Tuesday, November 7, 2017

Virtual Reality Just Got a Whole Lot Sharper




By Stephen Heirtzler

Credit to Pinmaxvr.com

Since the initial release of the Oculus Rift DK1 in March of 2013, virtual reality has experienced something of a revolution. With the ever improving capabilities of modern PCs, companies can finally explore its true potential.  However, new VR headsets have been slow to release, and the high end headset market is largely controlled by just three companies: HTC, Facebook, and Sony.

This may change soon, though.  Because, as of this month, a new player seems ready to enter the headset making game: Pimax Technology Co.

Pimax had previously released a 4k resolution headset to relatively minimal fanfare, but their new headset seems to go and above and beyond their own standards along with the industry standards. The headset is called The Pimax 8K and it is a game changer.

To understand why, we have to look at the two major limitations of virtual reality right now. The first limitation being field of view, and the second being resolution.

Credit to Oculus Rift
A headset’s field of view is dictated by the size of its lenses and the diameter of its display. The current generation of headsets have a field of view of about 110 degrees. Since the field of view of the human eye is about 210 degrees, that means that the experience of wearing a current generation headset is akin to wearing a skiing mask; large portions of your peripheral vision are obscured. This can have a negative impact on your immersion. You don’t feel quite as much like you’re “in the world” because of your limited field of view.
Arguably the most critical aspect of a VR headset’s immersiveness is its resolution. If a headset has fewer pixels to work with, the image will look noticeably jagged and blurry, dampening the illusion of looking into another world. Current generation headsets have a resolution of 1080 pixels by 1200 pixels per eye (about 2.6 million pixels). This means that small text and subtle details in a virtual environment are unreadable without getting closer. This also means that these headset suffer from something called “The Screen Door Effect” where, because of the separations between pixels, the          
image appears to be being viewed through the mesh of a screen door.

Credit to Youtube
What makes the Pimax 8k such a game changer is it sports both a 200 degree field of view (almost equal to that of the human eye) and a staggering resolution of 3840 by 2160 pixels per eye (about 16.6 million pixels). This means that there is no screen door effect, and that the virtual world fills your visual field.

The Pimax 8k is set to ship out in January of next year, and when it does, it will provide the most immersive virtual reality experiences to date.

Sunday, November 5, 2017

Six Steps to Learning to Program With Python

Jack Donaldson


Have you ever wanted to learn how to program but it just seems like there is way too much to learn? There are websites that try to make it easier to learn how to code such as code.org but they are far too simple and are aimed at kids in either middle school or younger. What if I told you that you could learn how to write a program in under five minutes? This is easily accomplished by using a more simple programming language, and the one I am going to show you is called Python. Python is known for its simplicity, however this means it is far less powerful than more complicated languages like C++ and Java.
For your first program I'm going to show you how make a program that asks for the user's name and then says “”Hi” to the user using their name.


Step One:
Open Python and you should come to a screen that looks like this. This is known as the shell and this is where your program will run. Press file and then new file to open up a new program.
1.PNG






Step 2:
A screen like this should pop up. This is where you will be writing the actual code.
2.PNG

Step 3:
Use hashtags to write comments. Comments are not read by the computer and are only read by other people who read the program. Comments are important because they allow others who read your program to know what you were trying to write with your code.
3.PNG


Step Four:
Create a variable that stores the user's name. In this case the variable is called “name” and the words in the quotes are the words that the user sees.
4.PNG


Step 5:
Create a print statement that uses the user's name using the variable created previously.
5.PNG


Step 6:
Create an input statement that stops the program. Without this the program will continue to run until you close Python. After you have done this press the run button and run the program!
6.PNG


Once you have run the program it will ask for your name. Type your name and then press enter.
7.PNG

Then the print statement will pop up on the screen and it will prompt you to press enter to exit. Congratulations you have just finished your first program!!!

