Chuyển đến nội dung chính

Bài đăng

Đang hiển thị bài đăng từ Tháng 3, 2019

We had a BABY!!! HERE IS WHAT YOU NEED TO DO WHILE I AM OUT>

I ntroducing HUDSON DEAN  (sorry if you were rooting for Wesley). I am guessing that you know what my 30 photos are going to be of.  Here is what I need you to do while I am out this week changing poopy diapers: 1.  Finish up your icons from before break: Make icons using adobe illustrator (we started this before break)  Place your photographs that you edited from the abstract photo shoot we did back in March into your new illustrator document. Add your icons on photographs to the slide in your VAT Portfolio. Your slide may look like this when you are done:   2.  Get credit for the 30 photographs that you took over the break:  Take a screenshot of your camera roll on your phone.  Get the screenshot into your VAT portfolio in the slide called photography 102.  your slide may look like this when your done. 3. Edit 3 of your photographs: Use Photoshop to enhance 3 of your photographs in some way.  Post your 3 edited photos next to the 3 originals in your portfolio on the slide called phot

Georgia man pleads guilty to hacking apple accounts of professional athletes and musicians

ATLANTA - Kwamaine Jerell Ford has pleaded guilty to logging into Apple accounts belonging to high-profile professional athletes and musicians without authorization and stealing credit card information from several of those victims. “Ford tricked his victims into providing their Apple account passwords and stole sensitive, personal information from the accounts,” said U.S. Attorney Byung J. “BJay” Pak. “After stealing credit card numbers belonging to several professional athletes, he brazenly spent thousands of dollars on personal expenses charged to the athletes’ accounts.” “The high profile victims in this case are an example that no matter who you are, hackers like Ford are trying to get your personal information,” said Chris Hacker Special Agent in Charge of FBI Atlanta. “This case demonstrates the need to be careful in protecting personal information and passwords, especially in response to suspicious e-mails. Hopefully this is a lesson for everyone, not just the victims in this c

Episode 222 - Formative Assessment End of Semester Projects

03/28/2019 It’s Friday, March 28th, 2019 and welcome to Episode 222 of TechTalk4Teachers, I’m Tom Grissom and I'm Brian Poulter. Welcome to TechTalk4Teachers the show about teaching and learning with technology .  In this episode Brian and I discuss the approaching end of the semester and what we can do as teachers to help students finish strong. We also have a Technology Pick of the Week and several recommendations for podcast listeners. Your browser does not support the audio element. Right-click here  to download. Show Notes: eiu.edu/itc ITC Techshare YouTube Channel ITC Chronicles Blog Snap Seed Technology Picks of th e Week Tom's Tech (Podcasts) Picks of the Week EIU Innovate - Breaking Babe Ruth Dark Side of the Earth   Hidden Brain Podcast NPR RadioLab Podcast Brian's Tech Pick of the Week Purple Air Sensors That wraps it up for Episode 222 of TechTalk4Teachers . For show notes please visit eiu.edu/itc and click on the TechTalk4Teachers link. Until next time, this

Machine learning Curve fitting using MATLAB

here is the code for the data set we have taken. >> clear; close all; Tx = [80: -20: -340]; alphay=[6.47  6.36 6.24 6.12 6.00 5.86 5.72 5.58 5.43 5.28 5.09 4.91 4.72 4.52 4.30 4.08 3.83 3.58 3.33 3.07 2.76 2.45]; alphay=1.e-6*alphay; plot(Tx,alphay,'bo'); title('Thermal expansion cofficient of steel'); ylabel('cofficient\alpha'); xlabel('temperature(in F)'); >> coef1=polyfit(Tx,alphay,1) coef1 =    1.0e-05 *     0.0009    0.6025 >> coef1=polyfit(Tx,alphay,2) coef1 =    1.0e-05 *    -0.0000    0.0006    0.6015 >> coef1=polyfit(Tx,alphay,3) coef1 =    1.0e-05 *     0.0000   -0.0000    0.0006    0.5998 >> pred1=polyval(coef1,Tx); >> pred2=polyval(coef2,Tx); Undefined function or variable 'coef2'. Did you mean: >> coef1=polyfit(Tx,alphay,1) coef1 =    1.0e-05 *     0.0009    0.6025 >> coef2=polyfit(Tx,alphay,2) coef2 =    1.0e-05 *    -0.0000    0.0006    0.6015 >> coef3=polyfit(Tx,alphay,3) coef3

Computer Networks all chapter Notebook From the book> Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,

Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,  Click and Download PPTs Sr. No. Chapter Name Overview 1 Introduction 2 Network Models Physical Layer and Media 3 Data and Signals 4 Digital Transmission 5 Analog Transmission 6 Bandwidth Utilization: Multiplexing and Spreading 7 Transmission Media 8 Switching 9 Using Telephone and Cable Networks for Data Transmission Data Link Layer 10 Error Detection and Correction 11 Data Link Control 12 Multiple Access 13 Wired LANs: Ethernet 14 Wireless LANs 15 Connecting LANs, Backbone Networks, and Virtual LANs 16 Wireless WANs: Cellular Telephone and Satellite Networks 17 SONETISDH 18 Virtual-Circuit Nenvorks: Frame Relay and ATM Network Layer 19 Network Layer: Logical Addressing 20 Network Layer: Internet Protocol 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 22 Network Layer: Delivery, Forwarding, and Routing Transport Layer 23 Process-to-Process Delivery: UDP, TCP, and SCTP 24 Conges

Criminal Justice Technology in the News

Law Enforcement News Body Cameras for Norwich Police ‘Good for Everybody' The Bulletin, (03/19/2019), John Barry The police department in Norwich, Conn., will be getting 80 body-worn cameras and 25 dashboard-mounted cameras for the department's cruisers. The move comes a few months before a state program offering a 50 percent reimbursement of the estimated $300,000 cost for the equipment expires on June 30. Link to Article 911 Dispatch System to Shift to the Cloud in Lafayette, La. Government Technology, (03/20/2019), Katie Gagliano for The Advocate/Baton Rouge The Lafayette Parish Communication District, which handles emergency calls for the parish's first responders, says it is transitioning to a more flexible, cloud-based computer-aided dispatch system. The current system is server-based. The new system will be accessible anywhere there's Internet access. Link to Article New Tool Lets People Submit Anonymous Online Feedback for Austin Police CBS Austin, (03/19