Tuesday, October 23, 2018

Elevator Pitch

Elevator Pitch

Hello Professor Daun, my name is Patrick Dileo and if I can have a minute of your time I would like to talk to you about cloud computing. As you may know cloud computing is something that we encounter almost everyday but we don’t realize it. We are consistently using cloud setups such as google drive and apple icloud to save our personal information that we want to keep to ourselves. We have the ability to save one thing to our computer and then pull out a phone, tablet or laptop and open it up on their. This way we can always have our data or information no matter where we go. Cloud computing sounds great on paper with being able to access files and such from any device but there is a big problem when it comes down to it. The number one problem that not only me but others have with cloud computing is the idea of someone else hacking into the cloud and getting a hold of all your personal information. Just imagine someone hacking into a big business who keeps track of all it’s customers and employees’ personal information through the cloud. That person now knows all of everyone’s information and nothing good could come out of that. The bottom line is that cloud computing has its pros and cons but if you’re not careful enough all you hard work can be gone in a second, that’s why I would like you to help me with an ACURA project that can help protect cloud computing against cyber-attacks.

Tuesday, October 16, 2018

PB2B



Pat Dileo

PB2B: Examining the Rhetorical Features of Scholarly Articles (800+ words)

Part 1: Commit to 2 scholarly journal articles by researchers in the same discipline that examine similar phenomena.

The first scholarly journal article that I picked for my research project is “Study of Mobile Cloud Computing Security against Cyber Attacks” by Ms. Ankita S. Koleshwar, Mrs. S. S. Sherekar and V.M. Thakare. The second scholarly journal article that I picked for my research project is “Addressing Cloud Computing Security Issues” by Dimitrios Zissis.

Part 2: Focus on the content of each piece. How have these researchers studied this phenomena in similar and different ways? How have they defined/described concepts in similar or different ways? And how do they “operationalize” or measure those same concepts, if at all? Describe their research methods. What questions were posed? What’s each scholar’s argument?

The first scholarly journal article that I will focus on is “Study of Mobile Cloud Computing Security against Cyber Attacks”. The way that the three researches who wrote this article studied this topic is by reading and pulling information from other scholarly journal articles. Some questions that I have for this article specifically is how they organized all three of the writers information and brought it together to make a well flowing article. The scholars’ argument in this piece is that there are three ways to deal with attacks in network, Detection, Prevention and Countermeasures. The second scholarly journal article that I will focus on is “Addressing Cloud Computing Security Issues”. The way that the researcher of this article studied this topic was the same as the authors of the first articles, he also pulls information and data from other scholarly journal articles. The scholar’s argument for this article is that cloud computing is changing the way we use technology and we must find a way to eliminate cyber attacks.

Part 3: Focus on the construction of each piece. Describe how and why these scholarly journal articles are a unique genre. What are their conventions? Affordances and constraints? How would you describe their rhetorical features? What’s each author’s purpose? Who is their audience, and what clues tell you this? How would you characterize their writing style? And lastly, how is each piece organized/structured -- what logic is behind the writer(s) organized/structured it in the way that they did?

The reason that these scholarly journal articles are their own unique genre is because the purpose of a scholarly journal article is to provide or present new knowledge on a problem or a matter. Another reason that scholarly journal articles are their own unique genre is because of their intended audience. All scholarly journal articles share the same audience in the sense that their target audience is other scholars that are in the same field as them. After looking throughout both of the scholarly journals articles I have came to the conclusion that the authors’ purposes are to help other scholars in their field conduct their own research. The reason I came to this conclusion about the purpose is because there is so much information within the articles that the only people that would read through all of the articles has to be someone who is doing their own research and needs references. The way that both of the scholarly journal articles are organized is by having the abstract on top which contains a quick summary of what you’re about to read, followed by keywords that can be found various times throughout the articles. After the keywords, you will find the introduction, followed by the body paragraphs and closed out by the conclusion. At absolute end of the paper you will find references that the scholar has used in order to write his article.

Part 4: Which specific aspect(s) of these two scholarly articles strike you as the most important? The most interesting? And why?

One specific aspect of these two scholarly articles that strikes me as the most important and interesting is the amount of detail and clarification that is put into these scholarly articles. When I am reading these two articles the only thing I can think about is how the authors really know what they talking about and how they are summarizing their main points in a way to make sure that someone who is interested in the topic, like me, can go in and understand and learn from the article. Another thing that I found really important is that before the introduction to the article, they have an abstract and keywords section. The reason I find this really important is because for someone who is looking for a topic that is very specific, I can read the abstract to get a quick understanding about what the article is about and look at the key words and figure out whether this article is something I should read through.

