in the College of Business Administration at UM - St. Louis |
The final exam is now available online.
The project is now available online. The site we viewed Monday in class is JavaScript Sample Code; in particular, we considered Form Validation.
Steve Savis' presentation is now available online.
Articles on Artificial Intelligence, especially with regard to the Deep Blue Chess Game include IBM's articles New York Times coverage of the match and re-match. From Time magazine, How Hard is Chess?, And Now a Word from Deep Blue, Deeper in Thought, Man's Glorious Defeat, and Deep Blue Funk.
IBM ACTION ENCOURAGES WEB SITES TO POST CLEAR PRIVACY POLICIES: IBM, which is the second-biggest advertiser on the Internet, has decided to refrain from advertising on any Web sites that do not post clear policies explaining to visitors of those sites such things as what information about them is being collected and how it will be used, sold, or otherwise disseminated for marketing purposes. IBM is the first large company to link advertising and privacy policy in this way. (Wall Street Journal 31 Mar 99)
For those of you who don't understand Mr. O'Hanlon's example, the story of the Tower of Babel is:
And they said, “Come, let us build for ourselves a city, and a tower whose top will reach into heaven, and let us make for ourselves a name; lest we be scattered abroad over the face of the whole earth.” And the LORD came down to see the city and the tower which the sons of men had built. And the LORD said, …“Come, let Us go down and there confuse their language, that they may not understand one another’s speech.” So the LORD scattered them abroad from there over the face of the whole earth; and they stopped building the city. Therefore its name was called Babel, because there the LORD confused the language of the whole earth. —Genesis 11 |
ARE AGENCIES COOKING THE BOOKS TO SHOW Y2K PROGRESS? In August 1997 the government listed 9,100 "mission-critical" computer systems, and the General Accounting Office judged 19.3% of them to be "Y2K compliant." Since then, 3,323 were dropped from the mission-critical list, even more than the number fixed (3,298). The government now asserts that 79% of its mission-critical systems are Y2K compliant, but that number would be only 55.6% if so many systems hadn't been removed from the mission-critical list. Deutsche Bank Securities chief economist Ed Yardeni says, "The pressure will only increase for organizations to define down their systems" in order to be able to claim a higher rate of compliance, but insists: "Once an agency compiles its mission-critical systems, I don't think it should be able to change what's defined as mission-critical as the deadline approaches." (USA Today, 30 Mar 99)
FBI INVESTIGATING MELISSA VIRUS: The cybercrime unit of the Federal Bureau of Investigation is investigating the "Melissa" computer virus that has spread more quickly than any previous virus in computer history (Edupage, 28 Mar 99). The FBI's National Infrastructure Protection Centers said it received reports of "significant network degradation and e-mail outages" at major Internet service providers and corporations, including Intel and Microsoft. However, Microsoft chief executive Bill Gates said that the response to the virus has generally shown that the industry's anti-virus capability works well. (Reuters/San Jose Mercury News 29 Mar 99)
Y2K ADVICE: PREPARE BUT DON'T PANIC: Janet Abrams of the President's Council on Year 2000 Conversion says people should prepare for possible Y2K problems just as they would for a bad winter snowstorm: stock up on groceries, fill the gas tank, and take out a little extra cash (but not too much!) from the bank. "And don't wait until the last minute." Government and industry representatives seem quite confident that there will not be any kind of national crisis over Y2K problems, though Federal Emergency Management Agency director Rita Calvan admits, "We're used to dealing with one incident at a time. What we could have here is a series of several small incidents. If we're all busy, I'm not sure we'll have the resources to respond." (Washington Post 27 Mar 99)
Do you trade stocks online? See this article first.
Got a browser? Cisco Systems says it can make you a more productive worker. See story from New York Times.
GM Recalls Faulty Website ... The company pulled the plug on a contest site Friday after learning that consumers' personal information was being inadvertently leaked in violation of the company's privacy policy. for more details, see Wired News
The Undead: You can find all forms of technology out there if you look for it.
The class web pages are available for viewing.
Program six shows how to accomplish the task discussed at the end of class. In addition, it is an example of defining and using functions.
Tonight we will begin discussion on the Internet. Netscape provides an Overview, and a timeline of Internet is a point to begin. For a discussion of the growth of the Internet, look at Trend Slides and Hobbes' Internet Timeline.
We will also review a variety of Internet Internet Tools, especially FTP.
