53 Cards in this Set
Front | Back |
---|---|
The hole in the wall?
|
Telecommunications company that put a computer with internet in the ghetto and kids started to play on it. “that which you can do anything”
|
MOOC?
|
Massive open online courses
|
Gamification?
|
integrating game dynamics into your site, service, community, contact or campaign, in order to drive participation. i.e. foursquare (when you check in you earn points)
|
Showrooming?
|
retail stores start to suffer because costumers are in the store but see the lower price online, so they buy it online.
|
SOPA?
|
(stop online piracy act)- protect your online rights
Protesting SOPA with blackout day
|
Second Screen?
|
is a term that refers to an additional electronic device that allows a consumer to interact with content they are consuming, such as TV, movies, music, or video games. Extra data is displayed on a portable device synchronized with content being viewed on television. (i.e. get glue)
|
Social TV?
|
the use of technologies that allow a viewer to: discover, interact, socialize, search share and purchase around content they are watching, synced in real time, with a second screen, like a laptop, tablet, game console, smart phone. (i.e. get this)
|
Big Data?
|
Everything is big data. At the end of the day everything is big data.
|
Klout?
|
measures overall influence on a scale of 1-100
-True reach: size of engaged audience(followers) -Amplification: likelihood of generating actions
-Network: how influential your audience is
|
Twitter?
|
-Recruiting
This is the technology du jour
-Promote the brand
Marketing/PR
-Customer Service
Engage
Early warnings of issues
-Listen and Learn
|
Instagram?
|
-Use “hashtags” to insert your product into almost everything.
- Free Advertising
-Drive traffic with compelling images
-Tell a story through images
-Have costumers take photos with your product or service
|
Facebook?
|
- Set up events, and invite your target audience
-Facebook has a more engaging tool than Twitter with businesses
-Background check Facebook
-Able to target your audience just by being able to see who views your pages.
-Analytics
-Add Interactive content (polls)
|
Location based services?
|
"Foursquare"
Push specials to people "nearby"
|
Social Media marketing?
|
-Facebook has an algorithm
-When you post something, Facebook decides who sees what you just posted.
-Ads. On Facebook tailor to what you search on Google or what online shopping you where just looking at.
|
Google Alerts?
|
put in your own name or anything you want to be alerted about. You'll be alerted when someone tweets about you or searches you on google.
|
Privacy tips?
|
-Assume that nothing is private on the web.
-Always monitor your
privacy settings.
-Never discuss private or intimate thoughts on social media.
|
Howard Akien?
|
Harvard professor made the Mark 1.
|
Mark 1?
|
First electromechanical computer created for the U.S. Air Force.
|
305 RAMC?
|
IBM Supercomputer.
5mb of storage. Could fit one song
|
Google Glasses?
|
Everything in a phone available in front of your eye.
|
3D printing?
|
able to print any object. It creates the object layer by layer.
|
Moore's Law?
|
- observation made in 1965 that the number of transistors on an integrated circuit will double every 24 months and cost per transistor decreases.
-That means the best computer out there should stay the same price, but the idea is that every couple years the computers are getting faster b…
|
PC?
|
Two popular architectures are the windows PC and the Apple..
Any laptop is a personal computer
|
Server?
|
o A server controls access to the hardware, software, and other resources on a network.
o A higher network speed to be able to handle the traffic.
o Examples: Web servers, mail servers, file servers, etc…
|
Mainframes?
|
o A mainframe is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
o Mainframes process more than 83% of bank transactions around the world
|
Supercomputer?
|
o A supercomputer is the fastest, most powerful computer
o Fastest supercomputers are capable of processing more than one quadrillion instructions in a single second.
