CSC/CYEN 132 the Science of Computing III Living with Cyber

Total Page:16

File Type:pdf, Size:1020Kb

CSC/CYEN 132 the Science of Computing III Living with Cyber CSC/CYEN 132 The Science of Computing III Living with Cyber Student Edition CSC/CYEN 132: The Science of Computing III Living with Cyber (part 3 of 3) Course Description:Additional coverage of algorithm analysis and development, object- oriented programming, data structures, computer architecture, and problem solving; applications of computing. This is the third Living with Cyber course. Course Outcomes: Upon successful completion of this course, students should: 1.Be able to identify a problem's variables, constraints, and objectives; 2.Understand more advanced data structures and their applications (e.g., dictionaries, lists, sets); 3.Be able to write object-oriented programs in a general-purpose programming language (e.g., Python); 4.Understand more advanced concepts of the object-oriented paradigm (e.g., polymorphism, coupling, and cohesion); 5.Have a basic understanding of signed and loating point number, and character representation in computers; 6.Have a basic understanding of how a computer is made (e.g., ALU, CPU, memory, I/O); 7.Have exposure to various applications of computing (e.g., problem solving with computers, software engineering, artiicial intelligence); and 8.Work in groups on a signiicant computing project with a presentation. Prerequisite(s): A grade of C or better in CSC 131 or CYEN 131. Textbook: The Living with Cyber text (in PDF format) is available for free online at www.livingwithcyber.com. Grades: Your grade for this class will be determined by dividing your total earned points by the total points possible. In general, graded components will fall into the following categories: Attendance: ~2.5% Puzzles: ~2.5% Raspberry Pi activities/project: ~30% Programs: ~15% Major tests: ~50% The Raspberry Pi kit that will be used throughout the Living with Cyber curriculum in the 2017- 18 academic year will be provided to participating students at no cost. Students who drop the Living with Cyber curriculum before inishing it must return the kit. Students not majoring or minoring in Computer Science, or majoring Cyber Engineering, will be loaned the kit and must return it at the completion of the Living with Cyber curriculum. Please see www.livingwithcyber.com for more information about device requirements. Students needing testing or classroom accommodations based on a disability are encouraged to discuss those needs with me as soon as possible. For more information, please visit www.latech.edu/ods. If you are ill, you can get treatment at the Wellness Center in the Lambright Intramural Center building. The nurses there can treat minor illnesses and can give vouchers to see doctors in town for more serious illnesses. Since you have already paid for this service through your fees, there is usually no additional charge. Also, if you sign a HIPPA release form at the time of your visit, they can verify that you were ill and thus you will have an excused absence for missing class. In accordance with the Academic Honor Code, students pledge the following: “Being a student of higher standards, I pledge to embody the principles of academic integrity.” For the Academic Honor Code, please visit http://www.latech.edu/documents/honor-code.pdf. All Louisiana Tech students are strongly encouraged to enroll and update their contact information in the Emergency Notiication System. It takes just a few seconds to ensure you’re able to receive important text and voice alerts in the event of a campus emergency. For more information on the Emergency Notiication System, please visit http://ert.latech.edu. TOPICS COVERED: • More on Data Structures • More on Objects • Building a Computer • Application (Beam): Problem Solving with Computers • Application (Beam): Software Engineering • Algorithms...Reloaded • Application (Beam): Artiicial Intelligence The Science of Computing III Living with Cyber Lesson Summary # Title Pillar(s) Description/Topic(s) Periods 01 More on Data Data Structures 1. Useful list functions 2 Structures 2. List comprehensions 3. Sets 4. Dictionaries 5. Dictionary comprehensions 6. Room Adventure...Reloaded 7. Data structures summary 02 More on Objects Computer 1. Review of inheritance 4 Programming 2. Abstraction and modularization 3. Polymorphism and method lookup 4. Multiple inheritance 5. Abstract methods and abstract classes 6. Coupling and cohesion 03 Building a Computer 1. Signed numbers (signed magnitude, one's 5 Computer Architecture complement, two's complement) 2. Characters 3. Floating point numbers 4. Combinational circuits: decoders, encoders, multiplexers, and demultiplexers 5. Sequential circuits: R-S flip-flops and clocked R-S flip-flops 6. Building a simple computer 04 Problem Solving Beam 1. The changing role of computers 1 with Computers (Application #2) 2. Communication-oriented