Thursday, November 26, 2015

Routervilla

        Looking for network equipment or other technologies that you need to manage your computer? Check out www.routervilla.com for all your networking needs. You can find various router reviews and more. The tech talk will bring you up to speed on the latest gadgets and games and each router is carefully reviewed. 

Wednesday, October 14, 2015

Code idea

So I got this idea for a program recently, and although my programming skills are still very basic. I thought I'd at-least list it out...

Basically it's a program that captures sound note's from music of really any type and changes them into different noises, from funny, to scary to anything really you can change the sound of your music. 

I know you can do this is the music industry, but I want to try it in a smaller environment and I'm not necessarily doing it for music I'm doing it to see how to convert sound to different sounds! 


So these are things I need to know, first and foremost I need to write python effectively. I need to be able to grab the sound files that are uploaded and parse them into little sections. These sections need to be small enough to encompass a single note yet big enough for me to code. I'm not sure exactly how to do this yet, but I know if I keep practicing python I'll be-able to.

Sunday, October 11, 2015

Readin the comp' and net'

In my design class online, we have to find three examples of online and three examples of real life collaboration. Successful or fluent is one, unsuccessful is the another and interesting / creative is the last. 

I think this class is helping me to understand design patterns specifically in software's and internet related situations. These various patterns are what are repeated each millionth of a second to be observed and collected. 






Tuesday, September 29, 2015

python encode/decode

Python Codecs


codecs.encode() uses ASCII coding to encode python data..

codecs.decode() uses ASCII coding to decode python data...


Used for primarily unicode...


Most common are UTF-8 and UTF-16

Encoding data has been a huge development in computers and the internet, finding approriate standards to encode and decode this data was and still is a difficult task.

The ASCII chart shows us keys that match to certain characters, using decimal, binary and hex.

Different char formats like the UTF's are compatible with certain browsers and programming languages.





Wednesday, September 23, 2015

BI Envrio

What is a Business Intelligence Environment? And how does a BI have anything to do with technology?


Getting the fullness of your business is essential to keeping your business strong. With Technology we find that we can have a high statistical change in business effectiveness if we improve our Business Intelligence Environment. Our BI environment can be drastically changed if keep our software and hardware updated as well as the people who run and manage them.


Business Technology is a whole new area of industry specifically tailored toward making Business software, hardware and firmware to detail our business's worldwide.

I just recently found out what the term BI actually means, but I've always though how business can be effected through Technology. A good study for any IT student would be to find the correlations between Technology and Business development. Increasing Business Technology is a great way to make your business run smoother and faster. 

Tuesday, September 8, 2015

Alan Turing

So I'm reading a paper by Alan Turing and in it he asks the questions, can machines think? 
So of course this got me thinking, can machines think? Do they have a expression of thought that we could examine. 

In some ways, they already do, but the logic they used is fixed and rarely makes errors like we would assume. 


The reason a computer (for the most part) accomplishes billions of tasks a second is because it is sending information at an incredible speed through a logic pattern that doesn't change. 


These logic patterns however evolve into more unique and specific patterns as computers develop. 

Turing was one of the several men who developed the Turing machine to break the enigma code during WW2. He also wrote a ton of very important mathematical documentation that is still used by code-breakers and mathematicians today. 

Check out some of Turing's work and analysis of numbers online and be informed :) 


Wednesday, June 24, 2015

Internet Hall of Fame

Mahabir Pun
Check out Mahabir Pun an Internet hall of famer famous for making a wire-less networking company in Nepal. His desire was to make sure his people had access to the Internet for education, healthcare etc. He has an educational master's degree and has also received a Honorary Doctorate. Mahabir and people like him are the inspiration behind rising Internet moguls and inventor's as we try to come together and educate the world into a better state.

You can find out more about him, and his story @ 

Thursday, June 11, 2015

computer machinary of the 1940's 50's

Colossus:

What was Colossus?

Colossus was one of the first major movements of Computer Technology recorded in history, this machine helped in WW2 to decrypt codes that prevented ally forces from getting communications and knowledge of enemy whereabouts.

