependent on access to data to maintain their operations, especially regarding patient information. Some ways to protect yourself online include having a strong set of passwords, antivirus software, pop up blocker, backup files, firewall, disable macros, and installing a VPN. The three types of AI are artificial narrow intelligence (ANI), which has a narrow range of abilities, artificial general intelligence (AGI), which is on par with human capabilities, and artificial superintelligence (ASI), which is more capable than a human. A few examples of ANI are anything from Siri, Face ID, and the Google Assistant, to self-driving cars and DeepMind’s board game playing program. In reference to AGI, Sophia is a human-like AI system designed for general reasoning, which includes a scripting software and a chat system. The Turing Test is a method of information collection in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being. The test is named after Alan Turing, the founder of the Turing Test and an English computer scientist, cryptanalyst, mathematician and theoretical biologist.
Robert Manzo says
Hey, Oliver great job with this very informative. I like how you went in-depth about the advancements of AI. I find it intriguing how far we are coming in terms of technology. It going to be fascinating how we see Ai evolve in the following years
Cherelle Gaillard says
Some pros of using Digital Platforms include:
Companies: easier for companies to connect to consumers and it’s easier for people to find companies.
Consumer: save money and reduce overhead cost
Industry: decreases barrier to entry.
Network effect is the indirect value goods and services gain as more people use them. An example of network effect is Facebook or Google.
The pros of Cloud computing include collaboration, scalability, cost, and ease of use. The cons of Cloud computing are security, data integrity, availability, and privacy.
SaaS is software as a service such as Salesforce. PaaS is a platform as a service such as Google App Engine. IaaS is an infrastructure as a service such as Amazon Web Services (AWS).
APIs connect computer software components. APIs build value by connecting individuals and businesses.
Threat modeling is thinking about what data you want to protect, and who you’re trying to protect it from.
Privacy and Personal Data Protection- California Consumer Privacy Act (CCPA). Federal cybersecurity regulations: Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act, and Federal Information Security Management Act (FISMA).
Ransomware is a type of malware from crypto virology that threatens to publish the victim’s personal data or permanently block access to it unless a ransom is paid. Hospitals are often targeted because hospitals more than likely to pay a ransom rather than risk delays that could result in death and lawsuits.
Some methods to protect yourself online are antivirus, ad blocker, avoid dodgy plugins, use a VPN, disabling macros, back-up files, and don’t open up attachments.
Artificial Narrow Intelligence (ANI) – a computer performing a single task very well.
Artificial General Intelligence (AGI) – a computer performing task on par with humans.
Artificial Superintelligence (ASI) – a computer capable of surpassing human intelligence. Example of ANI is Google maps. AGI example is IBMs. Bots are an example of ASI.
Alan Turning was a founding father of artificial intelligence and of modern cognitive science. The Turing test is used to determine whether a computer is capable of thinking like a human being.
Suela Haxhiu says
• There are a few pros of using digital platforms. It lowers the costs because it costs less than hardware. It increases productivity and allows for a higher level of collaboration within an organization because of an increase of access.
• The network effect can be described as the increase in value of a platform with the more users on the platform. If a platform has a lot of users, it will be desirable to other non-users.
• Pros of cloud computing are a reduction of infrastructure costs, the ability to consolidate data, very secure against data breaches. Scalability, automation, and space saving. The cons of cloud computing are its reliance on internet, there is no access to data if internet is down. Going from the cloud to on premise is costly and complicated. Backups and restores take longer.
• IaaS is on-demand access to cloud-hosted physical and virtual servers, storage, and networking. The backend IT infrastructure for running applications and workloads in the cloud. PaaS, or platform as a service, is on-demand access to a complete, ready-to-use, cloud-hosted platform for developing, running, maintaining, and managing applications. SaaS, or software as a service, is on-demand access to ready-to-use, cloud-hosted application software.
• APIS dictate how two machines talk to each other. These connections allow us to share data together and without them we could not connect multiple systems together.
• The Threat Modeling enables any developer or software architect to communicate about the security design of their systems. Analyze those designs for potential security issues using a proven methodology and suggest and manage mitigations for security issues.
• he three main cybersecurity regulations are the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act, which included the Federal Information Security Management Act (FISMA).
• Ransomware blocks access to one’s computer until a sum of money is paid. Hospitals are common to face ransomware attacks because they hold so much personal data in their EMR systems.
• Avoid phishing scams, enable 2FA, create very strong passcodes, be careful what you post online as the internet is forever.
• narrow (also referred to as weak AI), general (or strong), and super artificial intelligence (also known as artificial superintelligence).
• The Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether a computer is capable of thinking like a human being. The test is named after Alan Turing, the founder of the Turing Test and an English computer scientist, cryptanalyst, mathematician, and theoretical biologist.
Mishelle Werner says
Hi Suela,
I was intrigued that a pro of cloud computing is that it can protect against security breaches. I would’ve thought that putting your data on the internet would decrease your security versus having it saved locally.
Jieun Han says
• What are the pros of using Digital Platforms? 7.1 (Slide 4)
It provides a central place to save data allowing users utilize data at their convenience. It also enables users to save their money, so it is cost-effective
• What is a network effect and what are some examples? (Slide 5)
Network effect is a indirect benefit as more and more people use it. An example would be facebook or Instagram.
