Wednesday, September 30, 2009

Day 11

1. When Steve Jobs quoted Picasso I believe that he meant artists who are great pay attention to every detail and competitor around them and from there steal the ideas that are successful and make it there own but disguise it. Stealing is an art form in itself. Copying something that anyone who has been shown the product can do. Also copying means to take what you see and make a product exactly like it. Also when stealing the person you take from doesn't always realize it has happened. In this case it is difficult to say who stole and who copied because the one who showed more promise and a more updated computer did not succeed.

2. Apple Computers Inc suited Microsoft Corporations battled in a copyright infringement lawsuit which lasted over 4 years. Apple believed that Microsoft should not be able to use GUI (graphical user interface) which were very similar applications that they had on one of their computers (The Lisa). Apple did not get the success they were hoping for because the courts said that they were using un licensed GUIs that had already been developed by Xerox.

3. In this case I think that it is difficult to say who stole and who copied because the one who showed more promise and a more updated computer did not succeed. However, since Jobs is the one who made the statement it is easy to believe that he meant it that Apple is the one who steals and IBM are the ones who copy. I am just taking a guess considering the way he spoke about competitors.
4. Didn't get a chance to finish...
http://en.wikipedia.org/wiki/Operating_system

Wednesday, September 23, 2009

Day 7 Second Lab

Be Sure to drink your Ovaltine.

We used the table in the book to begin and from their we moved to an online translator. Translating every 8 bite strands at a time and the 6 zeros represended spaces in the sentence. Each character is stored a 1 byte of data. IBM computers and operating systems use the ASCII (American Standard Code for Information Interchange) however, larger computers usually use EBCDIC ( Extended Binary Coded decimal Interchange Code).

Day 7

When looking at the punch card another way that we thought of to read it could be. The first rows X (12) and Y (11) and and the tenth row each having a different portion of the alphabet. X being the letters A through J, Y being K through T and the tenth row being U through Z. To figure out the word lets take the word BOOK for example. Go over to the first punch on row X, which would be punched and drag your finger down the column to the next punched number that would represent the order of the in which the letters go, giving you a word. So B O O K would be punched at the top of the row and the numbers 1 - 9 would represent the order, spelling out the word. (Hopefully I wrote this so that is it understandable. It is easier to explain but difficult to write.)

Monday, September 21, 2009

Day 6: Reading a punch card

When reading a punch card the first thing that you need to do is go down the rows and write down the numbers that are punched. The numbers 1 - 9 are known as digital portions. The top part of the card that does not have any numbers is called the zone portion of the card. These are numbered 12, 11, 10 (or 0). Each punched number represents a letter in the alphabet. For instance if you have a card that is punched 6 then you would need to go over six and down six in order to find out the letter, which in this case would be F. Sometimes there will be rows that are not in use. The punch cards make it possible to store 80 characters per punch card and they are used in order to store large amounts of data. Also it is possible for the punches to represent numbers. If the top of the card is punched and so is the digital portion than it is gareenteed to be a letter in the alphabet. However, if it is only punched in the bottom portion of the card then it will be a number.
This process takes patients and is not very easy the first time. I am still a little confused on every exact detail of how to read it but I believe I am very close. The website link below is where I found most of my information, which will help to better explain reading a chart.

http://www.colostate.edu/Services/ACNS/swmanuals/sasdoc/sashtml/lrcon/z0695224.htm

Wednesday, September 16, 2009

Day 5

Reverse Engineering:

Reverse engineering is when a person or company takes a product that has been designed by a competing company and takes it apart, in order to break down exactly what the product is and how it works. This makes it possible for the company to build their own product using the exact same steps and design as the competing company but just to change a little something about it so that it is not necessarily stealing their product. A really simple example of this would be to try an amazing dish. Take the recipe from the person study the food and see what is inside and go home and make it but adding one extra spice so technically you are not stealing the cheif's master piece.

Reverse engineering is techincally legal because yes they are similar but their is something on the new product that makes them different and you used people that knew nothing about the first product. That is if you strip it down to the law exactly but in my opinion it is not legal. In no way shape, or form did the company come up with this product, they robbed the inventors and giving them no credit! That is like taking a song from an artist and changing the chorus and changing the beat here and there and calling it your own. That is not morally right or legal because the artist owns right to that song.

Monday, September 7, 2009

Day Two Hardware

After today's talk the one question that I am very curious about it what is the difference between a laptop versus the main computers? How does the techonology differ? Does the fact that it is portible mean that it is wired differently?

Wednesday, September 2, 2009

3 Stereotypes

The three stereotypes:

The first was that all of the nerds were men and that the women could have cared less about the growth of computers. The second was that the nerds seem to be loaners and spent all of their time working on the codes rather than having a social life. They were anti-social and they looked very weak. Also all of the men were white. Another stereotype was that all the men had glasses and most had beards and were very scruffy looking. They spent their lives hyped up on caffeine because they didn't want to stop their work. Lots of left overs and they slept in their offices, only associated with other "nerds."
Still today many nerds keep to themselves and only hang out with people who have their same dedication and drive. Also they keep themselves shut away just like they did in the earlier years of the computer. The only few differences I see from then to now is that their are more women in the field and that the men do not have the beards like I saw in the movies. Nerds today still have the anti-social side to them.
If I had to make a movie dealing with computer enthusiasts, I don't think I would change to many things. Adding women into the field and showing the new technology that the nerds had to work with are the two biggest. Also I think that the way the offices are set up now is alittle different and the information the nerds use would probably be on the computer rather than on thousands of sheets of paper because in today's world computers have come so far and so many computer people use very little paper, it's all on computers.

First Post

My name is Carolyn Schaeffer. I am from Wilmington, North Carolina and I am a sophomore. I am majoring in undecided business administration and I chose this class because I would like to learn a little more about computers. My main interest is horse back riding.