Master Computer (or Life) Filter

Let me warn you: this is not meant to be an informative-like post; but, rather a rant. So buckle your seat belts…. Every day when I log into Twitter, Facebook, Feedly and other social media sites I see great articles and things I like to read every day. Sometimes I get frustrated, like tonight and think to myself, “Why is everybody posting about these stupid things I’d rather not see/hear about??”

button deleteWhy can’t I create a Google-like search for my ENTIRE computer that filters OUT content from EVERY site I log into, based on my preferences. How would this work? I’m glad you ask! When you perform a normal Google search, you would typically type something like “mustang”. You can FILTER OUT the types of mustangs you DON’T want to see by typing this EXACT text this in the search box: “mustang -red”. The “-red” is what narrows the search results and ELIMINATES red mustangs. Think of a Venn Diagram: the largest circle is the master set (or universe) – it contains all mustangs: black, white, pink, red, orange purple, you name it. Within that circle there are smaller of circles: one with all pink mustangs in it, one for the red mustangs, etc. You’re not sure what color mustang you want but you know red is out of the question. So you search for exactly that: mustang -red (more Google search tips here) Maybe something good is coming out of this post after all.

Anyway, I think you get my drift. This is what I want for my computer – or actually for my life entire would be even better – I want to create a master Google-like search on my computer for stuff that I never want to hear or see. It would look something like this:

SHOW ALL -kanye -oscars -taylorswift -kardashian -justinbieber

filter_dataApple are you listening? Maybe there’s a solution already out there – one for Chrome, one for Facebook, Instagram, Feedly, etc. That’s not what I’m asking for. I want one MASSIVE and MASTER filter that would work on my entire computer (or life if you’re ambitious) and I want it now, please (see, I can be polite) Besides, who has time to install a separate filter, plugin or extension for each app, site or service they use.

So, that’s all I have. Yes, it’s a rant – I don’t do many of these – but I did tell you that from the beginning. If you’re still reading, thanks for listening. At least you can enjoy the video below and get a few more tips on filtering your Google search results. #TheFilterGirl

Screen Shot 2016-02-15 at 7.59.50 PM

Ransomware & Bitcoins

Ok ladies, it’s time for some heavy lifting! So let’s get right to it:

  • Question: What is Ransomware?
  • Answer: Ransomware is a type of malware that prevents or limits users from accessing their system. It forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back. (Trend Micro)

Let me give you a real life example to help you relate. If a criminal kidnaps a child, like in the popular Denzel movie, Man on Fire, they often demand cash in exchange for returning the person to their relative/loved one. During the time of the kidnapping, the family has no access to the child – they cannot even see the child or perform everyday tasks like eating dinner together or talking about what happened at school that day. Imagine that the child got their report card on the day they were kidnapped – the family would not be able to see what was on the report card – not the child’s name, not their grades, nothing. Access to the child and everything the child has is completely cut off. No family member can get to the child or access to the information they may hold until the ransom is paid and the child is returned. #InThatOrder

Ransomware is technical jargon; but, it basically means the same situation as described above; but, in this case the kidnapper is a computer hacker and the kidnapee is a computer systemA hospital in Southern California, Hollywood Presbyterian, is under a ransomware attack as we speak. Their computer system is completely shut down and workers do not have access to patient information, records, etc. Patient  registration, notes, medical records and conditions are all being handled the old way – by pen and paper. This is serious: the FBI has been called in to investigate and help!

The ransom being demanded is 9,000 bitcoins (or 3.4 million dollars). In exchange, the hackers would send back the key code to restore the system.

video.yahoofinance.com@8dfea102-b1a8-362e-9e14-5554f85eab4c_FULLBitcoins are a sort to encrypted virtual currency – think of it as electronic money (they are not real dollars) that can be transferred between entities or people digitally and ANONYMOUSLY. Your bank keeps track of everything you send/receive but that’s not possible with Bitcoins. Users simply have a Wallet ID and that’s it. You can “never” know who the buyer or seller is. This virtual currently is not ensured by the FDIC and this industry, praised by Bill Gates and others, is largely unregulated.

Screen Shot 2016-02-15 at 5.23.03 PM

Today, it’s a hospital, tomorrow maybe it’ll be the Social Security Administration or your bank. Then what? Sure, those agencies/companies spend millions of dollars fighting cyber attacks – President Obama recently announced that he wants$3 billion from Congress to to fight such crimes as these, cyberattacks; but, we, very much live in a digital world and it only takes one lucky attempt or try for a hacker to do “virtual” damage.

Ransomware is not just for companies, individuals can be targeted as well. Even you! So, what can you do? Don’t open email from people you don’t know, especially attachments. Don’t click on UNKNOWN links – seriously, if the sender’s email address is something like “info@yourbank.com” this should a RED FLAG. If you haven’t paid attention to that before, spend 5 seconds to look NOW! Don’t download FREE software you think is going to solve your problem (i.e. my computer is slow software X claims to be able to fix it”, etc.) Don’t play games online that require you to DOWNLOAD something. PERIOD. FREE != GOOD != SAFE… I just taught you a bit of computer programming there 🙂 And finally, get a Mac. Seriously… read more here.

