This semesters text book adoptions.
ITS 472 Final Project Paper (NMCI)
Students in my ITS 472 Networking Architecture course have completed a network design replicating the Navy Marine Corps Intranet project. The overall goal of this excercise was for the students in about 10 weeks to design an enterprise network solution…
Are students customers or scholars in training?
Part of the problem with considering students as customers rather than students is a difference in perspective between administrative needs and needs of faculty and the discipline. Personally I consider those people in their seats to be students or scholars…
K-12 Education: A university professor takes the future personally
Though as a faculty we represent a diverse and expansive educational background sometimes we miss the point. Whether your educational philosophy is behaviorist or constructivist our mission is to educate the next generation. There is some value in the criticism…
Shame on you! All of you!
That’s it! I am done! I am done with the main stream media (MSM). I am done with the BS bloggers. Done. We are holding a presidential election. We are trying to determine who will lead us for the next…
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may not be accurate. Some of the issues are illuminated when government and corporate information security…
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air warfare the terrain determines the scope and strategies. Low intensity conflict can be defined by…
Today at Purdue University Calumet
Today is a fairly momentous day in my professional life. Today Purdue University voted and awarded me tenure and promotion to associate professor. As a professor at Purdue University Calumet since August 2003 there have been trials and tribulations. Some…
Let users manage their own PC’s? BALDERDASH!
In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…
ITS 472: Phase 2 Navy Marine Corps Intranet Project
Here are the links to the presentations: Group 1 Presentation Questions DOCUMENT 6.9 MB Group 2 Presentation DOCUMENT 15.5 MB Click here to go to the final document & presentation link
Twitter at twitter.com/selil
I’ve gone ahead and joined twitter and will be doing updates via Twitter. A few students have asked me why it took so long. Gosh I don’t know know why. So, if you are interested in seeing what I’m up…
What does the military want from the education system?
There are a lot of misconceptions about higher education, secondary education, and primary education. The K-12 system is where I’m going to restrict my comments for this discussion, and especially the public education system. That being said only a little…
Hacking a computer with a microphone
While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…
Example Semester Paper
Here is an example of an APA 5 semester paper that meets most of the requirements. With some comments. Example Semester Paper
Example Laboratory Paper
Here is an example of an APA 5 laboratory that meets most of the requirements. With some comments. It doesn’t follow APA 5 exactly but the changes (bolding, accenting, etc.) help rather than hinder the readability of the report. Laboratory…