applications 3. Spreadsheets (including relative and absolute cell referencing, and replication and built-in functions) 4. Solving problems with spreadsheets 5. The Chaos Game spreadsheet 05 Software Beam 1. Introduction to software engineering 1 Engineering (Application #3) 2. Analysis and design 3. Documentation 4. Prototyping 5. Iterative software development 6. Errors, error handling, exceptions, exception handling, and error recovery 7. Testing and debugging 8. Software engineering in action: the game of life 06 Algorithms...Reload Algorithms, 1. Introduction to Java 3 ed Computer 2. A first Java program Gourd Last modified: 13 Mar 2018 Programming 3. Data types, constants, and variables 4. I/O, operators, and primary control constructs 5. Variable scope and program flow 6. Arrays 7. The foreach loop 8. The selection sort and binary search in Java 9. Laying out classes (Fraction...reloaded) 10. Inheritance, abstract classes and methods, and more (Shapes...reloaded) 07 Artificial Beam 1. Introduction to artificial intelligence (AI) 1 Intelligence (Application #4) 2. Can intelligent machines be constructed? 3. The Turing Test 4. A brief history of AI 5. Game playing and search techniques 6. Automated reasoning 7. Neural networks and machine learning Pi Activities 3 Final Pi Project 5 Exams 3 Housekeeping 1 Slack 1 TOTAL 30 Gourd Last modified: 13 Mar 2018 CSC/CYEN 132: The Science of Computing III Last updated: Lessons Raspberry Pi Activities Puzzles Videos Assessments 13 Mar 2018 1 Housekeeping W 2 Program 1 F 2D Points WEEK 1 More on Data Structures 3 Eight Queens -- Microsoft HoloLens M Knight's Tour 4 W 5 F WEEK 2 More on Objects 6 Program 2 M 2D Points...Plotted 7 W 8 Pi Activity 1 F Room Adventure...Revolutions WEEK 3 9 Final Pi Project Program 3 M (introduction) The Chaos Game 10 Building a Computer W 11 Exam 1 More on Data Structures More W on Objects WEEK 4 12 Nonogram -- The Backwards Brain Bicycle F Nonograms! 13 Program 4 Building a Computer M Shapes 14 W WEEK 5 15 F Pi Activity 2 Paper Piano CSC/CYEN 132: The Science of Computing III Last updated: Lessons Raspberry Pi Activities Puzzles Videos Assessments 13 Mar 2018 Paper Piano 16 M 17 Building a Computer W WEEK 6 18 Exam 2 F Building a Computer 19 Beam Program 5 Problem Solving with M The Chaos Game...Reloaded Computers 20 Beam W Software Engineering WEEK 7 21 Final Pi Project Einstein's Puzzle F 22 M Algorithms...Reloaded 23 W WEEK 8 24 Final Pi Project F 25 Algorithms...Reloaded The Expert M 26 MarI/O: Machine Learning for Beam Video Games W Artificial Intelligence -or- WEEK 9 How Machines Learn 27 Final Pi Project F 28 Exam 3 Algorithms...Reloaded M Beams 29 Final Pi Project W (presentations) WEEK 10 30 SLACK F Note: The beam on Software Engineering must be covered due to its material being required knowledge. Although the beam on Problem Solving with Computers is useful for students, the remaining beams can be replaced with others (based on instructor expertise and interest) as desired. The Science of Computing III Living with Cyber Lesson: More on Data Structures Pillar: Data Structures So far, you have been introduced to various elementary and high level data structures: arrays, linked lists, stacks, queues, and binary trees. Specific to Python, you have used lists (similar to arrays) in your programs. In this lesson, we will discuss some powerful functions that work with lists and introduce several new data structures. Useful list functions As you have seen, Python lists are extremely useful data structures. In the first Python lesson, you were introduced to several list functions that, for example, reverse a list, sort a list, etc. In this lesson, we will cover several more powerful built-in functions that are quite useful when used with lists. The filter function returns a new list consisting of only the items within an existing list for which some user-defined function is true. The user-defined function can be anything that evaluates an input in the existing list and returns true or false. The format for the filter function is as follows: filter(function, list) The parameter function represents the name of the function that will evaluate each item in the existing list. The parameter list is, of course, the existing list of items to evaluate. Suppose, for example, that you want to find all of the multiples of three or five that are less than or equal to 30 and make a list of them. Here's one way to do this: multiples = [] for i in range(3, 31): if (i % 3 == 0 or i % 5 == 0): multiples.append(i) However, here's how it could be done with the filter function: def f(x): return (x % 3 == 0 or x % 5 == 0) multiples = filter(f, range(3, 31)) Both of these methods generate the following list: [3, 5, 6, 9, 10, 12, 15, 18, 20, 21, 24, 25, 27, 30] The map function returns a new list consisting of the return values generated by a user-defined function on each item in an existing list.