Wednesday, October 10, 2018

PB2A

Part 1
The academic discipline that I find most interesting is my major, Computer Engineering. The professor that I chose to go along with my major is Qiang Duan. Professor Duan has a Ph.D. in Electrical Engineering, a M.S, in Telecommunications and Electronic Systems and a B.S. in Electrical and Computer Engineering. Some of Professor Duan's research interests include data communications and computer networking, the next generation Internet, the service-oriented architecture and network-as-a-service, Cloud computing, and Web services.
Part 2
One of the topics that Professor Duan studies that I find very intriguing is next generation internet. I don't know what next generation internet is exactly but just the name of it draws my attention and makes me want to learn more about it. This would be my top option if I had to devote a long time studying something in this field but other options include cloud computing and service oriented architecture.
Part 3
How safe is all your personal information and data when using cloud computing from cyber attacks?
How safe is all your personal information while using cloud computing compared to using a personal computer?
Part 4
Security, Server, Storage, Privacy, Information, Data, Cloud, Cyber Attacks, Iphone, Safe
Part 5
  • Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing Cloud Computing Security Issues."Future Generation Computer Systems, vol. 28, no. 3, 2012, pp. 583-592.
  • Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in Cloud Computing: Opportunities and Challenges." Information Sciences, vol. 305, 2015, pp. 357-383.
  • Henry, Stefan, and Md L. ALI. "Cloud Computing Security Threats and Solutions." I-Manager's Journal on Cloud Computing, vol. 4, no. 2, 2017, pp. 1.
  • Ogigau-Neamtiu, Florin. "cloud Computing Security Issues." Journal of Defense Resources Management, vol. 3, no. 2, 2012, pp. 141-141.
  • Sudha, M. R. "Efficiency of Security Privacy in Cloud Computing." International Journal of Advanced Research in Computer Science, vol. 6, no. 8, 2015.






Thursday, September 6, 2018

WP1 Proposal

Biggest - Basketball 
2nd Biggest - NBA 
Medium - 76ers 
Smallest - Ben Simmons 













Biggest - Food 
2nd Biggest - Fast Food 
Medium - McDonald's 
Smallest - Big Mac 











Biggest – Shoes 
2nd Biggest – Basketball Shoes 
Medium – Air Jordan's 
Smallest – Air Jordan 11's





Monday, September 3, 2018

PB1B Genre Generator

Genre Generators 

The first generator that I played around with was the meme generator. When you first enter the site, you can look at memes that others have made, or you can start making your own. When you are making your own meme, the first thing to do is select a picture. You can either select an image that they provide for you or you can upload your own image. Once you select a picture, it’s time for you to enter a caption. You are given two options for text, text on top and text on bottom, you can select one or both. After you select your text, you hit the button that says generate and your meme is created. Even though this website is more of a creator than a generator, it is still a good website for someone who wants to create their own memes and someone who just wants to have a good laugh. 

The next generator I used was the SCI generator. The first thing I noticed about this generator was that it is very simple to use. The only thing you have to do is type in a name for the author, which even then it is optional, and hit the generate button. Once you do this, the website will generate a very long paper about computer science or something along those lines. Each paper is structured the same, there is the title on top along with the authors names that you typed in, an abstract, a table of contents, 6 different sections and references on the bottom. Another thing I noticed about this generator was that all the papers had charts, flow charts and pictures scattered throughout them to make the papers seem more realistic. I don’t know exactly why people would use this website, but I think it’s very interesting reading the papers it produces. 

The final generator that I used was called Suggest Me Movie. The purpose of this site is exactly what the title says, it suggests you a movie. The first thing I noticed about this site was the filters on the side of the page. They had filters for year, genre, IMDb score, votes, and keywords. You can use these filters if you want, but you don’t need to. Once you're ready, there is a button that says suggest movie that you can hit. Once this button is hit the name of a movie will pop up along with its trailer, IMDb score and votes. Underneath the trailer, you can find a description about the film along with the director and the cast. This generator is very useful for when you’re in the mood for a movie, but you want to watch something new. 

cave man spongebob - when you're in english and the teacher asks for the homework

Wednesday, August 29, 2018

PB1A - Dr. Seuss


Dr. Seuss Books as a Textual Genre
Throughout his books, Dr. Seuss uses a lot of unique conventions within his books which makes his stories different from others. One of the main conventions Dr. Seuss uses within his books is that he creates new animals and creatures from his imagination. A few examples of this are The Sneetches, The Lorax and The Grinch. In addition to creating new creatures, Dr. Seuss will also create new words to go along with his stories. Seuss will usually do this to name his made-up creatures, people, food and places throughout his stories. Another convention that Dr. Seuss uses within his books is consistent rhyming. Throughout most of his books, Seuss will rhyme most of his lines with another because it’s his style of writing. A couple of examples of this are his books, “There’s a Wocket in my Pocket”, “Green Eggs and Ham” and “Hop on Pop”. One convention that Dr. Seuss uses that many other children’s books use is that he makes his cover and pages of the book very colorful. Just by looking at some of the covers of his books you can tell that he wanted them to stand out. Another convention that Dr. Seuss uses within his books is that most of the time the main character is an animal or a creature. Instead of Dr. Seuss books revolving around humans, Dr. Seuss will often have animals or even creatures he made up be the main character or protagonist of his stories. A couple of examples of an animal or creature being the main character are Dr. Seuss books, “The Cat in the Hat”, “Horton Hears a Who” and “Yertle the Turtle”. The two final conventions throughout Dr. Seuss books I will be talking about is the audience and the purpose. Throughout all his books, Dr. Seuss targets children as his audience. Dr. Seuss writes his books knowing that children are going to read them to themselves or have it read to them by someone else. Because Dr. Seuss knows his audience is children he makes his books easy to read by using small words and rhyming throughout his stories. Dr. Seuss will also make up fun words and creatures which help define the purpose of his books which is to entertain. The reason why Dr. Seuss uses all of these unique conventions in his books is to make sure that the reader is entertained and has fun while reading his books.

Thursday, August 23, 2018

Elbow Article Annotations

I highlighted different paragraphs that had a lot of information and summarized the main point on the side of my paper in my own words. Another thing I highlighted was words that I didn’t know. I would then look up the meaning of the words and write down their definitions on the side. The final thing I highlighted were statements throughout the article that I either agreed with or disagreed with. My partner Joe likes to highlight questions and comparisons between the two different types of thinking. He also likes to highlight the title and description of the article so he can achieve a brief understanding before reading.