• What are the pros and cons of Cloud computing? 7.1 (Slide 7)
It provides a place to save a large amount of data in an aggregated place. But, at the same time, the probability of data leaking is also becoming extremely high and the damage is unrecoverable considering the online environments.
• What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
SaaS is software as a service; utilizes the internet to deliver applications, which are managed by a third-party vendor, to its users. PaaS is platform as a service; provide cloud components to certain software while being used mainly for applications. PaaS delivers a framework for developers that they can build upon and use to create customized applications. IaaS is Infrastructure as a Service; IaaS is fully self-service for accessing and monitoring computers, networking, storage, and other services. IaaS allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright.
• What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
API’s allow digital systems to communicate with each other. Without API’s, we could not connect multiple systems together. By being able to connect multiple systems we find more efficient and convenient ways of sharing data.
• What is threat modeling?
Threat data is what data on the internet you are trying to protect as well as who are you trying to protect it from.
• What are some regulations involved with data protection and cybersecurity?
The CCPA is an example of a regulation within data protection and cyber security as i8t gives residents in certain places the right to be informed as to how their information is being used, shared, or sold.
• What is Ransomware, and why are hospitals often targeted?
Ransomware is a malware that locks your computer and prevents you from accessing anything until you pay
• What are some methods to protect yourself online?
To protect yourself online, you should be mindful of information you post, what data you are saving (i.e. credit card information), geotagging in photography, etc.
• What are the three types of artificial intelligence, and what are some examples of each?
• Artificial Narrow Intelligence: narrow range of ability designed to perform specific tasks. Siri or Alexa would be an example of this.
• Artificial General Intelligence: wide range of ability and is designed to learn with the addition of new information. Supercomputers would be an example of this.
• Artificial Super Intelligence: the level of AI that exceeds human capability.
• Who is Alan Turing, and what is the Turing test used for?
Alan Turing invented the first computer. The Turing test is used to examine a computers ability to achieve intelligent behavior.
Anthony Isaac says
Jieun
I agree with you. A good way to protect yourself online is to be careful what data you put into your computer.
Anthony Isaac says
What are the pros of using Digital Platforms?
The pros are that digital platforms can benefit companies, consumers, and industries.
What is a network effect and what are some examples?
A network effect is where there is an increase of people to improve the value.
What are the pros and cons of Cloud computing?
A pro would be that it’s cheaper.
What are the differences between SaaS, PaaS, IaaS?
IaaS can run applications anywhere. They can also bring products to markets easier.
PaaS is a third person provider and subscription based. SaaS computes resources over the internet.
What are APIs, and how do APIs build value?
APIs connect computer software components.
What is threat modeling?
Threat modeling can identify threats.
What are some methods to protect yourself online?
Change your password often, use strong passwords, install security systems to identify threats.
What are the three types of artificial intelligence, and what are some examples of each?
ANI, AGI, ASI.
Who is Alan Turing, and what is the Turing test used for?
The Turing test is used to see if a compute is capable of thinking like a human.
Brandon Lee says
1. The pros of using digital platforms is it makes it easier for companies to reduce transaction costs, finding new customers, and remove their underutilized assets.
2. A network effect is indirect value that goods and services gain when more people use them. An example is google or Instagram.
3. The pros of cloud computing is collaboration, environmental benefit, cost, and the ease of use. The cons include the security, Data integrity, availability, and lack of privacy.
4. The difference between the 3 is SaaS is Software as a service, PaaS is Platform as a service, and IaaS is Infrastructure as a service.
5. API’s is the Application Programming interface allowing digital systems to communicate with each other. API’s build value by being able to connect with each system, it makes it a more efficient way of sharing data.
6. Threat modeling is determining the threats, and vulnerabilities that will negatively impact the security of a system, application, or business process.
7. Some regulations involved in data protection and cybersecurity include the CCPA (California Consumer Privacy Act): Protects privacy and personal data
8. Ransomeware is the malicous software that strives to take over the digital system and takes it by ransom; typically for money. Hospitals are a good target because they store a lot of personal data and can take funds
9. Some methods to protect yourself online is being careful with what you post and what type of data you are saving.
10. ANI: Narrow range of availability – Siri, Face ID, Google Assistant
AGI: General – Human capabilities – self driving cars
ASI: Super intelligence
11. Alan Turing was a British Mathematician who made the first computer and the Turing test to test if a computers ability exceeds the human behaviors.
Akhirah Miller says
Hi Brandon,
I liked the brief description you gave on Alan Turing I never knew he created the first computer.
Akhirah Miller says
• What are the pros of using Digital Platforms? 7.1 (Slide 4)
-The pros of using Digital Platforms is making consumer/business relationship easier by being able to access information in one. Central location.
• What is a network effect and what are some examples? (Slide 5)
– The network effect means the more people or participants that utilize a product or service improves the values. A good example would be UberEATS, UberEATS parent company Uber started out as a rideshare company. Due to consumers frequently utilizing the rideshare app the company made the business decision to not only offer rides but to also deliver your food to you.
