Microcomputer Applications for Business and Economics
CGS 2100
Fall 2013

Syllabus

Calendar (HTML)

Overview

Pearson's List of Links for Chapter 1

Pearson's Sample Questions for Chapter 1

Pearson's List of Links for Chapter 2

Pearson's Sample Questions for Chapter 2

Pearson's List of Links for Chapter 3

Pearson's Sample Questions for Chapter 3

Pearson's List of Links for Chapter 4

Pearson's Sample Questions for Chapter 4

Pearson's List of Links for Chapter 5

Pearson's Sample Questions for Chapter 5

Pearson's List of Links for Chapter 6

Pearson's List of Links for Chapter 9

Pearson's List of Links for Chapter 11

Pearson's List of Links for Chapter 12

How to get to the slides

Pearson Study Guide Links on one page

In The News

2013-06-25: Raspberry Pi bot tracks hacker posts to vacuum up passwords and more

2013-06-25: Cassini captures gigantic hurricane on Saturn in exquisite detail

2013-06-25: It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis: 1930s — 1960s

2013-08-01: Trusting iPhones plugged into bogus chargers get a dose of malware

2013-08-26: The Guardian's NSA Files collection of articles (also related, The Guardian's general NSA keyword articles)

2013-08-26: They Know Much More Than You Think

2013-08-27: Snowden Interview

2013-08-27: Firefox Security and Privacy Add-ons

Technology in our lives

2013-06-25: Computer cold call virus scam — scammers outsmarted!

2013-06-25: FEMA Cyberattack advice webpage

2013-06-26: Wireless Sensing

2013-06-26: Sony's New Smartwatch

2013-06-26: Finance CIOs sweat as regulators prepare to probe aging mainframes

2013-07-13: New Bluetooth, Audio, TPM Requirements Coming for Windows 8 devices

2013-07-13: Your Facebook Friends May Be Evil Bots

2013-07-18: Nations Buying as Hackers Sell Flaws in Computer Code

2013-07-18: Stuxnet (Wikipedia)

2013-07-18: GRC.com --- in particular, look at the new page on Fingerprinting

2013-07-18: DHS Eyes Sharing Zero-Day Intelligence With Businesses

2013-07-22: FBI Cyber-crime news archive

2013-07-22: Getting the message, at last

2013-07-22: Messages from the past

2013-07-24: The Coming Push to Open Source Everything

2013-07-24: The perfect Trojan horse

2013-07-24: The firewall threat you don't know

2013-07-24: Power Pwn

Technology in History

Most histories of computing leave out the contributions of the number theorists in the early 20th century who constructed specialized computing devices.

The most prominent of these were Derrick Norman Lehmer and Derrick Henry Lehmer.

Here are a few web pages with information about their computing devcies:

A recent talk given by Arjen Lenstra

Lehmer Factoring Machines

Technology and Society

Artificial Intelligence (usually called "AI") has long been a fascination of computer scientists and the general public.

Stanford Encyclopedia of Philosophy: The Turing Test

The Trouble with the Turing Test

Eugene Goostman



XKCD (of course); it's at http://imgs.xkcd.com/comics/turing_test.png

Third-Party Web Tracking: Policy and Technology

Sixth Sense

Google Glass

November, 1977 edition of BYTE magazine

MITS

Altair 8800

IMSAI 8080

Apple I

Apple II

Xerox PARC

Mosaic

Konrad Zuse

3d printing

Another printing technology: Dye sublimation printer

Blu-ray BD-R optical drive

BBC Science Podcast RSS feed

Ten Risks of PKI

Mike Shapiro Hidden Camera Cartoon

Computer and Information Ethics

Electronic Frontier Foundation

Electronic Privacy Information Center

ACM Code of Ethics

Ethics in Computer (NC State)

Digital Rights

Megaupload and the Government's Attack on Cloud Computing

GPL's list of Open Source Software Licenses

Meet the Machines that Steal Your Phone's Data

Difference Engine: Pay up or shut up

You're infected — if you want to see your data again, pay us $300 in Bitcoins

Forget the Stereotype: Profile of an IT Worker