Welcome Windows Students


Welcome to Windows! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list in the Intro folder on the right. There is no book for this class. But I encourage you to check out some computer books at local book stores to supplement what we will be discussing in this class. This class is 4 Saturdays from 8-12. Remember, your attendance is critical, so please attend if you can. I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

Computer measurements


I often get asked what is a megabyte, etc…

So I added a link to the right called measurements that will take you to a nice list of a whole bunch of computer related measurments.

http://www.wu.ece.ufl.edu/links/dataRate/DataMeasurementChart.html

see also….http://en.wikipedia.org/wiki/Units_of_information

How do they relate?

  • 1 bit – answer to an yes/no question
  • 1 byte – a number from 0 to 255.
  • 90 bytes: enough to store a typical line of text from a book.
  • 512 bytes = ½ KiB: the typical sector of a hard disk.
  • 1024 bytes = 1 KiB: the classical block size in UNIX filesystems.
  • 2048 bytes = 2 KiB: a CD-ROM sector.
  • 4096 bytes = 4 KiB: a memory page in x86 (since Intel 80386).
  • 4 kB: about one page of text from a novel.
  • 120 kB: the text of a typical pocket book.
  • 1 MB – a 1024×1024 pixel bitmap image with 256 colors (8 bpp color depth).
  • 3 MB – a three minute song (128k bitrate)
  • 650-900 MB – an CD-ROM
  • 1 GB – 114 minutes of uncompressed CD-quality audio at 1.4 Mbit/s
  • 15 GB – number of bytes Google offers you for free.
  • 8/16 GB – size of a normal flash drive
  • 4 TB – The size of a $300 hard disk
  • 966 EB – prediction of the volume of the whole internet in 2015

Welcome Intro to Computers Students!


Welcome to Intro to Computers! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list in the Intro folder on the right. There is no book for this class. But I encourage you to check out some computer books at local book stores to supplement what we will be discussing in this class. This class is 4 Saturdays from 8-12. Remember, your attendance is critical, so please attend if you can. I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

Excel Students Welcome!


Welcome to Beg. Excel 2010! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list in the Excel folder on the right. The book for this class has the ISBN number of 978-0-76384-314-4 and I encourage you to check for used ones on http://www.Amazon.com . If you plan on taking the second part of the class, check for the Level 1 and Level 2 book, ISBN 9780763843106. It might be cheaper then buying two books. I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

Welcome Power Point Students!


Welcome Power Point Students! I am glad to have you in the class. I am looking forward to spending the next 4 weeks with you. I promise I will make it as informative and enjoyable as possible. Hopefully the time will fly by! The book I will reference for this class has the ISBN number of 9781423905240 for the 2007 book, 978-0-538-74716-5 for the 2010 book. Look to this page for additional information and any handouts. My contact info:

Steve Simpson
626-256-0302
simpsongcc@live.com

Here are the dates for Spring 2013 session


Spring 2013

Feb. 18 (M) Washington Day—Campus closed

Feb. 19 (T) Instruction begins for the spring semester

April 15-20 (M-Sat) Spring Break

May 27 (M) Memorial Day—Campus closed

June 5-12 (W-W) Final Examinations

June 12 (W) End of the spring semester

June 12 (W) Commencement

Saturday Classes— During the spring 2013 semester, there will be no Saturday classes on April 20

.

Excel Students


Welcome to Beg. Excel 2010! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list in the Excel folder on the right. The book for this class has the ISBN number of 978-0-76384-314-4 and I encourage you to check for used ones on http://www.Amazon.com . I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

Word Students!


Welcome to the Beg. Word 2010! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list on the right. The book for this class has the ISBN number of 978-0763843007 (full book 978-0763842994) and I encourage you to check for used ones on http://www.Amazon.com . I look forward to our time together. Thank you for coming!

Contract Information: (626) 256-0302 https://simpsongcc.wordpress.com simpsongcc@live.com

Self-driving cars!