Recommended publications
  • Download Sample
    Entrepreneurship Entrepreneurship FIFTH EDITION Andrew Zacharakis Babson College Andrew C. Corbett Babson College William D. Bygrave Babson College VP AND EDITORIAL DIRECTOR Mike McDonald EXECUTIVE EDITOR Lise Johnson EDITORIAL MANAGER Judy Howarth CONTENT MANAGEMENT DIRECTOR Lisa Wojcik CONTENT MANAGER Nichole Urban SENIOR CONTENT SPECIALIST Nicole Repasky PRODUCTION EDITOR Indirakumari, S. COVER PHOTO CREDIT © PitukTV/Shutterstock This book was set in 10/12pt Times by SPi Global, Pondicherry, India and printed and bound by Quad Graphics. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship. Copyright © 2020, 2017, 2014, 2011, 2008 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per‐copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www.copyright.com).
    [Show full text]
  • Programsko Rješenje Logičke Zagonetke Nonogram U Programskom Jeziku C
    Programsko rješenje logičke zagonetke nonogram u programskom jeziku C#. Džijan, Matej Undergraduate thesis / Završni rad 2018 Degree Grantor / Ustanova koja je dodijelila akademski / stručni stupanj: Josip Juraj Strossmayer University of Osijek, Faculty of Electrical Engineering, Computer Science and Information Technology Osijek / Sveučilište Josipa Jurja Strossmayera u Osijeku, Fakultet elektrotehnike, računarstva i informacijskih tehnologija Osijek Permanent link / Trajna poveznica: https://urn.nsk.hr/urn:nbn:hr:200:718571 Rights / Prava: In copyright Download date / Datum preuzimanja: 2021-09-24 Repository / Repozitorij: Faculty of Electrical Engineering, Computer Science and Information Technology Osijek SVEUČILIŠTE JOSIPA JURJA STROSSMAYERA U OSIJEKU FAKULTET ELEKTROTEHNIKE, RAČUNARSTVA I INFORMACIJSKIH TEHNOLOGIJA Sveučilišni studij PROGRAMSKO RJEŠENJE LOGIČKE ZAGONETKE NONOGRAM U PROGRAMSKOM JEZIKU C# Završni rad Matej Džijan Osijek, 2018. SADRŽAJ 1. UVOD ...................................................................................................................................... 1 1.1. Zadatak rada ..................................................................................................................... 1 2. RJEŠAVANJE NONOGRAMA .............................................................................................. 2 2.1. Koraci rješavanja .............................................................................................................. 2 2.2. Primjer rješavanja nonograma .........................................................................................
    [Show full text]
  • The Fewest Clues Problem of Picross 3D
    The Fewest Clues Problem of Picross 3D Kei Kimura1 Department of Computer Science and Engineering, Toyohashi University of Technology, 1-1 Hibarigaoka, Tempaku, Toyohashi, Aichi, Japan [email protected] Takuya Kamehashi Department of Computer Science and Engineering, Toyohashi University of Technology, 1-1 Hibarigaoka, Tempaku, Toyohashi, Aichi, Japan [email protected] Toshihiro Fujito2 Department of Computer Science and Engineering, Toyohashi University of Technology, 1-1 Hibarigaoka, Tempaku, Toyohashi, Aichi, Japan [email protected] Abstract Picross 3D is a popular single-player puzzle video game for the Nintendo DS. It is a 3D variant of Nonogram, which is a popular pencil-and-paper puzzle. While Nonogram provides a rectangular grid of squares that must be filled in to create a picture, Picross 3D presents a rectangular parallelepiped (i.e., rectangular box) made of unit cubes, some of which must be removed to construct an image in three dimensions. Each row or column has at most one integer on it, and the integer indicates how many cubes in the corresponding 1D slice remain when the image is complete. It is shown by Kusano et al. that Picross 3D is NP-complete. We in this paper show P that the fewest clues problem of Picross 3D is Σ2 -complete and that the counting version and the another solution problem of Picross 3D are #P-complete and NP-complete, respectively. 2012 ACM Subject Classification Theory of computation → Theory and algorithms for appli- cation domains Keywords and phrases Puzzle, computational complexity, fewest clues problem Digital Object Identifier 10.4230/LIPIcs.FUN.2018.25 Acknowledgements The authors are grateful to the reviewers for their valuable comments and suggestions.
