Writing

Content
is King

In the enormity of human history, there is little new to be said. It's how we say it that varies. And the rules for good design hold true for good writing, as well. Content must be truthful (or in the case of fiction, true to the story's environment), lean, orderly, and inviting.

Content that is not truthful destroys one's reputation (see Branding). Obscuring the truth, or outright lying, is a fine way to dig your own grave. Play it straight, and you'll sleep like a baby.

They say the Internet has destroyed the human attention span. I say the Internet has finally made writers accountable. Droning on and on is no longer an option, and that's a good thing. Stay organized, and stick to your outline.

Reading should be a pleasure. Well-chosen words create depth and conjure associations—little gifts for your reader. And a reader who feels loved will likely come back for more.

Competitive Analysis:
A2 Bank

Student Work

I wrote this report for the requirements-analysis phase of a site design for a fictitious bank. In the report, I compare the sites of four banks—two local and two national—to better understand industry standards.

View PDF of Competitive Analysis Report

Usability Testing Report:
Ann Arbor Art Center

Student Work

Working with a partner who shared in the research, I compiled this report analyzing the data from our testing. The testing revealed many opportunities for improvement for the Ann Arbor Art Center website, most notably in their shopping cart application.

View PDF of Usability Testing Report

Expert Review:
Humane Society of Huron Valley

Student Work

This Expert Review analyzes the Humane Society of Huron Valley website according to commonly-accepted usability guidelines. My partner and I compiled many recommendations to address the site's complex architecture and interface.

View PDF of Expert Review

Site Deconstruction:
Matthaei Botanical Gardens and Nichols Arboretum

Student Work

The Site Deconstruction report provides both a site outline and a site diagram describing the majority of the Matthaei Botanical Gardens and Nichols Arboretum website. My deep exploration of this site served as a stern warning to make clear, logical architecture my top priority in design.

View PDF of Site Deconstruction Report

Accessibility Inspection:
Literati Bookstore

Student Work

In this report, my partner and I analyzed the usability of the Literati Bookstore website from the standpoint of accessibility. We created a comprehensive set of recommendations to ensure this site is accessible to people of all abilities.

View PDF of Accessibility Inspection

Card Sorting Report:
Shedd Aquarium

Student Work

For this report, I had subjects group cards with labels currently in use on the Shedd Aquarium website, according to their own organizational preferences. The data revealed which labels on the site could be confusing to users.

View PDF of Card Sorting Report

Is Beauty Really in the Eye of the Beholder?

The ancient Greeks and Egyptians didn’t think so. They relied on a mathematical proportion dubbed ‘phi’ by the American mathematician Mark Barr. This proportion, roughly 1:1.61, is seen everywhere in nature – in the spirals of seashells, pinecones, insects, and even in our own faces and bodies!

Artists and designers have been using this proportion for thousands of years. The proportions of the Great Pyramids of Giza, Parthenon, and Mona Lisa are what make these works such marvels. This ratio is so harmonious, it’s been called the “Golden Mean.”

So how can you use the Golden Mean in your own work? First create a rectangle. Then fit a square in the rectangle that exactly matches the size of the rectangle’s short end. This will give you another rectangle. Create a new square within this new rectangle, again matching the square’s sides to the length of the rectangle’s short end. Continue embedding squares in each successive rectangle, as many times as you want. You will then have created a perfect compositional grid.

Now all you have to do is position the major elements of your design to fit the grid. And voila – you’ve just made a masterpiece!

Coloring in the Lines

Have you ever wondered why some color schemes take your breath away, while others make you want to run the other way? It’s not just a matter of preference; it’s really just ordinary physics and geometry.

Color, as you may have heard, is nothing more than white light broken up by material that makes it bend, or change direction, a phenomenon called refraction. Our atmosphere is full of these tiny refractive particles that break up all of our light into the colors we see.

So how does that help you coordinate your socks with your laptop case, you ask? It turns out, all you need is geometry. If you line up all of those sheared-off colors in wavelength order, you get a rainbow. Bend that rainbow around until you make a circle. Now you have a color wheel.

