Monday, November 27, 2017

Make Up Ex.

Author's Name: DANGUISE ZULAUF
_________________________________________________________________________________

In this part of the Make Up, I will be writing about Audacity, which is the tool that we used this Term and the last one to edit all our audio tracks. We needed  to edit everything in this tool and then uploaded to SoundCloud, then we copy the link and paste it in our Blogger so that it can be listen. What we did all this time in Audacity was, record audio tracks, then edit everything so that it sound perfect and then add music and silences, it was very difficult for some of us, but for others it was easy.
























3rd Term: Make Up




Friday, November 24, 2017

Deliver and Debrief

Author's names: Vivian Bethke, Candela Echeverria, Agustin Ramirez Calvo and Agustin Danguise

Wednesday, November 22, 2017

deliver and debrief

Deliver %2F Debrief.jpg

Author's names: Moron, Caffarelli, Gutierrez and Holze
___________________________________________________________________

In the first post about Crypto (short for Cryptography)we talked about a game that had some clues, this clues were ciphered with different methods of Cryptography. To describe how we got to solve them and learn the different methods we made a video and an audio, besides this post. This post is to help you with basics concepts so you can understand better the video and audio. The audio was made with a program called "Audacity". Audacity is an audio editor, and for the video we used VSDC, a video editor. In the video you'll see some basic explanations so you can understand how we got to the solutions.







There are different methods to cipher a message, the most known are: Caesar Cipher, Polyalphabetic Cipher and Visual Telegraphs. Our personal favorite is the Visual Telegraph, because it uses numbers to encrypt the messages and is the most original one, at least that's what we think. 
Cryptography is an excellent way to send secret messages when you don't want that the whole world knows what you want to say so we think it's great, although they should be a webpage for "Crypto-fans" so we could post our ideas of new methods or exercise with old encrypted messages like the ones from wars, because the golden age of Cryptography was when the wars began so the armies could let their members know their plans without the enemies knowing. 




We had some trouble doing this video but if you want to see a little of our process here it is:

















Wednesday, November 15, 2017

Monday, November 6, 2017

Deliver and Debrief


                                    

 Author's names: Hecker, Corrente, Diharce, Behrens and Gonzalez


Last classes we have been working on cryptography. This is the art of writting and solving codes. To practice and make this funnier we have made a challenge on Khan Academy called "Cryptography Challenge 101"This challenge is for all ages, it does not assume you have any specialized knowledge. The game starts with a short but catcher story about a mystery bag founded near the streets with important information, so we decided to solve this mystery case. It builds off the ideas presented in Ancient Cryptography. We had to solve four clues written in a secret code using the tools Khan Academy gave to us. This time we have focused on deliver and debrief skills.




CONCEPTS:



Here there are some screenshots of the video while we were doing it:






Friday, October 20, 2017

Dream and Design

                              Author´s Names: Camila MorĂ³n and Vivian Bethke

Design and Dream


Dream %2F Design.jpg Author’s names: Caffarelli and Echeverria

Dream and Design

Hi there! We are Nico and Tobi, and we are here to talk a little bit about our lasts Informatics classes.  We learned about "Crypto" which is a nickname for "Cryptography".If you don't know what Cryptography is, I can explain it to you. Cryptography is a way to cipher messages for keeping messages safe and also computer sttings. First we did a post talking about how we learned and what we learned but this time we will talk about some questions that we had even when we had already understood  the theme "Crypto" and we thought you might have them too so we made an interview using a program called "Audacity" to make it more interactive. 
 Dream %2F Design.jpg
--------------------------------------------------------------------------------------------------------------------------
These are the questions we made:



And this is the audio we made using Soundcloud:



Dream and design



Author´s names: Ramirez and Danguise

Hello there! Last classes we have been working with a game in Khan Academy. To play this game, first you have to know concepts like cryptography and Caesar cipher.  Last class we did an interview answering some interesting questions about this topics. We did 3 questions based on stage 4, 5 and 6. To do this interview we worked on Vocaroo and then we edited the audio in Audacity. Vocaroo is a web page where you can only recorded things and Audacity is an application where you can recorded things and edited, like adding music or low the volum for example. Then we have to upload the interview to soundcloud so you can hear it. Well let´s hear the interview

CLICK HERE TO HEAR THE INTERVIEW
https://soundcloud.com/agustin-ram/agus-x23




Here we leave you a youtube video about cryptograpgy:

Dream and Design


Author's name: Holze and Gutierrez

Design and Dream


Authors: Sol Guaita and Sophia Kahn 


 Here, we open up the heart and mind to the possipilities and visions of a solution the way we wish to see it.

 The phase is all about imagination, extrapolation and visualization. 




 This is basically the workshopping phase. Here the ctual mechanics of your solution being to take shape. It involves techniques that allow us to get the solution " on paper''.




Hello! Last classes my partner Sol and I have been working on Cryptography. This is the art of writing a solving codes. Today I´m going to show you an audacity file. It is an interview to know how much me learnt about it and to explain you some important things of Cryptography. There are 3 Questions based on stages 4, 5 and 6 from the Blooms Questions.

Click here to hear the Interview !