    [Show full text]
  • Giants: the Global Power Elite
    Secrecy and Society ISSN: 2377-6188 Volume 2 Number 2 Teaching Secrecy Article 13 January 2021 Giants: The Global Power Elite Susan Maret San Jose State University, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the Civic and Community Engagement Commons, Other Sociology Commons, Politics and Social Change Commons, and the Public Affairs, Public olicyP and Public Administration Commons Recommended Citation Maret, Susan. 2021. "Giants: The Global Power Elite." Secrecy and Society 2(2). https://doi.org/10.31979/2377-6188.2021.020213 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/13 This Book Review is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution 4.0 License. Giants: The Global Power Elite Keywords human rights, C. Wright Mills, openness, power elite, secrecy, transnational corporations, transparency This book review is available in Secrecy and Society: https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/13 Maret: Giants: The Global Power Elite Review, Giants: The Global Power Elite by Peter Philips Reviewed by Susan Maret Giants: The Global Power Elite, New York: Seven Stories Press, 2018. 384pp. / ISBN: 9781609808716 (paperback) / ISBN: 9781609808723 (ebook) https://www.sevenstories.com/books/4097-giants The strength of Giants: The Global Power Elite lies in its heavy documentation of the "globalized power elite, [a] concept of the Transnationalist Capitalist Class (TCC), theorized in the academic literature for some twenty years" (Phillips 2018, 9).
    [Show full text]
  • 13Th International Conference on Cyber Conflict: Going Viral 2021
    2021 13th International Conference on Cyber Confict: Going Viral T. Jančárková, L. Lindström, G. Visky, P. Zotz (Eds.) 2021 13TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: GOING VIRAL Copyright © 2021 by NATO CCDCOE Publications. All rights reserved. IEEE Catalog Number: CFP2126N-PRT ISBN (print): 978-9916-9565-4-0 ISBN (pdf): 978-9916-9565-5-7 COPYRIGHT AND REPRINT PERMISSIONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-proft or non-commercial purposes, providing that copies bear this notice and a full citation on the frst page as follows: [Article author(s)], [full article title] 2021 13th International Conference on Cyber Confict: Going Viral T. Jančárková, L. Lindström, G. Visky, P. Zotz (Eds.) 2021 © NATO CCDCOE Publications NATO CCDCOE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily refect the policy or the opinion of NATO Phone: +372 717 6800 CCDCOE, NATO, or any agency or any government. NATO CCDCOE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication.
    [Show full text]
  • Being Lord Grantham: Aristocratic Brand Heritage and the Cunard Transatlantic Crossing
    Being Lord Grantham: Aristocratic Brand Heritage and the Cunard Transatlantic Crossing 1 Highclere Castle as Downton Abbey (Photo by Gill Griffin) By Bradford Hudson During the early 1920s, the Earl of Grantham traveled from England to the United States. The British aristocrat would appear as a character witness for his American brother-in-law, who was a defendant in a trial related to the notorious Teapot Dome political scandal. Naturally he chose to travel aboard a British ship operated by the oldest and most prestigious transatlantic steamship company, the Cunard Line. Befitting his privileged status, Lord Grantham was accompanied by a valet from the extensive staff employed at his manor house, who would attend to any personal needs such as handling baggage or assistance with dressing. Aboard the great vessel, which resembled a fine hotel more than a ship, passengers were assigned to accommodations and dining facilities in one of three different classes of service. Ostensibly the level of luxury was determined solely by price, but the class system also reflected a subtle degree of social status. Guests in the upper classes dressed formally for dinner, with men wearing white or black tie and women wearing ball gowns. Those who had served in the military or diplomatic service sometimes wore their medals or other decorations. Passengers enjoyed elaborate menu items such as chateaubriand and oysters Rockefeller, served in formal style by waiters in traditional livery. The décor throughout the vessel resembled a private club in London or an English country manor house, with ubiquitous references to the British monarchy and empire.
