Friday, October 7, 2011

How this fruit changed the world and Steve Jobs' Legacy

By three apples,
The one Eve ate.
The one fell in Newton's head.
and The one STEVE JOBS built.

Honoring STEVE JOBS, he contributed to today's generation by creating devices like iPhone, iPod, and iPad
that will be part of our daily lives and through this,his legacy still remains on us.

Wednesday, August 17, 2011

My Personal Insight about Compsci

I learned in this class on how social networking sites affects our lives : the advantages and disadvantages of it,why people like or dislike it,and its scope and limitations. Also,I learned the difference of Desktop and a Laptop because I thought before that they are just the same,i know they are both computers but they function differently. I learned also that a single virus,particularly the I Love you Virus can crashed millions of computers around the world,thus it signalled that we should be careful on what we open on the e-mail boxes.

Compsci taught me on how computers affects our everyday lives and its functions to our society.

Friday, August 12, 2011

Advantages and Disadvantages of Social Networking Stories


1. KIDS ON FACEBOOK GET WORSE GRADES
but the social network has its benefits

(NEWSER) – Brace yourselves, parents: a flood of new research shows the damaging effects Facebook can have on kids. Middle school through college-age youths who checked the site at least once within a 15-minute study bloc received poorer marks, researchers found. Meanwhile, teens on Facebook appear to be more narcissistic, and kids who use media and other new technology every day face a higher risk of anxiety and depression, studies suggest.

On the other hand, Facebook can help kids forge a sense of identity, and kids who spend more time online appear more likely to learn “virtual empathy,” offering kind words to their friends online, Time reports. The virtual empathy translates into real-world empathy, a researcher says. “We're teetering on the balance—too much time online can lead to health problems and narcissism, but it can also teach you to be more empathic and develop your sense of self.




2. THE DANGERS OF FACEBOOK
learn how to protect yourself when meeting people online

You should consider some other important things as well. First, while you can meet new friends online, you may also come into contact with malicious people misrepresenting themselves. These are people you don’t want to know. Internet thieves and sexual predators are only too eager to exploit personal information found on social networking sites. They are out there and willing to hurt you unless you take precautions to protect yourself.

A second consideration, frequently overlooked, is that information you post on a social networking site may reveal indiscretions and worse to future employers, college professors, or even your parents. It’s on the record that students have been suspended and expelled for escapades and threats posted online. In some instances, potential job offers have been withdrawn because of information posted on a social networking site. Keep these things in mind when taking advantage of the pluses of social networking. You can follow these tips to help you protect yourself on a social networking Web site:

  • Consider restricting access to your profile. If the site allows it, it’s a good idea to limit access to your profile. Don’t allow strangers to learn everything they can about you. It’s just not safe.
  • Keep your private information private. Never post your full name, Social Security number, address, phone number, full birth date, financial information, or schedule. These will make you vulnerable to identity thieves, scams, burglars, or worse.
  • Choose a screen name that is different from your real name. Avoid using any personal information that would help someone identify or locate you offline.
  • Think twice before posting your photo. Photos can be used to identify you offline. They can also be altered or shared without your knowledge.
  • Don’t post information that makes you vulnerable to a physical attack. Revealing where you plan to meet your friends, your class schedule, or your street address is almost an open invitation for someone to find you. Remember that a photo in front of the Co-op tells strangers you are in Austin, and quite likely at the university.
  • Use your common sense. If you are contacted by a stranger online, find out if any of your established friends know the person, or run an online search on them (after all, you can use these things to your own benefit too!). If you agree to meet them, make it in a public place and invite others to join you.
  • Trust your instincts. If you feel threatened or uncomfortable during an online interaction, don’t continue the dialogue. Report any offensive behavior to the social networking Web site administrators.
  • Be suspicious. Don’t take any information you receive from a new online contact at face value. The Internet makes it easy for people to say or do things they would never say or do in public or in face-to-face interactions. Protecting yourself is the smart thing to do.


3. SOCIAL MEDIA STRATEGIES FOR A SMALL HOTEL

Business Makeover: The owner should understand online social networking, encourage customers to create content, update Facebook more often and use YouTube and Twitter, experts advise.

By Cyndia Zwahlen of the Los Angeles Times

Back in 1912, when the Venice Beach Suites & Hotel was built on Ocean Front Walk, the only tweeting going on was among the local bird population.

Today, owner Andy Layman is listening to the online chorus at Twitter and other social networking websites, hoping to join in. Learning to hit the right notes to attract new guests and boost revenue at his boardwalk property is a daunting prospect. "I haven't really gotten a handle on it," said Layman, 62.

