Tuesday, March 8, 2011

A Clearer View of How to Exploit Cloud Computing
Major: Computer Engineer

Reference: Alistair, R. (2011, Jan. 27). A Clearer View of How to Exploit Cloud Computing. Retrieved 05March 2011 from Engineerlive.Com:
http://www.engineerlive.com/Design-Engineer/Computer_Systems_Software/A_clearer_view_of_how_to_exploit_cloud_computing/23336/

Summary:

According to this article, as information technology companies show new ways to offer infrastructure to businesses, the term ‘cloud computing’ is becoming more common. The Internet is an accessible network of servers for data and information. However, the author shows that by 2012, “one-fifth of all companies will no longer own their IT”. The information business will increase its recognised IT by 60 percent. Any network is usually a connection between two or more computers. Cloud computing is a single server providing multiple services. “There are many virtual private servers on single physical servers at an internet service provider” Also, the article show that there are three types of cloud that connect between services and user. Infrastructure clouds referred, to as IaaS, they are where hardware resources or physical resources are. The data and storage clouds provide infrastructure on each application. Data and storage cloudsare short on this example, ” Amazon Simple Storage Service (Amazon S3)”. It is let you read, write and delete files from 1byte to 5terabyte each.Compute Cloudshave environments that include processing power. For example; Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable computer capacity in the cloud. It is designed to make web-scale computing easier for developers. Also, the author claim that software cloudsare single application made available as a service. In sum, cloud computing comes with problems but the newer technology is not without risk.


Reaction:
This article is inspiring and gives very important information that I will add to my computer dictionary. First, the number of objects you can store is unlimited because the numbers of Bytes equal 5 terabyte ×10244. It is a huge. Second, cloud computing describes computation, software, data access, and storage services that do not physical materials. The users can not see or work on it. That boils down to the fact: the cloud computing is working in background of the computers.
New Games Link Tech and Reality

Major: Computer Engineer

Reference: Devries, J. (2011, Mar. 04). New Games Link Tech and Reality. Wall street Journal. Retrieved 05 March 2011 from Online.WSJ.com:
http://online.wsj.com/article/SB10001424052748703300904576178421595916308.html

Summary:
The author claims that there are two companies that are experimenting with tools that mix technology and reality.She focuses in on researchers’ idea that adds new tools to help kids learn better computer games. The idea is how to allow children to move real objects to make something happen in a computer game. However, the article shows how the strategy that ties technology to the real world takes several years. There are powerful mobile games and computer games. Many researchers try to develop games that use augmented reality. “Dinosaur Train” series has been a popular game these days. Many children who are four or five children like it. Also, the author shows that reality games have several benefits. They keep children active and work in the real world without imagination. On the other hand, some games have a problem. They are specific to special ages. The author also shows “Socks Inc” did public online version of the game in April and the children liked it.
Reaction:
This article is very interesting, because It focuses in on the children’s hopes. Really these days the children do not have free time to play outside their home because their parents are working outside. Now they can see the world from computer games. The researchers came up with a great idea when they developed regular games into games similar to the real world. Actually, I like computer games. I played “Dinosaur Train”. It was interesting because I learned new words and it was like reality. Indeed, the parents should organize their children’s computer games time. In my opinion, 3 hours in the vacation and 1 hour in the studying is a great plan to play computer games.
Have We Lost Our Children to Technology?

Major: Computer Engineer

Reference: Daniels, T. (2011, Jan. 03). Have We Lost Our Children to Technology? Retrieved 04 March 2011 from openpr.com:http://www.openpr.com/news/164975/Have-We-Lost-Our-Children-To-Technology.html.




Summary:
The article shows that technology (DVD’s, computers game, cell phones and TV shows) has become a way of life for most young people. The parents’ role is to watch their children. However, the author claimes that our children are losing touch with the core values of their parents and grandparents. Bedtime stories and music and sound effects help children cope with growing up. Also, she explains that these days most parents are working outside the home.Then, grandparents are free to rear grandkids.This article also shows that Creative Children Magazine gave the series the 2010 CD of the Year award.


Reaction:


This article is interesting because it focuses in on the important topic,” We Lost Our Children to Technology”, that affects our children. Although we knew technology has many benefits, it has many harm at the same time. This article reminds me of my uncle’s son. He is four years old. He always watches TV. The TV affects him. However, he eats, plays, sleeps, talks and speaks like what he watches. So, the author came up with great idea when she looked children programs to reinforce the relationship between the children and their parents. In my opinion, it is parent’s role to save their children from technology. Their children need to talk with them. They need to learn their parent’s behavior not Tome and Jerri’s behavior.