• Home
  • Remote Education Assistance
  • Class Video Links
  • Computers and your family
  • About
  • Video Links

Steve Simpson, Glendale College Computer Instructor

~ Designed For My Students, Friends and Family!

Steve Simpson, Glendale College Computer Instructor

Category Archives: Intro to Computers

What computers can’t do

10 Monday Aug 2015

Posted by simpsongcc in Future Technology, Integrated Technology, Intro to Computers

≈ Leave a comment

Tags

New Tech


Interesting article….

http://www.computerworld.com/article/2959534/personal-technology/just-what-can-t-computers-do.html?phint=newt%3Dcomputerworld_thisweek&phint=idg_eid%3De6a70c0a773b5dd93399e3283c15a855#tk.CTWNLE_nlt_thisweek_2015-08-10&siteid=&phint=tpcs%3D&phint=idg_eid%3De6a70c0a773b5dd93399e3283c15a855

Engadget’s Best of CES 2015 finalists

07 Wednesday Jan 2015

Posted by simpsongcc in For Fun, Future Technology, Integrated Technology, Internet, Intro to Computers, New Technology

≈ Leave a comment

Tags

News


Some interesting stuff here. Take a look.

http://www.engadget.com/2015/01/07/introducing-the-best-of-ces-2015-finalists/

Quantum Computing…What is it?

24 Thursday Jul 2014

Posted by simpsongcc in Future Technology, GCC, Intro to Computers, New Technology

≈ 1 Comment


Here is a nice video explaining Quantum Computing

https://www.youtube.com/watch?v=jg8iCnQTLfM

How do Computers Work?

23 Wednesday Jul 2014

Posted by simpsongcc in GCC, Intro to Computers

≈ Leave a comment


Here is a three part You Tube series on how computers work.
https://www.youtube.com/watch?v=AtqjxyV9t1I
https://www.youtube.com/watch?v=9a7XQmEBK5Q
https://www.youtube.com/watch?v=E5SED8le34o

Some interesting info on ICANN from Vint Cerf, “Father of the Internet”

23 Wednesday Jul 2014

Posted by simpsongcc in GCC, Internet, Intro to Computers

≈ Leave a comment


How Web Addresses work:

For the very first time, a computer passes test for Artificial Intelligence

09 Monday Jun 2014

Posted by simpsongcc in Future Technology, Intro to Computers, New Technology

≈ Leave a comment


For the First Time Ever, a Computer Passed Turing Test for Artificial Intelligence

http://www.engadget.com/2014/06/08/supercomputer-passes-turing-test/

 

The Women who Created the Technology Industry

18 Tuesday Mar 2014

Posted by simpsongcc in GCC, Intro to Computers

≈ Leave a comment


Grace_Hopper_and_UNIVAC
I often talk about a few of these women in some of my classes, such as Grace Hopper (above). Here is a nice article about women in technology, with some great photographs. Enjoy.

http://www.techrepublic.com/pictures/photos-the-women-who-created-the-technology-industry/1/

Pictures, pictures, pictures!

11 Wednesday Dec 2013

Posted by simpsongcc in GCC, Integrated Technology, Internet, Intro to Computers, PowerPoint, Word

≈ Leave a comment


Tis the season for picture taking! So where do I put all those pictures?

If you want to save them along with any other files you might have, the cloud is a good place.

If you have a Windows device (especially Win 8), Skydrive is easy to use. You just need an account: http://www.live.com

Another good cloud service is http://www.dropbox.com

If you want to just have a place to save photos your Phone or tablet can be set to save to the following sites:

http://www.flickr.com/ (Now you get 1 Terabyte free!)
http://photobucket.com/ (You get 2 GB free)
http://www.shutterfly.com
https://www.facebook.com/  (Unlimited storage of photos)

With flikr and shutterfly you can make books, pillows, blankets, mugs, etc.. with your pictures on them. Great for gift-giving!

If you take a lot of pictures….check this tool out! http://www.eye.fi/

Remember, MS Word has some good photo editing tools but one of the best is a free tool from Google called Picasa. http://picasa.google.com/

Here is some info on cameras you might find useful and a site that reviews them.
http://www.digital-photo-secrets.com/tip/333/do-more-megapixels-mean-better-photo-quality/
http://www.dpreview.com

Have fun!