I included a few videos below in case you want to learn more about Ransomware or Bitcoins. #StaySafeOnline

Screen Shot 2016-02-15 at 5.43.17 PM

Screen Shot 2016-02-15 at 5.47.44 PM

New Education Bill

635853614123377872-500817362-78201944

(Surprisingly) Congress passed a new education bill last week. Forget “No Child Left Behind” rolled to in 2001 and embrace “Every Student Succeeds Act“. So what are the changes?

  • Testing will continue, but STATES – not the U.S. government – will now decide how to use the results in evaluating teachers and schools. The new law encourages states to limit the time students spend on testing, and it will diminish the high stakes for underperforming schools.(Associated Press)
  • Computer Science has been included in the definition of well-rounded education subjects. Its inclusion, for example, will allow computer science educators the same level of access to professional development opportunities as teachers in other subject areas such as science and math. (Wall Street Journal)

(see also The Case for Computer Science)

These are the two main points I saw as I scanned multiple news outlets’ headlines – there may be more. You can read the full details here (it’s only 1,068 pages). #HappyReading

The Case for Computer Science

IMG_4199-0This morning Martin Armstrong released a post titled, “Most Schools Do Not Teach Computer Science.” After hearing a few years ago that some schools don’t even offer Physical Education (PE) any more – better known as play time to kids – I’m not surprised one bit! Do you know what Computer Science is and the benefits? Many people may not know or others may think fixing personal computers is all the field has to offer. Not so my friends! So let’s explore the field a little more, Bri Alys style! (Two of my three degrees, Bachelors Tuskegee and Masters RIT, are in Computer Science so I like to think I have a bit of expertise in this area. I’ve also taught college courses in this space.)

What is Computer Science ? As you can see in the video above, the key theme is PROBLEM SOLVING, followed by the USE OF COMPUTERS (or other technologies) to solve those problems. They both go hand in hand. The field is all about logic, reasoning, rational thinking and creating a solution.

Putting this back in the context of schools, Martin argues, “computer science is probably the most essential qualification next to reading. You can even get a pocket calculator to do your math, and you can have phones read your text messages, but the one skill set that children cannot do without is computer science.” Studying Computer Science trains your brain. It trains you how to think. It trains you to focus on the solution rather than the problem. It trains you to break complex problems down into smaller components and come up with a solution. It teaches you how to think critically. These traits are not just valid for a computer, they are valuable in real life!

The article Martin references in his post points out three problems with kids not studying Computer Science:

  1. First, employers are clamoring for qualified people to fill tech-related jobs.
  2. Second, the lack of computer science in earlier grades also makes it more difficult to attract students into computer science majors in college.
  3. Finally, and perhaps most important, basic education in computer science makes sense for all students—even kids who’ll never earn a living writing software code.

We’ve all read the recent reports about the lack of diversity in the tech field – I’ve written about my own experiences before. Some companies like Intel are upping its referral bonuses to attract diverse tech talent. Couple that with Forbes recently reporting The College Majors With The Highest Starting Salaries. In at #1? Computer Science.

top

Makes me want to teach again! But for you, it’s never to late to learn. Checkout free online courses from Stanford and edX. Yes, you! Or if you have a kid, get them started early with a Kids Coding magazine.

There is no Online Safe Zone

macIn case you haven’t noticed, computer hackers are taking over the world! Surely you’ve heard of Anonymous, the “invisible” group threatening to release all sorts of information. I’ve said this so many times – the next “war era” will not be using bombs or grenades, it will be done online! And in case you haven’t noticed, it’s already started. Before we get into the details, here’s a simple truth: “Everything you do or say online can be used against you.” That disclaimer should be tied to every smart phone, computer or tablet issued in the entire world.  People who are smart enough to know how to program a computer (and exploit it) can make all of our worst nightmares a reality. You remember – there was the Target data breach (40 million cards affected), then came Home Depot and even more recently the US Government and Ashley Madison (online affair site – those hackers made good on their promise and exposed cheater’s names, credit card numbers and home address).  Even Hillary Clinton’s camp is  not smart enough to know that emails CAN ALWAYS be recovered.

SIDE NOTE: I’m no fan of Hillary Clinton by the way. Charles Barkley was on Mike and Mike this morning. When asked who he would vote for at the moment, he said “No Democrat impresses me.” I agree!

Now, back to the subject at hand – I’ve always said, the dumbest criminal is the one who incriminates him or herself. Why photograph illegal activity? Or post it online? Or insinuate it? Or leave a paper / digital trail. Just not smart people!!! Even a PRIVATE Instagram account will not hold up to a WARRANT from a JUDGE. Facebook just LOST a case when it tried to challenge the legality of warrants requesting personal data from it’s members.

I ran across this article by The Verge, I knew it was worth sharing:

PSA: Everything you say and do is public: five rules for living with the internet

  1. Assume everything you do and say will be made public.
  2. Do not be seduced by privacy settings and passwords, which are temporary illusions that distract from the reality of the previous point.
  3. Understand that context and data are often one in the same. When you enter information on the internet, assume that you include the who (you), the what (the data), the when (the time of data input), the where (the site on which the data is being placed), the how (the device on which you input the data), and the why (the purpose of the site).
  4. Believe that all of your credit card transactions are being kept in a colossal, searchable ledger that one day will be made available for all to study.
  5. Believe that data does not disappear when you delete it.

Stay in the KNOW!

#READ #LEARN and #STRENGTHENYOURTOOLBOX