Yet, done right, he believes social media would be an inexpensive way to find more of the type of traveler who already raves online about his eclectic, 25-room location. About three-quarters of the reviews on TripAdvisor, a major travel website, are positive, Layman said.

Visitors step outside the renovated hotel's front door onto the Venice boardwalk where fortunetellers, henna-tattoo artists and musicians vie for attention. Tourists and the homeless pass beneath the area's many murals while locals pump iron at nearby Muscle Beach and young people try out the $3.5-million skateboard park that opened last summer within sight of the hotel.

In the summer, Layman charges $130 to $305 a night for rooms, some of which have the building's original claw-foot bathtubs. Guests ride the 1939, birdcage-style elevator to the upper floors. To many guests, it's a charming experience. To others, it's too funky.

The hotelier wants to increase sales, which fell 20% last year to about $800,000. Reservations at the four-story hotel have picked up since March, he said, and he expects revenue this year in the mid-$900,000 range. But like a lot of other small-business owners, he is still scrambling to catch up with bills.

Engaging potential customers via social networking could help him boost sales as well as manage expectations for the hotel, said Rosalie Morton, an account executive in the West Hollywood office of Richmond, Va., marketing agency CRT/tanaka. She said the hotel is "having trouble articulating the funkiness of the boardwalk and talking about the homeless population and being able to articulate what Venice is about."

To help Layman take advantage of social media, Morton and colleague Priya Ramesh, director of social media at the agency, made the following recommendations.

Understand online social networking. Facebook, YouTube and Twitter provide new ways for Layman to reach customers. But it's not a one-way street. The point of social media for a business is to help customers interact with the company and network with one another online.

The more often that happens, the higher the hotel will rank on search engines and the more new customers will be drawn into the conversation. Postings on one site can be set up to automatically appear on other social media sites. That saves time while spreading the buzz.

Encourage customers to create content. The beauty of social media is that customers can be a major source of content. Layman can solicit comments, photos and videos about the hotel via its existing Facebook page and its website, http://www.venicebeachsuites.com.

Update Facebook. The hotel's Facebook page has a respectable 300 or so friends, Moore said, but it's updated only monthly. She'd like new information at least once a day. Customer content will help, but Layman should also post specials, photos and videos, directing visitors to his website, which Moore said could be better organized.

Use YouTube and Twitter. A YouTube account is a free and easy tool to post videos online. Through Twitter, a microblogging service, registered users can post messages of 140 characters or less. Daily tips about events such as local music festivals or just the latest beach weather are good subjects.

Try FourSquare. This mobile phone application uses geolocation software to track users' whereabouts. People earn points for posting about visits to new places or old favorites. Layman can sign up to offer special discounts to FourSquare users.

For Layman, creating an effective voice in social media is a worthy challenge. "We're looking forward to moving forward" on the tips, he said. "Social media and Internet marketing is the future of business."

If your small business could benefit from a free Business Makeover in the L.A. Times, please e-mailsmallbiz@latimes.com.

Source : http://articles.latimes.com/2010/jul/26/business/la-fi-smallbiz-makeover-20100726


4.
YOUR VIEW: TOO MUCH SOCIAL NETWORKING CAN BE A DISADVANTAGE

Social networking, such as Facebook, Myspace and Twitter, is taking over the way we communicate with one another today. If one were to ask a young person whether social networking is advantageous, he or she would most definitely say yes. But it is actually a disadvantage.

In today's society, it is socially acceptable to message someone through one of these networks rather than picking up the telephone. If you want to know what is going on in someone's life, you check that person's Facebook, Myspace and/or Twitter to see where she is and what she's doing. The younger generation is losing a valuable tool they will need in the real world -- a little thing called social communication skills.

One needs social skills, not social networking skills, to make it in today's work force.

We still need our communication and interpersonal skills if we want real, personal interactions with people in order to work with others effectively.

I still like to have actual phone calls with people and face-to-face conversations where I tell people what's going on in my life and not post it on my Facebook.

Source : http://blog.al.com/birmingham-news-commentary/2011/06/your_view_too_much_social_netw.html


5. WAYS NON-PROFITS CAN USE BLOGS AND SOCIAL MEDIA

Record numbers of people are visiting and writing blogs. Social networking has also become ingrained in every day life. From suburban moms to smallbusiness owners, blogs are being created to express interest and promote products. As blogs and social media are now a significant category in online behavior, organizations, specifically non-profits, can take advantage of the access these sites can give for promotion, events, and awareness to the public.

