Article Reflection

Article Reflection

 The article I chose to cover was entitled “Video games, emotions and the six senses” by Eugenie Shinkle. The main idea of the article was to discuss how video games connect to the user through our six senses; sound, taste, touch, sight, smell and movement. 

 In the past video video games were much more basic with simplistic gameplay and minimal story line. Today there as complex and individual as it gets allowing you to jump deep into the story line and really feel emotion toward certain events that take place. This is caused by a special bond you share with the character your controlling as time goes on. Often your allowed to work and your own pace and depict what you (your character) is going to do next, like a simulation of your real life. “from a fixed viewpoint, video games allow the user to enter and explore this space in real time” (Shinkle). Now video games are in the transition towards making the user experience that much more life like. Instead of pushing buttons on controllers video games are turned your body motions into the controller. This gives you unlimited possibilities and helps tie the user more into the game, feeling as him himself is actually in it. Some examples of this taking place are nintendo Wii and Xbox Kinect. 

 In conclusion the video game world is forever expanding. The innovators are always going to look for new ways to enhance or entice the users experience. The ultimate goal is to create as life like an experience as possible, bringing our genuine emotion and passion. 

 

Networking Group Blog

Networking

POSTED ON OCTOBER 31, 2013

 

 

1)      What is a computer network? is known as a “telelcommunication network” that transfers and exchanges data from machine to machine. It communicates and works with machines in order to accomplish tasks such as email, file share and basic communication. The Internet is the biggest and most well known computer network, as it can be accessed by virtually every computer.           http://en.wikipedia.org/wiki/Computer_network

 

2)      LANs (Local Area Networks) – smaller and used for private and/or personal uses. LANs are smaller scale, and usually not as powerful as WANs since WANs can support many more users.
WANs (Wide Area Networks – bigger range, can be supportive of a big group of users engaging with this network. WANs are so powerful because for example, they are used in schools, office buildings, and general public, which will be used much more than LANs which are usually used for private purposes
Internet – the world wide network that can be accessed by anyone from anywhere. This network contains search engines, social media websites, and endless amounts of information, at the tip of your fingers
Intranet – is a private network that cannot be accessed out of the intranet
MANs (Metropolitan area Networks) – refers to granting connections of two devices, given that they are in the same city. The signal and strength of the MAN will depend of the size of the city, if the city is a larger scale, the MAN will have to stretch of the whole city.
VPN (Virtual Private Network), it can stretch and grant more access to a private network by using the public network such as the Internet. The VPN can be accessed only online, with security, it is a smart way of setting up internet connection, because the private service will be much faster.

 

Sources: 
http://en.wikipedia.org/wiki/Local_area_network

 

http://en.wikipedia.org/wiki/Wide_area_network

 

http://en.wikipedia.org/wiki/Internet

 

http://en.wikipedia.org/wiki/Intranet

 

http://en.wikipedia.org/wiki/Metropolitan_area_network

 

http://en.wikipedia.org/wiki/Virtual_private_network

 

3)      Peer-to-peer networks connect multiple computers in order for them to share resources and information. The data is stored on all computers in the network and shared between them. This can be difficult for finding and regulating information, as there is no central location or server to keep track of it all. This means when trying to access a certain resource or material, the individual must access the specific computer it is stored. This is convenient for small local networks but often gets very unorganized with larger, cooperation-based networks. A server-based network centralizes around a server that controls and regulates the resources. All the information in the network is stored here and it acts as the authority that decides what computers in the network have access to which resources.

 

4)      A server is a base computer, or a master computer, where information can be taken by client computers which connects to the base computer for this use. Normally our computers we use would be considered the client computer, as the server computer is computers connected over the network for other computers to connect to.

 

5)      The Open Systems Interconnect (OSI) Model is a theoretical model that attempts to display and explain the foundations of a network. It organizes network functions into seven layers from lowest to highest: physical, data-link, network, transport, session, presentation, and application. The OSI model is used to describe and fix networking issues, as well as to teach networking and computer engineers how various technologies interact and communicate with one another. It is a great template for breaking down and analyzing any network.

 

6)      Five different network arcetetures are the Physical Layer, the Deta Linking Layer, the Network Layer, the Transport Layer and the Application Layer.  The physical layer is made up of the electrical and/ or physical portion of the network or the outlet in which the network works (cords, etc.) The Deta Linking Layer acts as the programming portion and corrects any errors that may be found in the physical layer. The network layer provides transferring variable length data sequences when using information from another host. The transport layer allows the transfer of information between hosts. The application layer’s main purposes is to, identify different partners or hosts that are being used when down lading certain information, resource availability and synchronising communication. 
Sources: 
http://en.kioskea.net/faq/2761-what-is-network-architecture
http://web.mit.edu/people/dimitrib/Intro_Data_Nets.pdf

 

