Monday, November 28, 2011
Tuesday, November 22, 2011
Monday, November 21, 2011
Theodore Roosevelt
Theodore Roosevelt and the River of Doubt
In December of 1913, Theodore Roosevelt, Kermit Roosevelt, and a small group of men embarked on a journey to explore an uncharted river in the Amazon, The River of Doubt. When they got to the river, Kermit hollowed out logs for the men to use as canoes when floating down the river. Once the canoes were carved and ready, they set off to explore. The River of Doubt flowed over 1,000 miles long and had a few tributaries.
While exploring the Amazon terrain one day, Teddy cut open his leg. He ended up with Malaria and several infections. Teddy did have a dose of morphine, and he was planning on taking it so he wouldn’t slow up the rest of his fellow explorers from reaching civilization. They were running out of food and supplies but Kermit strongly encouraged his father to keep on going as he carried him to civilization. The canoes were gone so the men had to travel on foot. Kermit and the other men raced to a civilization to get help.
Finally, the men got to a civilization but their health had declined and Teddy had lost 50 pounds and was unable to walk. He was in very critical condition. Shortly after, the men came back to America to get help. All the men would have issues that would stay with them for the rest of their lives because of the trip. Teddy would be plagued with flare-ups of malaria and inflammation so bad that they would require hospitalization for the rest of his life. The River of Doubt was a treacherous journey.
In December of 1913, Theodore Roosevelt, Kermit Roosevelt, and a small group of men embarked on a journey to explore an uncharted river in the Amazon, The River of Doubt. When they got to the river, Kermit hollowed out logs for the men to use as canoes when floating down the river. Once the canoes were carved and ready, they set off to explore. The River of Doubt flowed over 1,000 miles long and had a few tributaries.
While exploring the Amazon terrain one day, Teddy cut open his leg. He ended up with Malaria and several infections. Teddy did have a dose of morphine, and he was planning on taking it so he wouldn’t slow up the rest of his fellow explorers from reaching civilization. They were running out of food and supplies but Kermit strongly encouraged his father to keep on going as he carried him to civilization. The canoes were gone so the men had to travel on foot. Kermit and the other men raced to a civilization to get help.
Finally, the men got to a civilization but their health had declined and Teddy had lost 50 pounds and was unable to walk. He was in very critical condition. Shortly after, the men came back to America to get help. All the men would have issues that would stay with them for the rest of their lives because of the trip. Teddy would be plagued with flare-ups of malaria and inflammation so bad that they would require hospitalization for the rest of his life. The River of Doubt was a treacherous journey.
Monday, October 31, 2011
Wednesday, October 26, 2011
Vocabulary Terms
Terms not in notes
Freeware- computer software distributed without charge.
Shareware- computer software distributed without initial charge but for which the user is encouraged to pay a nominal fee to cover support for continued use.
Open source- software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.
Firewall- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Virus- a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
Hacking- attempting to gain unauthorized access to proprietary computer systems.
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc.
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation.
Phishing- trying to obtain financial or other confidential information from Internet users. (Email)
Cookie- a message or segment of data, containing information about a user sent by a Web server to a browser and sent back to the server each time the browser requests a Webpage.
Words in notes
creative commons
intellectual property
copyright
public domain
attribution
commercial use
derivative
share alike
identity theft
data back-ups
cloud
file sharing
Freeware- computer software distributed without charge.
Shareware- computer software distributed without initial charge but for which the user is encouraged to pay a nominal fee to cover support for continued use.
Open source- software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.
Firewall- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Virus- a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
Hacking- attempting to gain unauthorized access to proprietary computer systems.
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc.
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation.
Phishing- trying to obtain financial or other confidential information from Internet users. (Email)
Cookie- a message or segment of data, containing information about a user sent by a Web server to a browser and sent back to the server each time the browser requests a Webpage.
Words in notes
creative commons
intellectual property
copyright
public domain
attribution
commercial use
derivative
share alike
identity theft
data back-ups
cloud
file sharing
Wednesday, October 19, 2011
Copyright
Copyright is right to make copies, license, and otherwise exploit a literary, musical, or artistic work, that is either a print, audio, or video. When you write music, your work is under copyright protection the moment it is created in a tangible form that it is perceptible either directly or with a machine or device. Copyright protection lasts for the life of the author plus an additional 70 years. For an anonymous work, or pseudonyms work, the copyright lasts for a term of 120 years from the year of its creation. Having copyright to music or lyrics means that you have the right to make copies, license, and exploit the material. In the US, the current year for Public Domain music is 1922. The difference between public domain and proof of public domain is you can’t copy, rearrange, or publish music without a proof of the public domain.
