Computing and Information Sciences
CISS 100 – Prof Looby
Skip to content
Home
Lecture Modules
LM1 – Course Introduction & Syllabus
CISS 100 Syllabus
Contacting your Professors (Dept Email Requirements)
Emergent & Disruptive Change
Definitions, Publications & Resources
(LAC) Tutoring Schedule
LM2 – Architecture & Hardware
Computer Numbering Systems
Symbolic Representation & Coding
Mobile Computing Architecture
Fetch Execute Cycle
LM3 – Storage
RAID – Redundant Array of Independent Disks
LM4 – Input/Output
Input
Output
Mobile I/O
Augmented Reality
Virtual Reality
LM5 – Operating Systems & System Software
Digital Forensics Intro
OS Resources
PC USB Drive
LM6 – Application Software
LM7 – Networking
Physical Layer Media
Network Topologies
Ethernet & CSMA/CD
TCP/IP and UDP
OSI Reference Model
Wide Area Networking
LM8 – WWW & Internet
Search
The Deep or Dark Web
Internet of Things (IoT)
Spam
Net Neutrality
Freedom of Information
AI & the Web
LM9/LM15 Security
WiFi & Security Tips
Malware & Cybercrime
Hacking
Privacy: Profiling, Big Data & Predictive Analytics
Security Tech
Security & Privacy Resources
Phishing
HVCC Zimbra Phishing
Phishing Example – Chase
Phishing Example – Paypal
LM10 – Web Design
Abstract & User Centered Web Design
Web Development Life Cycle (WDLC)
Mobile Web Design
Virtual Customer Experience (VCE)
Content Management Systems (CMS)
LM11 – E-Commerce
Search Engine Optimization (SEO)
History of SEO
SEO Tips
Landing Page Optimization
Small and Medium Business (SMB) Web Design
SMB Web Design 2
Marketing, IT & the Web
Digital Marketing
E-Commerce Examples
Blockchain & Cryptocurrency
LM12 – Information Systems Analysis & Design
Emergent & Disruptive Change
Cloud Computing
Conflict and Change Management
Decision Support Systems (DSS)
JIT & TOC
LM13 – Programming
Prolog – Logic Programming
Prolog Theory
Prolog Mac Installation
Game Design
Extreme/Agile Java Programming w/Eclipse
Recursion
LM14 – Database (DBMS)
Relations
Normal Forms
Structured Query Language (SQL)
Advanced DBMS
DBMS Performance Tuning
Indexing Structures & Performance
Object Relational Model
OLAP
Query Optimization
Recursive Relations
SQL User Authorization & Security
Views and Indices
3-tier Web Architecture (w/DBMS core)
LM16 – Computer Ethics
Additional Topics
Artificial Intelligence
Big Data & Analytics
Health & Green Computing
Content Management Systems (CMS)
Democratization of Content
Open Source
Robotics
Information Design
PowerPoints
References
Linux Labs
LL1 – Ubuntu Linux Introduction
LL2 – HVCC AcadNX Ubuntu Server Access
LL3 – CLI/Terminal/Files Intro
LL4 – Files, Directories, Wildcards & Help
LL5 – Viewing, Searching and Redirection
LL6 – File & Directory Access Control
LL7 – Process Management
LL8 – Networking
LL9 – More SysAdmin Commands & Variables
LL10 Virtualization Intro
1. Virtual Machine Installation
VMWare Fusion & Workstation
Windows 8 Hyper-V Option
Win7 Microsoft Virtual PC Option
Ubuntu Virtual Box (VB) Virtual Machine (VM) Installation
Optional – VB Guest Additions & Shared Folders
2. Ubuntu Download
3. Cryptographic Hashes
4. VMWare Ubuntu Installation
LL11 – Managing Users
LL12 – Shell Scripting & Cron
Final Projects Due Wed May 9 by 3 p.m.
Advanced Scripting
LAMP & WordPress Installation
WordPress Installation
Kali Linux Security & Penetration Testing
Backtrack Linux – Security & Penetration Testing
Extreme/Agile Java Programming w/Eclipse
Extra Credit
Linux USB Utility Drive
PC USB Drive
Linux Media Server
Discussion Boards
DB1 – Classmate Introductions
DB6 – Personal Systems/Information Management
DB9 – Emergent Internet & Web
DB10 – Ubuntu VM, Desktop & Software Center
DB CC – Ethics & Professional Conduct
DB CC – Final Project
Extra DBs – Not Required
DB – System Analysis & Design
Emergent Topics
Advisement & Transfer
Advisement Intro
Registration and Transferring into HVCC
Transferring from HVCC to a 4-year College & Transfer Agreements
Cisco Network Academy
Wired Degree Evaluations
Curriculum Links & Advisement Sheets
Course Offering by Semester Map
Course Outlines
Course Withdrawal
CISS 260 Internship
Registration and Requirements
CISS 260 Syllabus & Rubrics
Finding your own Internship
Journal Entries
Interview & Employment Advice
CISS 260 Internship Site Evaluation Criteria
Internship Supervisor Evaluation Form
Intern Exit Inteview
←
Google veteran brought in as part of health website fix
Google’s Chromecast: 10 Things Consumers Should Know About the Dongle
→
Google Barges Spotted on San Francisco Bay
Posted on
November 5, 2013
by
Prof Looby
Google Barges Spotted on San Francisco Bay
.