Take any color wheel and draw a straight line to the other side of the color wheel. You now have a pair of complementary colors. If you were to mix two complementary hues of light, you would end up with a perfectly neutral (colorless) shade of gray. In other words, the wavelengths of these colors precisely cancel each other out. This is the underlying idea behind all color theory.

When we see complementary colors side by side at a distance, we read the colors as gray, even though they aren’t grey at all. In larger proportions, complementary colors can activate an image — either attracting or repelling the eye. It all depends on the proportions we use. As a general rule, never use complementary pairs in a 50:50 split. Pick a dominant color from the pair and use the complement to draw the eye to the most important areas in your composition.

Are two colors too few for you? Create a triangle on your color wheel for a more complex scheme, or even a square. Even if you’re color blind, you can use simple geometry to make your colors really pop.

Taming the Turquoise Hawaiian
Taco Bar Logo

Or Why Color Matters

You love turquoise - turquoise pools, turquoise jewelry, gleaming turquoise waters lapping up white, sandy beaches in the Bahamas. Naturally, you want the logo for your new Hawaiian Taco Bar business to be turquoise. But how will consumers react when you serve up that turquoise logo? The answer is that old standby - ‘it depends.’

When choosing colors in marketing, designers need to consider two factors - the consumer and the product.

We’ll start with the consumer. Who’s going to eat your tacos? How old are they? Are they small children, young adults, and/or senior citizens? Perceptions and affinities towards particular colors vary with age. Across all ages, blue reigns supreme, but by the time we hit 70, it’s just about the only color we want to see. Under the age of three, it’s a different story - warm, bold colors appeal the most. Under the age of 18, purple is the least favored, and green is at its most popular. Between 19 and 24, red is at its hottest, while purple peaks between the ages of 50 and 69.

The next question to ask is what gender are your consumers? If most of your clients are men, you should consider cooler hues, such as blue and purple. If your market is mainly women, stick to warmer palettes. Men also like their colors bold and deep, while women prefer softer pastels. Moreover, women are able to discern far more shades of each color. Where men see ‘white’, women are likely to see ‘ecru’.

Are your customers culturally diverse? Color has different meanings in different cultures. Purple connotes wealth and power in Japan, while in Thailand, the UK, Italy, and Brazil, it’s the color of mourning and death. Here in America, purple is associated with spirituality and New Age ideas. But some colors are more stable over international borders. Blue, for example, is practically universal as signifying trustworthiness.

Once you’ve established who your customers are, you need to consider what kind of emotions you want your product to evoke. Red is universally associated with love, youth, excitement, and on the flip side, aggression. Assuming your customers are American, orange connotes good cheer, confidence, and playfulness. It’s also considered cheap. Yellow is associated with clarity, optimism, and warmth. But combined with black, yellow signifies warning. Green implies growth, health, and prosperity. In modern times, green signals environmentalism. Blue, as mentioned, is the most trustworthy of colors - connoting dependability and strength. Purple, on the flip side, is the most unpredictable color choice - conjuring mysterious processes such as creativity, imagination, as well as luxury. For the balanced neutrality of a cubicle, choose gray.

But, color is also dependent on personal experiences and associations. Sure you love turquoise, you get turquoise, doesn’t everybody? What could go wrong? Well, if your customers don’t associate your favorite shade of azure with the Hawaiian taco experience, they won’t trust anything in your taco bar. But don’t just go with dependable blue because you want people to trust your tacos. People associate both Hawaii and tacos with heat - so orange, yellow, and red would probably be the best move. The color has to ‘fit’ with the brand, and the brand has to ‘fit’ with the product.

Combining colors is your next battle. A nice warm-hued logo is great, but it might not be very noticeable in the sea of logos and signs in your local strip mall. Colors that stand out from one another are not only more eye-catching, they also increase recall - whether in text or in an image. Complementary colors - those on opposite sides of the color wheel - offer the highest color contrast. These include blue and orange, red and green, and yellow and purple. So if you can’t bear to leave out that turquoise, use it for the text on your orange taco logo, and customers will remember the logo even more.

