Research+Srapbook

**Research Scrapbook Advanced Computer**

**Shopping**
 * __Computer__**

ASUS Eee PC 900 16G $339.99 [|amazon]

**__Software__**

[|Adobe Illustrator CS24]

Adobe Photoshop CS4 $699.00 [|Adobe Store]

Video editing $29.99 [|Bhphotovideo]

Adobe Photoshop CS4 $699.00 [|Adobe Store] Microsoft Office Mac Home Student 08 Eng $129.99 [|OfficeMax]

Electronic tools __**
 * __

Apple iPod classic 120 GB $224.95 [|Amazon]

Canon Digital Camera $169.94 [|Amazon]

Blackberry $319.99

[|amazon]

Macally ICECAM2 USB 2.0 Video Web Camera $23.00 [|amazon]

ASUS MyPal A626 $252.00 [|google products]

Garmin nüvi 760 4.3-Inch Widescreen Bluetooth Portable GPS Automobile Navigator $219.20 [|amazon]

=Aiptek A-HD 720p 8 MP CMOS High-Definition Camcorder (Black)= $79.99 [|amazon]



Blue Eyeball USB Microphone with Webcam
$99.99 [|Musician' Friends]

__Storage media__

1 DVD $8.49 [|amazon]

16GB $29.99 [|supermediastore]

= Toshiba 500 GB External **hard drive** - 480 Mbps = =$85.00= [|Google products]


 * Article Review**

=**More Employers Use Social Networks to Check Out Applicants**=

A new study conducted by Harris Interactive for CareerBuilder.com shows, that 45 percent of employers questioned are using social networks to screen job candidates. The consequence is, that 35 percent of 2,667 managers and human resource workers didn't offer a job to a candidate because of their social networking site. Most of these employers check their job candidates at Facebook, LinkedIn and Myspace out and they said, that provocative photos were the biggest factor contributing to a decision not to hire a potential employee.

44 percent of employers pinpointed references to drinking and drug use as red flag. You have to be careful at Facebook, because it's difficult to know what constitutes alarming behavior to a particular employer. It is adviced to use the new privacy setting offered by Facebook to keep everything as private as possible.

Wortham, Jenna (August 20, 2009). Nytimes.com. Retrieved September 2, 2009, from More Employers Use Social Networks to Check Out Applicants Web site: http://bits.blogs.nytimes.com/2009/08/20/more-employers-use-social-networks-to-check-out-applicants/?emc=eta1

= =

**How to prevent tech sabotage**
A lot of companies are attacked by ex-employees. They can without even entering the company’s headquarter cause a chaos and disrupt a company’s IT infrastructure and data. Those hackers often use their old employees login, after they got fired to destroy the company’s data. One ex-employee of Wand Corporation for example got access to Wand’s computer system this way. He uploaded malicious files, that corrupted a restaurants computer’s operating system, to about 1,000 of company’s restaurant management systems across the country.

To avoid things like that, companies should immediately delete all passwords access for ex-employees and have all remaining employees change their password. There should be different people who have access to the different things so that not just one single person has access to everything. There are also softwares for companies to protect their systems. If an employee discovers what appears to be a logic bomb you should contact the FBI right away.

=Your Own Worst Enemy=

The Web 2.0 security is pretty weak, especially from social platforms like Facebook or Twitter. They both had serious problems in the past, because their developers aren't security experts and just thought of features instead of the security of the software. Though developers get software security training, it doesn't help, because they don't remember the importing things about security. For example the ability to log in with a password is a feature, but they didn't think about making sure that the users are selecting strong passwords, and don't have the same password everywhere.

A result of this is, that it is commong, that a lot of peolple get hacked and the hacker post fake posts or even hacked into the accounts of Twitter emploeyees. Problems like this are'nt neccessary and can be avoided. This is why software platforms like Twitter need a better security. But in the end, the user itself has to do something about his security, because there will always be bad guys that capitalize on the people's trust to hack into accounts or things like that, even if the sucurity is better. [] Viega, J. Your Own Worst Enemy. Computerworld (Framingham, Mass.) v. 43 no. 31 (October 19 2009) p. 42

=Advantages of Windows 7=

Windows 7 supports many of the features available in Windows Vist, but it has a lot of new advantages like improved speed and lees amount of RAM. It uses Ram more effectively and uses less space on the RAM for its GUI features. But Windows 7 has a lot more advantages than this.It has an improved interface bye using the concept of jumplists, to organize recently used files as well as webpages. It also improved the taskbar; the system has now and interactive taskbar that allows you to align the objects on the taskbar of your own accord and with more functionalities. The three new features Aero Shake, Aero Peek and Snap provide very simple ways to get yourself out of clutter on your deskop.

Another advantage of Windows 7 is the media sharing, because it provides much better enhancements and drag and drop features and TV turner cards can be used much easier. Home networking also got easier, the interface for connecting the machines to a home network has been made much more lively and easy to use.Some of the improved accessories of Windows 7 are a new calculator with new features and a new look, a better looking Wordpad, Speecj recognition, that makes browsing thouch websites and sending a mail a simple task and Paint with more features.

http://www.buzzle.com/articles/advantages-of-windows-7.html

=Online Collaboration - Using the Web to Work Smarter=

Office and productivity tools are really helpful nowadays. You don't have to install them, but they still have similar features like the installed software. Some online collaboration tools also offer integration with installed software tools. Other benefits of those web tools are, that they are cost saving and the ability to share and collaborate with others. This is really helpful for example for teams that are not working at the same place or employees who travel. It helps them to collaborate inside and outside their firewalls and across geographic boundaries, and it is secure, too.