Computer measurements

28 Saturday Sep 2013

Posted by simpsongcc in GCC, Intro to Computers

≈ Leave a comment


I often get asked what is a megabyte, etc…

So I added a link to the right called measurements that will take you to a nice list of a whole bunch of computer related measurments.

http://www.wu.ece.ufl.edu/links/dataRate/DataMeasurementChart.html

see also….http://en.wikipedia.org/wiki/Units_of_information

How do they relate?

  • 1 bit – answer to an yes/no question
  • 1 byte – a number from 0 to 255.
  • 90 bytes: enough to store a typical line of text from a book.
  • 512 bytes = ½ KiB: the typical sector of a hard disk.
  • 1024 bytes = 1 KiB: the classical block size in UNIX filesystems.
  • 2048 bytes = 2 KiB: a CD-ROM sector.
  • 4096 bytes = 4 KiB: a memory page in x86 (since Intel 80386).
  • 4 kB: about one page of text from a novel.
  • 120 kB: the text of a typical pocket book.
  • 1 MB – a 1024×1024 pixel bitmap image with 256 colors (8 bpp color depth).
  • 3 MB – a three minute song (128k bitrate)
  • 650-900 MB – an CD-ROM
  • 1 GB – 114 minutes of uncompressed CD-quality audio at 1.4 Mbit/s
  • 15 GB – number of bytes Google offers you for free.
  • 8/16 GB – size of a normal flash drive
  • 4 TB – The size of a $300 hard disk
  • 966 EB – prediction of the volume of the whole internet in 2015

Outrace the Robots! Learning is key to future!!!

13 Thursday Dec 2012

Posted by simpsongcc in GCC, Intro to Computers

≈ Leave a comment


If you have taken my classes you know I have told you that going to classes and keeping up with technology will be a key to your future success.

Please ready the following article:

http://bits.blogs.nytimes.com/2012/12/12/eric-schmidt-how-we-outrace-the-robots/

Creating strong passwords is easier than you think

13 Tuesday Nov 2012

Posted by simpsongcc in GCC, Intro to Computers, Security Issues

≈ Leave a comment


Even with smartcards, biometrics, and other multifactor authentication solutions [1], everyone still uses basic name/password log-on combinations. Security experts always recommend “strong passwords.” But what qualifies as a strong password? And how do you avoid creating a password so strong you can’t remember it?   According to NIST (National Institute of Standards and Technology), a strong password should contain no fewer than 12 characters, a rule adopted by the U.S. government in 2007 and further defined in the U.S. Government Configuration Baseline [2]. Admin passwords should be 15 characters. Readers may sigh at those lengths, but they’ve been the recommended minimum for half a decade. Anything shorter is not considered secure.   [ InfoWorld Test Center reviews 7 password managers [3]. Find out which one comes out on top. | Learn how to secure your systems with InfoWorld’s Security Central newsletter [4]. ]   Sure, many people can and do use shorter passwords. But you should be aware that as you increase the length, you provide greater protection over time. An 8-character password may be fine for a few days of protection, but a 12-character password is generally thought to be long enough to provide protection for a maximum of 90 days. A 15-character password is often considered good protection for up to a year.   The myth of complexity Most security guidelines also insist on character complexity, which usually means that the password must contain multiple character sets, such as uppercase alphabetic characters, numbers, keyboard symbols, and so on. As I’ve noted in the past, however, complexity is less important than length [5]. A password of sufficient length can defeat a password guesser or cracker, whereas complexity adds significant value only when the complexity is random or near-random.   Typically, when users are forced into complexity, they use the same types of characters in the same places. For example, when people are required to create an 8-character password with complexity, most will choose a root word in their country’s language, with an uppercase first letter (usually a consonant), followed by a lowercase vowel. If they use a number, it will usually be a “1” or a “2” and placed at the end. If they use a symbol, it will usually be one of a handful of characters placed somewhere in the middle, often replacing a letter with a similar shape: an @ or a zero to replace an “o,” an exclamation mark for an “i,” and so on.   Password attackers know this, and their password cracking tools are optimized to guess at passwords using these patterns. Several security experts, including myself, have analyzed large dumps of captured passwords [6] and found the password patterns I’ve outlined above to hold true again and again.   For complexity to add significant value, the password must be truly unique and random — something like %Tv4$H@.<P. But if it’s that ugly, people will either write it down or never remember it. Unfortunately, most security auditors and regulations (including PCI DSS) require password complexity. For example, I use a financial website with a maximum password length of six characters, but complexity is required. It makes me want to scream! I’d be much better off with a password of Dogdogdogdog or Iforeverlovedogs.