8.PNG

Sunday, October 22, 2017

The Hack Shack and all the Little Bits that have improved over my time with it

Coleman Moore
Hack Shack Supervisor
The Hack Shack and all the Little Bits that have improved over my time with it


Throughout my time as a student at Oyster River High School, the Hack Shack has changed a lot from its creation in my sophomore year to a bustling and overall more well put together setting now during my senior year. At the beginning of its existence it had no reputation nor did anyone know about it.  From its creation to now, it's grown a lot and so has the class that manages the space.
When I came to the high school as a freshman there was no Hack Shack so I won't talk about this year too much but I still feel it's very important to the overall story. Back when there was no Hack Shack a lot of students had very few options if they were interested in technology other than the two programming classes and the robotics team. Many teachers either had to send a workorder to IT or search out Mrs. Pearce or Mrs Stetson, Our librarian and computer Science teacher respectively, if they had a teach related problem a problem the Hack Shack greatly fixed.
At the beginning of my sophomore year Mrs. Carr and Mrs. Pearce opened the Hack Shack as our high school's very own Makerspace. Word of the new makerspace spread fast through the school newspaper, Mouth Of the River, and other websites and publications such as NHSTE. During my sophomore year, not many people completely understood what the Hack Shack was for, including the staff that ran it. At this point we depended a lot on the librarians to tell students who were having tech problems to go see the Hack Shack to solve them. Throughout the year the staff got into much more of a flow and were able to help those who came in successfully more often.
When it came time for my Junior year I was no longer part of staff but I still came in often to check up on what was going on. Some of the most incredible 3D prints were made during that year.


It was also during this year that the Hack Shack began to be used more often for projects for classes than it had in the past and to build a real reputation for itself and why it was there.
Now we have entered the 3rd year of the Hack Shack and my senior year. This year rather than being a normal staff member, I instead supervise the staff, helping them with their workshops and how to go about working in the Hack Shack. My duties also include getting information from the staff to Mrs. Pearce and Mrs. Stetson and working on a special project for the semester. At the beginning of this year, Mrs. Stetson bought a new computerized cutter called the Cricut which has been a huge upgrade to the former one, the Silhouette cutter. Because of its simplicity and more easily understandable UI, more people have been able to create designs and print them then before. The format of the work done by normal staff has also greatly changed this year increasing the transparency between the staff, me, Mrs Pearce and Mrs. Stetson.
20170928_074422.jpgAll in all I think the Oyster River Makerspace Hack Shack has made a lot of progress and will continue to improve and grow to become even more embedded in the school culture. I hope it will continue to become someplace that everyone goes to to use the technology, learn new thing or just to enjoy themselves in a supportive place.


Wednesday, June 7, 2017

Zesting Up a Presentation With a Creative Touch… For Free!

By Micah Kelly

Have you ever had a presentation that needed a little something to push it over the edge? Have you ever wanted to put more of your creative side into a tangible, easy to understand format? Well, in this tutorial, I’ll show you how to create simple, polygonal motion graphics to convey information to an audience.

Blender is one of the most flexible open source programs out there, and is readily available for download here: https://www.blender.org/

An example of the final product can be found here:

Setting Up

First, open Blender

Press the A hotkey to select everything, then press the X hotkey to delete everything in the default scene
Press NUM7 to go to the top view, then NUM5 to make sure that you’re in orthographic view, meaning that there’s no perspective.
Press the SHIFT+A command, then create a new camera. A camera will appear on the cursor. Make sure that the cursor is centered at the scene origin by using the SHIFT+C hotkey.
Snap to the side view by pressing the NUM3 hotkey, then move the camera along the Z axis by pressing the G hotkey to move the camera, then press the Z hotkey whilst moving the camera to snap it to the Z axis. It won’t matter how far the camera is from the origin, since it will be orthographic.
Let’s change the camera to orthographic, to do this, go to the camera options tab, then click the orthographic icon in the LENS dropdown menu. The camera is now void of perspective.
Objects and Materials

To create a new 2D object, press the SHIFT+A command, then create a new plane.
Go into edit mode, then select 3 of the vertices by holding SHIFT and right-clicking. Press the X hotkey, then delete VERTICES.
Now, we have a single vertex point. To create a shape, select the vertices, then begin extruding it into the outline of your shape. To extrude, press the E hotkey while a vertex is selected, then move your mouse, then left-click to complete the action.
To close the shape, SHIFT select the start and end vertices, then use the F hotkey. A new edge has now been created. I’ve made a potato.
To make the outline into a solid face, use the A hotkey to select all vertices, then press the F hotkey to create a face. After a new face has been created, press CTRL+T to triangulate the face into a form that Blender can understand easier.
Sometimes the mesh’s normals are flipped. This will make their lighting look abnormal. The faces will look darker than usual. To fix this, select the affected faces, press SPACE, then search for FLIP NORMALS. Click the action in the search results, then the problem should be solved.