- IBM has a supercomputer
- NSA has a supercomputer analyzing data worldwide
|
Mobile?
|
Anything from I-pads to I-phones.
|
Green Computing?
|
-Recycle
-Virtualization
-Cloud Computing
|
Virtualization?
|
o Buy one computer that is more powerful but use it for multiple purposes
o Everyone can have an entirely different operating system on one computer.
o Idea: sharing resources but sharing virtual space
Instead of using 20 computers for a company get one computer and have diffe…
|
Cloud Computing?
|
o Basically just the internet
o Ex. Gmail in the cloud able to use all their services online like docs and PowerPoint.
|
PaaS?
|
-You manage: applications and Data
-They Manage: runtime, middleware, o/s, Virtualization, servers, storage, and networking
|
IaaS?
|
-You manage: applications, data, runtime, middleware, o/s
-They Manage: Virtualization, servers, storage, and networking
|
SaaS?
|
-You Manage: Nothing
-They manage: applications, data, runtime, middleware, o/s, virtualization, servers, storage, and networking
|
Amazon EC2 and S3?
|
-Amazon s3 – simple storage service (SaaS)
-Amazon EC2 – Elastic compute cloud (IaaS or Paas)
|
Advantages and Disadvantages cloud computing?
|
-Low Cost – pay as your go
-Instant Elasticity – instantly deploy your application
-Open and Flexible – If it runs in a data center. You have full control.
-Secure – totally secure network.
-Downside: you need to be connected to the internet. Automatic upgrade, you may not like …
|
Operator precedence?
|
What to evaluate first.
|
Formulas v.s. Functions?
|
Formula - Allow you to create instructions using mathematical expressions and commands.
Functions - Excel has built in functions to calculate or you can create your own.
|
Conditional Formatting?
|
Allows you to set rules for cell formatting.
|
Pivot Tables?
|
Enables someone to quickly and easily summarize and analyze large amounts of data.
|
Spark lines?
|
a tiny chart in a worksheet cell that provides a visual representation of data.
|
Delimited Files?
|
-Separating the values in each row with a specific character
-Most spreadsheet or database applications are able to import or export (read/save) data in a delimited format.
|
Alternatives to Excel?
|
-Google Docs.
-Zoho
|
Digital Images?
|
Pixel-Just a dot on a screen. How many pixel’s on your screen depend on your resolution of your computer.
Hue-The color type (red, blue, yellow, light blue, etc.) Uses HSB Model
Saturation- Intensity of the specific color. Uses HSB Model.
Brightness- More light or More dark. Uses…
|
HSB Model?
|
Hue, Saturation, and Brightness.
|
RGB v.s. CMYK?
|
-Red, Blue, Green (RGB)
(primary colors, additive colors)
-Cyan, Magenta, yellow, Black (CMYK)
(secondary colors, subtractive color)
|
Hexadecimal color?
|
Six Digit, three-byte Hexadecimal number used in HTML and CSS color range is from 0 BLACK to F WHITE
16.7 million color
|
Hexadecimal Color to RGB Conversion?
|
-take the first value and multiply it by 16.
-Then add the second value
|
Stenography?
|
Hides a message inside something else, thereby making the message non-obvious.
|
Cryptography?
|
Bases on mathematics
Methods for transforming information in order to hid its content
uses "keys" = A key is a piece of information used in scrambling process.
|
Symmetric vs. Asymmetric Keys?
|
Symmetric Key – Using the same key to encrypt and same key to decrypt. Advantage: speed(faster to decrypt). Disadvantage: Not as secure.
Asymmetric Key – Uses one key to encrypt and using a key pair to decrypt. Advantage: More secure. Disadvantage: Slower(takes more time to decrypt)
|
Kryptos?
|
Sculpture in the CSI headquarters using all of the cryptography methods into one sculpture. No one has yet to crack the sculpture.
|
Encryption/Decryption?
|
-Encrypting: scrambling up some information so it is not readable until decrypted
-Decrypting: unscrambling information to restore it to its original form
|
Cypher text vs. clear text?
|
Clear text (text that is not encrypted, your starting factor)
Cypher Text (the text after you have encrypted it)
|