In my Web 2.0/Cloud Computing post, I embedded a video about computer programming, which if you haven't seen you can see here. It talks about computer science and the lack and need of people who are educated in reading and writing code. I made a short presentation about this video, and have put it here for your convenience!
Friday, February 27, 2015
Tuesday, February 24, 2015
Journal Entry #1: Computer Use Policy
In the first week of taking this course, we discussed the Computer Use Policy. After going over the nine rules, we were instructed to write a little skit that talked about one of the policies, and quite frankly, ours did not turn out that well. Which is not the writers fault! Definitely not. Even the thought is bizarre, isn't it?
Our group decided to use Policy Four (hacking) as our inspiration, and since bickering is our favourite and most frequently done past time, we didn't get to finish. I took it home over the weekend though, and we presented (messed up) on that following Monday. In a nutshell, it was about a student who was going to hack into Facebook under another students name, and he debated with himself whether or not it was the best thing to do. He ended up doing it anyway, and the other student was suspended for violating the computer policies.
We selected this specific policy because it was something interesting and easy to work with. There is a lot you can do with hacking, from hacking into Facebook to hacking into the Pentagon and starting World War Three. It was just an easy topic to come up with a skit idea in a short period of time, and it could easily be understood.
Besides the bickering and the two know-it-alls constantly debating, I think the group worked fairly well. We are all friends and hang out together a lot more often than I would sometimes like, so we were comfortable with each other and got a long better than we might have if we didn't.
I think policy five (computer viruses) and policy seven (spam) are kind of interesting, or at least as interesting as computer policies can possibly get. The sending of computer viruses can range from teasing to deadly. Some viruses are designed to steal passwords and identities, and that can cause major problems, while others just cause your computer to act up until you can get rid of it. The same with the sending of spam. Some people can take it a lot more serious than others, and it too can cause problems.
I think all of the policies are equally important, but we chose policy four because it can easily become bigger than hacking into Facebook. Lives and people's identities can even be at risk when big name companies are hacked, and when government files are attempted to be accessed. It is a lot more serious than what some people believe, and it is usually never thought of as people go out their day-to-day lives. Remember when Snapchat's server files were leaked? That can happen a lot more after than most people think.
Our group decided to use Policy Four (hacking) as our inspiration, and since bickering is our favourite and most frequently done past time, we didn't get to finish. I took it home over the weekend though, and we presented (messed up) on that following Monday. In a nutshell, it was about a student who was going to hack into Facebook under another students name, and he debated with himself whether or not it was the best thing to do. He ended up doing it anyway, and the other student was suspended for violating the computer policies.
We selected this specific policy because it was something interesting and easy to work with. There is a lot you can do with hacking, from hacking into Facebook to hacking into the Pentagon and starting World War Three. It was just an easy topic to come up with a skit idea in a short period of time, and it could easily be understood.
Besides the bickering and the two know-it-alls constantly debating, I think the group worked fairly well. We are all friends and hang out together a lot more often than I would sometimes like, so we were comfortable with each other and got a long better than we might have if we didn't.
I think policy five (computer viruses) and policy seven (spam) are kind of interesting, or at least as interesting as computer policies can possibly get. The sending of computer viruses can range from teasing to deadly. Some viruses are designed to steal passwords and identities, and that can cause major problems, while others just cause your computer to act up until you can get rid of it. The same with the sending of spam. Some people can take it a lot more serious than others, and it too can cause problems.
I think all of the policies are equally important, but we chose policy four because it can easily become bigger than hacking into Facebook. Lives and people's identities can even be at risk when big name companies are hacked, and when government files are attempted to be accessed. It is a lot more serious than what some people believe, and it is usually never thought of as people go out their day-to-day lives. Remember when Snapchat's server files were leaked? That can happen a lot more after than most people think.
Friday, February 20, 2015
Web 2.0/Cloud Computing
For an assignment, we were told to watch three videos talking about or linking back in some way to Cloud Computing. The first one I watched was called "Cloud Computing-How It Works", and it was a fun, short video explaining what the Cloud is. As soon as you put anything on line, it immediately gets put into the Cloud, and this means that it is not only on your computer, but it is also accessible at any time, anywhere. There can also be copies of your picture or other data stored in "secret" warehouses full of computers called Data Centers, or Server Files. Your picture will be stored, and the Cloud acts as a backup.
The second video I watched was titled "The Machine is Us/ing Us", and it was an almost chilling video discussing the development in code and computing. We used to have to use complicated code to upload to the web, and as HTML expanded and more elements were added, form and content became inseparable. But then XML came along, and form and content could be separated. Data could be exported free of formatting constraints, and with these separated, we no longer needed complicated code.
The third video I watched was called "Cloud Computing", and it was a lot more different from the first video than I originally thought. It talked about how Cloud Computing companies can help your business by storing data and maintaining it in their databases. It's all secure, backed up in many different locations and accessible through the wed or the cloud. Businesses can spend less time worrying about technology, and more time making money.
After I watched these three videos, I had to choose my own video from the large (very large) selection of videos that talk about technology. I know this video doesn't talk about one specific topic and it's not about computer virus' or cool compact radios, or anything that could possibly have come from a James Bond movie, but it was interesting! I'm not going to lie! So here it is, and I hope it doesn't bore you or make you nostalgic, because I wouldn't be surprised if you have seen it before.
The second video I watched was titled "The Machine is Us/ing Us", and it was an almost chilling video discussing the development in code and computing. We used to have to use complicated code to upload to the web, and as HTML expanded and more elements were added, form and content became inseparable. But then XML came along, and form and content could be separated. Data could be exported free of formatting constraints, and with these separated, we no longer needed complicated code.
The third video I watched was called "Cloud Computing", and it was a lot more different from the first video than I originally thought. It talked about how Cloud Computing companies can help your business by storing data and maintaining it in their databases. It's all secure, backed up in many different locations and accessible through the wed or the cloud. Businesses can spend less time worrying about technology, and more time making money.
After I watched these three videos, I had to choose my own video from the large (very large) selection of videos that talk about technology. I know this video doesn't talk about one specific topic and it's not about computer virus' or cool compact radios, or anything that could possibly have come from a James Bond movie, but it was interesting! I'm not going to lie! So here it is, and I hope it doesn't bore you or make you nostalgic, because I wouldn't be surprised if you have seen it before.
Thursday, February 12, 2015
Composition
This is a link to the composition my fellow students and I had to write on a documentary title "How William Shatner Changed the World." It may be slightly long, but I hope it does not bore you as much as watching the documentary might have done.
Subscribe to:
Posts (Atom)