•You cannot reproduce the music or lyrics
•You cannot distribute the music or lyrics either for free, for no profit, or for profit
•You cannot perform the music/lyrics in public
•You cannot play a recording of the music or lyrics in public – even if you own the CD
•You cannot make a derivative work or arrangement for public use of any form
The Chiffons recorded a song called “He’s So Fine” in 1962 and then moved under the Bright Tunes Music Corp label in 1971. George Harrison’s ‘My Sweet Lord’ was released January 15, 1971 and hit the charts on January 23, 1971 as George Harrison’s first solo single. It was released under the Apple label and enjoyed the number one spot originally for five weeks, then in 2002, again for one week. Then, on February 10th, 1971, Bright Tunes filed a suit against George Harrison inclusive of his English and American companies. George Harrison’s attorneys tried to describe difference between the two songs, but with little success. The judge found that George Harrison did not purposefully plagiarize the song, but two songs were essentially the same, only differing in note and chord. George Harrison was found guilty of subconscious plagiarism and a judgment was filed against him for $587,000.00.
http://copyright.gov/help/faq/
http://www.fairwagelawyers.com/most-famous-music-copyright-infringment.html
•You cannot reproduce the music or lyrics
•You cannot distribute the music or lyrics either for free, for no profit, or for profit
•You cannot perform the music/lyrics in public
•You cannot play a recording of the music or lyrics in public – even if you own the CD
•You cannot make a derivative work or arrangement for public use of any form
The Chiffons recorded a song called “He’s So Fine” in 1962 and then moved under the Bright Tunes Music Corp label in 1971. George Harrison’s ‘My Sweet Lord’ was released January 15, 1971 and hit the charts on January 23, 1971 as George Harrison’s first solo single. It was released under the Apple label and enjoyed the number one spot originally for five weeks, then in 2002, again for one week. Then, on February 10th, 1971, Bright Tunes filed a suit against George Harrison inclusive of his English and American companies. George Harrison’s attorneys tried to describe difference between the two songs, but with little success. The judge found that George Harrison did not purposefully plagiarize the song, but two songs were essentially the same, only differing in note and chord. George Harrison was found guilty of subconscious plagiarism and a judgment was filed against him for $587,000.00.
http://copyright.gov/help/faq/
http://www.fairwagelawyers.com/most-famous-music-copyright-infringment.html
Sunday, October 16, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
Podcast
- podcast- a multimedia digital file available on the internet for downloading onto a multimedia player, computer other other device.
- Podcasts are used to give out new or information, provide entertainment, or educate viewers.
- Podcasts can be found on a numerous amount of websites, and can also be downloaded through iTunes.
Identity Theft
First of all, the women in this story made a mistake by using her debit card all the time. Hijackers accessed her card and then stole her identity. Identity theft is such a common problem these days because a lot of people carry around their social security cards, they are not careful throwing away identity information, they do not frequently check their credit report, and they are not careful who they give important information to. To steal a person's identity, one would have to obtain either a bank statement, a credit card number, or a social security card. To protect yourself from identity theft you should frequently check your bank/credit report, avoid carrying your social security card, carefully throw away identity information, and be careful who you give out important information to. Identity theft can be the stealers fault for taking the information, but it can also be the victim for not taking time to ensure that your identity is safe.
Tuesday, October 4, 2011
Cloud Computing
Cloud computing is internet based computing in which large groups of remote servers are networked to allow the sharing of data processing tasks, data storage, and online access to computer services or resources. Cloud computing allows lots of information to be stored on it, while also allowing the ability to be accessed from any computer with internet. Students and teachers can upload files or create files using a cloud computing program, and then access that information from a different location. This new technology is very helpful for students that don't finish their work in class, or business people on the go. One of the most popular sites that offers cloud computing is iGoogle. iGoogle provides
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
Thursday, September 29, 2011
Jean Hoerni
Jean Hoerni
In the March of 1959 Jean Hoerni invented the planar process. The planar process basically takes the large mass of information in the giant old computers, and compacts it down into a small chip on the circuit board. The new chip provided computers with far lower leakage currents, and also required less fabrication.The planar process has impacted the world by requiring less work when building computers, and also made it easier for people to own/ store computers with their smaller size. The planar process has made an impact of my life by allowing me to have a small, compact computer that fits on a desk instead of filling a whole entire room.I enjoy being able to have my own small computer in computers class that lets me access tons of information through a small machine. Jean Hoerni’splanar process was a huge mile stone for computers in history.
Thursday, September 22, 2011
QR codes
QR codes can be used for advertising, education and other purposes. Companies can place QR codes on their products that let buyers will recieve a coupon with their purchase. Teachers can use QR codes to help their students study. Language teachers can place QR codes on items in the room and have students walk around to guess and check the words. QR codes can also be used as boarding passes for airlines instead of printing passes. QR codes are very helpful.
Tuesday, September 20, 2011
Introduction
Hello, My name is Dylan and I am a freshman in high school. I am currently on the football team, and I plan to try out for basketball. I also have to decide whether I am going to try out for the baseball team in the spring or run track. Another focus in my life is spending time with my friends and family. I will use this blog for school posts, as well as personal posts. Thank you for your time and have a great day.
Subscribe to:
Comments (Atom)


