GLC LIST of Those Who ATTENDED
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Case Against the GOT' O William a . Wulf, Carnegie-Mellon Universit Y
A Case Against the GOT' O William A . Wulf, Carnegie-Mellon Universit y ABSTRAC T suggestion to ban the goto appears to have been a part of the computing folklore for several years , It has been proposed, by E . W . Dijkstra and others , to this author's knowledge the suggestion wa s that the goto statement in programming language i s first made in print by Professor E . W . Dijkstra i n a principal culprit in programs which are diffi- a letter to the editor of the _Communications o f cult to understand, modify, and debug . More cor- the ACM in 1968 (1) . rectly, the argument is that it is possible t o In this paper we shall examine the rational e use the goto to synthesize program structures wit h for the elimination of the Soto in programin g these undesirable properties . Not all uses of th e languages, and some of the theoretical and practi- goto are to be considered harmful ; however, it i s cal implications of its (total) elimination . further argued that the "good" uses of the got o fall into one of a small number of specific case s RATIONAL E which may be handled by specific language con- structs . This paper summarizes the arguments i n At one level, the rationale for eliminatin g favor of eliminating the goto statement and som e the poto has already been given in the introduc- of the theoretical and practical implications o f tion . Namely, it is possible to use the goto in a the proposal . manner which obscures the logical structure of a program to a point where it becomes virtually im- KEY WORDS AND PHRASES : programming, programmin g possible to understand (1,3,4), It is not claimed languages, goto-less programming, structured pro- that every use of the goto obscures the logica l grammin g structure of a program ; it is only claimed that i t CR CATEGORIES : 4 .2, 4 .22, 5 .2 4 is possible to use the Soto to fabricate a "rat' s nest" of control flow which has the undesirabl e INTRODUCTION properties mentioned above . -
Student Handbook 2020-2021
Student Handbook 2020-2021 Master of Science in Public Policy and Management Two Year Track Three Semester Track Data Analytics Track Global Track 1 Contents 1 INTRODUCTION .................................................................................................................................. 4 2 Mission statement ................................................................................................................................... 4 3 CURRICULUM ..................................................................................................................................... 4 3.1 MSPPM Requirements .............................................................................................................. 5 3.2 MSPPM Two-Year Track Requirements .................................................................................. 5 3.3 MSPPM Three-Semester Track Requirements ......................................................................... 6 3.4 MSPPM-Data Analytics Track Requirements .......................................................................... 7 3.5 MS-Global Track Requirements ............................................................................................... 9 3.6 Information Technology Core Requirement ........................................................................... 10 3.7 Advanced Coursework ............................................................................................................ 12 3.7.1 Advanced Policy Topics (12 units required) ...................................................................... -
Conference Proceedings from the Annual Carnegie Cognition Symposium (10Th, Vail, Colorado, June 2-8, 1974)
DOCUMENT RESUME ED 123 584 CS 002 668 AUTHOR Klahr, David, Ed. TITLE Cognition and Instruction; Conference Proceedings from the Annual Carnegie Cognition Symposium (10th, Vail, Colorado, June 2-8, 1974). INSTITUTION Carnegie-Mellon Univ., Pittsburgh, Pa. Dept. of Psychology. SPONS AGENCY Office of Naval Research, Washington, D.C. Personnel and Training Research Programs Office. PUB DATE May 76 CONTRACT N00014-73-C-04^5 NOTE 356p.; Some parts of text may not reproduce clearly due to smallness of type* ' EDRS PRICE *MF-$0.83 HC-$19.41 Plus Postage. DESCPIPTOES *Cognitive Development; *Cognitive Processes; Comprehension; Conference Reports; Educational Psychology; *Instruction; *Instructional Design; *Learning; Memory; Problem Solving; *Research ABSTRACT This book, containing conference papers and a summary of activities, focuses on the contributions which current research in cognitive psychology can make to the solution of problems in instructional design. The first three parts of the book include sets of research contributions followed by discussions: part one deals with different strategies for instructional research, part two concerns process and structure in learning, and part three concentrates on the processes that underlie the comprehension of verbal instructions. The fourth part contains three Chapters that offer critiques, syntheses, and evaluations of various aspects of the preceding chapters. A list of references and author and subject indexes are included. (JM) *********************************************************************** Documents acquired by ERIC include many informal unpublished * materials not available from other sources. ERIC makes,every effort * * to obtain the best copy available. Nevertheless, items of marginal * * reproducibility are often encountered and this affects the quality * * of the microfiche and hardcopy reproddctions ERIC makes available * * via, the ERIC Document Reproduction Service (EDRS). -
