Google Search Tips and Tricks

I. To search for an exact word or phrase, use quotation marks. “protest the hero”, for example.

II. To search for something on a specific site, use the site: command. For example, tesseract

III. To search for a definition, type define: before the word. For example, define: progressive metal.

IV. To search for a specific product within a specific price range, type the product followed by $priceone..$price two. For example, roland ax7 $500..$800

V. To search for a specific file type, type what you are searching for followed by filetype:(and then the file type you wish to search for). For example, bloodmeat filetype:mp3

VI. If you wish to ignore words in your search, put a ‘-‘ before them. If you wish to include words that Google leaves out because they are common, but they are crucial to your search (ie band name), put them in quotations. For example, between “the” buried “&” me -merch

VII. To find related pages, use the related function. For example,

VIII. To search for synonyms within a topic, type the topic first followed by a ~subtopic. For example, djent music ~concerts

This will yield results that refer to concerts as shows, gigs, sets, etc., within the djent genre.

IX. To find out the time in another country, simply put time before the name of the city or country you are inquiring about. For example, time encinitas

Posted in Uncategorized | Leave a comment

Collusion Screen Shot

Collusion Screen Shot

This week, our tutorial was to explore cookies through the web application known as collusion. This app was very interesting in that it allowed me to see which third parties were associated with which sites that I frequent. It was interesting to see very clearly how some overlapped thanks to the easy-to-understand web-forming display. I was surprised to see that many of the third parties were sites I trust, such as Google and Youtube. Overall, it was a very informative experiment, and made me consider more carefully where my information is going during online sessions.

Image | Posted on by | Leave a comment

Week Four: Privacy and Security

  1. As most weeks, I decided to once again begin by finding an informative summary on the benefits of web security so as to orient myself within the topic. Personally, I am fairly laid-back when it comes to surfing the web and could perhaps benefit from educating myself on how I can be more cautious. I found this article to be effective in delivering a detailed but concise briefing on security risks online and how to prevent, or at least minimize them. The article was straight-forward and manageable. It helped explain the different risks (such as the difference between a virus and a worm) without being bogged down with jargon. I would definitely suggest this to anyone who’s after a quick explanation of the benefits of online security.
  2. From there, I decided to research how others feel on the topics of online security and privacy. This is a short video I found to be effective in highlighting the key risks that users worry about whilst browsing the web. A lot of the concerns expressed are similar to my own, such as the worry that important information (such as credit card information) could fall into the wrong hands.
  3. A sub-topic of online security and privacy we spent a sizable amount of time talking about and exploring was cookies. However, we mostly learned of their negative aspects. I was curious, then, to learn why, if they are in fact such a nuisance, are cookies used frequently in the online world?

    After browsing through a few articles, I found one (above) that was particularly effective in explaining how, as the potential supplier of an online commodity (say website design?), I could make use of cookies to make things easier for both me and my clients. It was interesting to view things from this perspective.

  4. Of course, there are two sides to every story, and so I decided to investigate the negative aspects, as well. From what I’ve gathered, the concerns with cookies is that they often have an agreement with third parties to whom they lend information. This video helped to explain that process to me. Being a New Media student, I find I am a little desensitized to privacy and information sharing issues. With all the information being willfully released into cyberspace, it seems a little improbable that a company is really going to do much by knowing what websites I tend to visit, other than targeting certain advertisements for me rather than others. That being said, it is still a comfort to know that I have the option to delete or disable cookies on my browser, should I choose to at any time.
  5. A question I finish with, then, is whether or not we should be concerned about third parties tracking us. In your personal experience, do you find yourself less concerned about your online habits being sold to third parties, if the website or third party yourself is a website that you trust? Do you believe enabling cookies helps or hinders your online experience?
Posted in Uncategorized | Leave a comment

Here’s a link to my Proposal Prezi, in case the other three didn’t suffice.


This course has brought to my intention the importance of online accessibility. Though I am in a program that deals heavily with the innovation of technology, this is one aspect that is not stressed in our work. It is perhaps for this reason, then, that I am interested in learning more and in sharing my knowledge with others.

Click here to view.

