Tuesday, November 22, 2011
Monday, November 21, 2011
How to Knit Tutorial- Extra Credit
How to Cast on- http://www.youtube.com/watch?v=2Y6qgaEhfFM
Knit Stitch- http://www.youtube.com/watch?v=Qi3A3HBAfrQ
How to Cast off- http://www.youtube.com/watch?v=h9rfgG63xJM
Friday, November 4, 2011
Theodore Roosevelt and the River of Doubt
It was December of 1913 when Theodore Roosevelt felt the call to go to South America's River of Doubt. Not only would it allow his pride to return after an embarrassing loss in the Presidential election, but to have a chance with his son, Kermit. What began as a leisurely trip quickly turned into disaster.
After suffering through the loss of most of their men and diminishing supplies three men remained. Roosevelt, Kermit, and their friend Cherrie were left with cases of malaria, infections, and almost no health. Their canoes had to be abandoned and were now stranded. But hope was still with them. Kermit had amazing skills in rope bridges and worked hard to get them to safety away from Indians attacks and raging rapids. Three months after what was once thought to be a relaxed vacation, the three men returned to New York to now face judgment that they had never been to one of the most frightening places in South America now named "Rio Roosevelt."Theodore Roosevelt and Kermit Roosevelt Pictures
Monday, October 31, 2011
Thursday, October 27, 2011
Re: Vocabulary Terms and Concepts
1) Vocabulary Terms already known:
Already known terms-
Creative Commons
Intellectual property
Copyright
Public domain
Freeware
Shareware
Open source
Commercial use
Attribution
Derivative
Share-alike
Firewall
Virus
Hacking
Malware
Identity theft
Data back-ups
Cloud
File sharing
Terms not in notes-
Cookies Files stored on your computer to help load pages faster
Piracy Illegally getting movies, TV shows, or music
Phishing A way hackers attempt to retrieve information like usernames, passwords, and credit cards
2) What are the duties of Federal Trade Commission? The FTC keeps the public informed and enforce antitrust laws that protect the public.
How does copyright and CC fall into this category? The FTC's work is considered to be authored by the United States Government which makes it all Public Domain.
Already known terms-
Creative Commons
Intellectual property
Copyright
Public domain
Freeware
Shareware
Open source
Commercial use
Attribution
Derivative
Share-alike
Firewall
Virus
Hacking
Malware
Identity theft
Data back-ups
Cloud
File sharing
Terms not in notes-
Cookies Files stored on your computer to help load pages faster
Piracy Illegally getting movies, TV shows, or music
Phishing A way hackers attempt to retrieve information like usernames, passwords, and credit cards
2) What are the duties of Federal Trade Commission? The FTC keeps the public informed and enforce antitrust laws that protect the public.
How does copyright and CC fall into this category? The FTC's work is considered to be authored by the United States Government which makes it all Public Domain.
Monday, October 17, 2011
Re: Copyright music and lyrics
Copyright has become such a common name, but I don't know exactly how it applies to me. A person has copyrights when their work is created and is known to be theirs. Copyrights, for lyrics for example, last for the life of the author plus 70 years. Having copyright means that you have the right to record those lyrics and distribute them in the way you want to. Currently, if there is any music made before 1922, it has become Public Domain. This means that we can use this in public settings without permission. But I highly doubt that people are going to want to go to rock out to "April Showers" by Al Jolson at homecoming. So I would just be careful not to use music as your own or use it unless you have permission. I know youtube is the biggest culprit of copyright law because people post music on their website and even though it's not for monetary gain, it's still considered copyright infringement.
One of the most famous cases on copyright infringement is a song I'm pretty sure we all know..."Happy Birthday to you." We all have probably sung it close to a million times by now to people for their birthdays, but it is actually under US copyright until the year 2030. Idealy you are allowed to use the song, but you have to pay a $700 royalty. It's interesting to know.
Resources:
http://www.copyright.gov/help/faq/faq-general.html#what
http://www.copyright.gov/help/faq/faq-duration.html
http://www.pdinfo.com/copyrt.php
http://en.wikipedia.org/wiki/Happy_Birthday_to_You
One of the most famous cases on copyright infringement is a song I'm pretty sure we all know..."Happy Birthday to you." We all have probably sung it close to a million times by now to people for their birthdays, but it is actually under US copyright until the year 2030. Idealy you are allowed to use the song, but you have to pay a $700 royalty. It's interesting to know.