Does the Seventh Amendment Compel Fact-‐Finding Before
HAVE WE GONE TOO FAR: DOES THE SEVENTH AMENDMENT COMPEL FACT-FINDING BEFORE REACHING A DECISION ON PATENT- ELIGIBLE SUBJECT MATTER? JESSE D.H. SNYDER* I. INTRODUCTION Something seems amiss. Settled notions of what can be Patenta- ble are changing.1 To complicate matters further, so far, neither the SuPreme Court nor the Federal Circuit has addressed whether the in- quiry into Patent-eliGible subject matter is factual, legal, or both. And while the scoPe of Patentable subject matter is understandably con- strictinG, the end result may not be coterminous with the SuPreme Court’s Guidance in Alice Corporation Party Limited v. CLS Bank.2 Under Alice, which built uPon the Patent-eliGible subject matter frameworks of Prior cases, for those Patent claims that are directed to a Patent- ineligible concePt (e.G., abstract ideas), Patentability turns on whether an “inventive concePt” exists to “‘transform the nature of the claim’ into a Patent-eliGible aPPlication.”3 The lower courts have seized on the Alice holding, inhuming Pa- tents whose subject-matter failures render them invalid as a matter of law. But what if the means adoPted by the lower courts to reach that leGal conclusion also sidestePs certain constitutional guarantees? What if they are simPlifyinG the analysis at a facial level when a more granular investigation is required? What if, at the motion to dismiss staGe, fact-findinG is still required to determine whether a Patent is * 2015-2016 term law clerk to the Honorable Jimmie V. Reyna of the U.S. Court of APPeals for the Federal Circuit. I earned my J.D., summa cum laude, from Texas Wesleyan School of Law and my B.S. -
Chief Data Officer Certificate Program
CHIEF DATA OFFICER CERTIFICATE PROGRAM The success of a modern enterprise is increasingly dependent on its ability to maximize value from data and manage large, diverse, and rapidly changing data. Most executives admit that their organizations mismanage their information assets, leading to missed business opportunities and undue expense. To establish a data-driven culture change in an organization, management needs to engage with stakeholders across the enterprise to secure buy-in and ongoing support in treating data as an asset — not data as a byproduct. To cope with these challenges, many organizations are appointing data governance executives, or Chief Data Officers (CDO), whose responsibilities span the recognition of opportunities afforded by new data sources to ensuring compliance with emerging regulations around security, privacy, and bias. The CMU Heinz College Chief Data Officer Certificate Program provides current or future CDOs a thorough understanding of critical data management related responsibilities and the foundations for developing a robust enterprise data governance program. The 13-module CDataO certificate program will cover key areas – data engineering, data science, decision making, emerging technology, change management, CDO operations, communication/influencing/ leadership skills - to help data executives build important data analytical and decision-making capabilities to better support the strategic mission of their organizations. To meet the needs of these busy professionals, the six-month program will be delivered as a hybrid model, blending the benefits of focused in-person sessions at our CMU campus in Pittsburgh, PA with synchronous distance learning. Participants can expect to develop a tight-knit cohort of their peers. Distance teaching allows participants the flexibility to engage at their own pace to develop their skills to become an effective data executive. -
Campus Floods
Modern food regulation Athlete Profi le: Emily Pittsburgh provides plenty policies harken back to the Baddock fi nds success on of cheap – or even free – early 1900s • A7 and off the court • A10 cultural activities • B8 FORUM SPORTS PILLBOX thetartan.org @thetartan August 29, 2011 Volume 106, Issue 2 Carnegie Mellon’s student newspaper since 1906 Obama introduces Pittsburgh hit with rain; campus fl oods initiative at NREC SARAH ZAKRAJSEK were at 9.1 percent, accord- Personnel Manager ing to the U.S. Bureau of La- bor Statistics. “If we want a President Barack Obama robust, growing economy, spoke on the morning of Fri- we need a robust, grow- day, June 24, at Carnegie ing manufacturing sector,” Mellon’s National Robotics Obama said. “And that’s why Engineering Center (NREC), we’re here. Carnegie Mellon located in Pittsburgh’s Law- is a great example of what it renceville neighborhood. means to move forward.... In- Obama addressed an ex- novations led by your profes- cited crowd of about 150 in- sors and your students have vite-only guests, the majority created more than 300 com- of whom were chosen by the panies and 9,000 jobs over White House in addition to a the past 15 years.” select list chosen by Carnegie Bruce Brown, CEO of Mellon. The invitees included Proctor and Gamble, at- students, faculty, university tended the president’s ad- leadership, alumni, and cor- dress. Brown cited research porate partners. The presi- institutions such as Carnegie dent announced a new ini- Mellon as “part of the United tiative called the Advanced States’ competitive advan- Manufacturing Partnership tage.” He agreed with the (AMP), a national effort to president on the importance unite industry, universities, of advanced manufacturing. -