Another advantage is that it leads to better and faster customer service because it helps bridge the gap with client extranets. It is essential between business partners, consultants, and distribution companies. A lot of partner teams have increased pressure to accelerate timelines and reduce cost.

http://www.goarticles.com/cgi-bin/showa.cgi?C=2308173

**Young Adult Literature 2.0**
Web 2.0 offers writers and readers a great opportunity to connect. This is helpful for authors to communicate especially with teens. According to statistics 70% of teens use social networking sites like Twitter or Facebook. With the help of those sited readers are able to tell the author how he likes the book right after he read it and to ask them whatever else they want to know. Authors also use social networks to connect with other authors, booksellers and all kind of people that are working in their business.

They also can share music playlists that may relate to a book or upcoming events, photos an, and book information. Authors also use YouTube to promote books, new releases, and authors. This shows that technology isnt a competition to the printed text, but it offers young people a better opportunity to interact with their favorite authors.

Hamilton, B. (2009). Young Adult Literature 2.0. //Library Media Connection//, //28//(3), 14-15. Retrieved February 10, 2010, from OmniFile Full Text Select database.

Protect Your Privacy on Facebook and Twitter
There are a lot of dangers when you are using social networking sites like Facebook and Twitter. It is important to be aware of those dangers and to be careful using social networks. You should think twice about, what you are posting somewhere, because it may be pulled up again later somewhere in you life or the wrong person could read it. It can happen easily that your boss is reading your post when you are saying something bad about your job. When you try to take a quiz on Facebook, it warns you that you are continuing will open access to information from your profile. Canada's Privacy Commissioner is unhappy with Facebook, because Photos might be still available long after a user deleted his account. User also have to be aware of hijacking, people who hack into strangers accounts to ask their friends for money.

Bradley, Tony. "Protect Your Privacy on Facebook and Twitter." //PC World// 27.12 (2009): 110-12. //OmniFile Full Text Select//. Web. 12 Feb. 2010.

Multilingual Mobil Messenger
Geneva Software Technologies in Bangalore, India has developed a new software for disaster warning. It translates English text messages into multiple languages and send it to the whole world to warn people against disasters.

With the help of this software, there could have been thousands of people from the Indian Ocean tsunami of 2004 saved. Any cellular phone or mobile deice in the world, would receive a text messages in right language. Also, language characters are transmitted as pictures, which almost any phone can render on-screen. This new technology could make a big difference in disaster alerting.

Mudur, Ganapati. "Multilingual Mobile Messenger." // Technology Review (Cambridge, Mass.: 1998)// 109.3 (2006): 16. //OmniFile Full Text Select//. Web. 12 Feb. 2010.

Outsmart the Internet Hackers
Nowadays there are a lot wireless internet accesses that are easily accessible. This is why it is so easy for hackers to set up a network as a trap. You should not join a network before you check the name and know where it is from. It is also not save to send passwords or credit card info over public Wi-Fi. If there is an error message that tells you the site's certificate is being expired or invalid you should not use that Wo-Fi hotspot, because it might be infiltrated. It is also important for internet users to delete previous network searches and secure your folders to keep private folders protected. Because of all those dangers it is the safest do buy your own network and to keep antivirus and antispy ware programs updated.

"Outsmart the Internet Hackers ." //Men's Health// 24.9 (2009): 58. //OmniFile Full Text Select//. Web. 8 Mar. 2010.

Optimize your website for mobile users
Nowadays everybody is mobile and able to access the internet from everywhere with phones. But there are some problems, first of all the small screen size of phones and that most websites are not optimized for cell phone viewing. For this reason there are more and more websites that are designed for mobile visions. To make a mobile vision of your own website you have to consider who your audience is. You should only mobilize parts of the website instead of the whole site. It is recommended to start with simple projects that simply reuse current material.

ennedy, Dennis. "Mobilization." //American Bar Association Journal// 95.12 (2009): 30. //OmniFile Full Text Select//. Web. 9 Mar. 2010.

Online Learning Communities / Learning Management Systems
Nowadays you don't have to go to a class room anymore to learn something. There are online learning communities, places where you can learn and communicate with other people with the help of instant messaging, collaboration, social networking and blogs. At the start, LMS were web-based products that could be used for the development of online courses. These courses included video and other available media; these communications pathways were used by a teacher or professor to guide student study, receive assignments, assess progress, and more. There are different learning management systems (LMS), the prices for those products caries widely. The different products are called "Desire2Learn","HotChalk", "JoomlaLMS", "SharePointLMS", "Thinking Cap LCMS", "Angel IMS 7.4", and "Enterprise Learning Management System(LMS) e-Learning Solution v4.2". They offer teaching and learning tools like a tool for teachers to create quizzes. Nowadays Learning Management Systems will be used more and more to present individual classes and to design and manage complete department and entire school offerings. Another advantage, for example, is the use of LMS for snow days and other school emergencies and events. It makes it possible to display student assignments in form of online galleries, podcasts, recorded life sessions, or online slide shows.

Doe, Charles. "A Look at ...: Online Learning Communities/ Learning Management Systems." //MultiMedia & Internet @ Schools// 17.2 (2010): 32-5. //OmniFile Full Text Select//. Web. 12 May 2010.

The Internet infects the courtroom
An old rule said, that jurors are not allowed to consider anything in their deliberations other than the evidence that has been presented in the courtroom and the law as instructed by the court. That has changed, since jurors are going onto the Internet for information about cases. They use social network sites like Facebook and Twitter to get more information. Even lawyers, parties, witnesses and a couple of judges have been caught accessing the internet to gain more information. This is why some courts require jurors to sign declarations attesting that they will not use personal electronic and media devices to research or communicate about any aspect of the case and more courts are planning to do so.

Wallace, Steven. "The Internet infects the courtroom." //Judicature// 93.4 (2010): 138-9. //OmniFile Full Text Select//. Web. 17 May 2010.