Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

A little bird told me

Friday, July 24th, 2015

twitter-bird-blue-on-whiteHave you ever heard of Larry the bird?  Yes, the Twitter bird has a name.

We’re all familiar with the online social networking service called Twitter, but do we know more than the fact that it consists of 40 character “tweets”?

Twitter, or twttr as it was known initially was created in March 2006 by Jack Dorsey, Evan Williams, Biz Stone and Noah Glass during a daylong brainstorming session. Dorsey explained the origin of the “Twitter” title as follows:

“…we came across the word ‘twitter’, and it was just perfect. The definition was ‘a short burst of inconsequential information,’ and ‘chirps from birds’. And that’s exactly what the product was.”

“twttr” was used in the beginning since the domain twitter.com wasn’t available immediately. Six months later at Twitters launch, the domain was purchased and the name changed to the one we now use.

Almost ten years later Twitter Inc. is still based in San Francisco and has more than 25 offices around the world with more than 500 million users.

Through the years Twitter developed from being a social tool people use to tweet their experiences and opinions to a useful tool for marketing, education, news, as well as for emergency communication. Twitter fulfilled an important function during the San Francisco earthquakes and Boston marathon bombings. In South Africa Twitter proved useful in updating us on the Cape Town fires and subsequently also assisted with fundraising.

In events such as these Twitter users use a # to group information and make it searchable, for example #capetownfires. As soon as a hashtag’s usage increases and is mentioned at a greater rate, it becomes a “trending topic” and will be visible on the sidebar to all users. These topics show Twitter users the most talked about subjects, whether they are news events or people’s opinions on current topics. (More on the # here)

Colleges and universities also started using Twitter as a communication and learning tool for students. When courses consist of large groups of students, Twitter can be used to facilitate communication between class members.

HOW DOES IT WORK?

Tweets are publicly visible by default, but senders can restrict messages to just their followers. Users can tweet via the Twitter website, compatible external applications (such as for smartphones), or by Short Message Service (SMS) available in certain countries. Retweeting is when a tweet is forwarded via Twitter by users. Both tweets and retweets can be tracked to see which ones are most popular.

Users may subscribe to other users’ tweets – this is known as “following” and subscribers are known as “followers” or “tweeps”. In addition, users can block those who have followed them.

The "@" sign followed by a username is used for mentioning or replying to other users. To repost a message from another Twitter user and share it with one’s own followers, a user can click the retweet button within the Tweet.

You can watch the animated history of Twitter on YouTube.

[SOURCE: www.wikpedia.org]

Mathematica at SU

Thursday, July 16th, 2015

Modern computational tools are important in diverse disciplines, and they are clearly essential in fields requiring sophisticated mathematics, complicated numerics or the processing of large amounts of data.  Over time each field has developed an array of their own specialised solutions or packages.

However, a campus-wide license has recently been obtained for the package Mathematica developed by Wolfram Research Inc. Mathematica is one of a very small group of extremely powerful, high-level software packages specialising in advanced algebraic, numerical and image processing computation.

mathematicaAt Stellenbosch University colleagues have been using it successfully in the biological, mathematical and physical sciences, and also in economic and management sciences for both teaching and research.  It is therefore really worthwhile exploring whether it is suitable for your academic work too.

In addition to its function as a high-performance research tool it is has also developed to be an efficient, user-friendly teaching device.  It is powerful beyond any other general symbolic manipulation package, and easy to use at base level.  Mathematica places the emphasis on computation of mathematical objects and comes with its own formal language.  It also interfaces with an extensive audited database, which might be known to some readers through the Wolfram Alpha website.

For a license to use the Mathematica software, please contact narga@sun.ac.za.

[Article by Kristian Muller-Nedebock]

 

Register for Wi-Fi access

Tuesday, July 14th, 2015

If you are required to work on more than one SU campus and need an internet connection, there’s something you have to keep in mind.

To use Wi-Fi on the Stellenbosch, Tygerberg or USB campuses you will have to register your devices separately on all three campuses. If you’re already using Wi-Fi on your home campus, it doesn’t mean you’re automatically registered for others.

To use the Secure of  MatiesWifi SSIDs elsewhere, register your device by e-mailing the following information to help@sun.ac.za:

  • Building
  • Room number
  • Username
  • Asset tag of the laptop or a description of the device
  • Network card address (also known as the MAC address)

Windows 10 is on its way

Friday, June 12th, 2015

If their direct marketing approach is anything to go by, Microsoft is extremely eager to upgrade clients to their latest operating system. Over the past two weeks, Windows users have been confronted by a pop-up message on their computer screens, marketing Windows 10.

cortana“What happened to Windows 9 you ask?” It would seem as if Microsoft decided to skip the next logical option, Windows 9, and go directly from version 8 to 10.

The company claims that it’s such a huge leap from Windows 8 tot 10, it wouldn’t make sense to stick to the usual numeric naming convention. Given that Windows 8 hasn’t been the most popular, nor the most successful operating system, Microsoft might want to distance them from it as much as possible.

Whatever the reason, Windows 10 was presented to the media in September last year, and will, according to Microsoft, be available to the public at the end of July.

The bigger news however, is that Microsoft will be offering a free upgrade to Windows 10 to all their clients using the Windows 7 Service Pack 1 or Windows 8.1.

Some staff, depending on the versions of Windows you have installed, might have received a notice from Microsoft asking if they’d like to upgrade. If you say “yes”, a copy is reserved for you and when it’s available another notification will be sent. You can then decide if and when you want to install it.

BUT, just because Microsoft sent you the message, it doesn’t mean your computer can necessarily handle the new operating system.

And, as with most new software, the first release tends to have some glitches and the occasional bug.

IT will first conduct a thorough software testing and will then notify users when it’s safe to install and use it. Please hang in there for a bit longer and keep an eye out for news on Twitter and in Bits & Bytes.

If Microsoft’s marketing material is anything to go by, the new version seems promising and possibly an improvement on Windows 8. (more information is available on Microsoft’s website.

Keep in mind that some of the new functionality isn’t available from the start. Windows Media Center and the previously installed software needed to watch DVDs are also some of the functions that ended up on the chopping board.

The biggest visible change will probably be Cortana, a personal assistant –  Microsoft’s answer to Apple’s less successful Siri. Microsoft Edge will also replace Internet Explorer as a web browser.

More answers regarding the upgrade to Windows 10, can also be found on the Guardian‘s website.

Think you’re safe online?

Friday, June 12th, 2015

Memeburn, a website specialising in tech news and analysis recently reported on the state of cyber security in South Africa. (Read the article here)

According to the article, it was announced during the 2015 Security Summit in Johannesburg that over the previous six month, South Africa was the most popular target in Africa for criminal cyber attacks. DDOS attacks in Africa also increased 150% over the past 18 months.

Antonio Forzieri, an executive at Symantec, stated that one out of 214 e-mail sent in South Africa last year, was a spear phishing attempt.

South Africans are losing R2.2 billion per year to cybercrime. Statistics like these emphasise the importance of being informed and careful with personal information.

Online sales are on the increase and providesan additional platform for cybercrime.

onedollarKaspersky Lab, a company renowned for their expertise in security, launched a new project which, in a very visual, simple and interactive way, demonstrates the danger of cyber threats.

The one dollar lesson is an animated website which shows what happens to your money when you shop online and your information is intercepted.

One dollar lesson also hosts three training modules – each of which shows one dollar’s virtual trip to the bank and the possible obstacles it can encounter along the way.

Don’t assume you know everything there is to know about cyber safety. Stay up to date on new cyber threats and be careful with your personal information.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.