Monday, December 17, 2012

Technology Current Event

Topic: Three dogs learned how to drive.

Article Title:

Dogs That Can Drive A Car? You Better Believe It!

Article Source: dogonews

Summary: Three New Zealand dogs learned how to drive a car. The dogs used were abandoned starys residing at New Zealand's SPCA. The driving classes were supervised by trainer Marke Vette. The training started with the dogs learning how to move the gears back and forth, turning the steering wheels, and applying the brakes. After the training was complete the dogs practiced using a motorized wooden go-kart. Finally, the dogs were ready to drive a real car.The car used were modified for the dogs to use. 



Description: Dog driving
Dare: Decemeber 10, 2012
Found at: dogonews


Reaction: These three dogs learning to drive is just so amazing. Who would have thought someday dogs could drive? I wonder how long it took the dogs to learn to drive? This proves just how smart dogs are. I'm not really into dogs; I have a huge fear of them. So maybe when they're in a car it'll be less scary.  



Description: Dog driving
Date: December 10, 2012
Found at: dogonews


World Impact: Dogs are used to help people in so many ways. Dogs that can drice can really come in handy. The handicaped and elderly can use the dogs to drive them around to different places. The only thing that might cause a problem is when the dog gets in a car accident. Who would be responsible for the crash? Along with learning to drive, the dogs might also need to learn the rules of the road.

Monday, November 19, 2012

Technology Current Event

Topic: Real-life Transfomers suits.


Article Title: Just In Time For Christmas - Real-Life Transformers Suits!


 Article Source: Dogonews


Summary: Drew Beaumier invented a real-life transformer suit. His suit contains of a vehicle body, helmet, battery belt and even motor equipped drive boots, that allows the user to zoom around like an automobile at speeds of up to 10-15km/hr when in“vehicle” mode. When a person is driving around in "vehicle" mode they can later spring up and strut around like Optimus Prime.


Description: Life-size transformer suit
Date:November 18, 2012
Found at: dogonews.com


 Since Drew custom-builds each suit from gently used toys and sporting gear, the drive suit can be made to resemble almost any vehicle. The suit takes about 50 hrs to create and cost about $1,800 USD each. Recently, Drew received an investment from Shark Tank's Kevin O'Leary (Mr. Wonderful) who plans to set him up with a toy manufacturer. By next Christmas toy stores all over the world will be featuring Drew's amazing invention.


 Reaction: This new invention is really cool and crafty. Everybody would want to buy something like that. It also came out right in time for Christmas. I think the transformer suit would make a cool halloween costume also. The price is a little too expensive though. People might not want to buy something so expensive. 


World Impact: I don't think this really impacts the world much. Other inventors may try to copy this invention or create something similar to it. I don't see this invention going world wide untill later on in the future. Like I said before the costume is really expensive. People in other countires might not be able to afford the invention untill later on when the price is more reasonable. 

Friday, November 16, 2012

Week Thirteen of GECHS

This week was really simple and easy. We went over our new digital literacy lesson and worked on a few other things. Unfortunately, we didn't learn about any new web 2.0 tool.


Our new digital literacy component this week was scams and schemes. We had a class discussion on how important it is to keep private information private. If your information gets out into the public, it can lead to multiple problems that may take years to fix. One major issue in the United States is identity theft. The only way someone can steal your identity is if you give them the information they need.

Description: Thief
Date: January 25, 2007
Found at: flickrcc.net

However, they are also ways you can avoid identity theft. Here are five rules to follow to protect you from online scams: 
  1. Avoid opening the message or email.
  2. Don't click on any links or download any attachments; they might contain viruses or spyware.
  3. Don't reply to the message.
  4. Mark as "junk mail" or "spam" for your email provider, or report it to your social networking site.
  5. If you are concerned about an account you have with a company, contact its customer service department by phone. Make sure you verify the company’s contact information elsewhere online first.


To guide us through our lesson we were given a list of words to define. We have already went over a few of the words in the past.