My personal password trick revealed Some people like to use special password-keeping programs [7], but I prefer to do something else that is faster for me. I use the same root password (let’s say TadPole) in all my passwords, but vary the beginning and the end. One website may be 44TadPole44. Another may be TadPole32, and yet another may be AmazTadPole32On. I have a method to my madness, so the pre- and post-portions make sense to me for particular websites.   Thanks to the common root method, I can keep passwords to hundreds of different websites in my head. Because each password is different, if an attacker compromises one of my passwords on one website, my password commonality remains unknown. Even if they figure out I’m using a common password root — heck, I’m telling them right here — they’ll have a hard time figuring out the right pre- and post-portions aligned with other websites. None of the currently available password tools can handle that type of replacement complexity when trying different password combinations.   Lie in reply to password reset questions Just as important as a good, strong password is making your password reset questions unguessable. There are lots of stories (remember the Sarah Palin email hack [8]?) where people who were not even true hackers did a little research and guessed a person’s password reset questions correctly. In general, the effort needed to crack reset questions is an order of magnitude less than guessing the actual password. It’s the weakest link.   Do what I do and don’t answer those questions truthfully. When they ask you your mother’s maiden name, the brand of your first car, or your birthplace, you are not obligated to provide correct answers. Instead, pick a common password reset answer for each website and use my password root strategy, remembering to vary the common root word or phrase so you can remember it and associate it with each website.   Anyone can end up with a compromised password. It happens. Websites get hacked. Ingenious, targeted phish emails fool the best of us. But if you follow these recommendations, you can reduce the risk of successful password hack attacks.   This story, “Creating strong passwords is easier than you think [9],” was originally published at InfoWorld.com [10]. Keep up on the latest developments in network security [11] and read more of Roger Grimes’ Security Adviser blog [12] at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter [13].

Report on thin sheets of plastic replacing paper

10 Monday Sep 2012

Posted by simpsongcc in Intro to Computers

≈ Leave a comment


Coming to you soon.

http://news.bbc.co.uk/2/hi/programmes/click_online/9735780.stm

Welcome Intro to Computers students!

08 Saturday Sep 2012

Posted by simpsongcc in GCC, Intro to Computers

≈ Leave a comment


Welcome to the Intro to Computer Class! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list on the right. I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

  • How Computers Work
  • History of Computers
  • How software works
  • History of Windows
  • History of Apple OS
  • Comparison of OSs
  • Future of Technology
  • Honda Robotics
  • A Day with glass – Corning – Part 1
  • A Day with Glass – Corning – Part 2
  • Ray Kurzweil
  • TED

Welcome Intro to Computer Students!

10 Saturday Sep 2011

Posted by simpsongcc in Intro to Computers

≈ Leave a comment


Welcome to the Intro to Computer Class! I am so happy you are attending. Look here for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list on the right. I look forward to our time together. Thank you for coming!

Contract Information:
(626) 256-0302
https://simpsongcc.wordpress.com
simpsongcc@live.com

  • How Computers Work
  • History of Computers
  • How software works
  • Future of Technology
  • Honda Robotics
  • Ray Kurzweil
  • TED
Newer posts →

This slideshow requires JavaScript.

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

Hours & Info

818-813-1720
ssimpson@glendale.edu
January 2026
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Dec    

Categories

Archives

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

A WordPress.com Website.

  • Subscribe Subscribed
    • Steve Simpson, Glendale College Computer Instructor
    • Join 81 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Steve Simpson, Glendale College Computer Instructor
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...