Presentation is loading. Please wait.

Presentation is loading. Please wait.

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.

Similar presentations


Presentation on theme: "(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology."— Presentation transcript:

1 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology IT 101 Week 10 Chapter 11 Tuesday Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology NJIT

2 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 2 Team Class Project - Guidelines Each team will submit a hard copy of their completed “Class Research Project” (in PDF format) in class on Tuesday November 21, 2006 (each student must sign the front cover) Each team will also submit (Nov. 21, 2006) an electronic copy of the completed “Class Research Project” and Power Point Presentation to Professor Foster via e-mail to address: stephen.foster@njit.edustephen.foster@njit.edu Ensure that each students contribution to the project is separated by a new project heading in the final report (each student is also required to have contributed a minimum of (5) pages) For each day your submissions are late the combined team will loose five (5) grade points off your class project and oral presentations All team member Power Point Presentations will be combined into one PPT file (presentation) for submission (the slides should follow “the flow” of your Class Research Project report)

3 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 3 Oral Class Project Guidelines Team presentation order will be determined by a lottery drawing and will begin on 11/30 Teams will have 20 minutes or 5 minuets per team member to speak to the slides he / she created. (each student will present a minimum of two slides with max of four) Teams will present using a business acumen Each team member will be graded for his / her part of the presentation separately and this will represent 50% of the students overall class project grade Oral Presentation Grading Elements 1.Content, format and number of slides 2.Knowledge of information on slides 3.Verbal presentation of slides 4.Personal demeanor during presentation

4 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 4 Admin HW for Chapter 11 “Short Answer” questions 1, 2 and 6 only

5 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 5 IT Computers 101 Lets Go! Chapter Eleven – Applications

6 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 6 Let me begin by quickly outlining what we just announced. Microsoft and Novell, starting today, have agreed to build and market solutions so that Novell's technology works on Microsoft's and vice versa. Specifically, customers will now be able to run virtualized SUSE Linux Enterprise on Windows or Windows on SUSE Linux Enterprise. This landmark agreement also calls for both Microsoft and Novell to provide patent coverage to each others' customers for our respective products. Why is that important? It's important because our customers shouldn't have to worry about legal matters when it comes to which operating system they use. They also shouldn't have to worry about barriers such as intellectual property agreements, who owns which patent portfolio, and indemnification. None of those issues move their business forward. Now many of those barriers have been removed. For info only not on a test For info only Not on a test

7 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 7 Applications Software development is when the fingers touch the keyboard Security should be planned and managed throughout the lifecycle of a system Application Threats 1. Object reuse – erase all sensitive data from storage or memory before another subject accesses it 2. Garbage collection –a process should deallocate committed storage, memory segments, and resources when they are no longer needed by the application 3. Trap doors and back doors – mechanisms that allow and entity into the application and system by bypassing access controls 4. Buffer overflow – when bounds checking is not implemented, long strings of data can be accepted. Is that it is larger than allocated memory buffer, the data flows into another memory segment 5. Time of check / Time of use (TOC/TOU) – control information is modified between time the system checks and when the variable and when it is actually used 6. Covert channel – when two or more objects use resources (storage and Timing) as a communication channel in a way that was not intended

8 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 8 Applications Fifth Generation Languages Artificial Intelligence and Natural 1. Natural – ultimate non-procedural language (everyday language people speak) 2. Expert Systems – computer programs designed to mimic human logic / algorithm (if-then) 3. Artificial Neural Network – Network model that is based on the neural structure of the brain (ANN units communicate strictly through electrical voltage)

9 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 9 Good Luck! Class Projects will be due on Tuesday Nov. 21st (do not miss this class) NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university. 2003 Top 10 Technology Universities by R&D Expenditure 1. Massachusetts Institute of Technology 2. Georgia Institute of Technology 3. California Institute of Technology 4. Virginia Polytechnic Institute 5. Carnegie Mellon University 6. Texas Tech University 7. New Jersey Institute of Technology 8. Rensselaer Polytechnic Institute 9. Northeastern University 10. Michigan Technological University


Download ppt "(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology."

Similar presentations


Ads by Google