Conflict Kitchen Reopens After Threats Uber Gets Sigma Phi Pittsburgh Comes to License Brian Trimboli Campus News Editor
Bahcall explains distribution Women’s soccer dominates Walk the Moon performs in of dark matter • A4 in NCAA • A12 Wiegand Gymnasium • B5 SCITECH SPORTS PILLBOX thetartan.org @thetartan November 17, 2014 Volume 109, Issue 12 Carnegie Mellon’s student newspaper since 1906 Alpha Conflict Kitchen reopens after threats Uber gets Sigma Phi Pittsburgh comes to license BRIAN TRIMBOLI campus News Editor CHELSEA DICKSON College students around Staffwriter Pittsburgh were disappoint- ed early last summer when Given the many time an investigation by the commitments and respon- Pennsylvania Public Utility sibilities the average Carn- Commission (PUC) led to egie Mellon student juggles cease-and-desist orders for daily, it could be hard to both Uber Technologies Inc. understand why one would and Lyft Inc. On Thursday, want to find yet another however, the PUC voted 4–1 reason not to sleep. Yet for to grant an experimental li- some undergraduate men cense to Uber, allowing the at Carnegie Mellon, the op- company to operate across portunity to create a new Pennsylvania. Before, Uber community of friends and and Lyft were both operat- leaders was too exciting to ing under temporary au- turn down. thority from the PUC. Alpha Sigma Phi and Phi Uber and Lyft were Delta Theta are the new- founded in San Francisco est arrivals on Carnegie in 2009 and 2012, respec- Mellon’s ever-developing tively. Both companies use fraternity scene. Alpha Sig- an app — available on iOS ma Phi is still in the early and Android — to give “colony” stage of forma- rides to users from drivers tion, while Phi Delta Theta at a cheaper rate than most was officially designated a existing taxicab services. -
Boundless Arrives at a the World Needs the Neutrality and Expertise Time of Year Associated with Renewal and of Librarians More Than Ever Before
CARNEGIE MELLON UNIVERSITY LIBRARIES SPRING 2017 two A Conversation with: Alice Bright three Enhance + Services: A New Look for Sorrells Library five Steward + Collections: Three Sheets to the Wind six Spotlight: A Class in Shoemaking seven Insight: Keith Webster eight Build + Services: A Partnership for the 21st Century Library nine IDeATe: Visit from MythBusters Star ten 3MT@CMU Front cover: The new “portal” connects the front and back sections of the renovated Sorrells Library Back cover: 2017 First Place Awardee Diane Nelson presenting her Three Minute Thesis Keith G. Webster, Dean of University Libraries Erika Linke, Associate Dean Contact the Dean’s Office 412-268-2447 library.cmu.edu A CONVERSATION WITH Alice Bright by Terrence Chiusano Alice Bright (DC 1973), retired on parents never dwelled too much on their March 1, 2017 after 37 years as college days so I had this good feeling about a librarian at Carnegie Mellon the campus, but not too many details. Stories University. During this time, she I’ve heard about my grandfather say that he held the positions of reference was very kind and helpful to students; I wish librarian, serials librarian, and head that I could have known him. When he died, of cataloging. In addition to her the school closed for his funeral. long career at University Libraries, Your first day on the job here was as an she is a third-generation alumna. assistant reference librarian at the science Colleague Terrence Chiusano talks library. On your final day of work, you to Alice about her legacy at CMU. attended the reopening of what is now known as the Roger Sorrells Engineering & Science Library after extensive renovations. -
Management Consulting Syllabus 98
MANAGEMENT CONSULTING 94808, 94408 FALL 2020 Heinz College, Carnegie Mellon University Monday, 6:40 - 9:30 PM EST, Section A, 12 Units Dr. Chris W. Brussalis Jordan R. Pallitto Office: 412.722.1111, ext. 111 Office: 412.722.1111, ext. 115 Cell: 412.720.4669 Cell: 724.493.3517 [email protected] [email protected] [email protected] [email protected] Description This is an applications course exploring the profession of management consulting and the art and science of providing management counsel to organizations in the public and private sectors. The course is designed to provide a framework for collaborating with organizations to solve problems and to execute projects efficiently and effectively. Students will explore and utilize practical tools that will enable them to solve problems and execute projects as external or internal consultants or as individual contributors or leaders within organizations. The course introduces frameworks as well as quantitative and qualitative methods that are typically used in management consulting. Course Objectives 1. View problems from the perspective of practicing experts in the field. 2. Utilize quantitative and qualitative methods and interpersonal skills to collaboratively solve problems and execute solutions. 3. Expose students to the classical literature of the profession. 4. Prepare solutions through case studies utilizing technical expertise and experience. 5. Apply course theories and principles to provide consulting services to actual clients. Learning Outcomes 1. Define management consulting and understand why and how consultants are utilized. 2. Apply a consulting process framework to an actual client engagement. 3. Understand the value of stakeholder engagement and how to apply it. -