Names for colors matter, too. If you need to name colors in your products make sure they are evocative and unusual. Consumers routinely prefer “ice blue” over “light blue,” for example.

And don’t forget that 10% of the population is color blind. If you are using color to highlight important information, make sure the dark and light contrast is sufficient. For example, if your background image is an orange and yellow Hawaiian taco, and your text is turquoise, the turquoise should be dark enough to be easily seen over the taco image, or vice versa.

Choose your colors to appeal to your customers and fit with your product, and your branding will stick out like a Hawaiian taco.

Who Is My Neighbor?

Good Samaritan Appeal 2017

With so much of our lives spent online, it’s easy to wonder where exactly our neighborhood lies. Who do we include as our neighbors? Are our friends on social media our neighbors? How about business associates we Skype with? Is our neighborhood the “contacts” list on our phones?

Jesus cut to the heart of this question with the parable of the Good Samaritan. This parable suggests that we should extend compassion and aid to all who are suffering in our midst. But as we carefully choose whom to befriend as neighbors, whether online or in person, are we missing the opportunity to witness and care for those in greatest need?

At CSSW we take care of those who are wounded, neglected, and avoided, no matter what “neighborhood” they are from.

  • We counsel pregnant women in making parenting or adoption plans.
  • Our Washtenaw County Advocacy Center provides fully-integrated intervention and care for child victims of sexual abuse.
  • We provide access to physical health care for our low-income Behavioral Health Counseling Services clients through our partnership with the Packard Health Clinic.
  • Our Emergency Food Pantry at Northside Community Center feeds more than 500 low-income families annually.
  • Through our Interfaith Volunteer Caregiver Program and The Oaks Adult Day Program, we provide much-needed breaks to low-income caregivers of clients with a range of impairments, including Alzheimer’s.

We all feel terrible about the overwhelming suffering in this world. But the Good Samaritan wasn’t just moved with pity, he was moved to action. And his actions included providing resources so others were able to care for someone who was suffering.

Your gift today expands the boundaries of our neighborhoods into a community of hope and compassion. As our partner, you are the Good Samaritan for those whose lives have been shattered by mental illness, violence, poverty, drug and alcohol addiction, unplanned pregnancies, and the challenges of age. We are honored and grateful to be a part of your neighborhood.

See original post on Catholic Social Services of Washtenaw website

Mental Health Support During the Holidays

Not Everyone Loves to Celebrate

For those suffering from serious mental health problems, the holidays can be a painful reminder of the peace and stability they lack. Loneliness, grief from the loss of a loved one, debilitating health conditions, poverty—all of these can contribute to and exacerbate underlying mental health conditions, especially when it seems like everyone else has loving support and a full meaningful life.

What You Can Do

Listen

Sometimes a person suffering from mental health problems will come right out and tell you he or she is in pain. Other times, he or she may pretend to be happy to avoid feeling vulnerable. If you know someone is alone, or has recently lost a loved one, or is homebound from injury or illness—ask how they are doing; share a cup of coffee; visit them on the weekends. Anything you do to stay in touch with hurting neighbors will remind them that they have options and that there are people who notice and care.

Respect

Respond with affirmations, not derision. It may seem obvious, but it’s easy to be dismissive when people tell us their problems. We might react with an uneasy laugh, or comments that undermine their suffering, like, “Oh, things could be so much worse,” or “Just don’t think about it,” or “Let me tell you my problems.”

Keep confidences—your neighbor needs to trust you. But if the person makes references to suicide, get professional help right away. Get in touch with our Behavioral Health Counseling Services intake counselors, or call the National Suicide Hotline for immediate help: 1-800-273-8255.

