Forrest Kerslager. Haskell, Java, Python Broadcasts a client s message to all other clients connected to the server.

Size: px
Start display at page:

Download "Forrest Kerslager. Haskell, Java, Python Broadcasts a client s message to all other clients connected to the server."

Transcription

1 Chat Server Forrest Kerslager Haskell, Java, Python Broadcasts a client s message to all other clients connected to the server. IRC like features

2 Implement two encryption algorithms RC4 (Rivest Cipher 4), a stream cipher, and AES (Advanced Encryption Standard, Rijndael), a block cipher. The languages I plan on using are C++ and Haskell. If time permits, I d also like to implement both algorithms in Scala. Team: Nick Noto

3 A Comparison of Implementations of Cryptographic Primitives Proposal Implement primitives RSA Diffie-Helman DES More! Compare languages Python C Haskell More! Team Justin Tracey 1

4 AES Encryption Michael Bennett, Tim Pace, Bardia Keyoumarsi Purpose: Advanced Encryption Standard (AES) A well known algorithm called Rijndael Created by Joan Daemen and Vincent Rijmen Chosen by NIST as the algorithm that the AES would use AES uses a substitutionpermutation (see Figure 1) network, and is fast in both software and hardware. Goals: Implement a Haskell, C++, and Python version of the algorithm in order to compare and contrast the- Speed Number of Lines of Code Ease of Implementation Verbosity Readability Figure 1: AES Flowchart

5 F# Stock Market Analysis Cullen Glassner Stock analytics require fast and complex mathematical calculations to be run on large data sets. This is an ideal environment for Functional Programming.

6 DrCr by Lauren E. Scott A game aimed at teaching the basics of financial accounting Wednesday, February 5, 14

7 Statistical Analysis Program Group: Lester Pi and Alan Zhang Program will be based off of programs such as Stata and R Row 1 Row 2 Row 3 Row 4 Column 1 Column 2 Column 3 Will attempt to implement in both python and haskell

8 Food Roulette Steven Pan

9 Pantry The One Stop for Groceries Honey, when does the milk expire? Man, I wonder how much cereal we have remaining Do we have any orange juice left in the fridge? Dude, did you just eat my snack? Pantry Makes Keeping Track Of Food Easy Store a list of your food and drinks Know when they expire Track your next grocery list Made For ios and Android Designed by Edward Nguyen

10 CMPS 112: Comparative Programming Final Project Slide: Refrigerator Inventory Team members: Kyle Novelli Juan C. Manzo Implement a food inventory management program in C++, Python, and maybe Haskell. Program will read input from a standard text file. Contents of our food items will contain: Name, type, expiration date, and quantity. User will have option to add and delete food objects, display grocery inventory to standard output (C++) and GUI (Python). Inventory can be categorized by type, closest expiration date, or alphabetically. Create a function to display groceries that are expired or close to expiring. Document time spent programming, lines of code, time to parse different sized files, and data structure implementations when comparing programming languages. Time Table (over the next 5 weeks) 1) C++ implementation (study Python syntax, data structures, and GUI). 2) Python implementation (study Haskell for functional approach). 3) Haskell implementation. 4) Debug week Polish and fix up programs and add features if we can. 5) Final Project write up based on documentation from prior weeks.

11 Summary: The goal of this project is to write a program that can accept a grocery list via a simple text file or one by user input and notify the user when groceries are close to expiring. Each file will be created by another small program which will populate a file with a type of grocery, expiration date and the amount to be inserted e.g banana, , 1. The program will be done in both C++ and Python. Lines of code, debugging time, time to parse files and data structure methods used will be compared at the end to help point out strengths and weaknesses of each programming language. If time permits, we would also like to implement the program in Haskell. Time Table: Make data structures for groceries and subcategories like vegetables, dairy, meat, etc. ETA: 4 hours per programming language Categorize data in different ways whether it be alphabetically, by type of grocery, or by closest expiration date. ETA: 3 hours per programming language Integrate a timer that has the current date and time which will be used to decide when notifications will be sent. ETA: 3 hours per programming language Compare programming languages in multiple ways like, time efficiency for different sized input files, number of lines of code, data structure construction, etc. ETA: 4 hours If manageable, create a barcode scanner input to create the inventory list or perhaps a grocery list.

12 ETA: (?) hours per programming language. Risks:If there is insufficient time, we will not attempt to integrate a barcode scanner.

