Tuesday, November 29, 2011

Facebook settles FTC Information Privacy Complaint

Seal of the United States Federal Trade Commis...
Image via Wikipedia
11/29/11: Facebook has settled a complaint by the Federal Trade Commission that the social networking giant deceived consumers by promising privacy protections while it shared and made user data more public, according to the FTC.

Wednesday, November 16, 2011

Databases & Metadata in Action: Jeopardy Champion

In September, 2011, Computer Science grad student Roger Craig set a new single-day record of $77,000 on Jeopardy.

In a video, Craig explains how he trained for Jeopardy by creating an application that allowed him to power study.  If you listen to the first four minutes of his explanation, you will hear how he used metadata to create a database of hundreds of thousands of Jeopardy questions and answers.

In November 2011 Roger Craig won the Jeopardy Tournament of Champions, taking home a quarter million dollars in cash winnings.

Monday, November 14, 2011

HTML5: A Look Behind the Technology Changing the Web

A year and a half after Steve Jobs endorsed it in an unusual essay, a set of programming techniques called HTML5 is rapidly winning over the Web. Don Clark has details on Digits (WSJ).

Friday, November 4, 2011

Monday, October 31, 2011

Rising Value of IT Degrees

Image representing New York Times as depicted ...NYT 10/20/11: If you’re trying to figure out what to study in college, a new report suggests you would do well choosing a major in science, technology, engineering or math.

Science and technology have “become the common currency in the labor market,” but don’t count the liberal arts out, either.

Ch. 13 FIT: Passwords

How to Make Usable and Secure Passwords.

Check if Your Password Was Compromised.

Usable Password Generator.

Sunday, October 23, 2011

Saturday, October 22, 2011

Artificial Retinas: UO Physics Research

A subject in ch. 11 of our textbook Fluency w/IT is human tri-chromatic color perception.

A couple minutes with… Richard Taylor" features a UO professor of physics, whose research includes artificial retinas that could help restore eyesight in those with retinal diseases.

Wednesday, October 19, 2011

The Zetta-Flood is Coming

SAN JOSE, CA - AUGUST 10:  A sign is posted in...This from Dave Evans, Cisco's Chief Futurist:

This year (2011) the world is creating 1.2 zettaBytes (1 sextillion) of unique data, mainly as a result of HD Video. Evans expects that 91% of internet data will be HD video by 2020.  -from CACM, 9/11.

FIPS in the News: IMDb/Amazon

The IMDb logo.An anonymous actress claims in a million-dollar federal lawsuit that her offers for roles dropped sharply after the popular Internet Movie Database published damaging personal information: her age.

The actress provided credit card information and her real name – but not her age – when she bought the service, according to the lawsuit filed last week in U.S. District Court against Seattle-based IMDb and its parent company, Amazon.com.

IMDb used that information - without her permission - to uncover her date of birth and added it to her profile on the website.

Tuesday, October 18, 2011

Europe vs. Facebook: Fair Information Practice Principles

privacyFair Information Practices are covered in ch. 13 of our Fluency texbook.

As a contemporary case study, read how a 24 year old law student from Vienna, Max Schrems, has filed 22 complaints with the Irish Data Protection Commissioner targeting Facebook's lack of compliance with  EU requirements.

Article: 24 year old student lights match - Europe versus Facebook.

Associated website.

The Fair Information Practice Principles (FIPPs)

In 1973, the U. S. Department of Health, Education and Welfare published five principles that would allow the benefits of computerization to go forward, but at the same time provide safeguards for personal privacy.
The principles also provide an excellent tool to judge the merits of cases such as Europe vs. Facebook:

To evaluate the merits of Mr. Schrems' case against Facebook, read the first two sections of the IT Law Wiki article: (i) The HEW Report and, (ii) European Developments.

Wednesday, October 12, 2011

Hazards of the FaceBook Generation

An old Social Security card with the "NOT...Image via WikipediaIf a stranger came up to you on the street, would you give that person your name, Social Security number and e-mail address?