Long hailed as one of the safest car producers in the world, Volvo hopes to retain that reputation by introducing vehicles that can avoid passenger injuries on their own by the year 2020. Its plans hinge on eliminating the largest cause of road accidents — the drivers themselves. The head of development for the program is convinced that driver-less cars are the future and that Volvo will be the first one there. The main technology underpinning Volvo’s autonomous automobiles is wireless internet, which would enable each car to be assigned a certain point on the road and give different vehicles the ability to interact with each other. The company is preparing to release an initial batch of autonomous vehicles, capable of speeds of up to 31 miles per hour, in 2014. We know from the SARTRE project that the automaker has been able to achieve autonomous speeds of 53 miles per hour in traffic for long distances, though they aren’t disclosing when those higher-speed prototypes would be publicly available.

Welcome Integrated Technology Students!


Welcome to the Class! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list on the right. I look forward to our time together. Thank you for coming!

 

Bringing ‘Minority Report’ touchless gestures to Windows 8


http://news.cnet.com/8301-11386_3-57548636-76/bringing-minority-report-touchless-gestures-to-windows-8/

Elliptic Labs wants to bring the touchless gesture controls seen in the science-fiction film “Minority Report” to everyday consumer electronic devices, starting withWindows 8.

The company — a Norwegian university spinout with offices in Oslo and Silicon Valley — unveiled a set of tools to help consumer electronic companies enable touchless controls in their products. These would be similar to the kind of gesture controls seen with theXbox 360 Kinect and in certain smart televisions like a few models from Samsung Electronics, but presumably would work more smoothly.

That’s because the Elliptic device won’t use a camera like the Kinect or Samsung television. Instead, Elliptic’s technology is based on ultrasound and employs multiple microphones in the device. The ultrasound technique has a much wider field of view, doesn’t require lights, and is more responsive, according to Morhan Kjolebakken, product manager for the company.

“The really big difference is you can do a lot of things with Windows 8 much more naturally,” he told CNET.

Elliptic’s announcement today includes the system, which has a set of touchless gestures programmed for each control found in Windows 8, a software development kit for developers looking to embrace touchless controls, and a “start kit” for developers and manufacturers looking to integrate the technology into products.

The company is talking with a number of partners on incorporating the technology into products, Kjolebakken said, adding that he expects products to come out over the next 12 to 14 months. He said that manufacturers have expressed interest in the company’s technology.

Elliptic doesn’t believe it’s a big step for manufacturers. Beyond a few extra microphones, a company needs to add a few “ultrasonic transducers” to capture the gestures.

While the first step has been to integrate the controls with Windows 8 laptops and PCs, Kjolebakken said that he expectstablets and smartphones to eventually get the feature. Down the line, he sees the potential for cars to get gesture controls as well.

Samsung Stretches Lineup — Group Plans to Mass Produce Flexible Mobile-Device Screens


http://online.wsj.com/article/SB10001424127887324556304578116392091283994.html?mod=dist_smartbrief

SEOUL—As the battle for dominance in the smartphone and tablet-computer market intensifies, South Korean conglomerate Samsung is pushing ahead with plans to start mass production of displays using plastic rather than glass, a move that will make mobile devices unbreakable, lighter and bendable.

Samsung’s display unit, Samsung Display Co., is in the last phase of development of so-called flexible displays for mobile devices, which are expected to be released in the first half of next year, a person familiar with the situation said.