Resources:
http://www.copyright.gov/help/faq/faq-general.html#what
http://www.copyright.gov/help/faq/faq-duration.html
http://www.pdinfo.com/copyrt.php
http://en.wikipedia.org/wiki/Happy_Birthday_to_You
Saturday, October 15, 2011
Blue October Podcast- Taylor Maley Online A
Blue October Podcast- Taylor Maley Online A
So this is my podcast for this weeks assignment. I'm really proud of this one because it is something I am really passionate about...Blue October. This bands means the world and so much more to me, so for an assignment to present itself in such a perfect light for them to shine through makes me smile. :)
So this is my podcast for this weeks assignment. I'm really proud of this one because it is something I am really passionate about...Blue October. This bands means the world and so much more to me, so for an assignment to present itself in such a perfect light for them to shine through makes me smile. :)
Wednesday, October 12, 2011
ID Theft- Taylor Maley Online A
ID Theft- Taylor Maley Online A
The above is a hyperlink to my ID theft podcast. It is startling to imagine how easily and destructive it can be to have your identity stolen.
The above is a hyperlink to my ID theft podcast. It is startling to imagine how easily and destructive it can be to have your identity stolen.
Tuesday, October 11, 2011
ToonDoo- ID Theft
Podcasts
A Podcast is a web feed that is released every so often. They are downloaded by the user, either a video or audio file, most of time from iTunes. I've used iTunes to download podcasts from my favorite bands like Blue October and Alfie Boe. Mostly they are just interviews, but the people who put them out on the internet have a show that they do periodically and I can just download the ones that interest me.
Friday, October 7, 2011
My Voki
This is an avatar I created on voki.com for my Online A class. I thought I'd share it with you. :)
Wednesday, October 5, 2011
Re: Identity Theft
From this post: http://www.washingtonpost.com/wp-dyn/content/article/2008/01/12/AR2008011200275.html?wpisrc=newsletter&sid=ST2008011201190
This woman decided to use her debit card instead of credit cards to remain debt free. However, credit cards will reimburse their subscribers for fraud charges, but debit cards don’t normally have to. ID Theft is very common nowadays. With the internet emerging with new sites that allow you to buy new items at the click of a button it is just as easy for someone to hack into your accounts and steal your information. All most people need is a credit card number and the code on the back to start charging a few items that you didn’t order. If you want to protect yourself from these types of things common sense should be used. Don’t share information with anyone you don’t trust. Look around for a loan manager or ask friends for references. Credit scores should be checked annually. Another good piece of information is people who call you saying they’re from the bank don’t necessarily have to be from the bank. Use caution when giving out information! People who try to steal your information are exactly just that..STEALING! They are to blame, but don’t make their job easy.
This woman decided to use her debit card instead of credit cards to remain debt free. However, credit cards will reimburse their subscribers for fraud charges, but debit cards don’t normally have to. ID Theft is very common nowadays. With the internet emerging with new sites that allow you to buy new items at the click of a button it is just as easy for someone to hack into your accounts and steal your information. All most people need is a credit card number and the code on the back to start charging a few items that you didn’t order. If you want to protect yourself from these types of things common sense should be used. Don’t share information with anyone you don’t trust. Look around for a loan manager or ask friends for references. Credit scores should be checked annually. Another good piece of information is people who call you saying they’re from the bank don’t necessarily have to be from the bank. Use caution when giving out information! People who try to steal your information are exactly just that..STEALING! They are to blame, but don’t make their job easy.
Tuesday, October 4, 2011
Re: Emerging Technology
When it comes to brain cancer one of the most aggressive forms is Glioblastoma. In a new study published this week, the Sanford-Burnham Medical Research Institute and the Salk Institute for Biological Studies studied this cancer in mice. They developed a nanosystem that "combines a tumor-homing peptide, a cell-killing peptide, and a nanoparticle that both enhances tumor cell death and allows the researchers to image the tumors." This is extremely important because Giloblastoma is difficult to detect and treat. It is hard to find and brutal to surgically remove leaving most patients who become diagnosed without many options. This nanotechnology allows for treatment to be done only to the infected tissues without harming other parts of the brain and delivers this treatment directly into the mitochondria of the infected cells essentially destroying it's power house. This system treated all but one mouse in a study of ten infected mice. It is important that we find cures for cancer; to find a way to treat patients with this intense form of brain cancer is an advancement we have all been waiting to hear.
