The UK has created one of the best tools for mitigating Huawei’s risks. Whether or not the UK Huawei ban stands, its Huawei Cyber Security Evaluation Centre should receive increased funding and support to protect and enhance its interests at home and abroad.
The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach.
This article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.
This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker & Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy.
The FCC reported that there were about 3.1 million smartphone thefts in 2013. Today nearly everyone owns at least one smart device, and many people tend to keep personal or business information on these same devices. If your device is lost the first reaction you might have is to use attempt to use 3rd party software to locate or wipe the sensitive data from your device, but what happens when the connection to those services is severed? The Fail-Safe Erase application aims to provide you with the ability to wipe your device after its disconnected from reaching network services. After setting up a personalized password and a wipe timer, the Fail-Safe Erase application will run in the background while looking for those services. Once the connection to GPS, network, and cellular service is interrupted the wipe timer begins its countdown. If the user does not access their device to interrupt the wipe timer within the time set by the user, the device will begin to wipe itself of all personal data. Fail-Safe Erase aims to ensure that if you can’t gain access to your mobile device, remotely or physically, the private data on it will be securely erased, hopefully before it falls into the wrong hands.
The use of the GoCart application will have the ability to enhance grocery shoppers’ experience by taking the shopping list and generating the most efficient shopping path. According to the Time Use Institute, the average shopping trip takes 45 minutes. In part, the time spent is attributed to confusing store layout, congested aisles, and uninformed staff (Marks, 2015). Results from our grocery shopping experience has shown that more time is directed towards roaming through the aisles searching for the items. There are applications dealing with allowing us to create a virtual list, but none directed towards the location of the items. Along with GoCart creating the most productive shopping path with the virtual list, there will also be a map with the store layout that pinpoints each item. Having GoCart will make the next trip to the grocery store quick and painless.
Through research conducted by Mcgarry Bowen and Kraft, 59% of 25 to 34-year old adults use their phones to look up recipes while in the kitchen. A Google consumer survey also states that for a quarter of online millennials, the most important part of cooking is putting a personal spin on the food. Fudo is a bridge between the kitchen and the digital age. Fudo gives these people a platform to easily access, customize and share their favorite recipes, while also making it simple to find new ones. Current avenues to find recipes online are hard to navigate and force the users to hunt through blog posts that conceal the recipes in favor of personal stories and ads. Fudo has adapted a sleek and modern interface coupled with an easy to understand user experience in order to bring the digital age to the kitchen table.
Nibbler is an android application used to search and find restaurants based on specific
filters applied by the user. Nibbler gives users the ability to apply multiple filters to their
searches and allows those with dietary restrictions or food allergies to find restaurants that fit
their specific diet. Nibbler also aims to eliminate the issue of analysis paralysis by limiting the
return on food locations that are returned to the user after completing a search. The reason for
this is simple, if there are too many options, then an individual can overanalyze or overthink the
situation. This way the user still has everything they originally searched for, but the decision is
easier due to the fact that they are limited in their options. The application is simple to use and
anyone with an android device can navigate the simple UI. This allows users to store personal
data and health information safely and securely.
Getting a job interview does not mean automatically landing a job. For people in IT, the interview process can be very lengthy and involve multiple face to face interviews and skill testing. These interviews can be stressful and hard to prepare for. No one should be held back from getting a job they are qualified for. In order to help people prepare for interviews, we have created PrepIN. PrepIN will do what sites like Indeed and Hackerrank do not. Anyone would be able to schedule a time for a practice interview. They will participate in a one to one host video call and have access to a video message chat. Having access to a test environment that will put them face to face with someone will better help stimulate the interview environment and process. That way job seekers can work to deal with the stress and anxiety that many face during interviews.
The average cost to host a DJ for a 3-4 hour set is about $1200; for local venues, bars and events that can be an expensive investment (HireRush). There are other music applications that allow users to add songs to a community queue but fail at providing a solution for events and venues. BeUrDJ is a web-based application that is oriented to allow all music listeners at social gatherings to engage in the song selection. BeUrDJ allows all music listeners to easily input their music choice to the group. The DJ sets up each session where listeners can join, and each session is designed to be highly customizable. DJs can set filters for each session to match the atmosphere of the event and the queue will be updated with recommended songs if there are no songs left in the queue. The queue is then modified based on the upvotes and downvotes for each song. The song with the most amount of upvotes verse downvotes will be first in the queue. This allows all music listeners to easily input their opinion to the song selection. BeUrDJ provides listeners with an interactive music listening experience by giving the power to the listeners.
According to cybersecurityventures.com, despite the high demand for new talent in the cyber security field, there are currently not enough cyber professionals to fill this need (Morgan, 2019, p. 1). To generate new cyber talent, the Ohio Cyber Range Institute utilizes its in-house web application to host regional Capture-the-Flag (CTF) events—exciting, cyber-themed competitions that help inform and spur interest in cyber security. Our project, UC CTF, takes that existing web application and greatly expands upon it. UC CTF features a completely redesigned application site, enhanced functionality and quality-of-life improvements for site administrators, and a brand new question repository of fun cyber challenges for CTF players—from beginner to expert and everything in between. UC CTF greatly improves upon the capabilities of the original application, allows for players of all skill levels to engage in an exciting CTF environment, and helps to develop new talent in cybersecurity.