    [Show full text]
  • The Creek "Migration Legend"
    UCLA UCLA Electronic Theses and Dissertations Title Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community Permalink https://escholarship.org/uc/item/2qm3x2bd Author Koons, Ryan Abel Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Ethnomusicology by Ryan Abel Koons 2016 © Copyright by Ryan Abel Koons 2016 ABSTRACT OF THE DISSERTATION Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community by Ryan Abel Koons Doctor of Philosophy in Ethnomusicology University of California, Los Angeles, 2016 Professor Tara Browner, Chair This dissertation presents an ethnography utilizing a multispecies perspective of the "busk" ritual cycle as performed by the southeastern Muskogee Creek American Indian community, Pvlvcekolv (Apalachicola). Humans construct humanity and personhood partially via interactions with other-than-human persons, such as animals, plants, and objects. I examine ritualized interactions between humans and others-than-human in a southeastern Indigenous "natureculture," exploring the intersections of ontology, personhood, and performance practice. Pvlvcekolv, an animistic Florida-based tribal town with a ceremonial Fire that pre-dates European Contact, maintains a centuries-old ritual tradition, the busk. Sometimes known as "Green Corn Ceremonialism," many Native communities share this tradition, including ii Cherokee, Chickasaw, Seminole, Yuchi, and other Creek peoples historically and in the present day. Performing the songs, dances, and ritual actions of the busk places participants into dialogue with other-than-human persons.
    [Show full text]
  • The Contested Space of STEM-Art Integration: Cultural Humility and Collaborative Interdisciplinarity
    The Contested Space of STEM-Art Integration: Cultural Humility and Collaborative Interdisciplinarity Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University By Kerry Dixon Graduate Program in Education: Teaching and Learning The Ohio State University 2016 Dissertation Committee: Dr. Valerie Kinloch, Advisor Dr. Patricia A. Brosnan Dr. Candace Jesse Stout ii Copyrighted by Kerry Dixon 2016 ii Abstract This dissertation study is part of Project ASPIRE (Apprenticeships Supported by Partnerships for Innovation and Reform in Education) (U.S. Department of Education Award Number U336S090049), which created a new model for urban teacher education based on principles of equity, diversity, and social justice. That model was focused on preparing highly qualified teachers in hard-to-staff content areas to teach in high-need public middle and high schools. This dissertation focuses on one component of the overarching ASPIRE project: a teacher inquiry group comprised of veteran secondary science, mathematics and world language teachers charged with determining how arts- integrated teaching and learning could inform the preparation of pre-service urban teachers in their content areas. Specifically, the study explores how four of the inquiry group members—one mathematics teacher and three science teachers—engaged with and enacted arts integration in their own classrooms. While many arts supporters have advocated for the inclusion of the arts within STEM (Science, Technology, Engineering and Math) education policy, funding and practice, there is currently little research-based consensus on what exactly constitutes high quality STEM-Art integration. Furthermore, there is scant research-based guidance on how such integration can be systematically enacted to meet the needs of all students.