Act

Sometimes people are so overwhelmed with grief and crisis they aren’t able to tell you what they need. Feel free to start guessing! Shovel their driveways, bring them lunch or a special treat, babysit their children—anything you can think of. You might not guess exactly right, but you’ll open the door to finding out what might really help.

Support CSSW

Last year, we served more than 9,000 people struggling with a wide variety of social, mental, and physical impairments. And our sliding scale fee structure means nobody who comes to us for mental health counseling is turned away because of income. We believe that professional mental health care should be available to everyone who needs it, regardless of their ability to pay.

If you share our commitment, please be a Good Samaritan. Your financial gift is critical for providing the support our neighbors need.

Thank you for making our neighborhood one of compassion and hope.

See original post on Catholic Social Services of Washtenaw website

Supporting Families In Crisis

Our Neighbors Are Hurting

The holidays can be an excruciating time for children from troubled homes. While there are many challenges that can wreak havoc on families, few can compare to the devastating impact of the current opioid epidemic. From 1999 to 2016, opioid deaths in Michigan have multiplied 17 times, to 2,335 in 2016. (MDHHS). This alarming rise is driving more and more children into foster care, straining the system to the breaking point.

What You Can Do

Become a Foster Parent

In Michigan, there are approximately 13,000 children currently in foster care and 300 in need of adoption (MDHHS). Becoming a foster parent requires compassion for children, and a commitment to their care, not perfection! Learn more about our Foster Care program here: www.csswashtenaw.org/pregnancy-adoption/foster-care/. These children need caring people, just like you.

Support CSSW

top for a moment and consider the devastation parents feel when their children are removed from their homes and placed in foster care. And imagine the terror and turmoil of emotions those children experience, especially during the holidays. Through CSSW programs such as Families First, Family Time, Nurturing Families Washtenaw, and Grandparents as Parents, our caseworkers work tirelessly to teach parents and caregivers the skills they need to raise strong, happy children in a safe environment.

Your partnership will support the overwhelming needs of families in our communities. Join us in our work to keep kids safe and families secure, as a foster parent or with a financial gift. We are grateful for your help which builds resilience and hope in our neighbors who face so many enormous challenges.

May all the families in our neighborhood find peace and joy this season.

See original post on Catholic Social Services of Washtenaw website

The Industrial Revolution

Home Page Text

This is a re-write of a very dense, difficult introduction written by truly brilliant engineers. My first achievement was sort-of understanding what the original text was getting at, and then figuring out a way to contextualize it for non-engineers. I structured the piece as a progression through problems and solutions that ultimately lead to an artificial intelligence that more accurately mimics human cognition.

In the heart of downtown Detroit, Michigan, our team of graduate students and post-doctorates are forging the design engineering research. Wayne State Department of Industrial and Systems Engineering professor Kyoung-Yun Joseph Kim leads our ever-changing team of students and post-docs, but the mission stays the same: To empower engineers and designers with data.

But to accomplish our vision, we’ve had to change how we think about traditional design processes and systems. In short, we’ve had to stop thinking like machines and start thinking like humans.

Linear Vs. Relational

Our first hurdle has been to see the forest through the trees. In traditional product design, models are developed in a sequential, linear manner, based on a product’s lifecycle. However, they are not easily transposed into systems with conflicting frameworks. Moreover, it's difficult to remove a portion from the sequence without losing its context.

To address these limitations, our team applies mereotopology in the design of our systems. Mereotopology, a mathematical theory for mapping the relationships between parts to a whole, provides a framework for us to parse and employ the complex relationships between parts of a design process and the finished whole of a product. Our designs focus not on the sequences of parts, but on the relationships between them. This paradigm shift allows us to create systems that are modular, interoperable, and machine-interpretable.

Semantics-Based Reasoning

While our mathematical approach ensures a greater level of interoperability, our semantic methodologies improve our design systems’ accessibility and performance.

Conventional, knowledge-based approaches are based on the accrual of increasing levels of expert knowledge. At CInDI, we are implementing the more adaptable system of logic that is based on semantic reasoning.

