Showing posts with label communication. Show all posts
Showing posts with label communication. Show all posts

Saturday, November 3, 2018

Communication Today

Yesterday, I entered an elevator with a man who continued talking on his Smartphone in a foreign language. After I pushed the button for my floor, I looked toward him and was about to ask, "Where to?" He had seen the button I pushed while he was listening to someone on his phone, and he just shook his head indicating he was going to the same floor as I was.

     I have been in elevators when friends who had been speaking together in a foreign language instantly switched to English to ask the floor button they should push for me. I also have been in vans taking hotel passengers to an airport, when the Spanish-speaking driver could switch to English to ask which terminals we needed.

     One of my globe-trotting, English-speaking friends developed a technique for asking directions in a foreign country. She looks for a young woman who she assumes, usually correctly, studied English.
Of course, studying a foreign language before visiting a foreign country works, too.

     Research outcomes based on studies at the University of Pennsylvania provide some useful advice to help adults learn a foreign language and to help parents and teachers enable children to enjoy knowing a new language. I read that babies first put together the word a parent says with the object the parent shows them. A baby's eyes have to go to the object when the baby hears the word for the object. This process reminded me of the German teacher who held up a turkey statue and asked us what is was before she told us the German word for turkey. We tried our best and said something like, "grosse Vogel" to imply it was a big bird.

    The point is, language research found we progress from learning nouns to verbs and finally ideas. We have to build up a vocabulary to be able to infer more meanings. Parents, teachers, and children can begin together to learn a foreign language. Find a foreign language book or dictionary and make a list of the foreign words for objects in the home or classroom, foods, toys, and the like. Practice using these nouns with each other as you go about the day. Then, try to describe these items without each other seeing them. Use gestures and any other means you can think of to help you decide what other words you need to learn for colors, shapes, describing how objects are used or how big they are.

     Exceptions to language "rules" are a special challenge. Some verbs, for example, don't end in "ed" the way traveled and dined do. Counting introduces the need to memorize exceptions. Studies show once an English-speaking child can count to 73, he or she can continue counting indefinitely. I don't know where the so called "tipping point" for infinite counting is in other languages, but a fiend tells me it's sooner in Spanish.

     Studies indicate a child who knows how to count is on the way to mastering basic arithmetic skills. In any language, once a child knows one plus one is two he or she can buy or sell and won't be cheated out of a dime because a nickel is larger. Alexander Hamilton knew how to put the financial system of the new United States in order, because he handled shipping costs and revenue on the docks of Puerto Rico at an early age.

     As we begin to make a list of resolutions for 2019, we might think about adding learning, and helping children learn, bits and pieces of another language.

Wednesday, June 6, 2018

China's Domestic Economic Belt

Less well known on the world stage than China's land and sea "One Belt, One Road" and "Maritime Silk Road" is China's Domestic Economic Belt along the Yangtze River from densely-populated and heavily-polluted Shanghai, west to the lake region around Wuhan (where COVID-19 originated), and still farther southwest to Chongqing, population over 30 million, larger than Shanghai and Beijing (home to OneSpace, China's solid-fueled commercial spacecraft industry, specializing in launching small satellites) and Chengdu, where police just raided an underground church about to commemorate the June, 1989 democracy demonstration in Tiananmen Square. (This is an opportunity for students to trace the Yangtze River on a map of China.)

Attention to ecology along this Yangtze River route is a priority in China. It entails:

  •  Closing polluting chemical plants
  •  Restoration of lakes and wetlands 
  • Sewage treatment 
  • Regulating the fishing industry
  • Developing clean air technology (See earlier post,"How to Meet the Clean Air Challenge.")
  • Integrating non-polluting energy sources into the existing power grid'
  • Building new eco-friendly communities (See earlier post, "Priority: Eliminate generating electricity from fossil fuels.")
A new project in China's far western reaches demonstrates Beijing's focus on developing non-polluting energy sources. Where the Yangtze is known as the Jinsha Jiang River, the new Lawa hydroelectric dam will generate two billion watts of power, the same energy supplied by the U.S. Hoover Dam, on the border between Sichuan and the Tibetan Plateau.
     Development along the Yangtze also indicates China's interest in technological progress.  Economic assistance is going to the Donghu New Technology Development Zone east of Wuhan. The zone houses the FiberHome Technology Group, an optic fiber communications center, and the Wuhan Xinxin Semiconductor Manufacturing Corporation. Producing memory chips for China's semiconductor industry has become a personal priority of President Xi Jinping.