Scam- An attempt to trick someone, usually with the intention of stealing money or private information. 
Identity Theft- A type of crime in which your private information is stolen and used for criminal activity.
Vulnerable- In a position that makes it easier for you to be harmed or attacked. 
Phishing- When people send you phony emails, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.


Overall, this week was really laid back. I enjoyed not having that much work to complete. The only thing I had a problem with was my stems test.

Wednesday, November 7, 2012

Week Eleven of GECHS

This week was by far the best week ever here at GECHS. The moment we have all been waiting for has finally happened. The new building was ready for us! It was supposed to be completed a while back but all the waiting has finally paid off. Our first full day in the new building was on November 2, 2012. It was very exciting for all of us.


This week we signed up for a website called Noredink. Noredink is a simple site that both teachers and students can use. The site helps students practice and master grammar and writing skills in a fun and easy way. Noredink is also a way for us to study for grammar test. I really enjoy using it.


Our first assignment, as usual, was to edit our peers' blog. After having our blog edited, we went back and did a little revision and fixed our blog. Later, we commented on our classmates blogs. Having someone comment on our blog allows us to take in any suggestions and fix mistakes so our blog could be amazing.


The next day we started a new discussion on online tracking and targeting. Most of what we learned was about how companies can track your online activity and target specific ads and searches based on your demographic information and digital history. This may seem as an invasion of privacy but it doesn't all have to be negative. There are both negative and positive perspectives to it.


Description: Targeting
Date:April 23, 2008
Found at: Flickrcc.net


Online tracking and targeting can easily be something positive instead of negative. For example, you are looking for a movie to watch on Netflix. Instead of searching for a long time, netflix tries to determine the type of movies you enjoy based on your choices. Then they recommend movies that you may enjoy. Doing this is less time consuming and helps you search for movies easier.


The negative side of online tracking and targeting is that some information is hidden from you due to companies and search engines trying to tailor your online experience. This means that when two different people search the same thing, the results are not necessarily going to be the same. Having information personalized for you at all times doesn't always turn out to be a good thing.


Description:
Date:
Found at: www.flickrcc.net


We were also given a list of new vocabulary words to define.

Track- When companies collect information about you based on your online behavior.
Target- When companies tailor content to you based on the information they have collected about you.
Demographic- Common categories of the population, such as age, gender, and race.
Cookies- Data files that are stored on your computer when you visit certain sites.


There are multiple ways to stop companies from collecting too much of your information. This brings me to my next topic. Our new web 2.0 tool we used this week was Mixbook. Mixbook is a website that allows you to create a variety of things. Mostly photobooks, photocards, scrapbooks, yearbooks, and calenders.


The instructions given to us was to create a brochure giving 7 tips on how to limit data collection. Using mixbook, was a a little bit of a challenge. After a while it was easy to use. There wasn't really any negative aspects of Mixbook. It was a fun and easy website to use. My Mixbook is shown below.


Mixbook - Create Beautiful Photo Books and Scrapbooks! | Start your own Photo Books | Create custom Christmas Cards








Overall, this week was absolutely amazing! I really enjoyed everything we went over in class. I never knew that companies kept track of what you do online and try to tailor your online experience. Moving into our new building was just the icing on top of the cake! I can't wait until next week. It'll be our first full week in the new building.

Technology Current Event

 Topic: Employees experience cyberbullying


Article Title: Cyberbullying Not Just a Problem for Kids


Article Source: Technewsdaily


 Summary: A study by researchers at British universities Nottingham University and the University of Sheffield  found that cyberbullying in the workplace can be worst for its victims. The cyberbullies use modern communications technology such as emails, texts or Web postings to abuse people. Victims of these attacks seem to suffer more than regular forms of bullying. Cases like these appear to be worse because "those that had experienced cyberbullying tended to have higher mental strain and lower job satisfaction"


Reaction: I was surprised that cyberbullying was also occurring at workplaces. I just thought it caused an issue in kids and teens. I expect that grown ups should be way more mature and grown up. What I still don't understand is how employees "suffer" more that the regular forms of bullying. My parents always tell me to have self-esteem for myself and not let anyone bring me down. Why can't adults have that same type of attitude? There are stories of suicides due to cyberbullying attacks. I have never heard of an adult committing suicide over it. So how do they get it worse?


