Marked Up Article 6 [EDIT: Annotated Bibliography Added]

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1327&authkey=!ANd8lvRH9SxE6Go&ithint=file%2cdocx


Khandelwal, S. (2015, February). Lenovo shipping pcs with pre-installed ‘superfish malware’ that kills https. Retrieved from http://thehackernews.com/2015/02/lenovo-superfish-malware.html

This web document details a piece of malware, known as “Superfish,” that Lenovo has been releasing with consumer-grade computers sold before 2015. This software monitors user behavior and injects advertising into websites. This vulnerability is also available on websites that utilize HTTPS, the secured version of the standard HTTP. Lenovo, after being called out on the issue, provided users with a way to remove the malware through an update that provides the steps necessary. The company defended the move, telling the public that they will rerelease the software when it perfectly suits their needs. This website does a fantastic job of providing readers with the steps necessary to remove the bug just in case they would want to get rid of it. I believe the document is an unbiased source and it a great read for any users who want to learn more about how software can affect the privacy of your machine.

Marked Up Article #5

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1325&authkey=!AESYT_vaFSFxZNY&ithint=file%2cdocx


Kumar, M. (2015, February). 15 year-old jasbug vulnerability affects all versions of microsoft windows. Retrieved from http://thehackernews.com/2015/02/jasbug-windows-vulnerability.html

This web document was written to inform its readers on the Jasbug vulnerability found in nearly every version of Microsoft Windows since Windows Vista. This vulnerability, named after the researcher that discovered it, would allow any user that is unknowingly connected to a malicious network to have their data altered or access. This means that the attacker would have access to install and delete programs or even create a user account on the affected system. The author does make his readers aware that the attackers would require a public-esque networks to be vulnerable, noting how home networks were not affected by this flaw. Microsoft has released multiple updates lately in an attempt to fix this bug that has been active for around fifteen years. The article also includes a technical demonstration as to how the attacks are performed, which improves the credibility of the document overall. It is incredibly interesting that this flaw is fifteen years old and affects even Windows Vista. It appears to show the level of sameness that occurs within the programming of each successive Windows release. This unbiased piece of work is designed for the average user, but the technical demonstration may be lost on them, so it is good that the basic information was written first.

Marked Up Article #4 [EDIT: Annotation Added]

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1318&authkey=!AHqF9mFB2c_O5Is&ithint=file%2cdocx


Khandelwal, S. (2014, February). Microsoft internet explorer universal cross-site scripting flaw.

Retrieved from http://thehackernews.com/2015/02/internet-explorer-xss.html

This web document details a new vulnerability found in Microsoft’s leading operating system, Internet Explorer. This vulnerability allows hackers to enter user accounts on any website or enact phishing attacks that are incredibly hard to detect by exploiting the Same Origin Policy. This principle is normally used to access site cookies or responses without allowing third parties to interfere without permission. This vulnerability is also available on websites that utilize HTTPS, the secured version of the standard HTTP. Knowing this, anyone with the right knowledge can access a bank’s website and access private financial information, for example. Microsoft is currently looking into this flaw and advises Internet Explorer users to not follow any links that appear suspicious. This website maintains its credibility by providing a link to testers demonstrating this defect. The website utilizes vernacular in such a way that it can be understood by the vast majority of individuals, as the article’s intended audience can be described as anyone utilizing the internet. This unbiased piece of work is great insight into the current world of hacking and it is recommended that as many people become aware of this issue as possible.

