Monday, October 31, 2011
Wednesday, October 26, 2011
Vocabulary Terms
Terms not in notes
Freeware- computer software distributed without charge.
Shareware- computer software distributed without initial charge but for which the user is encouraged to pay a nominal fee to cover support for continued use.
Open source- software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.
Firewall- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Virus- a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
Hacking- attempting to gain unauthorized access to proprietary computer systems.
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc.
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation.
Phishing- trying to obtain financial or other confidential information from Internet users. (Email)
Cookie- a message or segment of data, containing information about a user sent by a Web server to a browser and sent back to the server each time the browser requests a Webpage.
Words in notes
creative commons
intellectual property
copyright
public domain
attribution
commercial use
derivative
share alike
identity theft
data back-ups
cloud
file sharing
Freeware- computer software distributed without charge.
Shareware- computer software distributed without initial charge but for which the user is encouraged to pay a nominal fee to cover support for continued use.
Open source- software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.
Firewall- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Virus- a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
Hacking- attempting to gain unauthorized access to proprietary computer systems.
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc.
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation.
Phishing- trying to obtain financial or other confidential information from Internet users. (Email)
Cookie- a message or segment of data, containing information about a user sent by a Web server to a browser and sent back to the server each time the browser requests a Webpage.
Words in notes
creative commons
intellectual property
copyright
public domain
attribution
commercial use
derivative
share alike
identity theft
data back-ups
cloud
file sharing
Wednesday, October 19, 2011
Copyright
Copyright is right to make copies, license, and otherwise exploit a literary, musical, or artistic work, that is either a print, audio, or video. When you write music, your work is under copyright protection the moment it is created in a tangible form that it is perceptible either directly or with a machine or device. Copyright protection lasts for the life of the author plus an additional 70 years. For an anonymous work, or pseudonyms work, the copyright lasts for a term of 120 years from the year of its creation. Having copyright to music or lyrics means that you have the right to make copies, license, and exploit the material. In the US, the current year for Public Domain music is 1922. The difference between public domain and proof of public domain is you can’t copy, rearrange, or publish music without a proof of the public domain.
•You cannot reproduce the music or lyrics
•You cannot distribute the music or lyrics either for free, for no profit, or for profit
•You cannot perform the music/lyrics in public
•You cannot play a recording of the music or lyrics in public – even if you own the CD
•You cannot make a derivative work or arrangement for public use of any form
The Chiffons recorded a song called “He’s So Fine” in 1962 and then moved under the Bright Tunes Music Corp label in 1971. George Harrison’s ‘My Sweet Lord’ was released January 15, 1971 and hit the charts on January 23, 1971 as George Harrison’s first solo single. It was released under the Apple label and enjoyed the number one spot originally for five weeks, then in 2002, again for one week. Then, on February 10th, 1971, Bright Tunes filed a suit against George Harrison inclusive of his English and American companies. George Harrison’s attorneys tried to describe difference between the two songs, but with little success. The judge found that George Harrison did not purposefully plagiarize the song, but two songs were essentially the same, only differing in note and chord. George Harrison was found guilty of subconscious plagiarism and a judgment was filed against him for $587,000.00.
http://copyright.gov/help/faq/
http://www.fairwagelawyers.com/most-famous-music-copyright-infringment.html
•You cannot reproduce the music or lyrics
•You cannot distribute the music or lyrics either for free, for no profit, or for profit
•You cannot perform the music/lyrics in public
•You cannot play a recording of the music or lyrics in public – even if you own the CD
•You cannot make a derivative work or arrangement for public use of any form
The Chiffons recorded a song called “He’s So Fine” in 1962 and then moved under the Bright Tunes Music Corp label in 1971. George Harrison’s ‘My Sweet Lord’ was released January 15, 1971 and hit the charts on January 23, 1971 as George Harrison’s first solo single. It was released under the Apple label and enjoyed the number one spot originally for five weeks, then in 2002, again for one week. Then, on February 10th, 1971, Bright Tunes filed a suit against George Harrison inclusive of his English and American companies. George Harrison’s attorneys tried to describe difference between the two songs, but with little success. The judge found that George Harrison did not purposefully plagiarize the song, but two songs were essentially the same, only differing in note and chord. George Harrison was found guilty of subconscious plagiarism and a judgment was filed against him for $587,000.00.
http://copyright.gov/help/faq/
http://www.fairwagelawyers.com/most-famous-music-copyright-infringment.html
Sunday, October 16, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
Podcast
- podcast- a multimedia digital file available on the internet for downloading onto a multimedia player, computer other other device.
- Podcasts are used to give out new or information, provide entertainment, or educate viewers.
- Podcasts can be found on a numerous amount of websites, and can also be downloaded through iTunes.
Identity Theft
First of all, the women in this story made a mistake by using her debit card all the time. Hijackers accessed her card and then stole her identity. Identity theft is such a common problem these days because a lot of people carry around their social security cards, they are not careful throwing away identity information, they do not frequently check their credit report, and they are not careful who they give important information to. To steal a person's identity, one would have to obtain either a bank statement, a credit card number, or a social security card. To protect yourself from identity theft you should frequently check your bank/credit report, avoid carrying your social security card, carefully throw away identity information, and be careful who you give out important information to. Identity theft can be the stealers fault for taking the information, but it can also be the victim for not taking time to ensure that your identity is safe.
Tuesday, October 4, 2011
Cloud Computing
Cloud computing is internet based computing in which large groups of remote servers are networked to allow the sharing of data processing tasks, data storage, and online access to computer services or resources. Cloud computing allows lots of information to be stored on it, while also allowing the ability to be accessed from any computer with internet. Students and teachers can upload files or create files using a cloud computing program, and then access that information from a different location. This new technology is very helpful for students that don't finish their work in class, or business people on the go. One of the most popular sites that offers cloud computing is iGoogle. iGoogle provides
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
Subscribe to:
Comments (Atom)