 World Impact: I don't think this would  really impact the world. It is an eye-opener to me to see this happening. Maybe it would be for other people also. I guess bosses can see that what they say to their employees is considered cyberbullying. Know one wants to be known as the bully, I wouldn't.


Wednesday, October 31, 2012

Weekly Technology Current Event

Topic: You should lie online so your identity can be protected


 Article Title: Lie Online to Protect Your Identity, British Official Says


Article Source: Technewsdaily


Summary: What this article was basically stating was that people should lie online so their identity could be protected. Information such as your name and date birth should be fake when you are using a social networking site. Putting real information about you can be later used against you. However, this doesn't apply to government websites. You should always be honest about your self when you are using a government website. There was a controversy that rose on this topic. Facebook has a strict rule against using false identity's.


Reaction: Well, we are actually learned about this topic in one of my classes. My opinion on this topic is that you should be real online about who you are. However, I also agree that you should be careful what information you put online. In other words, don't be too real online. Private information such as your address, bank number, or your full name should be kept private.


 World Impact: This article should be read by everybody around the world. Keeping yourself safe online is really important. Situations like identity theft can happen anywhere. People can now get a wake up call. You never know who could see and read your information. There are actual stalkers out there. People need to understand that you need to understand that what you do online will catch up to you somehow. 

Friday, October 26, 2012

Week Ten of ECHS

This week has been one of the best weeks here at Early College. Most of the work we completed this week was simple, easy, and fun. We started a new discussion on being real online. We also completed another Digital Driver's License lesson. The new web 2.0 tool we used was Glogster.


The first thing we worked on was our current events and a new Digital Driver's License lesson. The lesson we completed was on digital communications, etiquette, and security.  There are so many different ways to communicate with each other digitally now.


Something you have to be careful about is staying secure online. There are various ways that people can hack your computer and get personal/financial information. When you get emails take time to analyze them and make sure it's not a phishing scam. Giving out personal information can lead to identity theft.


There are two forms of writing that we use when we communicate with each other, formal and informal writing. Usually we use informal writing when we talk to friends via text message. Formal writing is mainly used when we're doing academic writing or business communications. Believe or not when you use informal writing too much it can affect the way you do formal writing.


Whenever you use digital communication you have to show some etiquette to those around you. Having loud ring tones can sometimes annoy or bother people. Also, when you are talking to someone on a cellular device be aware of those around you. Don't yell or speak loudly. When your phone rings you can leave the room and go speak outside so you won't disturb those around you. Here's a Youtube video showing a few ways people use bad etiquette.




The next day we watched the movie 'Cyberbully'.  'Cyberbully' is a story about a teenager who becomes the victim of a cyberbully attack on a social networking site. She is betrayed by her best friend and also attempts suicide. Later on in the movie, her mom takes on the school system and state legislation to help prevent others from going through the same harrowing ordeal as her daughter.


Watching 'Cyberbully' helped us fully understand how serious cyberbullying is. The movie had a very emotional toll on us, but we were also very touched by the unbelievable story. It also gave us a glimpse of how bad cyberbullying can get from the victims point of view. I would recommend this movie for any teenager in high school.


Our class discussion this week was on how we present ourselves online. To guide us through this discussion we were given a few new terms to define.


Represent- How you show yourself to others.
Persona- The image or personality you portray to others.
Avatar- An image or graphic that represents you online.
Anonymous- A hidden identity.
Inhibited- Being careful or restrained about your actions or impulse.


Most people have a different persona online than they do in the outside world. It's okay to be yourself online. Lies that you say online can and will eventually catch up to you. How you portray yourself online can affect your future in many ways.


During our class discussion we went over different tips on how to stay real online. Later, we made a Glogster  giving advice on how to stay real online. Glogster is a really simple and easy website to use. I really loved it. The only problem is that it doesn't save your work automatically for you. The Glog I created is below.





This week has been one of the best weeks ever. I really enjoyed making a glog and discussing the different ways to stay real online. I can't wait until next week to see what else we would be learning.