Such a transition requires an ontological system for design and engineering. Our semantics-based system addresses the reported limitations of Knowledge Formalization and Representation (KFR)—AI systems that depend entirely on the kind of extensive knowledge base only a machine can contain. Limitations of KFR systems include:

  • Challenges for individuals who aren’t logicians, either by nature or training
  • Inefficient use of code
  • Diminished interoperability with systems lacking the same levels of knowledge input.

Semantics-based systems rely not on encyclopedic knowledge, but on a few key ontological definitions combined with a capacity for contextual reasoning. Our system’s resonance with human learning promises superior levels of flexibility and adaptability than knowledge-based systems. This improvement allows us to create simpler and more efficient models that are intuitively grasped by users of the system and easily incorporated into other systems.

Real World Applications

The research we do at CInDI pays off. Right now, we are creating a breakthrough, data-driven design framework for manufacturers who use metallic assemblies. System Integrators and OEMs currently have to rely on suppliers and testing companies to physically test each new material they are considering.

Using our new paradigm of data-driven manufacturability prediction, we are developing an integrated environment that uses real manufacturing data to create accurate decisions about the manufacturability of desired materials. This application minimizes the need for expensive, time-consuming physical testing.

Training the Next Generation

While we are excited about our current projects, we are keeping the future of design and manufacturing environment our top priority. To that end, we are developing a Digital/SMART Demonstration Center (WSU D/SDC) for the high bay of the manufacturing engineering building at Wayne State University’s College of Engineering. This demonstration center will provide both students and researchers the opportunity to interact with real-time manufacturing, inspection, design/engineering data, and fully-sensored, advanced manufacturing processes.

Our team is currently establishing partnerships with various industries to advance the development of this state-of-the-art, industry-supported manufacturing environment. This center will provide a one-of-a-kind opportunity to educate, demonstrate, and research the Internet of Things (IoT), Digital Manufacturing, SMART manufacturing, and real-time manufacturing analytics.

Cookies 2 Die 4

Student Research Paper

This is a research paper I did for a beginning coding class, so the information is a bit dated, but still mostly accurate.

It’s a cold, rainy Saturday morning. And after a long, sleepless night with a teething baby, you feel perfectly entitled to a plate full of white, refined sugar. But you know that’s wrong, so you do a very respectable online search for dessert recipes when somehow Google interprets “chocolate chip cookies” as “a nasty image I don’t want my baby’s six-year-old-sister-who-of-course-is-peering-over-my-shoulder to see.”

But big sister is still asleep, so you soldier on until you find a promising recipe on what appears to be a family-friendly site: CookieRecipes2Die4.com. You click on the Google link, and your computer sends a request to the cookie website through your Internet Service Provider (ISP) for a delicious recipe page written in Hypertext Markup Language, or HTML. This language, custom-made for applications called “web browsers,” is necessary because computer applications don’t speak any English at all.

The request for your cookie-recipe HTML page goes out in what is called an “IP packet,” a little bundle of data, somewhat like a Christmas card to your mother-in-law. IP, or “Internet Protocol,” is a set of rules that govern transmissions through the Internet. Just as the US Postal Service maintains rules for addressing, sending, and paying for Christmas cards, the Internet also uses a set of standards for its transmissions.

The IP packet contains a header, which is a bit like your mother-in-law’s address. Routers, special computers that connect to other computers via cable, wireless links, and satellite, inspect the packet to determine where it should go, just as a post office would.

But unlike postal employees, browsers can’t understand “CookieRecipes2Die4” because, as we’ve discussed, it’s in English, sort of. So yet another computer is needed to translate the bad English into the actual IP address for the server holding the cookie recipe. This IP address is a very computer-friendly series of numbers and periods, and it works just like a street address.