To add a material, first switch the viewtype to material.
Go to the materials tab, then in the shading menu, click SHADELESS.
Go into edit mode for your desired model, select the all vertices, then after choosing a color, click ASSIGN. The model has now been applied with a material
Text

Creating text in Blender is very simple. First use the SHIFT+A hotkey, then create TEXT.
Going into edit mode allows you to edit the text by typing.
The text can then be textured using the same method as the objects before.
Animation

The animation aspect is also very simple.

First press NUM0 to snap to the camera view, we’ll animate from here.
Select the desired object in object mode, then move the bar on the timeline to where the movement will start.

Create a keyframe by pressing the I hotkey, then click the LocRotScale option.
Move the bar on the timeline to where the movement will end, then make another keyframe. The object should move between the keyframes in that space of time.
Keyframes can be easily edited on the DOPE SHEET. Keyframes can be scaled around the timeline bar with S, or moved with G.

You have now created a simple 2D animation in Blender, that can be used for presentations, instructional videos, cartoons, or anything else your heart desires!

Tuesday, June 6, 2017

easy use chopsticks

By Ben Titus


If you like Chinese food but you can't use chopsticks, you will find this tutorial useful.

Use Google SketchUp to design and print your own chopsticks.










Lost in Translation

by Hanwen Liang


In 10 years, Google Translate has gone from supporting just a few languages to 103, connecting strangers, reaching across language barriers and even helping people find love.

Google Translate is a free translation service that provides instant translations between 103 different languages. It can translate words, sentences, and web pages between any combination of our supported languages. It was launched on April 28, 2006.

Now, with Google Translate, You can speak, snap, write or type words or sentences you want to translate to talk to someone with a different language. It can also operate on other websites or applications. It can even run offline.
Video:
Google Translate also could translate idioms, sayings, book/movie titles by its more common translation rather than translate it word-for-word like a few years ago. It could also translate sentences without major grammatical issues.
With the advancement in Artificial Intelligence, translation software also evolves.
 
Modeled after the way neurons connect in the human brain, deep neural networks are the same breed of AI technology that identifies commands spoken into Android phones and recognizes people in photos posted to Facebook, and the promise is that it will reinvent machine translation in much the same way. Google says that with certain languages, its new system—dubbed Google Neural Machine Translation, or GNMT—reduces errors by 60 percent.
Companies like Google are racing towards the same future—working not just to improve machine translation, but to build AI systems that can understand and respond to natural human language. As Google’s new Allo messaging app shows, these “chat bots” are still flawed. But neural networks are rapidly changing what’s possible. “None of this is solved,” Schuster says. “But there is a constant upward tick.” Or as Google says the Chinese would say: “Yǒu yīgè bùduàn xiàngshàng gōu.”
Also: A Music Video Made with Google Translate


Work Cited:
Works Cited
Google Translate. " Translate." About – Google Translate. Google, n.d. Web. 17 Feb. 2017.
"Google Translate." Wikipedia. Wikimedia Foundation, 14 Feb. 2017. Web. 17 Feb. 2017.
Google. "Translate." Www.blog.google. Google, n.d. Web. 17 Feb. 2017.
Metz, Cade. "An Infusion of AI Makes Google Translate More Powerful Than Ever." Wired. Conde Nast, 27 Sept. 2016. Web. 17 Feb. 2017.

Turovsky, Barak. "Found in Translation: More Accurate, Fluent Sentences in Google Translate." Google. Google, 16 Nov. 2016. Web. 17 Feb. 2017.

Thursday, June 1, 2017

“Ransomware”: Technology Hazard or not?