If your answer is No, read on:

Saturday, October 8, 2011

The Tilde (~) in Unix & URLs

A tilde (Punctuation mark)Image via Wikipedia
UNIX

In a Unix pathname, the tilde (~) is an abbreviation for the "path to your home directory".

Example (not using ~): 

/home4/susanQ/public_html/110/ is the Unix path to Susan Queue's 110 folder on shell.uoregon.edu.

Example (using ~): 

~/public_html/110/ is the Unix path to Suzie's folder on shell.uoregon.edu

URLs

In a URL, the tilde (~) has a related but different meaning: it stands for the path to your public_html folder on the web server.

Example: 

http://ix.cs.uoregon.edu/~susanQ/ is the URL that corresponds to the Unix path /home4/susanQ/public_html/

Example: 

http://ix.cs.uoregon.edu/~susanQ/110/ is the URL that corresponds to the Unix path /home4/susanQ/public_html/110/
Enhanced by Zemanta

Thursday, October 6, 2011

UO TextPad License

UO TextPad License

The University of Oregon has a site license for TextPad, a text editorwith enhanced Web development features(Windows only). The license covers current UO students, faculty and staff only.

Windows users can download and install TextPad from the UO Software Center.
  1. Uncompress the downloaded file (TextPad.zip), and run the installer (.exe).
  2. Drag TExtPad License.txt onto your desktop.
  3. Start TextPad, and open TextPad License.txt.
You will need the UO License Code to register the product. The License Code is contained in the file TextPad License.txt.

If you do not enter the UO License Code in TextPad, your downloaded version will terminate after 45 days, plus you will be constantly prompted to purchase TextPad.

To enter the License Code and register your copy of TextPad:
  1. Start TextPad, and open the file TextPad License.txt.
  2. Select all the lines including "BEGIN LICENSE" and "END LICENSE", and copy them to the clipboard using Ctrl+C.
  3. Choose the "Enter License Code" command from the Help menu in TextPad.
  4. Paste the license information into the dialog box, using Ctrl+V.
  5. Click OK.

Enhanced by Zemanta

Tuesday, September 27, 2011

Browser "Cache" Memory

web browsers Read how browser's cache pages at the CIS 110 blog.

Browswer Cache Memory

web browsersThe Browser Cache:

For efficiency reasons, browsers will sometimes cache pages/images.

I.e., , to avoid redundant downloads, the browser will store a copy of a page/image on the hard drive (along with a time stamp).

The next time the page/image is requested, it will first check the cache.

If a copy is found, it sends a conditional request to the server.
     ==>  "send this page/image only if it has been changed since the timestamp"

If the server copy has not changed, the server sends back a brief message and the browser simply uses the cached copy.

This does not always work, however.

Force Reload (in general):

But, by holding the Shift key down when you reload/refresh a page, you can force the browser to reload the page from the server, not the cache.

'Open this page outside of the Blackboard frameset & hit shift-Reload/Refresh to see the latest version'

Force Reload (in Blackboard):

In Blackboard, the shift-reload command will simply reload the Blackboard frameset rather than the page that is displayed inside the frame.

To force a reload of the web page itself you must first open that page outside of the Blackboard frame: Right-click the web page and choose This Frame > Show Only This Frame. Then use the shift-reload to see the non-cached version of the page.

Sunday, September 25, 2011

How do I get into the 110 lab I want if it is full?

PC Lab in Tuttleman- classroom set upImage by wsh1266 via Flickr If you are unable to enroll in the course or any lab because the course is full, your only option is to Use the Wait List.

However, if you are already enrolled in the course and a lab but would like to switch to a lab that is full, here's what to do:

Go to the lab you want and ask the GTF if there's room for you. If your GTF says Yes, make sure that s/he has your name removed from your original lab and added to the new one. If the GTF says No, you will have to attend a different lab.