Citation Practice

Deep Neural Networks – Magazine Article

Clustering Affective Qualities of Classical Music – Journal

Startup Advice – Document from a Website

How Telemedicine Can Help Treat Ebola – Blog Post

Vrbicky, Keith W. (2014, Oct 23). How telemedicine can treat ebola and other infectious diseases [Web

log post]. Retrieved from http://www.computer.org/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=how-telemedicine-can-help-treat-ebola-and-other-infectious-diseases

Latent Feature Decompositions – Journal

Gregory, K. B., Momin, A. A., Coombes, K. R., & Baladandayuthapani, V. (2014). Latent feature

decompositions for integrative analysis of multi-platform genomic data. Transactions on Computational Biology and Bioinformatics. 11, 984-994. Retrieved from computer.org

Achieving Dynamic Capabilities – Magazine Article

West, B. C., Battleson, D. A., Kim, J., & Ramesh, B. (2014, Nov 24). Achieving dynamic capabilities with

cloud computing. IT Professional. Retrieved from computer.org

Parallel Style-Aware Image – Journal

Fix It: The Patten Goal – Blog Post

Hopper and Dijkstra –Document from a Website

Payette, S. (2014, December). Hopper and Dijkstra: crisis, revolution, and the future of programming.

Retrieved from http://www.computer.org/cms/Computer.org/ComputingNow/issues/2015/02/man2014040064.pdf

Enough Consumer Coolness – Blog Post

The Mikado Method – Document from a Website

Crowdfunding Takes off – Document from a Website

Visualization beyond the Desktop – Document from a Website

Marked Up Article #3 [EDIT: Bibliography Added]

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1308&authkey=!AM3OIL0VEixsXgk&ithint=file%2cdocx


Khandelwal, S. (2015, January). Mozilla deploying high-capacity tor middle relays. Retrieved from http://thehackernews.com/2015/01/mozilla-tor-middle-relays.html

This web article covers the topic of Mozilla’s newest move, a joint action with Tor in an attempt to increase the efficiency of the security-based network. Tor is a network of relays connected all around the world that prevent any prying eyes from discerning your location. Mozilla, the company that created the popular Firefox browser, has shown interest in the privacy of its users, so this move makes sense. The author also notes the limitations of the venture, describing how hackers may utilize a flaw of the system in order to bypass the privacy features of the system. I like how the author brings these limitations to light, rather than simply talk about the good sides of the results. This improves the credibility of the article and makes it more informative as a whole. This article was written for anyone interested in Mozilla’s recent actions as well as the Tor network and online privacy. I do not know much about the Tor network, so this article shed some new light on the subject for me. The article appeared to be unbiased and well written as well.

Says/Does Analysis

Ehrenreich, B. (2001). Nickel and dimed: On (not) getting by in America. New York: Henry Holt and Company.

In this book of nonfiction based on the journalist’s experiential research, Ehrenreich attempts to ascertain whether it is currently possible for an individual to live on a minimum-wage in America. Taking jobs as a waitress, a maid in a cleaning service, and a Walmart sales employee, the author summarizes and reflects on her work, her relationships with fellow workers, and her financial struggles in each situation.

An experienced journalist, Ehrenreich is aware of the limitations of her experiment and the ethical implications of her experiential research tactics and reflects on these issues in the text. The author is forthcoming about her methods and supplements her experiences with scholarly research on her places of employment, the economy, and the rising cost of living in America. Ehrenreich’s project is timely, descriptive, and well-researched.

Says

Does

In this book of nonfiction based on the journalist’s experiential research, Ehrenreich attempts to ascertain whether it is currently possible for an individual to live on a minimum-wage in America.

Type of article (nonfiction book), the author, and summary of book given

Taking jobs as a waitress, a maid in a cleaning service, and a Walmart sales employee, the author summarizes and reflects on her work, her relationships with fellow workers, and her financial struggles in each situation.

Different examples of jobs given in an attempt to prove or disprove the subject of the book.

An experienced journalist, Ehrenreich is aware of the limitations of her experiment and the ethical implications of her experiential research tactics and reflects on these issues in the text.

Describes the experience of the author and the fact that the research done could be more thorough while stating that these limitations are described in the text as well

The author is forthcoming about her methods and supplements her experiences with scholarly research on her places of employment, the economy, and the rising cost of living in America.

Author enhances her points by doing more research on the subject. The research’s credibility is described as well.

Ehrenreich’s project is timely, descriptive, and well-researched.