Link | Posted on by | Leave a comment

Week Three: Cloud Computing and Online Collaboration

  1. There are many benefits to cloud computing. From its cost-efficiency and nearly unlimited storage capacity, this technology can really benefit businesses of all sizes. However, there are several downsides to cloud computing, as well. I browsed a few articles pertaining to pros and cons of cloud computing from the business side of things to better my understanding of how I could make use of this technology in the future. The article above is the one I found most helpful in summarizing both the advantages and disadvantages of cloud computation.
  2. Cloud computing as a business option, however, seems a little distant to me at this point in time. I decided, then, having learned that cloud computing is very much a party of everyday internet life in the form of social networks, to look further into how cloud computing benefits the user. I found this video on Youtube, and feel it is effective in communicating the advantages and current uses of cloud computing. Specifically, I think this video highlights how cloud computing enhances the ability to share, which is a key aspect of the Web 2.0.
  3. While I do recognize the benefits of cloud computing, I believe that often times the security risks are overlooked. I decided, then, look further into risks associated by subscribing to platforms that use cloud computing, such as Facebook. Surprisingly, it took a great deal of effort and wading through ‘risks to business owners’ before I was able to come up with any real information on the implications of cloud computing on social media. What I did find, shown above, was a small snippit of information advising users to be wary of sending personal data off into cyberspace, as cloud computing means it has to travel further and in a potentially insecure manner. I think this is an important point that deserves more attention.
  4. Being a New Media student, I began looking for interesting applications of cloud computing that fall outside the realm of the ordinary, mundane business world. I recalled hearing in recent years that, in an attempt to evade the police, The Pirate Bay was considering launching its servers into low-orbit, an idea that seems fairly ambitious, yet commendable. I decided to check up on whether or not they had gone through this tedious process, as it occurred to me that cloud computing was perhaps a more viable option. Sure enough, The Pirate Bay has enlisted the help of cloud computing to ensure the continued distribution of free information. While I’m not looking to outsmart the police, I think this is an effective example of how cloud computing makes life easier: it prevents the need to develop low-orbit drones!
  5. Though I have focused mainly on cloud computing throughout this story, I would like to turn now to online collaboration. I’ve included what I’d consider to be my favourite example of online collaboration: Star Monarchy. Star Monarchy is a music project started by bassist Ray Riendeau. It enlists the talent of many musicians who I am quite found of, such as Rody Walker and Dan Tompkins. Because the artists featured are from all different locations, online collaboration was key for this project. Each artist had to record their parts individually and have them shipped off to be mixed together to create the final product. Additionally, Ray made use of social networking platforms such as Facebook in a talent search to provide a few amateurs with a chance to perform on the record. Undoubtedly, this masterpiece would not have been possible without the help of online collaboration.
  6. To finish up, I leave you with these questions: How can a person optimize the advantages of cloud computing without falling victim to risks of breaches in security? Do you believe changes need to be made on the hosting end or on the part of the user, if at all? Do you think that the sense of anonymity created by mass participation in this type of technology devalues the threat of a potential security breach, or puts more weight on the strive for security measures?
Posted in Uncategorized | Leave a comment

Week One: Eyeballs for Access

  1. In this week’s class, we touched mainly on personal branding in the digital world. This focused mainly on presenting the best ‘you’ possible to future employers, bosses, or collaborators who may happen across you within the online world. We also discussed where technology is headed in the future. In particular, we discussed ‘the Internet of Things,’ which is an extremely interesting concept.
  2. Personal branding was of great interest to me as much of the work I plan to do in the future will involve maintaining an impressive image online. Now, as a student, my current online image is not exactly where I’d like it to be. I found this article extremely helpful in pointing me in the right direction in terms how I can improve this image. Geared specifically towards students, I found myself able to relate to many of the topics discussed.
  3. From there, I began to think in terms of how personal branding applied to me in my line of my work. Upon graduation, I will be receiving a Bachelor of Fine Arts, and therefore thought it would be beneficial to pursue articles pertaining to the self-branding of artists. I discovered this article, which I find quite interesting and useful. This will definitely prove to be valuable tool for both during the remainder of my time at Ryerson and beyond as I move into the career world.
  4. For me, as an aspiring New Media artist, the Internet of Things most likely has a different meaning than it does for many others in this class. In New Media, we are encouraged to make any and all things talk. We strive to connect and network objects and to put them to use. Sure, this can be applied on a basic level, such as the Web 2.0, but for us, connecting objects is as important as connecting people. It is for these reasons, then, that I have decided to share the work of Steve Daniels. Steve is both a New Media artist and a professor. His background in biology has lead to the inclusion of biomimicry in much of his work. I believe a lot can be learned from his works, in terms of both where we are headed and how we can optimize technology for the betterment of society. It may be a little outside of the box, but I feel there is much value in Steve’s work that helps to explain, make use of, and push forward the Internet of Things.
Posted in Uncategorized | Leave a comment

Closed Captioning Videos

Here is this week’s assignment.

Here is the .pdf file of my transcript: MOECARLSON

And here is a link to the original video: Interview with Moe Carlson


Posted in Uncategorized | Leave a comment