13 Bret Dalldorf CMPS 112 Project Proposal Social networking site using films Proposal: To create a social networking site that will be used to meet people that like the same films you do. Users will be able to add/rank films they have watched. By ranking films they will be able to see what other users are watching that have a similar ranking in films. This concept is similar to the website Goodreads which deals with books. I plan on creating the website in Python. I will be using Python, JavaScript (jquery, Ajax), and SQL. If I have time I may implement a backend service (maybe in C#) to handle analyzing the database for user film recommendations. NOTE: I know Netflix (and other services) already gives recommendations; but this will be for all films. It will allow users to find films they may be interested in that aren t available through services that have contractual agreements. Team: This is an individual project Time line: 1 st week will be spent designing the database making sure to have a normalized schema with all the appropriate tables and foreign keys. The 2 nd week will be developing a basic UI, user profile page and user authentication. The 3 rd week will be spent writing the logic for making recommendations based on other user ratings. Other time will be spent polishing the website and making sure the logic is working correctly. If everything goes well a backend service can be built to analyze user data in the database and calculate film recommendations for users. Risks: Time constraints. I need to make sure I get the basic functionality for the site working before I put too much focus on specific aspects. That is why the backend service is optional; I may not have time to implement it.

14

15 JSON Survey Creator GUI application written in F# Drag and drop survey creation Export surveys as JSON objects View and fill out surveys in a separate Java application

16 Project Proposal Slide Proposed Project: Our project is to compare Ruby vs Scala in web development. We will make a simple application that allows a user to sign in and sign up as a new user. We will use the Rails platform to make the webpage in Ruby. For Scala we will be using the Play framework for our application. We will use sqlite database for Ruby on Rails and our Scala Play site. Some CSS/HTML will be required for this as well. Our final report will be comparing Scala and Ruby and how they defer in an application environment. Team Members: Christian Ambriz Simon Ho

17 Build your own Reddit bot Team: Jason Heron and Rita Valentine PROJECT OVERVIEW We are planning on making a web app that will allow a user with no programming experience to build a Reddit bot for their own purposes with an easy, clean javascripty app. The idea is that you can make a bot that, for the sake of brevity, will preform an action when a certain criteria is met (i.e send a message to a user who posts about a certain type of cat). THE PYTHON Our project will use Python and one of its popular web frameworks Flask, Web2py, or Django to programmatically generate a python Reddit bot per the users specifications. So basically we re putting some python in some python so you can use python to generate python. THE APP The front end of our web app will likely use a theme built from Twitter s bootstrap framework. We plan on hosting our app on either Amazon s AWS or Google s AppEngine.

18 Creating a Dynamic Website with a Database - cookie access, - GET and POST data - executing SQL - form to add data to database - recaptcha Ian Gudger Brittany Arthur Jason Shao Steven Chou Today is wonderful because " Before I die, I want to " I appreciate "

research assistant at VSE/LEE course site: janvavra.github.io consultations by appointment

research assistant at VSE/LEE   course site: janvavra.github.io consultations by appointment research assistant at VSE/LEE email: vavra.jn@gmail.com consultations by appointment course site: janvavra.github.io presentations, guides for installation, links, code. currently under review, will email

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Ajax On Rails: Build Dynamic Web Applications With Ruby By Scott Raymond READ ONLINE

Ajax On Rails: Build Dynamic Web Applications With Ruby By Scott Raymond READ ONLINE Ajax On Rails: Build Dynamic Web Applications With Ruby By Scott Raymond READ ONLINE Let's take a look at how we can accomplish this with AJAX in Rails. Overall, I was quite surprised at how easy it is

More information

CBSE and Mobile Application Development

CBSE and Mobile Application Development ECE750-T11 CBSE and Mobile Application Development Submitted To: Ladan Tahvildari Authors: Jenelle Chen (20077857) Aaron Jin (20326635) Table of Contents Table of Figures...3 Abstract...4 Problem Description...4

More information

CS371m - Mobile Computing. Persistence - Web Based Storage CHECK OUT g/sync-adapters/index.

CS371m - Mobile Computing. Persistence - Web Based Storage CHECK OUT   g/sync-adapters/index. CS371m - Mobile Computing Persistence - Web Based Storage CHECK OUT https://developer.android.com/trainin g/sync-adapters/index.html The Cloud. 2 Backend No clear definition of backend front end - user

More information

CMPE 131 Software Engineering. Ruby on Rails Introduction

CMPE 131 Software Engineering. Ruby on Rails Introduction CMPE 131 Software Engineering September 5, 2017 Ruby on Rails Introduction Presented By Melvin Ch ng Agenda Native App vs Web App What is Ruby on Rails? MVC Architecture What can you do with Rails? What