The U.S. Commerce Department's April, 2018 7-year ban on sales of chips to ZTE, the high-tech firm in China's integrated circuit and Smartphone industry, exposed dependence on exports from Qualcomm in California. Once again the consequences of cheating played a part. False statements and missing export records showed ZTE violated a 2017 settlement by illegally using U.S. chips in telecommunications equipment shipped to Iran and North Korea. Although ZTE had settled the 2017 case by paying a $1.2 billion penalty and promising disciplinary actions against 39 employees involved in illegal conduct, ZTE took no personnel measures. To restore Qualcomm's sales to ZTE, the company agreed to install a new management team and to let the U.S. staff a compliance unit that would report to the U.S. Commerce Department for the next ten years. At first the US Congress still rejected the plan, until President Trump and Chinese President Xi reached a separate agreement. 

Violations of the original ZTE technology agreement and other cases of Chinese infringement on intellectual property rights concern the U.S. about China's interest in stealing chip research, development, and manufacturing know-how, not only how work in these areas is progressing at the zone in Donghu. With nearly 350,000 Chinese students in the United States, universities are warned to lock their labs, and legal interns from China are being kept away from sensitive antitrust cases. (See the post concerning Foxconn's intended facility in Wisconsin in the later post, "Unmask Inscrutable Chinese Intentions.") 

Monday, November 7, 2016

Secret Codes

If you communicate with emojis, you might be using a secret code that people who speak another language can understand, but some who speak your own language can't. That's the essence of secret codes. You send information you intend someone to understand and hide your messages from everyone else. Of course, spies do this all the time. They report plans, troop movements, economic conditions, and the health and characteristics of key officials enemies want to hide.

     Not only is it necessary to write secrets in code and in things like lemon juice that disappears until the paper its written on is heated, but methods for sending messages also are important. Short radio bursts are used and messages are hidden in James Bond-type devices. During the Revolutionary War, Nathan Hale, considered the first U.S. spy, unfortunately  hid a secret message in his boot which was easily discovered when he was caught by the British.

     You and a friend might make up a secret code that gives words different meanings or uses the third letter in every word to make a sentence when those third letters are written together. If you want to send your message during a class, how would you get it to your friend three rows away? Or you might wrap a long strip of paper around a baseball bat, write your message vertically on the paper, unwind the paper and hide it somewhere. In order to read your message, a friend would have to wind the paper around a bat that was the same size as yours.

     Decoding mistakes can happen. In 1916, Elizabeth Wells Gallup claimed she found coded messages from Sir Francis Bacon hidden in Shakespeare's scripts. Using only words written in one particular typeface, she found a message Bacon left in Richard II that led her to believe he said he wrote the play. When Elizabeth and William Friedman looked at Gallup's work in 1955, they found the different typefaces she relied on were caused by accidental primitive printing technology, not the intentional work of Bacon or anyone else.

     Suppose you and a friend have a secret meeting or message hiding place. Spies have left messages in pumpkins, under bridges, under floor boards, and in bottles in the hollows of trees. You can signal your friend that you want to meet or you have left a message by methods similar to those spies have used. Where spies have put chalk marks on mail boxes, you could put a chalk mark on a friend's locker. Instead of putting a flower pot on a balcony, you could put a toy at your window or blink a flashlight. Slaves escaping on the Underground Railroad used to look for safe houses that had statues positioned in a certain way out front.

     Fans of Harry Potter know his owl Hedwig carried secret messages. Homing pigeons performed the same task in wartime. Could you train a pet to do the job?

     Secret codes often are very difficult to decipher. Letters carved into the sculpture, "Krypto," outside the U.S. Central Intelligence Agency remained a puzzle until an analyst spent eight years on his lunch hours using pencil and paper to figure out three of the sections on the stone. Even then, what the message meant was unclear. The movie, The Imitation Game, showed how Germans in World War II created an impossible to crack Enigma code that caused a British decoder at its secret Bletchley facility to build a computer to try millions of letter combinations. That didn't work until one person realized each transmission began with a weather report. By comparing each day's weather with the letters used in that day's secret message the number of combinations the computer had to try was reduced and messages Germans sent regarding enemy ships they intended to destroy could be read faster.

     Nowadays, it is possible to both code and decode secret messages by computer. It also is possible to hack into messages sent by computer unless security measures, such as the use of secure passwords and default passwords, are taken. TIME magazine (Nov. 7, 2016) reported that on October 21, 2016 cyber hackers even tapped into the unsecured Internet of Things (remotely controlled internet connected surveillance cameras, printers, digital video recorders) and used them to activate a virus, Mirai, (the Japanese word for "the future") that overwhelmed servers at one company with malicious traffic that prevented legitimate users from reaching intended receivers. The tasks of preparing a truly secret code and transferring secret codes are becoming more difficult every day.

(For more information about how emojis communicate, see the earlier post, "Communicate without Words.")