(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.

Slides:



Advertisements
Similar presentations
Abhinn Kothari, 2009CS10172 Parth Jaiswal 2009CS10205 Group: 3 Supervisor : Huzur Saran.
Advertisements

ITCS 3181 Logic and Computer Systems
CS Tutorial 7 Frid. Nov. 20 th, 2009 Final Project Presentations & Demos Tutorial.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Preparation for In-class Presentations.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Course Outline Process Overview for Course Convenors.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
ME 4054 Advisor Meeting September 4, 2008 Prof. Thomas R. Chase Mechanical Engineering University of Minnesota.
Term Project 1 CS502 Spring 2006 Operating Systems CS502 Spring 2006 Term Project.
COMS S1007 Object-Oriented Programming and Design in Java July 31, 2008.
COMP 110 Introduction to Programming Mr. Joshua Stough August 22, 2007 Monday/Wednesday/Friday 3:00-4:15 Gardner Hall 307.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
Computer Engineering 294 R. Smith Outlines and Organization 10/ Organization, Outlines and Abstracts The objective of both written and verbal communication.
Introduction to Project Management
Agenda9/11/13 Do Now –Display your name tag and log into your computer Pre-Assessment Test Info and Interests Syllabus and Course Expectations Opening.
Letter of intent By to predefined format (Word file, see guidelines) Chair Scientific Committee Coordination EO To all members of.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
MGS 351 Introduction to Management Information Systems
Segmentation & O/S Input/Output Chapter 4 & 5 Tuesday, April 3, 2007.
1 Introduction to Operating Systems 9/16/2008 Lecture #1.
Peer Edit Day Today’s Quiz Grade: 50 points= two peer edits of a student draft 50 points= complete rough draft * MLA format of all parts * minimum of 4-5.
WXGE 6103 Digital Image Processing Semester 2, Session 2013/2014.
Marking Scheme ISM ISM Top-up. Project Contents Abstract, – A one page summary (max. 400 words) of the Intent, work undertaken. Introduction, – An overview.
Assessing Quality for Integration Based Data M. Denk, W. Grossmann Institute for Scientific Computing.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
CSCI 51 Introduction to Computer Science Dr. Joshua Stough January 20, 2009.
BIS3324 Group Assignment – Schedule, guideline & templates (2015-Jan Semester)
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
Research & Technology Implementation TxDOT RTI OFFICE.
INFS614, Dr. Brodsky, GMU1 Database Management Systems INFS 614 Instructor: Professor Alex Brodsky
MSE 101 ON LINE LECTURE INTRODUCTION LECTURE & LABORATORY Professor: Professor Shahriar Manufacturing Systems & Engineering Management Dept.  Faculty.
Thesis Format and Submission
HE 520: Higher Education Laws and Regulations Unit One Seminar Pre-Seminar Welcome to HE 520: Higher Education Laws and Regulations, Unit One Seminar Seminar.
Principles of Computer Science I Honors Section Note Set 1 CSE 1341 – H 1.
G53SEC 1 Reference Monitors Enforcement of Access Control.
EECS 110: Introduction to Programming for Non-Majors Aleksandar Kuzmanovic Northwestern University
LISA A. TOBLER, M.S. Introduction to Psychology PS124 Seminar #1.
Project Documentation Presentation Fall Outline Purpose Types of Documentation Individual Documentation Project Documentation Team Documentation.
10 Aug 2010 ECE/BENG-493 SENIOR ADVANCED DESIGN PROJECT Meeting #2.
FINAL REPORT LAYOUT Criteria for Formatting of the Project Report.
PROCESS MANUAL PROCESS MANUAL Teaching Someone to do Something.
Using PowerPoint Josef Vice CM105 Unit 8 Seminar.
Virtual Memory Pranav Shah CS147 - Sin Min Lee. Concept of Virtual Memory Purpose of Virtual Memory - to use hard disk as an extension of RAM. Personal.
2014 AP ® Pre-Administration Session at West Mecklenburg High School “Don’t Just Choose AP…Be AP!”
COT 4600 Operating Systems Fall 2010 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:30-4:30 PM.
LISA A. TOBLER, M.S. Introduction to Psychology PS124 Seminar #1.
Text2PTO: Modernizing Patent Application Filing A Proposal for Submitting Text Applications to the USPTO.
Lead from the front Texas Nodal 1 Registration Market Call Nov 21, 2008.
CMPT 463 Artificial Intelligence Instructor: Tina Tian.
 1- Definition  2- CRM  3- Analytics  4- Tools.
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO CE101.
BUS 210 Week 8 CheckPoint IT Applications Presentation Check this A+ tutorial guideline at CheckPoint-IT-Applications-Presentation.
Computer Networks CNT5106C
100 minute paper assignment
ESøknad - A web-based system for the electronic submission of research funding applications A short presentation of the system intended for principal investigators/researchers.
IT 200 STUDY Education for Service-- it200study.com.
Computer Networks CNT5106C
Term Project Assignment
ESøknad - A web-based system for the electronic submission of research funding applications A short presentation of the system intended for principal investigators/researchers.
ECE 544 Project III Description and Timeline March 23, 2018
CSE1311 Introductory Programming for Engineers & Scientists
First Semester 1439/1440 Welcome 
Guidelines for virtual poster presenter
Front page must highlight: ▪ Title ▪ Name ▪ Affiliations ▪ Logo of affiliations Contents must include but not limited to: ▪ Introduction/ Background (include.
Computer Networks CNT5106C
Instructor: Xiuwen Liu Department of Computer Science
Guidelines for oral presenter
Presentation transcript:

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology IT 101 Week 10 Chapter 11 Tuesday Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology NJIT

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 2 Team Class Project - Guidelines Each team will submit a hard copy of their completed “Class Research Project” (in PDF format) in class on Tuesday November 21, 2006 (each student must sign the front cover) Each team will also submit (Nov. 21, 2006) an electronic copy of the completed “Class Research Project” and Power Point Presentation to Professor Foster via to address: Ensure that each students contribution to the project is separated by a new project heading in the final report (each student is also required to have contributed a minimum of (5) pages) For each day your submissions are late the combined team will loose five (5) grade points off your class project and oral presentations All team member Power Point Presentations will be combined into one PPT file (presentation) for submission (the slides should follow “the flow” of your Class Research Project report)

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 3 Oral Class Project Guidelines Team presentation order will be determined by a lottery drawing and will begin on 11/30 Teams will have 20 minutes or 5 minuets per team member to speak to the slides he / she created. (each student will present a minimum of two slides with max of four) Teams will present using a business acumen Each team member will be graded for his / her part of the presentation separately and this will represent 50% of the students overall class project grade Oral Presentation Grading Elements 1.Content, format and number of slides 2.Knowledge of information on slides 3.Verbal presentation of slides 4.Personal demeanor during presentation

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 4 Admin HW for Chapter 11 “Short Answer” questions 1, 2 and 6 only

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 5 IT Computers 101 Lets Go! Chapter Eleven – Applications

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 6 Let me begin by quickly outlining what we just announced. Microsoft and Novell, starting today, have agreed to build and market solutions so that Novell's technology works on Microsoft's and vice versa. Specifically, customers will now be able to run virtualized SUSE Linux Enterprise on Windows or Windows on SUSE Linux Enterprise. This landmark agreement also calls for both Microsoft and Novell to provide patent coverage to each others' customers for our respective products. Why is that important? It's important because our customers shouldn't have to worry about legal matters when it comes to which operating system they use. They also shouldn't have to worry about barriers such as intellectual property agreements, who owns which patent portfolio, and indemnification. None of those issues move their business forward. Now many of those barriers have been removed. For info only not on a test For info only Not on a test

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 7 Applications Software development is when the fingers touch the keyboard Security should be planned and managed throughout the lifecycle of a system Application Threats 1. Object reuse – erase all sensitive data from storage or memory before another subject accesses it 2. Garbage collection –a process should deallocate committed storage, memory segments, and resources when they are no longer needed by the application 3. Trap doors and back doors – mechanisms that allow and entity into the application and system by bypassing access controls 4. Buffer overflow – when bounds checking is not implemented, long strings of data can be accepted. Is that it is larger than allocated memory buffer, the data flows into another memory segment 5. Time of check / Time of use (TOC/TOU) – control information is modified between time the system checks and when the variable and when it is actually used 6. Covert channel – when two or more objects use resources (storage and Timing) as a communication channel in a way that was not intended

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 8 Applications Fifth Generation Languages Artificial Intelligence and Natural 1. Natural – ultimate non-procedural language (everyday language people speak) 2. Expert Systems – computer programs designed to mimic human logic / algorithm (if-then) 3. Artificial Neural Network – Network model that is based on the neural structure of the brain (ANN units communicate strictly through electrical voltage)

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 9 Good Luck! Class Projects will be due on Tuesday Nov. 21st (do not miss this class) NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university Top 10 Technology Universities by R&D Expenditure 1. Massachusetts Institute of Technology 2. Georgia Institute of Technology 3. California Institute of Technology 4. Virginia Polytechnic Institute 5. Carnegie Mellon University 6. Texas Tech University 7. New Jersey Institute of Technology 8. Rensselaer Polytechnic Institute 9. Northeastern University 10. Michigan Technological University