Downloads of Information Outside the Patterns of Normal Behavior by Those Employees
Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model* 1 Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model* Andrew P. Moore [email protected], Dawn M. Cappelli [email protected], Thomas C. Caron1 [email protected], Eric Shaw2 [email protected], Randall F. Trzeciak [email protected] CERT®3 Program, Software Engineering Institute and CyLab at Carnegie Mellon University 4555 Fifth Avenue Pittsburgh, PA 15213 Abstract. A study conducted by the CERT Program at Carnegie Mellon University’s Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage includes incidents in which the insider’s primary goal is stealing confidential or proprietary information from the organization with the intent to use it to take to a new job, to get a new job, or to start a business. It does not include cases of in which insiders sell an organization’s information. This paper describes general observations about, and a preliminary system dynamics model of, this class of insider crime based on our empirical data. This work generates empirically-based hypotheses for validation and a basis for identifying mititgative measures in future work. 1 Introduction Since 2002, the CERT Program at Carnegie Mellon University’s Software Engineering Institute has been gathering and analyzing actual malicious insider incidents, including IT sabotage, fraud, theft of confidential or proprietary information, espionage, and potential threats to the critical infrastructure of the United * This paper appears in the proceedings of the 1st International Workshop on Managing Insider Security Threats (MIST 2009), Purdue University, West Lafayette, 15-19 June 2009. -
Sharon Mccoy Carver
Sharon McCoy Carver Home Address: Business Address: 1579 Cumberland St. The Children's School Pittsburgh, PA 15205 MMC 17 (412) 937-2307 Carnegie Mellon University Pittsburgh, PA 15213 (412) 268-1499 Education 1986 Ph.D. Department of Psychology Cognitive Development Carnegie Mellon University Pittsburgh, PA 15213 1982 A.B. Princeton University Psychology Princeton, NJ 08544 Teach. Cert. K-12 Biology Employment History 1993 - Director, Children's School, Carnegie Mellon University Teaching Professor, Department of Psychology Beginning 2005, Co-Training Director, PIER (Program in Interdisciplinary Education Research) 1988 - 1993 Assistant Professor Graduate School of Education and Human Development and Department of Psychology, University of Rochester 1986 - 1988 Post-Doctoral Research Associate with David Klahr Department of Psychology, Carnegie Mellon University Research Interests Development of Cognitive Skills, Educational Applications of Cognitive Theory, Early Childhood Developmentally Appropriate Practice, Classroom Research and Reform, Integration of Technology Across the Curriculum My research approach involves clear specification of developmental objectives for young children, designing instruction and assessment based on the specification, implementing the instruction and assessment collaboratively with teachers, and, when possible, conducting detailed studies of the learning impact on the targeted skills using naturalistic and structured observation, 1/25/13 interview, and protocol analysis techniques. I am working collaboratively with the staff and undergraduates at the CMU Children's School to test the impact of specific aspects of our program on young childrenʼs development, using experimental studies within the classroom setting. In addition, I work with senior honors students on projects related to early childhood development (e.g., the impact of observation coaching on childrenʼs graphic representations). -
THE INAUGURATION of FARNAM JAHANIAN
THE INAUGURATION of FARNAM JAHANIAN AS THE 10TH PRESIDENT OF CARNEGIE MELLON UNIVERSITY OCTOBER 26, 2018 2 #CMUFARNAM TABLE OF CONTENTS 2 About Farnam Jahanian 4 Investiture Ceremony Program 6 Keynote Speakers 8 Performers 10 Ceremonial Traditions 12 Board of Trustees 14 University Leadership 15 Past Presidents 16 Inauguration Performers 18 University Delegates 19 Alma Mater INVESTITURE CEREMONY 1 FARNAM JAHANIAN President, Henry L. Hillman President’s Chair Farnam Jahanian was appointed the 10th president of Carnegie Mellon University by its Board of Trustees in March 2018. He was previously the university’s provost and later served as interim president from July 2017 to February 2018. A nationally recognized computer scientist, entrepreneur, public servant and higher education leader, Jahanian brings to CMU extensive leadership and administrative expertise, not only in advancing research and education within and across disciplines, but also in translating research into technologies and practices that benefit society. He first joined CMU as vice president for research in 2014, where he was responsible for nurturing excellence in research, scholarship and creative activities. In his role as 2 #CMUFARNAM provost and chief academic officer from May 2015 to June 2017, Jahanian had broad responsibility for leading CMU’s schools, colleges, institutes and campuses and was instrumental in long-range institutional and academic planning and implementation. Prior to coming to CMU, Jahanian led the National Science Foundation Directorate for Computer and Information Science and Engineering (CISE) from 2011 to 2014. He guided CISE, with a budget of almost $900 million, in its mission to advance scientific discovery and engineering innovation through its support of fundamental research.