You’re in love. You make love. You get pregnant. Oh yeah, and you’ve got a pep rally in the gym tomorrow. So what do you do next? If you decide to raise the kid, you’re now officially a mom, but unfortunately, there’s no fifth-period elective on rearing children. If you’re feeling overwhelmed right now, you’re … Continue reading How to Raise a Kid When You are One
The answer, it would seem, is no, at least in the world of digital information. Before creating Facebook, Mark Zuckerburg hacked through Harvard’s security system to set up a prank website. Ten years later, it’s not just Ivy League schools that are in danger. Even big-league telecommunications companies like Norway’s Telenor are being hit. Fifty-three … Continue reading Is Anything Sacred? Is Anything Safe?
Within the long history of warfare, cyberattacks are a relatively new method of battle, but can potentially be categorized as weapons of mass destruction. While not deadly in an of themselves, cyberattacks open the door to any number of various military actions. Recently, a two incidents have brought the severity of cyberwarfare to the forefront … Continue reading Is North Korea Sending a Message?
For millenia, humankind survived and even flourished without electronic technology. However, in the last dozen decades, lightning-quick advances in technology have made the absence of digital technology an acute disadvantage wherever it occurs. Globally, the difference between its presence or absence has been termed the digital divide, and a movement has been churning to bridge … Continue reading Digital Divide: More Than Just Electronics
This is another school assignment. http://ellipsisweaver.podbean.com/2013/02/26/net-neutrality-podcast/ Continue reading Net Neutrality Podcast
“We may be doubtful about certain identities of ours if these identity categories are controversial, stigmatized or unaccepted in society,” (Cheung 59). New York, often a social and political leader in the United States, has initiated a program titled “Operation Game Over” through its Electronic Securing and Targeting of Online Predators (e-STOP) law, which requires … Continue reading Online Identity (Class Assignment)
One of the things strangers find most interesting about me (or at least the most worth questioning me about) is that I have a sister who is 17 years my junior. While some people my age are hanging with friends in dorm rooms or going to house parties, I’m doing things like brushing my sister’s … Continue reading The Pretty Average Weekend of a Not-So-Average College Student
In 8th grade, at the end of the school year, I wrote a thank-you letter to my teachers and slipped it under their doors. (Yes I was that kid.) It was only 3-4 months after my salvation took place and I had always had a soft spot for teachers. For years I thought I had lost it, … Continue reading To the Oft Forgotten
Part 1 Previous Section Carter asserts in his essay “Intrinsic Value and the Intrinsic Valuer” that “Only persons have within themselves their own concepts of themselves, and, therefore, only persons have within themselves the standard of themselves” (511). However, it should be acknowledged that the intrinsic value of humans cannot be attributed by humans themselves … Continue reading Intrinsic Value Part 3
So, again, I’m dropping the ball, but with your forgiveness, I will now submit to you the rest of my paper that I gave you the teaser for a week ago. For Part 1, click the hyperlink. To begin, it may be appropriate to first define the term “intrinsic value” for ease of discussion. Intrinsic … Continue reading Intrinsic Value Part 2