Thursday, November 26, 2015
Looking for network equipment or other technologies that you need to manage your computer? Check out www.routervilla.com for all your networking needs. You can find various router reviews and more. The tech talk will bring you up to speed on the latest gadgets and games and each router is carefully reviewed.
Wednesday, October 14, 2015
So I got this idea for a program recently, and although my programming skills are still very basic. I thought I'd at-least list it out...
Basically it's a program that captures sound note's from music of really any type and changes them into different noises, from funny, to scary to anything really you can change the sound of your music.
I know you can do this is the music industry, but I want to try it in a smaller environment and I'm not necessarily doing it for music I'm doing it to see how to convert sound to different sounds!
So these are things I need to know, first and foremost I need to write python effectively. I need to be able to grab the sound files that are uploaded and parse them into little sections. These sections need to be small enough to encompass a single note yet big enough for me to code. I'm not sure exactly how to do this yet, but I know if I keep practicing python I'll be-able to.
Sunday, October 11, 2015
In my design class online, we have to find three examples of online and three examples of real life collaboration. Successful or fluent is one, unsuccessful is the another and interesting / creative is the last.
I think this class is helping me to understand design patterns specifically in software's and internet related situations. These various patterns are what are repeated each millionth of a second to be observed and collected.
Tuesday, September 29, 2015
codecs.encode() uses ASCII coding to encode python data..
codecs.decode() uses ASCII coding to decode python data...
Used for primarily unicode...
Most common are UTF-8 and UTF-16
Encoding data has been a huge development in computers and the internet, finding approriate standards to encode and decode this data was and still is a difficult task.
The ASCII chart shows us keys that match to certain characters, using decimal, binary and hex.
Different char formats like the UTF's are compatible with certain browsers and programming languages.
Wednesday, September 23, 2015
What is a Business Intelligence Environment? And how does a BI have anything to do with technology?
Getting the fullness of your business is essential to keeping your business strong. With Technology we find that we can have a high statistical change in business effectiveness if we improve our Business Intelligence Environment. Our BI environment can be drastically changed if keep our software and hardware updated as well as the people who run and manage them.
Business Technology is a whole new area of industry specifically tailored toward making Business software, hardware and firmware to detail our business's worldwide.
I just recently found out what the term BI actually means, but I've always though how business can be effected through Technology. A good study for any IT student would be to find the correlations between Technology and Business development. Increasing Business Technology is a great way to make your business run smoother and faster.
Tuesday, September 8, 2015
So I'm reading a paper by Alan Turing and in it he asks the questions, can machines think?
So of course this got me thinking, can machines think? Do they have a expression of thought that we could examine.
In some ways, they already do, but the logic they used is fixed and rarely makes errors like we would assume.
The reason a computer (for the most part) accomplishes billions of tasks a second is because it is sending information at an incredible speed through a logic pattern that doesn't change.
These logic patterns however evolve into more unique and specific patterns as computers develop.
Turing was one of the several men who developed the Turing machine to break the enigma code during WW2. He also wrote a ton of very important mathematical documentation that is still used by code-breakers and mathematicians today.
Check out some of Turing's work and analysis of numbers online and be informed :)
Thursday, June 11, 2015
What was Colossus?
Colossus was one of the first major movements of Computer Technology recorded in history, this machine helped in WW2 to decrypt codes that prevented ally forces from getting communications and knowledge of enemy whereabouts.
This Computer was the first large scale device that could actually function difficult mathematical functions and symbols.
A eager beginning most bypass the Colossus on their way to understanding today's technology and look towards the first PC, Lisa, and other computational devices of the 80's and 90's.
Although the Colossus was huge, it isn't even close to the data-transfer rates of today and could only transfer data in specific "counts" which were documented and then translated. It ran on a thin paper-tape and didn't have an assorted memory module like today's devices.
Who was involved?
Tommy Flowers assisted by Sidney Broadhurst, William Chandler / Post Office Research Station / British Military
Check it out!
The Colossus Computer (1943-1996): And How it Helped to Break the German Lorenz Cipher in WWII
As well as:
Colossus the secrets of Bletchley Park
Friday, May 15, 2015
Monday, May 11, 2015
Question:What does the last bit of Code do?The last bit of Code which happens to be window.exitonclick() shuts down the window when you click. :)The window variable is = to the turtle screen which displays the program itself. Python already knows what exitonclick means through built-in method retrievals.
Check this out and more PYTHONIC codes at http://love-python.blogspot.com/2014/07/turtle-triangle-fun.html
Wednesday, March 18, 2015
Monday, March 16, 2015
A SQL Injection is a type of virus that you type into a user input field that allows access to the database that the field is connected to. If done right a SQL Injection can leave devastation on a computer and site. SQL Injection's can be done in a variety of ways and forms, and they are becoming increasingly dangerous via the web.
Different SQL codes can be used to override SQL database code and gain information.
SELECT user from users where password = 'pass123' OR email = 'email@example.com'
Thursday, March 12, 2015
You can make gradient color's and have them show up in different shapes and sizes throughout your website using this CSS style trick.
background-image: radiant-gradient(circle at top right, #ffa949 0%, firebrick, dodgerblue); placing this within your class, ID, or simply a h1 can change your entire website radically.
Thursday, March 5, 2015
Thursday, February 26, 2015
Everyday we here of new technology being implemented and today more and ever we have needs to help us as humans better ourselves and develop a greater sense of reason and logic. Robots are intended to do just that and protect us from things that can potentially harm us.
If we were to take a look at a nano we'd see that it can't be compared geometrically to our outside vision without first setting up constant's that don't move.
A nano is bigger than the width of an atom and this is a easier scale to observe and manipulate nano's. We could use nano technology to create music, health devices or services, and even more it's all up to our imagination on how and why we want nano technology.
Tuesday, February 17, 2015
Check out more blog and affiliate marketing @ http://www.mysecondmillion.com/ad-affiliate-ads-to-yourblog/
Make your own website and sell for other companies!
Check it out if your interested in how to move around in Word-Press!
Friday, January 23, 2015
Check out Treehouse learning programs! Easy and fun to learn and use!