Drilldown: CapGrads
CapGrads > Capstonebegin
:
A portfolio of my photography work.
or
A sort of TED talk like presentation.
or
Making a water to combustible gas conversion engine. 
:
A portfolio of my photography work.
or
A sort of TED talk like presentation.
or
Making a water to combustible gas conversion engine. 
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
My project was going to be a scooter edit. It was back when I was more into scootering and I know it's not good but I tried my best with the limited skills I have. (1) ·
Well essentially its my photography portfolio. All images are black and white film dark room prints that have been scanned in; other than one color film negative scan. The portfolio had two goals for me: the capstone and submissions for OSAI Quartz Mountain. I can now proudly say both goals have bee (1)
Realizing I have no money for it. (1) ·
The core of it went well and I'm pleased with my portfolio. However, as an extra thing I had wanted to include a video to play alongside my portfolio at the capstone booth that would've been essentially a sped up slideshow of all my negatives. They would be in order from freshman year to my senior y (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I had to quit scooting shortly after the problem, so I wish I was able to make it better sorry. (1) ·
I wouldn't say I have any takeaways from the capstone itself, but I do think it served as a catalyst to hone in on my photography. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