• What are the pros and cons of Cloud computing? 7.1 (Slide 7)
– Pro is lower cost for managing and maintaining your IT systems. Con Risk for data theft and/or data leak.
• What are the differences between SaaS, PaaS, IaaS? 7.1 (Slide 10-12)
– IaaS builds the infrastructure of cloud-based technology. Ex:Google Cloud
PaaS helps with the development of custom apps via an API that is delivered over the cloud. Ex: Google App Engine
SaaS is cloud-based software that companies sell and use. Ex: Dropbox
• What are APIs, and how do APIs build value? 7.1 (Slide 7-9)
-Apis are tools that connect with different applications to interact with software systems to receive/upload data from one system to another. Apis help developers perfect the applications that is being built.
• What is threat modeling?
-The Identifying of a potential threat to an application or computer system.
• What are some regulations involved with data protection and cybersecurity? Constant is one a consumer have to give consent when providing certain businesses with valuable information (SS#, DOB, Financial information)
–
• What is Ransomware, and why are hospitals often targeted?
– Malicious software used by hackers to block access to business computers system until a certain amount of money is paid. Hospitals are targeted for the simple facts of housing Patient demographic data (address, SS#, DOB, Financial Information)
• What are some methods to protect yourself online?
-Avoid phishing scams always read Emails in the entirety some hackers can mimic a certain webpage and have consumer input their real account information into a fake page just to steal the consumer information.
• What are the three types of artificial intelligence, and what are some examples of each?
– Artificial narrow intelligence (ANI), specializes in one area Ex: Siri.
Artificial general intelligence (AGI), a computer with human capabilities EX: Tesla
Artificial superintelligence (ASI), more capable than a human. Ex: Rankbrain from google.
• Who is Alan Turing, and what is the Turing test used for?
-Alan Turing Believed that a computer could possess artificial intelligence if it could mimic human responses under certain conditions.
Turning Test- works work an interrogator asking a host of questions to two participant to see if the system can tell the differences between a computer response and a human response.
Mishelle Werner says
Hi Akhirah,
I like your example of UberEats and how the network effect helped them develop their business from a ride share app to a food delivery app. I didn’t realize they started one without the other.
Oliver Forssell says
Hi Akhirah,
Good job explaining ransomware, the medical insurance company I worked for used software to block people from stealing classified information. Given the amount of data that is online, it’s important that companies use extra precaution to make sure their clients info is safe.
Mishelle Werner says
The positives of using a digital platform are the reduction in environmental impact, headcount efficiency in the organization, the ability to automatically manager equipment better, and faster innovation.
A network effect is when a product or service becomes more valuable, the more that people use this product or service. Examples of this could be social media, delivery services, and applications. By having more users on these platforms, we can find more glitches and work out errors quickly, improving the experience for everyone.
Cloud Computing Pros:
Ease of Use – Data can be accessed from anywhere
Reliability – Data can be accessed at any time
Data Backup and Control – All Data is held in a secure location and can be accessed worldwide.
Cloud Computing Cons:
Security – Data held in the cloud can be hacked and stolen
Cost – This is a service which comes with a recurring cost for however long the company needs to store data.
Accessibility – Data held online can only be accessed if there is internet. If the internet at the office goes out, employees are unable to access any files.
Saas, Paas, Iaas, are different in that the service provider will manage different levels of management for your cloud computing. See tiers below-
Saas: Software as a service is the highest management level and means that the service provider will handle applications, data, runtime, middleware, O/S, virtualization, servers, storage, and networking.
Paas: Platform as a service means that the service provider will handle runtime, middleware, O/S, virtualization, servers, storage, and networking.
Iaas: Infrastructure as a service means the service provider will handle your virtualization, servers, storage and networking.
An API is an application programming interface where the software communicates between the two applications through requests and responses. API’s build value by linking essential technologies and organizations together to improve business and open new pathways through data.
Threat modeling is identifying the threats that will harm an application or system. After the threat is defined, we can mitigate the issues with countermeasures.
Some protections in the USA are HIPAA which protects medical privacy and the new U.S State Data Protection Act. In the EU they have a broad act GDPR which broadly protects all electronic data.
Ransomware is when malicious software blocks access to an essential computer system until a sum of money is paid. Hospitals are targeted because they will quickly pay the ransom to continue providing healthcare to their patients.
Some methods of identity protection are to use strong passwords and a password manager. Make sure your devices are updated for the highest security measures and use two factor authentication.
ANI – narrow range of intelligence, example is google assistant.
AGI – Intelligence on par with humans, self-driving cars which are capable of learning new tasks.
ASI – Intelligence far exceeds a human, making it capable of self-awareness. Example is a supercomputer or a humanoid robot.
Alan Turing was a mathematician and the first computer scientist who developed the first modern computer. He is famous for decoding the German Enigma machines during the second world war. His Turing test was developed to test for human intelligence in a computer and determines whether the computer is capable of artificial intelligence.
Akhirah Miller says
Hi Mishelle,
I like how you explained Id. potection, I truly love two step verification it has helped me unlock many accounts using this method.