BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Monday, August 31, 2009

ITGS textbook notes, page 6/7

1. page 6, paragraph 2: "A 'computer' was a person who performed calculations. These human computers labored for many hours to produce mathematical tables. Unfortunately, to err  is human, and the tables they produced were riddled with mistakes."

 It is funny how now the machines that have become part of our daily lives had the same name as one who computes 40 years ago.
2. paragraph 3 Konrad Zuse:"I was too lazy to calculate, so I invented the computer."
This is also funny because it seems that creating the very first computer is the easy thing. It is also ironic how they rejected the idea when it was first  debuted.
3. paragraph 5:"When Atanasoff approached International Business Machines for funding, he was told :IBM will never be interested in an electronic computing machine." 
Ironically IBM is now one of the  bigest computer distributors. Also we notice in stead of computers it is refered to as "electronic computing machine." 
4."This 51-foot-long, 8-foot-tall monsterused noisy, slow electromechanical relays, but it proved its worth by computing ballistics tables for the U.S. navy."
 It is also  very  ironic how 40 years a ago computers were as tall as a house, when now we have inventions like laptops such as the Macbook Air.
5.Page 7 "THe Space race spurred futher develpments incomputer technology. After the soviet Union's successful lauch of the Sputnik Satellite in 1957, the United States was desperate to catch up with its Cold War rival.
We can tell that the space race played an essential role in computers and technology and spurred many new ideas for technology.

Article Analysis: Discontinuation of Polaroid Cameras




Many companies who produce polaroid film decided to discontinue production, losing many client who instead of digital cameras, use polaropid regularly. This is an interactive article, with a exerpt of the article on each slide on the side of a polaroid snapshot. It talks about how polaroid users and customers still use these vintage devices and how it is now a fad that is coming back.


Wednesday, August 26, 2009

From make-believe cellphones for toddlers to unlimited texting devices for preteenagers.

http://www.nytimes.com/2009/08/27/technology/personaltech/27basics.html?_r=1&ref=technology


this article is a basic guide about everything you need to know about texting and kids. OSme use an unlimited texting plan as a reward for god grades others can now by their children make-believe cellphone with a full keyboard like on a blackberry.

My response to this article is that society is making more room for cell phones and texting. Having texting lingo as common household language is a bit too much. The logic behind this new toddler texting device is ideal for toddlers who like to play with phones and can be looked at with different perspectives.

Tuesday, August 25, 2009

Tech Reflect

I think computers and technology are very useful and people in this era cannot function without them. Without them we would not be able to research for school or communicate with outher people areound the world.
The world simply cannot function without technology whether it be a telivision for news or entertainment or an oven for cooking. The world we live in is held together by technology.
Unfortunatly the computer has become part of our daily lives, so much so that we spend more time with the computer or other technology like cell phones than with actual people. It can become addicting and holds risks if your not too careful about who you talk to or "meet" on it.

Monday, August 24, 2009

PA SYStem

Section 2 : System in a social context
The PA system affects the school by spreading important announcements throughout the school and can inform or educate the school community at large, at the same time.
Section1: The isses that are raised from the PA system is there can be complications with it if it does not work in some areas or cannot be clear. This system is responsible for relaying important announcements and without it the community can be misinformed or the news can take longer to relay.

Section 3: Education
This is effective in educating the school about important news and announcements.
A negative is that it can be misused by people who are not authorized to use it.
Entertainment: This can be used for multimedia such as nasheeds

Sunday, August 23, 2009

IT Systems: Security

Security is a large concern when it comes to systems such as 'facebook',' twitter', aim, yahoo or 'myspace'. These systems come with settings so that a profile, which is complete with information or pictures on a user can be set as private to non-friended users. These systems have the option of maintaining a public or private profile if one is concerned about security. For example a user can choose to hide their "tweets".
Although these systems are made for communication with other users, they are created with security in mind to maintain confidentiality.
Security settings are used to regulate the availability of information to the public community and ensures that information is accessible only to those who have authorized access. system security settings ensure that the private information and communication of users are private when requested.

Although some faulty security systems do pose some risk for users with a public profile, new security systems provide protection accounts from unauthorized access to a profile. Proper security systems protect profiles on networks such as facebook or twitter and prevent altercation or entry and restrict access to machines. The reliability of security systems allow users to place confidence in new systems and programs.

Thursday, August 20, 2009

ITGS








Wednesday, August 19, 2009

policies and Standards:Death Star

POlicies consist or rules governing access to, or use of, information, hardware, information and software. The death star is capable of destroying any planet and must have policies for those who have access to and atr governing it. Policies for the death star would need to define what is constitutional and unconstitutional access to it. The Death Star pulls in spaceships and identifies who has access to it and its polices. Polices promote or constrict access and must be present when people are using it and deciding to use it with all of its ability.
The standards govern the design and use of the death star and all of its uses.

The death stars ability makes it easier to destroy planets and maximizes human ability to destroy and is very effective in its dedsign. iT also makes their jobs more easy and effective, although its purose is not appropiate and another alternative should be found becuase it is a social issue.

Tuesday, August 18, 2009

List several ways you interact with you compyter in your daily life

As a student I use the computer many times everyday.
We use the computer to finish homework assignments or research information for projects or look up things we have questions about.
I also use the computer to check email and communicate with others.
We use the computer to visist websites and blogs to check up on daily information and news.
We use the computer at school as well in ITGS .