It is still unclear when devices using the technology will be available commercially, and Samsung declined to …

Creating strong passwords is easier than you think


Even with smartcards, biometrics, and other multifactor authentication solutions [1], everyone still uses basic name/password log-on combinations. Security experts always recommend “strong passwords.” But what qualifies as a strong password? And how do you avoid creating a password so strong you can’t remember it?   According to NIST (National Institute of Standards and Technology), a strong password should contain no fewer than 12 characters, a rule adopted by the U.S. government in 2007 and further defined in the U.S. Government Configuration Baseline [2]. Admin passwords should be 15 characters. Readers may sigh at those lengths, but they’ve been the recommended minimum for half a decade. Anything shorter is not considered secure.   [ InfoWorld Test Center reviews 7 password managers [3]. Find out which one comes out on top. | Learn how to secure your systems with InfoWorld’s Security Central newsletter [4]. ]   Sure, many people can and do use shorter passwords. But you should be aware that as you increase the length, you provide greater protection over time. An 8-character password may be fine for a few days of protection, but a 12-character password is generally thought to be long enough to provide protection for a maximum of 90 days. A 15-character password is often considered good protection for up to a year.   The myth of complexity Most security guidelines also insist on character complexity, which usually means that the password must contain multiple character sets, such as uppercase alphabetic characters, numbers, keyboard symbols, and so on. As I’ve noted in the past, however, complexity is less important than length [5]. A password of sufficient length can defeat a password guesser or cracker, whereas complexity adds significant value only when the complexity is random or near-random.   Typically, when users are forced into complexity, they use the same types of characters in the same places. For example, when people are required to create an 8-character password with complexity, most will choose a root word in their country’s language, with an uppercase first letter (usually a consonant), followed by a lowercase vowel. If they use a number, it will usually be a “1” or a “2” and placed at the end. If they use a symbol, it will usually be one of a handful of characters placed somewhere in the middle, often replacing a letter with a similar shape: an @ or a zero to replace an “o,” an exclamation mark for an “i,” and so on.   Password attackers know this, and their password cracking tools are optimized to guess at passwords using these patterns. Several security experts, including myself, have analyzed large dumps of captured passwords [6] and found the password patterns I’ve outlined above to hold true again and again.   For complexity to add significant value, the password must be truly unique and random — something like %Tv4$H@.<P. But if it’s that ugly, people will either write it down or never remember it. Unfortunately, most security auditors and regulations (including PCI DSS) require password complexity. For example, I use a financial website with a maximum password length of six characters, but complexity is required. It makes me want to scream! I’d be much better off with a password of Dogdogdogdog or Iforeverlovedogs.

My personal password trick revealed Some people like to use special password-keeping programs [7], but I prefer to do something else that is faster for me. I use the same root password (let’s say TadPole) in all my passwords, but vary the beginning and the end. One website may be 44TadPole44. Another may be TadPole32, and yet another may be AmazTadPole32On. I have a method to my madness, so the pre- and post-portions make sense to me for particular websites.   Thanks to the common root method, I can keep passwords to hundreds of different websites in my head. Because each password is different, if an attacker compromises one of my passwords on one website, my password commonality remains unknown. Even if they figure out I’m using a common password root — heck, I’m telling them right here — they’ll have a hard time figuring out the right pre- and post-portions aligned with other websites. None of the currently available password tools can handle that type of replacement complexity when trying different password combinations.   Lie in reply to password reset questions Just as important as a good, strong password is making your password reset questions unguessable. There are lots of stories (remember the Sarah Palin email hack [8]?) where people who were not even true hackers did a little research and guessed a person’s password reset questions correctly. In general, the effort needed to crack reset questions is an order of magnitude less than guessing the actual password. It’s the weakest link.   Do what I do and don’t answer those questions truthfully. When they ask you your mother’s maiden name, the brand of your first car, or your birthplace, you are not obligated to provide correct answers. Instead, pick a common password reset answer for each website and use my password root strategy, remembering to vary the common root word or phrase so you can remember it and associate it with each website.   Anyone can end up with a compromised password. It happens. Websites get hacked. Ingenious, targeted phish emails fool the best of us. But if you follow these recommendations, you can reduce the risk of successful password hack attacks.   This story, “Creating strong passwords is easier than you think [9],” was originally published at InfoWorld.com [10]. Keep up on the latest developments in network security [11] and read more of Roger Grimes’ Security Adviser blog [12] at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter [13].