Thursday, March 17, 2016

The Five Most Innovative Thinkers in the Past 100 Years

The Five Most Innovative Thinkers in the Past 100 Years
 Thomas Edison - The inventor of many things we use today, such as a light bulb.
 Steve Jobs - Innovator and producer of the Apple company.
 Nikola Tesla - Developed the AC electricity delivery system.
 Bill Gates - Founded and built Microsoft.
 Benjamin Franklin - Founding father of the United States of America. 

Yesterday
Yesterday we learned the definition of innovate and we voted on playing hide and seek with a twist. Once a person was found, they were asked an intelligent question.
The takeaway message is that by changing your daily routine, it makes learning more enjoyable and memorable. 

Process of Innovation
The process of innovation is to develop or change something, inventing a new way of doing things. Here are the steps that go into the process of innovation.
Innovation Intent:

  • Workshop, strategy and combination of methods.
  • Focus
  • Explore your options and ideas, be open minded.
  • Select your main purposes.
  • Design and create.
  • Put your model into action.
  • Assess.
  • Put your model out there.
  • Re-focus, stay on track.

Inventors often make something that has never been used or seen before. They use innovative thinking.
You don't just wake up and create something completely different. It takes a lot of time and effort to expand your ideas and make the perfect product. People put a lot of hard work into innovation. It requires a lot of focus and skill.

I think the idea of normal needs to change. Adapt to differences. I would recommend creative thinking to people who feel the need to have change in their lives. 

Friday, March 11, 2016

How to fix a broken school? Lead fearlessly, love hard. TED Talk: Friday


Linda Cliatt-Wayman:
How to fix a broken school? Lead fearlessly, love hard
Linda talks about the first time she had walked into a high school as principal and a huge fight broke out among two girls. After things were under control, she immediately called a meeting to introduce herself to the school as the new principal. She made sure and listed her expectations for their behavior and what they would learn in school. She felt the school was low-performing and dangerous. Upon entering her third year as principal, she realized how old the school building was. She noticed classrooms were nearly empty. Students were scared.
Her slogans are “If you are going to lead, LEAD.” She reset every lock combination, fixed the lightbulbs, put up colorful and bright positives messages on the walls, and removed the chains from the doors. They rebuilt the schedule times to add honor classes and elective activities. They devised a school wide disciplinary system.

What did the student Ashley say in the auditorium?
What did Linda see upon her first arrival at the school?
How long was Strawberry Mansion on the dangerous school list?
How many years as principal did Linda serve until major changes were done to the school?
Why was there chains on the door?
What’s one of Linda’s famous slogans?
Was Strawberry Mansion removed off the list?
Why did the teachers feel scared?
What sort of laws were broken within school boundaries?

What was put up on the walls of the school to promote positivity? 

Monday, March 7, 2016

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?- TED TALK on Technology

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

As technology developed, common password requirements were amped up in order to maintain security within the websites that contain a password log ins. The guidelines to be followed is that there should be eight or more letters, one uppercase and one lowercase, a character, and no words found in the dictionary. This ensured a lower percentage of people getting their account hacked or messed with.
She passed around a survey to people on the campus to get their opinions on the new password policy, and sure enough 470 surveys stated that many thought the policy is annoying, and others felt more secure with their new passwords.
Many people aren’t using the variety of symbols on the keyboard, they’re sticking to “!”. Formerly, the password policy was called “Basic8”, meaning your password only required eight characters. Smart attackers can break into accounts if you choose a basic password that’s commonly used.

Questions
  1. Do you understand why passwords are required to be more complex?
  2. What does “Basic8” mean?
  3. Why were passwords so accessible to hackers before the password policy change?
  4. Do you prefer the old password policy? Why or why not?
  5. Why can’t there be less than eight characters?
  6. Why was the new policy created?
  7. Why do people write down their passwords?
  8. How do people feel about the password policy?
  9. What was the purpose of the survey?
  10. Do you think that this new policy will spread beyond this one particular website?

Wednesday, January 20, 2016

Networking Numbers

Facebook: 116 Friends
The main purpose of Facebook is "to give people the power to share and make the world more open and connected." It allows people to connect with their family and friends easily.

Twitter: 0 Followers
Twitter enables you to post updates on what you're doing. Like Facebook, you can connect with friends and share posts, called "retweets".

Instagram: 315 Followers
You can upload videos, photos and gifs onto this photo-sharing network. You can view other people's pictures and like them. 

Snapchat: 12,994 
What's unique about this application is that you can send photos and videos and they will disappear in seconds. 

We Heart It: 20 Hearts
You can create collections of your favorite images, save them, post them, and heart other people's posts.

Tuesday, January 19, 2016

Dream Act

FACT:Children who were born in the United States but parents' are illegal immigrants will have a chance to gain permanent legal residency in America under the terms that they attend college or join the U.S. military. 
OPINION:They would have to get involved with programs that the government has set up in order to even be eligible. In a way I see this as a fair, somewhat easy way to become legal but at the same time, college can be expensive and there's no way you can sign up for scholarships if  you are not legal in the states. Also, finding work to pay off college can also be a struggle.

Tuesday, January 12, 2016

Decisions About Social Issues

Child Abuse:
I feel that if a parent knows in their heart that they're not equipped to have children, whether it be biological or adopted kids, they should abide by their gut feeling and NOT raise children. Taking out all their frustration on their children is completely unfair. 45% of kids that undergo abuse are under the age of 5. Little do they know they're scarring their children for the rest of their lives or the children develop the same abusive habits once they get older. 

Texting While Driving:
Approximately 600,000 people attempt to use their cellular device behind the wheel every day. Texting and driving leads to 1.6 million deaths in car crashes every year. This doesn't seem to stop people from the temptation. I feel as though their should be a law against using your phone at all when you're behind the wheel and driving. 

Stereotyping:
Stereotypes are untrue or partially true exaggerated assumptions that people make about other people's statuses, behaviors, desires and lifestyles. Racial stereotyping is common among the internet today. In fact, many vine superstars make a living by making fun of their own race and the stereotypical things that person's race does. Not only is this discriminating, but it is very offensive. A mockery is made out of things very much valued to other religions, races, sexual orientations, etc. Stereotyping can also be used as a form of bullying. 

Thursday, January 7, 2016

Virusescomputer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Phishingthe activity of defrauding an online account holder of financial information by posing as a legitimate company.

E-mailmessages distributed by electronic means from one computer user to one or more recipients via a network.

Social engineering the application of sociological principles to specific social problems.

SpoofingA technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

Identity Theftthe illegal use of someone else's personal information 

Spamming Unsolicited, undesired e-mail.