Sources:
http://www.nanotech-now.com/news.cgi?story_id=43532
http://www.medicalnewstoday.com/releases/235417.php
Sources:
http://www.nanotech-now.com/news.cgi?story_id=43532
http://www.medicalnewstoday.com/releases/235417.php
Monday, September 26, 2011
Re: A Point in History
Jean Hoerni was born on this day in 1924. He grew up in Switzerland and went on to receive a Ph.D from the University of Cambridge and another from the University of Geneva in his hometown. He was silicon transistor pioneer and is famous for creating the Plantar Process.
In this process, pieces of a transistor are created separately and then placed together in a way that creates an integrated circuit. The use of silicon dioxide oxidation binds the transistor without the need to do it by hand. This is important because it allowed these transistors to be made out of silicon rather than germanium. Silicon can hold more information than the previously used germanium.
Jean Hoerni is important in today’s electronic era because the Plantar Process is still used today in the computers we use. It stores the information we need in a way that is smaller and more compact than what could’ve been imagined.
Resources:
http://en.wikipedia.org/wiki/Jean_Hoerni
http://en.wikipedia.org/wiki/Planar_process
In this process, pieces of a transistor are created separately and then placed together in a way that creates an integrated circuit. The use of silicon dioxide oxidation binds the transistor without the need to do it by hand. This is important because it allowed these transistors to be made out of silicon rather than germanium. Silicon can hold more information than the previously used germanium.
Jean Hoerni is important in today’s electronic era because the Plantar Process is still used today in the computers we use. It stores the information we need in a way that is smaller and more compact than what could’ve been imagined.
Resources:
http://en.wikipedia.org/wiki/Jean_Hoerni
http://en.wikipedia.org/wiki/Planar_process
Friday, September 23, 2011
Online Safety
Here are some important things to remember while you're online:
· Use COMMON SENSE. This is probably the most important thing you can do.
· Don’t put yourself in risky situations. Chat rooms pose the greatest risk for online predators.
· Remember that a person can be anyone. If you have everything in common with soeone and it's too good to be true...it probably is.
· If a person on the Internet asks you to keep them self a secret RED FLAG! A friend wouldn’t be asking you to keep themselves hidden.
· Never give out personal
information.
· Never post photos of
yourself.
· Never meet face to face.
· Never enter a website that charges for services without your parents
permission.
· Never download files from and unknown source.
· Never think that once something is deleted is gone forever.
Read this article to find out just how long photos can stay on facebook:
http://www.theage.com.au/technology/technology-news/facebook-keeps-deleted-user-photos-for-years-20101013-16j1x.html
· Use COMMON SENSE. This is probably the most important thing you can do.
· Don’t put yourself in risky situations. Chat rooms pose the greatest risk for online predators.
· Remember that a person can be anyone. If you have everything in common with soeone and it's too good to be true...it probably is.
· If a person on the Internet asks you to keep them self a secret RED FLAG! A friend wouldn’t be asking you to keep themselves hidden.
· Never give out personal
information.
· Never post photos of
yourself.
· Never meet face to face.
· Never enter a website that charges for services without your parents
permission.
· Never download files from and unknown source.
· Never think that once something is deleted is gone forever.
Read this article to find out just how long photos can stay on facebook:
http://www.theage.com.au/technology/technology-news/facebook-keeps-deleted-user-photos-for-years-20101013-16j1x.html
Re: QR Technology
I do not own a smart phone, but I'm sure we have all seen these around. Ms. Lang created one that said, "A smile is an inexpensive way to improve your looks." The above QR is mine. It reads my favorite lyrics, from my favorite song, from my favorite band. I think it is very cool the technology we have and the way we are using it today. I think it would be great if we expanded the QR codes to include ways to teach in school. If we could put in apps into these codes and students can scan them and have all their coursework for the day, it would be very beneficial. Students who miss school could have all their work right there at home instead of having to make up work later on. This can save trees and wasted printing. The list can go on forever!
I can see QR technology expanding greatly. The possibilities are endless.
I can see QR technology expanding greatly. The possibilities are endless.
Paint Personality
This is a neuron. A neuron is an excitable cell that uses chemical messages to communicate to the rest of the body. I think a neuron represents myself because I feel like I take in information and process it and then bring that information to where it needs to be. I feel like I am the person that people go to for homework help. I love tutoring and one of the best things I like about myself is that I can take in information and understand it in a way I can; but not only that, I can change it to help others too.
Tuesday, September 20, 2011
Introduction
My name is Taylor and I am going to be a Pediatric Neurologist someday. I live with my mom, and a younger sister and brother, and my gecko, Jeremy. I like to read; I like to listen; I like to sing. I listen to Blue October far too often. And I'm working on changing what the world thinks.
Subscribe to:
Posts (Atom)