But let’s say your baby’s six-year-old sister made an adorable Christmas card for your mother-in-law, and you’re in a hurry because it’s December 23rd. You rush through your address and instead of writing “Grandma Jones, 5342 Jack Rabbit Road, Ann Arbor, MI 48105,” you write “Grandma Jones, Jack Rabbit Road, Ann Arbor, MI 48105.” Hopefully, the spirit of Christmas will right all wrongs, but probably, your card will come back to you with a “return to sender - address unknown” stamp. A port number in an IP address is just as vital as a street number. One domain may host several services, like both email and a website. To get a cookie recipe, you don’t want the domain’s email service, you want their website service. The port number tells the server which service you are requesting - just as in our example, the street number tells us which house on Jack Rabbit Road contains your mother in law.

Most of us can handle holiday greetings without any help, but we need our ISPs to translate domain names into IP addresses, which are unreasonable to memorize. ISPs do this with a special computer called a Domain Name Servers, or DNS. Of course, no computer can store all twenty-five trillion web addresses in existence. So pages under requested domain names are sorted by a nomenclature hierarchy. “Top level Domains,” or TLDs, are indicated by suffixes tagged onto the end of the name, like “.com” and “.edu.” The DNS that sorts through these suffixes is called a Root Server. It’s a rough sorting - like putting something addressed to Great Britain in the “air mail” slot.

The html request is then sent to “recursive resolvers,” other servers that keep sorting and re-distributing requests until a match is found on what’s called an “authoritative name server.” This is the server responsible for a specific domain name. It’s like the system theme parks use for lost children. Weeping children searching for their parents are directed to a “lost kids” building where employees take steps to locate a child’s “matching” supervisor.

Once the proper IP address is located, a connection is made to the Web server hosting the domain, and a request is issued for the chocolate-chip-cookie-recipe html page you found on Cookies2Die4.com. Faster than Tinker Bell can can turn broccoli into marshmallows, the html page is sent to your kitchen laptop.

But let’s say that after all that effort, Cookies2Die4 turns out not to be quite the family-friendly recipe site you thought it was. And let’s say that not-a-recipe-at-all html page appears just as your baby’s-six-year-old-sister is, of-course, peering over your shoulder. Then you have no choice but to panic, slam shut your laptop (a bad thing to do), and quickly change the subject. You may even decide to skip the cookies.

But not everybody wants their laptops slammed shut, so to speak. The relative newness of the internet has posed a variety of legal conundrums. One of the most well-known challenges occurred in 1988 when a federal district court in Virginia ruled that mandatory internet filtering at a public library violated the First Amendment. As a society, we have overtly decided that our freedom of speech should be guarded at all costs. But as individuals, freedom in the context of pornography and other social ills is often patently rejected. The burden of internet filtering is on whomever wants it.

So what is an internet filter? How does it work? Let’s take a look at the various ways to avoid the cookie-crumbling disaster described above.

Technological

Blacklisting
By Header
Routers

The request for a cookie recipe that isn’t actually a cookie recipe can be stopped as early in the process as the routers that receive your initial request. Routers can be configured to simply drop any packets whose IP headers designate an IP address on a specified blacklist. This is a broad stroke for a filter, blocking not only the “cookie recipe,” but also any other websites or email servers under a blacklisted domain.

A more refined approach is to block packets requesting blacklisted domains that are headed for a specific server port. That ensures that other services under a particular domain are still available.

DNS

Blacklisting can occur at the DNS phase as well. You simply configure an ISP’s DNS server to not accept any domain names on a blacklist. The user will simply get an error message.

By Content

Censoring headers, however, is a bit of a placebo. Nefarious websites multiply faster than enteroviruses, and keeping a complete, up-to-date blacklist for their domains is impossible. Happily, filters based on content are available at just about every juncture in the transmission path.

Routers

In content filtering, the entire IP packet is inspected, this time for keywords. This is not in a router’s job description, however, so extra equipment must be used, increasing the cost for the filter. Moreover, IP packets have a maximum size before they get spliced by surly Network Administrators who must minimize their IP packet SAR (Segmentation and Reassembly) times to keep web traffic flowing properly. So if the packet for your cookie recipe just rambles on and on, it will get spliced into smaller packets, forcing the router to read only one portion at a time. And what could happen is that the first portion of the packet is key-word safe, but the second portion is not, but by the time the filter figures this out, it’s too late, and the entire transmission has gone through. Or you could have a single key-word split up, and it could be the very word that would have been censored.