7)      Protocols- A protocol is a set of computer rules that govern what has the ability to get transmitted on your screen. Visually a protocol looks like a long chain of actions where the original image gets transmitted through and altered at every station on its way out.
TCP/ IP-  TCP stands for Transition Control Protocol, and IP stands for Internet Protocol. It is used to connect hosts to the internet.
Visually it looks like a middle hub sending out messages to receiving links. 
FTP- FTP stands for File Transfer Protocol. It is used to transfer files over from one host to another.
Visually it looks like a transfer of information from one computer to another. 
HTTP- HTTP stands for Hyper Text Transfer Protocol. It is used to define how messages are formatted and transmitted.
Visually it’s shown at the beginning of the request cycle before it goes through the computer.
Telnet-A telnet is a network protocol that allows a user on one computer to log into another computer that’s a part of the same network.
Visually a telnet is shown on the outside linking in to the network and accessing a gateway

 

8)      A router is a device responsible for the transmission and direction of data between networks. It is located at a gateway, the place where two or more networks connect, and regulates data flow between them. This means a router is always connected to at least two networks, and often more. Routers join multiple computers and networks to one server which transmits information to and form the internet, instead of having several computers in one location with each network hooked up individually to the server.

 

9)      A firewall is a software or network security system that controls the network traffic that comes in and out of your computer. It does so by analyzing the data and determines whether they are permitted to pass through or not.

 

10)   A web server holds basic web pages when an FTP server is usually a password protected server that allows a connection to be made between two computers and grants them access to upload or download files.

 

11)   An IP address is a long string of numbers that is used to identify a specific computer’s digital footprint. For example, when somebody posts something on the internet, their IP address is linked to the post and even if they do not allow viewers to see their work, it can be traced back to them anyway using an IP address.
Sources:
http://whatismyipaddress.com/

 

12)   The following video explains exactly how to transfer files to a web serverhttp://www.youtube.com/watch?v=0jwG9DWB1V0

 

Credits: 
1, 2, 4 – Jesse

 

3, 5, 8 – David

 

6, 11, 12 – Leighton

 

7, 9, 10 – Ginlucia 

 

New Media Innovators

Antonio Vivaldi

Antonio Vivaldi was born in 1678 in Venice, Italy. He was an Italian composer who excelled at playing the violin. He was also a priest and was given the nickname “The Red Priest” for his shining red hair. Antonio can be considered a new media innovator in the way he changed up the style of classical composition in his era. He tried to push the limits of what people considered good music and adapted a style of his own. His style was taken very well at first but gradually started to decline in popularity. Nowadays he’s considered one of the greatest Baroque composers of all time. Like new media innovators Antonio Vivaldi looked for a way to expand on something that was already thriving and succeeded in doing so. 

John Cage

John Cage is an American composer. He was born on September 5, 1212 in Los Angeles. Cage can be considered a new media innovator in the way he pushed the limits of his music and included indeterminacy, electroacoustic and non-standard use of musical instruments in it. He also was involved in the expansion of modern dance, mainly due to his wife Merce Cunningham. He also created a new sounding piano called the prepared piano. He altered the sounds coming out of the instrument by lacing objects in specific areas around. Because of his innovative ways and his ability to push the limits of what people know and get a positive reaction out of it i can see why John Cage can be regarded as a new media innovator. 

Summary on Whyndam’s “Working the Twitter-Sphere”

Origional:

The article “Working the Twittersphere” by Dawn R. Gilpin discusses how Twitter falls into the realm of social media and its relationship to professional online identity. Twitter differentiates itself from other social media sites such as Facebook and MySpace because of how open it is allowing any user to interact with whomever they wish. Professionals can use this platform to connect with social media users in order to create a network that can be used to gather information on how Twitter can be used effectively as a professional entity. As twitter continues to grow in popularity users will share more information and will interact with one another on a greater scale, professionally and personally. The people who use Twitter professionally can be easily examined in terms of how they interact with the public and how they are viewed. This enables people to see an individual’s professional capabilities openly. The line between personal and professional identities are blurred by this form of social media because of how connected both worlds are to the same person.

 

“Working the Twitter-sphere”

Is the summary covering the main points of the article?

Throughout Whyndam’s summary he manages to clearly explain the significant points of the article and convey them in a way thats easier for the viewer to understand.

What is missing and why?

Explains what Twitter is a little too broad, doesn’t go as far as explaining how it works. Almost assuming the reader is fully aware of how to work twitter. Also doesn’t include specific personalities that can be reached on twitter.

What could be removed and why?

Nothing really seems like it should be removed, if anything I would add the fact that you can never really know who’s on the other end of the account you’re trying to connect with and that it may not be the direct thoughts of the individual being portrayed from the account.

How well written is the summary?

The summary is incredibly well written. He uses easy terms to understand complex scenarios that where brought up in the original article. In doing this he really helps the reader grasp all the ideas and get a better understanding of the original piece. Also because all the important points were summarized the reader of his summary will feel content with the information they gathered.