Here are a few ways that blogs and social media can serve as a vital part of a non-profit.

Update and Document

Social networking sites allows for constant update capabilities, and with the applications that can used on smart phones, non-profit coordinators can update from events and conferences. Social media and blogs also serve as free media coverage. Since both also allow comments, photo posts and video posts, visitors get an interactive experience.

Example: NPR has a Facebook and Twitter account for audiences to watch videos and read articles, which they can comment on as well.

Create Connection

Comments posted on your blog can serve as a way to make new connections, and also to encourage discussion about the organization and its work. Discussion through comments can lead to collaboration and connection to possible donors. Social networking sites that allow “friends” means your organization can stay connected to members, volunteers, interns, and donors. Link from their pages will create virtual breadcrumbs to your organization’s web site and blog. This will encourage traffic and the organization’s online presence.

Example: Linda Pascotto, president of the Prem Rewat Foundation, created a personal page on Facebook that connects to her non-profits page and their affiliate organizations.

Promotion and Resources

Blogs have RSS feeds that send updates to your blogs followers, which is an easy way to spread news about future events. Social networking sites, such as Facebook, have an events page creator to that will appear on the newsfeed of friends and your friend’s friend. This helps to create awareness among those who have no direct connection to the organization. Both social media and blogs have profiles where the organization can post links to their main web site, resource material, and affiliates.

Example: The Canadian Breast Cancer Foundation has a blog called Finding Hopeon WordPress that has an events tab, RSS feed and a section where members post their personal stories.

While blogs and social networking require attention and constant content, they are easy to run and a great resource for spreading an organization’s objective.

Source : http://www.alliedbloggers.com/2011/02/ways-nonprofits-blogs-social-media/

Saturday, July 2, 2011

The Access Nation

>It is intended for a database,if a person has criminal records.
but use to kill a victim.

-A Hacker can see every movement of his/her victim.
for example,the password of a site,Personal Accounts,the sites he/she visited.
-They have information of a victim,that they will plan to kill him/her.
-Some sites are (not) protected.
-Computer Files are being hacked.
-Sometimes,Releasing Confidential Documents from a victim.
-Some of them,using the Hard Drive for malicious purposes.
-In some instances,the Computer can reformat itself.


Tuesday, June 7, 2011

Computer Problems

Some of you may personally experienced this kind of problems in your computers before....

Here's Some of the problems........

-Failing Power Supply
>It suddenly shut downs and have difficulty to start up

-Viruses
>This are programs of the computers to be able to spread the virus to other computers
>No Computer is immune to viruses

-Slowdown
>Computers today are expected to perform faster and better
but,in some instances,the video you watch is taking longer to load than the usual

-Adware
> mysterious messages will appear on your computer
> Its purpose is to violate your computer with advertising
>Annoying but it's easy to remove

To Conclude,all computers,even new computers today will experience the problems in the future.......

Compsci Project 2

Thursday, May 26, 2011

History of Computers


> It started differently,not as computers we know today,but a separated technologies like calculation and programmability because no single device can be identified on it
>1837:Englishman Charles Babbage first to conceptualize and design a mechanical computer,Analytical Engine,thus,earning him as the "Father of the Computer"
>1946:The US Army (Ballistic Research Laboratory) operated ENIAC (Electronic Numerical Integrator And Computer),which is regarded as the first general-purpose electronic computer,which used decimal arithmetic
>1970s:Integrated Circuit Technology and Microprocessors subsequent creation,example is Intel 4004,further decrease size and further increase speed of computers
>1980s: Home computers and personal computers was now in the electronic market,during also this time,Internet evolved
> 2009-Present:Modern Smartphones,are the most fully programmable computers in existence



CompSci Project
1st Term 2011-2012
Miguel Antonio S. Catibog
BSBA-E





Computer Generations (Part 2)

4th Generation (programming language)

DESIGNED TO....
>With a specific purpose in mind,such as the development of commercial business software
>Reduce programming effort,the time it takes to develop software development
SOMETIMES,not been successful on a task,this results to inelegant and unmaintainable code
>Some Examples are Agile Business Suite,X Base ++,IBM Rational EGL (Enterprise Generation Language),and Clipper

5th Generation (programming language)

>Rather than a algorithm written by a programmer in past computer generations,it is based around solving problems using the program with the constraints given
>Most constraint-based and logic programming languages and some declarative languages are some of the generation's languages
>Without the programmer,it is designed to make a computer solve a given problem
>Considered to be the wave of the future

Some Descriptions are sourced from Wikipedia......

Next..... History of Computers