ALTAVISTA, INKTOMI GO HEAD TO HEAD: Back in May, Inktomi cut a deal with Yahoo! to replace AltaVista as the popular Web site's search engine, and now AltaVista's getting its revenge, unseating Inktomi from its position as Microsoft's search provider. AltaVista, which is being spun off into a public company by parent Compaq, plans to ratchet up the competition among so-called portal sites, and its latest deal with Microsoft raises the stakes considerably. The "co-opetition" agreement with Microsoft calls for the two companies eventually to develop a network of users across both sites, sharing services like instant messaging and chat buddy lists. (TechWeb 27 Jan 99)
INTEL FLIPS SWITCH ON PENTIUM III'S I.D. FEATURE: Responding to concerns by critics that the new Pentium III chip's unique serial number will allow the monitoring of an individual's moves throughout cyberspace, Intel has decided to alter the software so that the ID capability will be turned off unless the customer voluntarily turns it on to make a secure e-commerce transaction. (The original plan was to have the feature turned on unless the user took the trouble to turn it off.) But privacy advocates are not satisfied, and want the ID feature entirely disabled. Deirdre Mulligan of the Center for Democracy and Technology says, "If everybody's demanding it, it's going to be hard for a consumer to say no." (San Jose Mercury News 26 Jan 99)
SUN LAUNCHES JINI: Sun Microsystems has unveiled its Jini 1.0 source code (http://java.sun.com/products/jini), which enables any digital device to be networked to other devices, regardless of the underlying software or hardware. The technology sets up basic rules for how to connect to the network, share information and interact with other devices. The Jini 1.0 code includes the full discovery/join/lookup protocol, says Sun engineer Richard Gabriel, but users will have to wait for transactional and security features, which are slated to be added later this year. (InternetWeek 25 Jan 99)
FILTERING SOFTWARE GETS SMARTER: Filtering software used in schools and public libraries has been criticized for cutting too wide a swath in its efforts to screen out obscene or other objectionable material. Such software often can't discern the difference between phrases like "hot teen breasts" and "breast cancer research," sending them both into the cybertrash. Now a company called RuleSpace says it may have a solution: its WebChaperone software is based on an artificial-intelligence engine called the Intelligent Content Recognition Technology, and is designed to differentiate between legitimate content and pornography. The product is geared toward parents, who should be in charge of using such filters, says RuleSpace founder Adrian Russell-Falla. As far as use in public schools and libraries, Russell-Falla sides with the American Library Association, which does not endorse the use of filtering software "that blocks access to constitutionally protected speech." (TechWeb 26 Jan 99)
Netscape provides an overview of newsgroup technology.
We will also look a little at our e-mail page for further hints.
OOPS -- Y2K BUG TRIGGERS PREMATURE DATA RELEASE: A computer malfunction indirectly related to the Year 2000 glitch triggered a premature posting of the December producer price index (PPI) data on the U.S. Labor Department Web site. The problem has since been corrected, but "It definitely will make us extremely cautious in our testing and heightens the seriousness of testing for Y2K," says the associate commissioner for technology and survey processing at the Bureau of Labor Statistics. Tuesday's event was the second time since November that the Labor Department has accidentally pre-released economic data that had the capacity to affect markets. The two-day-early release of unemployment figures in November was attributed to human error. (TechWeb 14 Jan 99)
U.S. ONLINE AUDIENCE STARING TO LOOK MORE LIKE AMERICA: A study by the Pew Research Center for the People and the Press indicates that the online audience is rapidly changing from an elite computer-savvy group comprised of young, well-educated and affluent males to a more mainstream American group, with middle-aged and middle-income people of both sexes coming to the Internet in increased numbers, as are people with less formal education. Although the 74 million Internet users in the U.S. are still younger, better-educated and more affluent than the population at large, 40% of Internet newcomers never attended college and 23% have household incomes below $30,000 a year. (AP 14 Jan 99)
IF AT FIRST YOU DON'T SUCCEED, BREAKING-IN'S NO CRIME IN NORWAY:
The Supreme Court in Norway has ruled that it's not a crime to try to break
into someone else's computer system, because people should expect others to
try to invade their systems, and take measures to protect themselves. There
is a crime, ruled the court, only if the system is actually breached. The
case developed out of an attempt by a computer security company to break
into the University of Oslo's computers through the Internet, to contribute
to a feature story by the Norwegian state broadcasting network. Apparently
the security company mapped holes in the university's computer security, but
did not break in, tamper with, or steal any information. (USA Today 13 Jan 99)
The History of the Internet will help you get perspective on the source of the Internet and how it all works. In addition, you might read E-Commerce: The Next Step for a perspective on where it is going. If you want to learn more about e-commerce, look at The Electronic Commerce Knowledge Base.
On campus e-mail accounts are of the form s#######@admiral.umsl.edu (where ####### is your student id number).
For an interesting view of the impact of computers, read John Gehl and Suzanne Douglas' recent article, From Movable Type to Data Deluge.
This should be a place you check frequently. There will be announcements posted here (as well as to the electronic discussion group). In addition, it will link to information organized for this class.