For labs that are full, two names may be added beyond the max on the condition that the added students bring a notebook computer or watch over someone's shoulder on days when the lab is full.

Students actually registered for the lab are guaranteed a workstation if they need one.

Monday, September 19, 2011

UOwireless Network: How To Bypass Login

Image via Wikipedia Q: I have to log in every time I use uowireless. How do I set it up so I don't have to log in every time?
A: Go to wireless.uoregon.edu and run the setup process to enable UO Secure. Using the UO Secure wireless network remembers your password and encrypts information sent between your device and our network.
From https://it.uoregon.edu/
Enhanced by Zemanta

Monday, September 12, 2011

Moonshadow Mobile: Big-Data Web Apps in Eugene

web appsImage by Maqroll via FlickrFrom the Eugene Register Guard 9/4/11:

Eugene technology company Moonshadow Mobile is struggling to find employees to meet customer demand for its Internet-based technology programs.

Its first offerings — geared for political and government customers — quickly assemble large amounts of information gathered from U.S. Census and voter registration reports and display them on Google or Bing maps.

Using voter registration information, mapping technology, satellite imagery and data from the U.S. Census, the firm has developed a political redistricting program called Borderline, which allows users to instantly change the boundaries of political districts on maps and get population and other data on the new districts.
Enhanced by Zemanta

Thursday, September 1, 2011

1-Armed Bandits && Demorgan's Law

When simulating the spin of a three-wheel slot machine, how do we detect three of a kind?





The following condition recognizes three of a kind:

var s1 = 'lemon', s2 = 'lemon', s3 = 'lemon';
alert((s1 == s2) && (s1 == s3) && (s2 == s3));

We can modify it to control a loop that spins the wheels:

       s1 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);
       s2 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);
       s3 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);

       while(!((s1 == s2) && (s1 == s3) && (s2 == s3))){
           //spin again...
       }

Applying Demorgan's Law we get:

       while(!(s1 == s2) || !(s1 == s3) || !(s2 == s3)){
           //spin again...
       }

Equivalently:

       while((s1 != s2) || (s1 != s3) || (s2 != s3)){
           //spin again...
       }

To hit the jackpot, we must spin the wheels at least once. This leads to a final, simpler version using a do-while:

do{
       s1 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);
       s2 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);
       s3 = RandomOneOf(['lemon', 'cherry', 'bar', 'donut']);
}while ((s1 != s2) || (s1 != s3) || (s2 != s3));

The do...while loop will always be executed at least once, even if the condition is false, because the statements are executed before the condition is tested.

It is a post-test loop; the while loop and the for loop are pre-test loops.

Use the do-while when you know you will repeat an action at least once.


Web Apps w/o Programming: If this, then that (IFTTT)

IFTTT. Put the internet to work for you by creating tasks that fit this simple structure:if this then that.

Tuesday, August 30, 2011

Steve Jobs Quotes

Steve Jobs on the iPadThis will be of interest to more than just Apple enthusiasts:
Steve Job' Best Quotes (Wall St. Journal)

Wednesday, August 17, 2011

The Colbert Report on Cloud Computing.

SOMF Cloud Computing ModelImage via Wikipedia
The Colbert Report.
The Word - Head in the Cloud. 09-Aug-2011.
Technology turns people into empty flesh terminals ;-)

Monday, August 15, 2011

Usable Password Generator

Although Password can be played without any eq...Image via WikipediaIf you are interested in trying a usable, easy to remember password, here is an online generator:

xkcd Password Generator

Thursday, July 28, 2011

How to Make Usable and Secure Passwords

Password (game show)Image via WikipediaIt's no fun to have your Facebook or email password compromised. Here's an interesting article (and a FAQ) on how to prevent it.

The Usability of Passwords.
Written by Thomas Baekdal.

The Usability of Passwords - FAQ.
Written by Thomas Baekdal.

"Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones."
One of the comments mentions that using fractured grammar may be a good idea:
'An intelligent phrase-based dictionary attack would give statistically probable phrases a higher weight than statistically improbable ones, and give known quotations an even higher weight. If you know the target's media preferences (as you might find on a social media profile) that narrows your initial search significantly.'

'Moving beyond that you'd try grammatically correct phrases over incorrect ones -- "fluffy bunny" is a lot more statistically probable than "bunny fluffy", because in English adjectives almost always precede the nouns they modify.'
Another comment mentions the common use of Rainbow Tables to do a simple lookup of encrypted passwords.

Note that Unix servers (like shell.uoregon.edu) use password encryption techniques "that make precomputation attacks [i.e., rainbow tables] for almost any length of password unfeasible against these systems for the foreseeable future."

You can check to see if any of your current passwords are in known rainbow tables. Should I Change my Password?
Enhanced by Zemanta

Security: Check if Your Password Was Compromised.

Hacker inside


Enhanced by Zemanta

Thursday, July 21, 2011

Friday, July 1, 2011

Web Apps w/o Programming: If this, then that (IFTTT)

IFImage by alex drennan via Flickr
IFTTT. Put the internet to work for you by creating tasks that fit this simple structure:
if this then that.

 A Web Tool That Lets You Automate the Internet. (NYT)

7 Ways to Automate Your Life With ifttt. (NYT)

Wednesday, March 30, 2011

Google Student Jobs

lowercase "g"Image via WikipediaNot all jobs at Google are tech:

Google Student Jobs

Monday, March 28, 2011

CIT 281 Meets in B90C-D Onyx Bridge (Science Libr.)

CIT 281 meets in B90C-D Science Library.

Create your own video slideshow at animoto.com.

How to Subscribe to this Blog

You can subscribe to this blog's RSS feed by using Firefox's Live Bookmarks feature. Then all new posts will be "pushed" to your browser. Here's how to do it:

1. In Firefox choose Bookmarks > Organize Bookmarks, and create a "Feeds" folder on the bookmarks toolbar.

2. Open this blog in Firefox, scroll to the bottom and click on "Subscribe to: Posts (Atom)". A new page will open in the browser: select Live Bookmarks in the drop-down list, and click Subscribe Now. Add the bookmark to your Feeds folder. Presto!

The drawback to using Live Bookmarks is that the bookmarks exist only on the computer you used to subscribe. An alternative is to use a hosted feed reader such as Google Reader. Then your feeds are stored in the "cloud" and may be accessed from any machine by logging in to your Google account.

Reminder to use Google ReaderImage by Sue Waters via Flickr



Reblog this post [with Zemanta]

Tuesday, March 1, 2011

SSH and the Unix Shell's Erase Key

Polished Turtle Shell
SSH sometime uses the Delete key to erase characters, but I prefer to use the Backspace key. How do I set it up?

You have several options, as follows:

  • Windows: Start SSH, select Edit > Settings > keyboard, then select Backspace sends Delete (or whichever key you want to use), then click OK.

  • OS X: Start Applications > Utilities > Terminal, the select Terminal > Window Settings..., then select Keyboardin the drop-down list, then check Delete key sends backspace.

  • Set your Unix shell's Erase key--

    Use Pico or Emacs to edit your login shell's startup file, .bash_profile:

    $ pico .bash_profile

    Add this line to the .bash_profile:

    stty erase '^h'

    save the file and exit pico.

Customizing your Unix Command Line Prompt

UnixImage by p373 via FlickrHow can I get the path for the current directory displayed in my Unix prompt?

Read Generic UNIX Interactive Prompts

21 c. Resumes

Social Media: Changing BusinessImage by Intersection Consulting via Flickr

21 c. Job Title: Data Wrangler

A stitched panorama of downtown Portland, OR a...Image via WikipediaPeriscopic.com's (PDX) job description for Data Wrangler.

CIT covers most of the desired skill-set.

Read about the screen-scraper tool Needlebase at ReadWriteWeb.

Monday, February 21, 2011