By Tim Bartos
For those who have been watching the news lately, the propagation of a malware called “WannaCry” has sparked a wake-up call from technology experts and governments alike. This malware, known as ‘ransomware’ spread rapidly across the world in mid-May, affecting FedEx, the United Kingdom National Health Service, Renault, and many countries across the globe. However, for those ‘out of the loop’, here’s the story behind what ‘ransomware’ is.
What is ‘Ransomware’, Anyways?
Ransomware is a type of malware, or ‘malicious software’. Existing since the rise of Microsoft operating systems in the early 1990’s, malware is usually separated into two categories: viruses, and ‘Trojans’, which usually describes their method of ‘entering’ a user’s system. Some types of malware can exploit two or even more methods of transmission.
Viruses, like their biological counterparts, are spread through infected files or programs from computer to computer, such as email attachments or downloaded files. Viruses tend to thrive off of multiplying themselves and their code across many files within a user’s system, essentially opening the door for more spreading, like a real-life infection.
“Trojans”, in reference to the ancient Greek story of the Trojan horse, are files designed to mislead the user into installing/executing, allowing malicious code to be executed, thus letting the creator of the malware add any form of malicious alterations. Most commonly, a ‘backdoor’ is installed, such that an outside user can manipulate files within a computer in order to find important information to steal.
While ‘ransomware’ is traditionally not a category of its own, ransomware can exist in both of these categories, and can be transmitted in a similar fashion. However, the outcome of a ransomware is what makes it unique. After infecting a user’s system, all of the user’s files are encrypted, or modified such that they can only be read with a certain code, or ‘key’. The user will traditionally read a message which notifies them of their files being encrypted, and usually demands a monetary sum in return for the ‘key’ to unlock their files.
The history of ‘ransomware’ is fairly new, and ‘WannaCry’ is a new contender. The first major malware attack was that of “CryptoLocker’, a ransomware which utilized Bitcoin transactions to allow for easy, untraceable money exchanges. Before the existence of Bitcoin, cash transactions were easy to trace. However, in an internet like ours, this is no longer the case, and ransomwares can earn millions of dollars without any consequence.
What makes ‘WannaCry’ so Bad?
Computer viruses and malware have existed for decades, and most often exploit vulnerabilities in computer systems. As computer systems advance, changes in the form of ‘patches’ remove known vulnerabilities. This is why malware from the 1990’s cannot harm us today—we have removed its method of propagation. Additionally, many computer security companies work around-the-clock to find and fix loopholes before the average consumer is exposed to any excessive danger.
However, this does not mean that all computers are protected. Large computer networks, especially those in business settings, are expensive to update and ‘patch’. For this reason, many consumer services like checkouts at the grocery store still run on older versions of operating systems, like Windows XP or Windows 98. As these systems age, the chance that old vulnerabilities are exploited increases exponentially. This is the reason many regular consumers don’t need to worry about “WannaCry” and its demand of 300 dollars—your system is likely up-to-date and well beyond the vulnerabilities of older systems affected by this malware.
Help! I got ‘WannaCry’!
If you are affected by a ransomware, it’s important to stay calm. While it may seem like the only option, paying the sum of money required to decrypt your computer is not a guarantee. Even if your computer is decrypted by a code given to the malware, it is also not a guarantee that the software will be removed at all. In fact, several ransomwares continue to operate in the background of computers which have paid—which signifies the user is vulnerable to malware threats—and steal more information without the user even knowing. These targeted individuals are almost always the ‘technologically unproficient’ in our society.
However, there is a solution. Several ransomware viruses have been documented, and security agencies have created software that can simply decrypt the system, albeit over several days. Additionally, new technologies can detect ransomware’s encryption before it can complete, allowing an analysis of the malware, and ultimately, a faster solution.
Otherwise, the simplest solution is always to exercise caution when sharing and downloading files on the internet. The only way for malware to spread is through vulnerable computers—checking to verify the legitimacy of every file we receive from the internet and the programs we install limits the chances that a computer virus slips under our radar. To be extra sure, make sure to keep your security programs and operating system up-to-date to be less vulnerable to existing exploits.
If you’re looking to learn more about the WannaCry ransomware, I recommend this timeline of stories regarding the malware by The Verge: https://www.theverge.com/2017/5/14/15638026/wannacry-ransomware-updates-cyberattack-cybersecurity
If you wish to learn about ransomware in general, you should check out the Microsoft Malware Protection Center. Microsoft is one of the biggest targets of malware—and they’ve got a lot of resources to learn from. You can access the article on ransomware as well as find other articles at https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx.
Image Citation

WannaCry Virus Notification. Digital image. The Verge. The Verge, 14 May 2017. Web. 24 May 2017. <https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries>.