This Computer was the first large scale device that could actually function difficult mathematical functions and symbols. 

A eager beginning most bypass the Colossus on their way to understanding today's technology and look towards the first PC, Lisa, and other computational devices of the 80's and 90's.

Although the Colossus was huge, it isn't even close to the data-transfer rates of today and could only transfer data in specific "counts" which were documented and then translated. It ran on a thin paper-tape and didn't have an assorted memory module like today's devices.



Who was involved?

 Tommy Flowers assisted by Sidney Broadhurst, William Chandler / Post Office Research Station / British Military 

Check it out!


The Colossus Computer (1943-1996): And How it Helped to Break the German Lorenz Cipher in WWII

 

As well as:

 

Colossus the secrets of Bletchley Park 

 




Monday, May 11, 2015

Turtle Time


import turtle
def draw_triangle(side_length, depth): if depth == 0: return counter = 0 while counter < 3: counter += 1 brad.forward(side_length/2) if depth > 1: brad.left(120) draw_triangle(side_length/2, depth-1) brad.forward(side_length/2) brad.right(120) brad.left(240) if __name__ == "__main__": window = turtle.Screen() window.bgcolor("white") brad = turtle.Turtle() brad.shape("turtle") brad.color("green", "green") brad.speed(5) brad.begin_fill() brad.right(120) brad.forward(128) brad.left(120) brad.forward(256) brad.left(120) brad.forward(256) brad.left(120) brad.forward(128) brad.left(120) brad.end_fill() brad.color("green", "white") brad.begin_fill() draw_triangle(128, 3) brad.end_fill()
window.exitonclick()
 
Question:
What does the last bit of Code do?
The last bit of Code which happens to be window.exitonclick() shuts down the window when you click. :)
The window variable is = to the turtle screen which displays the program itself. Python already knows what exitonclick means through built-in method retrievals.




Check this out and more PYTHONIC codes at http://love-python.blogspot.com/2014/07/turtle-triangle-fun.html

Wednesday, March 18, 2015

Gudio Van Rossum Main()

I've written a few main() functions in my time. They usually have a structure roughly like this:


"""Module docstring.

This serves as a long usage message.
"""
import sys
import getopt

def main(): # parse command line options try: opts, args = getopt.getopt(sys.argv[1:], "h", ["help"]) except getopt.error, msg: print msg print "for help use --help" sys.exit(2) # process options for o, a in opts: if o in ("-h", "--help"): print __doc__ sys.exit(0) # process arguments for arg in args: process(arg) # process() is defined elsewhere if __name__ == "__main__": main()


By:

Guido Van Rossum 

Monday, March 16, 2015

SQL

SQL Injection


 A SQL Injection is a type of virus that you type into a user input field that allows access to the database that the field is connected to. If done right a SQL Injection can leave devastation on a computer and site. SQL Injection's can be done in a variety of ways and forms, and they are becoming increasingly dangerous via the web.



Different SQL codes can be used to override SQL database code and gain information.


SELECT user from users where password = 'pass123' OR email = 'email@m.com'




Thursday, March 12, 2015

CSS help


You can make gradient color's and have them show up in different shapes and sizes throughout your website using this CSS style trick.



background-image: radiant-gradient(circle at top right, #ffa949 0%, firebrick, dodgerblue); placing this within your class, ID, or simply a h1 can change your entire website radically.

Thursday, March 5, 2015

CSS-BASICS



Alters the default CSS box model used to calculate widths and heights of elements.

Sets the maximum width of an element. It prevents the used value of the width property from becoming larger than the value set for max-width.


- Treehouse


Thursday, February 26, 2015

Nano Tech

Nano Technology

Everyday we here of new technology being implemented and today more and ever we have needs to help us as humans better ourselves and develop a greater sense of reason and logic. Robots are intended to do just that and protect us from things that can potentially harm us. 

If we were to take a look at a nano we'd see that it can't be compared geometrically to our outside vision without first setting up constant's that don't move. 

A nano is bigger than the width of an atom and this is a easier scale to observe and manipulate nano's. We could use nano technology to create music, health devices or services, and even more it's all up to our imagination on how and why we want nano technology.