Weekly Presentation- Web 3.0

Weekly Presentation

I chose to summarize Sam’s web 3.0 presentation. Sam’s presentation was incredibly informative and really made me grasp the idea of web 3.0 by communicating it in a simplistic way. He explained that our internet had undergone 3 transformations over the time it was invented to where its at now. It started with Web 1.0; a very simplistic version of the internet which had a white plain background with black text over i. It lacked ability for the user to interact with it and was written in early code. The second was Web 2.0 an internet were all familiar with today. It a more iterative customizable web that allows the user to fell more involved. Chances are you have been using web 2.0 your whole life. Last we have Web 3.0 which is the direction the internet is leaning towards now. Web 3.0 it’ll be more of the computer doing the work for you instead of how its usually been with you interacting with it. The computer will start taking info on all your interests and hobbies and display links and sites that appeal to you. Its exciting in the way our internet is progressing and it’ll be very interesting to see where we go from here.

Article Summary – The Twittersphere

I chose to read the article “Working the Twittersphere”. Throughout the article it discusses the ways in which twitter allows basically anyone to connect with friends, family, and colleagues, no matter how difficult that person is to get a hold of face to face. Location of who your communicating with is not an issue because Twitter allows you to instantly gather and send out information across the world. This is referred to as “micro blogging” or “tweeting”. Because of its simplicity and how easily one can connect with others thoughts, it has now  become one of the most popular forms of social networking in the world. Not only has twitter become one of the major forms of social networking it is also a tool for public relations as mentioned in the article it is used keep ties and relationships between partnering firms and potential business associates. Although this might be thought of as a useless tool and a waste of time, when used properly one can make great advances in their business endeavours and relationships.

Digital Identity

Digital Identity

 

My partner for this was Jesse Perez. While searching his name I found it very difficult to gather information on him seeing is that he shares the same name as a famous DJ. Of course the Dj would be a more popular search item then Jesse so i had to really dig in and go through every social media i found linked to his name and make sure it was the right Jesse Perez. Over my span of searching i found out many things about Jesse however no real media-based interests were shown. From his Facebook page I found that he Attended Greenwood College before Ryerson. He lives in Toronto and is of Jewish descent. He’s visited Turkey and Italy over the years and his favourite movies include: Scary movie, American pie, and hangover.

If i was an employer or teacher being told this information about Jesse would not alter or swing my thoughts on him in anyway, its all just simple facts about his life and beliefs. The only thing that stands out at me from a new media sense is that he took the time to enter his favourite movies. It shows that movies and media play a large role i his life and he’s passionate about them.

I found all my information from Jesse’s Facebook page, aside from that Jesse seems to have a lot of control over what goes on the internet surrounding his name

Participation

Participation

 

Participation all round is integral to take part in for anyone who wants to gain more knowledge on a certain subject. If you participate it will almost always benefit you, even if you’re wrong with your contribution you will be enlightened by either your peers or professor, making you learn something you never knew before. Even if your contribution is right usually when you’re in a group and raise a statement your group members will add to or clarify your statement only making everyone’s understanding better. This creates an environment where everyone feeds off each other’s idea and benefits all. This can only be accomplished if everyone is attentive and willing to put their two cents in.

 

Personally I find myself to be a fairly good participator. When a teacher is talking I always try to stay attentive and contribute when need be. Sure my body language isn’t the greatest but that doesn’t mean I’m not listening. I also feel that I work well in groups. I love hearing how everyone took the information given to us individually and always try to take something away from every group experience I’ve taken part in.

Time Management

Time Management

 

Time management is a very difficult subject for me to cover for the lone fact that I have no time management skills what so ever. To the point where I’m up till the next morning working on papers due within the hour. So on this note I’m going to provide you with some things to avoid in order to be as time productive as possible. If you’re like me and attached at the hip with your phone you’re better off leaving it in another room. Phones have this weird ability on teens that can almost drag them away from what there focusing on and drop them in this virtual world full of activities and entertainment. Another thing to stay away from would be distracting friends. Friends can talk for hours and can easily divert your attention away from what you’re focusing on. This will result in your task taking much longer than expected. Also be very conscientious about what your search online. One off topic search can lead to hours of mindless slaving on the internet looking up latest crazes. In the end time management comes down to self-control. If you have the ability to block out all tools that could distract you from completing your task in the least amount of time then you should have no problem at all being a smart time manager. 

Problem Solving

Problem Solving

 

When faced with the tedious task of having to problem solve its important to follow this step by step process to help overcome what’s troubling you. Step one, you have to pin point exactly what’s the problem. Identifying the problem is a must; you have to know what to get yourself mentally or physically ready for before you can overcome it. Next step would be to do your research and really try to get your head around all negative outcomes that could happen. Making sure to avoid those circumstances will make your problem solving go a lot smoother. Next, prepare for what goal you have set for yourself no matter what the length may be. This part could involve a little patience on your part but ultimately it will help you reach your outcome. Finally apply everything you have taught yourself in order to beat the task troubling you. Remember that failure happens to everyone and you can only learn from it thus making you a stronger individual. In the occurrence of failure try to repeat these steps over and use your frustration as added motivation to overcome the problem. Following this step by step guide will ensure you eventually overcoming any goal in life.