Describe the credibility of the author and the work

Marked Up Article #2

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1304&authkey=!AJDFQMNtb_62x9M&ithint=file%2cdocx


Auchard, E. (2014, July). Smartphone management flaws puts users at risk, researchers say. Retrieved from http://www.reuters.com/article/2014/07/31/us-mobilephone-cybersecurity-idUSKBN0G01RI20140731

This article details the aspects and effects of certain vulnerabilities found within smartphones that are used today. The author writes about the research done regarding this topic as well as the reactions that the big companies, Google, Apple, Android and Blackberry, gave as a result. It is also said that Android users were at the biggest risk due to their unique nature when the company first started, but notes their increase in security as of late. The article was quite informative and the information was presented in a very concise, yet detailed format.  I personally enjoyed the descriptions that were given regarding the reactions by the affected companies. In addition to this, stating that all companies lost market share as a result was a good supporting point as well.

Peer Review of Cody’s 1st Bibliography Entry

1. Is the description about 50% of the whole annotation? Is it succinct, thorough, informative and comprehensive? 3
You are succinct when you are describing what the article is about.
2. Is the evaluation about 50% of the whole annotation? Is it insightful, useful, thoughtful, and specific? 3
Your evaluative statements helped me to know that the author succeeds in achieving her intended purpose.
3. Is the citation in proper APA format, and complete? 3
Your citation is completely correct.
4. Is the entry free of grammatical, mechanical and typographical errors? 0
The following phrases/sentences contain errors in grammar, mechanics, or typography:

Janet Brown, a Contributor at Forbes, presents a look into the trap that so many investors fall into and discusses ways to properly invest.
The fourth word in this sentence does not need to be capitalized.

Many investors become severly invested in the success stories of the market so much that they end up making mistakes and losing a lot of money.
The fourth word in this sentence is misspelled. The proper spelling is “severely.”

Marked-Up Article [EDIT: 15 Points and Annotated Bibliography Added]

https://onedrive.live.com/redir?resid=60779666F27AEDEA!1293&authkey=!AJe0QYtIZzue63w&ithint=file%2cdocx

Source Article: http://www.nytimes.com/2014/12/02/technology/hackers-target-biotech-companies.html?_r=1

10 summative points

  1. More than 100 organizations
  2. FireEye, a cyber-security and malware company
  3. Found in Silicon Valley
  4. 2/3 found within health care and pharmaceutical sector
  5. “Fin4,” one of the few groups who hack for financial gain, native English speakers based in either North America or Western Europe
  6. Emails sent are meticulously created to lure individuals into trap
  7. Victims were notified
  8. FBI also notified
  9. Stock price has dropped from $100 last March to $30
  10. Hackers used Tor

5 evaluative details

  1. The article showcases the versatility that hacking has, being able to strike anything that incorporates technology
  2. I think it’s important to note the sectors that were primarily affected, being pharmaceutical and health care, as I think there’s a possibility of something coming of these attacks
  3. I like the article, as I find the topic to be quite interesting
  4. I would recommend this article to anyone who is interested in understanding what hacking can do
  5. I would also recommend this article to those interesting in business, as it provides some insight into what to watch out for

*Assume its in APA format*

Perlroth, N. (2014, December 1). Hackers Using Longo of Wall St. Breach Health Care Companies’ Email. The New York Times. Retrieved from: http://www.nytimes.com

This article describes the aftermath of an attack by a hacking group on the cyber security and malware company, Fireeye. The Silicon Valley based company was attacked and unintentionally facilitated the financial gain of the hacking group, dubbed Fin4, by assisting in distributing information on over 100 organizations, most of which are found within a health care or pharmaceutical sector. This article was written for those interesting in both business and hacking, as it showcases the ability of both aspects throughout the text. As my topic is focused on hacking and my degree focuses on business, this article was incredibly relevant to the work that I’m doing. The unique aspect of the story, for me, was that the hacking group has yet to be identified, as they only know the general locations of the group to be either North America or Western Europe. I did find this article to be primarily unbiased and strong when describing the situation, with no glaring weaknesses to speak of.