About Prof Looby
Prof James G. Looby Chair Computing and Information Sciences Hudson Valley Community College
View all posts by Prof Looby
→
This entry was posted in
Emergent Topics
and tagged
Business
,
Google
,
Storage
. Bookmark the
permalink
.
←
Google veteran brought in as part of health website fix
Google’s Chromecast: 10 Things Consumers Should Know About the Dongle
→
Leave a Reply
Cancel reply
You must be
logged in
to post a comment.
Search Site
Search for:
Recent Emergent Topics
Wireless charging over distance just got a boost | Computerworld
Two vendors now sell iPhone cracking technology – and police are buying | Computerworld
When every public screen is your personal screen | Computerworld
Best R packages for data import, data wrangling & data visualization | Computerworld
How blockchain could solve the internet privacy problem | Computerworld
Emergent Topics/Tags
AI
Analytics & BI
Android
Apple
Apps&Software
Automobile
Big Data
Browser
Business
Clothing
Cloud
Education
Ethics
Gaming
Google
Government
Green+
Hardware
HCI
Health
I/O
Information Systems
Internet
IoT
Jobs
Linux
Location
Microsoft
Military
Mobile
Networking
Open Source
OS
PC
Power
Privacy
Programming
Robotics
Security
Social Computing
Storage
Technology
Web Design
Wireless
WWW
Emergent Topics Archives
Emergent Topics Archives
Select Month
April 2018 (8)
March 2018 (15)
January 2018 (12)
November 2017 (2)
October 2017 (7)
September 2017 (2)
July 2017 (8)
June 2017 (2)
April 2017 (3)
March 2017 (5)
February 2017 (5)
January 2017 (4)
December 2016 (5)
November 2016 (3)
October 2016 (5)
September 2016 (9)
August 2016 (10)
July 2016 (1)
June 2016 (8)
May 2016 (3)
April 2016 (12)
March 2016 (14)
February 2016 (13)
January 2016 (9)
December 2015 (10)
November 2015 (11)
October 2015 (6)
September 2015 (10)
August 2015 (9)
July 2015 (12)
June 2015 (16)
May 2015 (9)
April 2015 (18)
March 2015 (29)
February 2015 (20)
January 2015 (10)
December 2014 (8)
November 2014 (13)
October 2014 (24)
September 2014 (22)
August 2014 (12)
July 2014 (19)
June 2014 (15)
May 2014 (13)
April 2014 (11)
March 2014 (11)
February 2014 (21)
January 2014 (33)
December 2013 (28)
November 2013 (24)
October 2013 (48)
September 2013 (46)
August 2013 (26)
July 2013 (3)
June 2013 (10)
May 2013 (16)
April 2013 (22)
March 2013 (27)
February 2013 (20)
January 2013 (41)
December 2012 (45)
November 2012 (80)
October 2012 (64)
September 2012 (80)
August 2012 (44)
July 2012 (50)
June 2012 (29)
May 2012 (41)
April 2012 (61)
March 2012 (45)
February 2012 (6)
January 2012 (1)
English
Afrikaans
Shqip
አማርኛ
العربية
Հայերեն
Azərbaycan dili
Euskara
Беларуская мова
বাংলা
Bosanski
Български
Català
Cebuano
Chichewa
简体中文
繁體中文
Corsu
Hrvatski
Čeština
Dansk
Nederlands
English
Esperanto
Eesti
Filipino
Suomi
Français
Frysk
Galego
ქართული
Deutsch
Greek
ગુજરાતી
Kreyol ayisyen
Harshen Hausa
Ōlelo Hawaiʻi
עִבְרִית
हिन्दी
Hmong
Magyar
Íslenska
Igbo
Bahasa Indonesia
Gaelige
Italiano
日本語
Basa Jawa
ಕನ್ನಡ
Қазақ тілі
ភាសាខ្មែរ
한국어
كوردی
Кыргызча
ພາສາລາວ
Latin
Latviešu valoda
Lietuvių kalba
Lëtzebuergesch
Македонски јазик
Malagasy
Bahasa Melayu
മലയാളം
Maltese
Te Reo Māori
मराठी
Монгол
ဗမာစာ
नेपाली
Norsk bokmål
پښتو
فارسی
Polski
Português
ਪੰਜਾਬੀ
Română
Русский
Samoan
Gàidhlig
Српски језик
Sesotho
Shona
سنڌي
සිංහල
Slovenčina
Slovenščina
Afsoomaali
Español
Basa Sunda
Kiswahili
Svenska
Тоҷикӣ
தமிழ்
తెలుగు
ไทย
Türkçe
Українська
اردو
O‘zbekcha
Tiếng Việt
Cymraeg
isiXhosa
יידיש
Yorùbá
Zulu