Content-filtered ISPs

These are ISPs that only offer limited access to the Internet based on content parameters. In this case, the ISP decides what it will or will not transmit to and from your computer.

Proxy Servers

Like ghost writers for politicians who lack the time and/or skills to write a pre-election memoir, proxy servers quietly step in between a web user and a web content provider to do the communicating for one or both of them. This is often used in the context of an internal network, like at a company. A school, for example, may wish to use a proxy server to negotiate students’ web transmissions. The server can stop and search all requests for any blacklisted keywords or headers. Complex rules prevent any transmission to the client until the packet is thoroughly inspected. Likewise, a proxy server can read transmissions from the outside and block any blacklisted content.

Client-Side Filters

This is software anybody can purchase or download for free on his/her computer. These applications are perfect for parents. It should be noted, however, that private companies that create these applications can choose to filter sites in any way they choose, according to their political and/or religious leanings, for example. A variety of popular client-side filters have been shown to block sites like the National Organization for Women, Quaker sites, Amnesty International, and The Heritage Foundation. There is no way for the government to check this power as it held in the private sector.

Browser Extensions

A browser extension is a program that enhances a browser’s abilities in some way. Extensions can be created through normal web coding which in the case of filters, are designed to block content that is blacklisted. AdBlock is an example of a browser extension filter.

E-Mail Filters

These applications search for banned content in an email’s body, header, sender, subject, and attachment.

Search-Engine Filters

These filters are available on search engines, like Google, but they must be activated. They only filter web searches, however. The URL for a known site can still be used if it is known.

Content Labeling

This is the “fox guarding the henhouse” method. In 1994, the Internet Content Rating Association (ICRA), developed an online questionnaire for web masters to describe the nature of a website’s content. This information was then packaged into the IP packet to be read by content-filtering software.

There are other tagging systems, but as long as they are voluntary, it’s hard to see how they could be terribly helpful. The problem isn’t the good guys - it’s the bad guys.

Denial of Service

In this not-so-civilized approach, a party who lacks the authority to filter can simply render Web sites inaccessible by overloading either the server or the network connection with an insane amount of requests. A very fast computer or a team of fast computers and a very fast connection are needed to accomplish this “filter,” better known as a Denial-of-Service (DoS) attack. Think of this as the “death-by-nagging” approach so often favored by 4th graders angling to watch Terminator movies.

Domain Deregistration

If you happen to be a ruthless dictator, this is the filter for you. Your country’s TLD, that dot-suffix tacked onto your web address, is most likely operated by you, your royal majesty! So anything subversive and/or disloyal can be deregistered right at the root servers, no problem.

Psychological
Surveillance

Monitoring an individual’s web surfing, and threatening said individual with legal action should he/she attempt to access prohibited content, is a psychological method of filtering. There might be a few scenarios where this method could be of some use, although the individual could only be held accountable on devices where surveillance has already been set up.

Public View

Positioning computers in a library or workplace so that anyone can see what’s on anyone else’s screen is a great way to keep people off Facebook.

Physical
Server Takedown

This is where the rubber hits the road: just unplug the server holding the undesired content. If that doesn’t work... well, that’s kind of creepy.


The delicate balance of freedom of speech and civilized communication is fraught with high emotion and anxiety on both sides. As with so many of mankind’s inventions, the power of the internet forces us to sort out our priorities. What are we willing to sacrifice for safety? Or for freedom? In the end, what and with whom we communicate has never been as fully in our control as we would like to believe. It is the speed and volume of web communication that forces us to confront these questions.

Web filters cannot sooth teething babies, bake cookies, or stop your daughter from occasionally seeing something she shouldn’t. But filters are certainly worth understanding, and in many cases, using. Total control may be impossible, but knowledge is always power.