    [Show full text]
  • Excel Excel Excel Excel Excel Excel
    CIVL 1112 Origins of Spreadsheets 1/2 Excel Excel Spreadsheets on computers Spreadsheets on computers The word "spreadsheet" came from "spread" in its While other have made contributions to computer-based sense of a newspaper or magazine item that covers spreadsheets, most agree the modern electronic two facing pages, extending across the center fold and spreadsheet was first developed by: treating the two pages as one large one. The compound word "spread-sheet" came to mean the format used to present book-keeping ledgers—with columns for categories of expenditures across the top, invoices listed down the left margin, and the amount of each payment in the cell where its row and column intersect. Dan Bricklin Bob Frankston Excel Excel Spreadsheets on computers Spreadsheets on computers Because of Dan Bricklin and Bob Frankston's Bricklin has spoken of watching his university professor implementation of VisiCalc on the Apple II in 1979 and the create a table of calculation results on a blackboard. IBM PC in 1981, the spreadsheet concept became widely known in the late 1970s and early 1980s. When the professor found an error, he had to tediously erase and rewrite a number of sequential entries in the PC World magazine called VisiCalc the first electronic table, triggering Bricklin to think that he could replicate the spreadsheet. process on a computer, using the blackboard as the model to view results of underlying formulas. His idea became VisiCalc, the first application that turned the personal computer from a hobby for computer enthusiasts into a business tool. Excel Excel Spreadsheets on computers Spreadsheets on computers VisiCalc was the first spreadsheet that combined all VisiCalc went on to become the first killer app, an essential features of modern spreadsheet applications application that was so compelling, people would buy a particular computer just to use it.
    [Show full text]
  • University of Florida Thesis Or Dissertation Formatting
    BETWEEN NATIONAL ATTACHMENTS, ROOTED GLOBALISM, AND BORDERLESS UTOPIAS: SEARCHING FOR IMAGINED COMMUNITIES IN LATIN AMERICA’S BOOMING ECONOMIC RELATIONS WITH THE ARAB WORLD By KEVIN B. FUNK A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2016 © 2016 Kevin B. Funk To Macarena, our growing family, and the struggle for a better world ACKNOWLEDGMENTS This research project, like all products of human creation, represents the collectively harvested fruit of the efforts of many. It has benefited enormously from the participation and interventions of countless family members, friends, compañeros, students, and colleagues, only some of whom I am able to acknowledge here. In particular, I would like to recognize the direct and indirect contributions of: my dissertation chair, Ido Oren, for his incisive comments, critical disposition, and ready willingness to allow me to pursue my interests in accordance with my values, along with my other committee members—Aida Hozic, Leann Brown, Philip Williams, and Matthew Jacobs—for their guidance, support, and mentorship; Sue and Pat, for their behind-the- scenes efforts; the many teachers, ranging from Chris Warnick to Dan O'Neill, who labored doggedly to cultivate my critical faculties and challenged me to set out on my own intellectual journeys, along with the many students for whom I hope to have done the same; my fellow activists in the union movement, for their dedication, solidarity, and unwillingness to be atomized and alienated through the inhospitable and individualistic professionalization structures and practices that surround us; and Mauro Caraccioli and Sebastián Sclofsky, for their amistad, along with the former’s sunny disposition in the face of adversity and the latter’s righteous indignation over the injustices that surround us, and their collective insistence that we engage in “a ruthless criticism of everything existing” (Marx 1843a).
    [Show full text]
  • Personal Computing
    Personal Computing Thomas J. Bergin ©Computer History Museum American University Recap: Context • By 1977, there was a fairly robust but fragmented hobbyist-oriented microcomputer industry: – Micro Instrumentation Telemetry Systems (MITS) – Processor Technology – Cromemco – MicroStuf – Kentucky Fried Computers • Two things were needed for the personal computer revolution: 1) a way to store and retrieve data, and 2) a programming language in which to write applications. Homebrew Computer Club • March 5, 1975: the Amateur Computer Users Group (Lee Felsenstein, Bob Marsh, Steve Dompier, BobAlbrecht and 27 others) met in Gordon French’s garage, Menlo Park, CA • 3rd meeting drew several hundred people and was moved to the Coleman mansion • Stanford Linear Accelerator Center’s auditorium – Steve Wozniak shows off his single board computer – Steve Jobs attends meetings Homebrew-ed • 21 companies formed: – Apcose Apple – Cromemco Morrow – North Star Osborne • West Coast Computer Faire • Byte magazine, September 1975 • Byte Shop Both: images.google.com And then there was Traf-O-Data • October 28, 1955: William H. Gates III born – father: attorney mother: schoolteacher • Lakeside School: Lakeside Programming Group – Mothers Club: access to time-shared system at GE – Students hired by local firm to debug software – First computer program: Tic-Tac-Toe (age 13) – Traf-O-Data to sell traffic mgt. software (age 16) • 1973, Bill Gates enrolls at Harvard in pre-law. • Paul Allen is in his second year. January 1975, Popular Electronics: Altair • Allen shows
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]