More information

Technology Expertise STUDIO GRAPHENE

Technology Expertise STUDIO GRAPHENE Technology Expertise STUDIO GRAPHENE ios Development ios development The 01. Devices iphone, ipad, Apple Watch Video and audio Live streaming Video playback and capture OS versions ios 8, ios 9, ios 10,

More information

Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle

Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle SE425: Communication and Information Security Recitation 5 Semester 2 5778 16 April 2018 Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle In this week s recitation we ll learn

More information

Programming The Raspberry Pi: Getting Started With Python PDF

Programming The Raspberry Pi: Getting Started With Python PDF Programming The Raspberry Pi: Getting Started With Python PDF Program your own Raspberry Pi projects Create innovative programs and fun games on your tiny yet powerful Raspberry Pi. In this book, electronics

More information

C++ Developer Survey "Lite": C++ and Cloud

C++ Developer Survey Lite: C++ and Cloud Q1 This month we focus on how C++ is used, or could be better for use, in cloud-related applications and environments. In what (if any) kinds of cloud computing-related workloads do you use C++? (select

More information

COS 333: Advanced Programming Techniques

COS 333: Advanced Programming Techniques COS 333: Advanced Programming Techniques how to find me bwk@cs.princeton.edu 311 Computer Science, 609-258-2089 TA's: Christopher Moretti (moretti), Taewook Oh (twoh), Xin Jin (xinjin), Raghav Sethi (raghavs),

More information

COS 333: Advanced Programming Techniques

COS 333: Advanced Programming Techniques COS 333: Advanced Programming Techniques Robert M. Dondero, Ph.D. Princeton University Please pick up handouts at the back of the room 1 COS 333: Course Overview Copyright 2018 by Robert M. Dondero, Ph.D.

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

COMPLEXITY ACROSS DISCIPLINES

COMPLEXITY ACROSS DISCIPLINES COMPLEXITY ACROSS DISCIPLINES REU 2015 INTRODUCTION TO CRYPTOGRAPHY Liljana Babinkostova Cybersecurity Defined Information Assurance. IA consists of measures that protect and defend information and information

More information

Grade 7/8 Math Circles November 1 & 2, The Matrix

Grade 7/8 Math Circles November 1 & 2, The Matrix Faculty of Mathematics Waterloo, Ontario N2L 3G Centre for Education in Mathematics and Computing Grade 7/8 Math Circles November & 2, 26 The Matrix Introduction to Matrices A matrix is a rectangular arrangement

More information

Table of Contents. Revision History. 1. Introduction Purpose Document Conventions Intended Audience and Reading Suggestions4

Table of Contents. Revision History. 1. Introduction Purpose Document Conventions Intended Audience and Reading Suggestions4 Software Requirements Specification for Python Checker Version 1.0 approved Prepared by Matthew Arnold, Seong, Ian Computer Science Team 4 February 4th 2015 Table of Contents Table of Contents Revision

More information

01/09: Project Plan. The Capstone Experience. Dr. Wayne Dyksen Department of Computer Science and Engineering Michigan State University Spring 2013

01/09: Project Plan. The Capstone Experience. Dr. Wayne Dyksen Department of Computer Science and Engineering Michigan State University Spring 2013 01/09: Project Plan The Capstone Experience Dr. Wayne Dyksen Department of Computer Science and Engineering Michigan State University Spring 2013 From Students to Professionals Project Plan Functional

More information

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key 1/56 CSc 466/566 Computer Security 6 : Cryptography Symmetric Key Version: 2012/02/22 16:14:16 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

Foodwatch. Problem and Solution Overview. Tasks

Foodwatch. Problem and Solution Overview. Tasks Foodwatch Sean Miller; Group Manager Brandon Zahl; Designer Mike Silver; User Testing Kyle Hornberger; Writer CSE 440; Autumn 2009 http://cs.washington.edu/education/courses/cse440/09au/projects/foodwatch/documents/interactiv

More information

Assignment: Seminole Movie Connection

Assignment: Seminole Movie Connection Assignment: Seminole Movie Connection Assignment Objectives: Building an application using an Application Programming Interface (API) Parse JSON data from an HTTP response message Use Ajax methods and

More information

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS)

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Presented by: John Jay King Download this paper from: 1 Session Objectives Understand the need for something like Oracle Mobile

More information

Symmetric Cryptography. CS4264 Fall 2016

Symmetric Cryptography. CS4264 Fall 2016 Symmetric Cryptography CS4264 Fall 2016 Correction: TA Office Hour Stefan Nagy (snagy2@vt.edu) Office hour: Thursday Friday 10-11 AM, 106 McBryde Hall 2 Slides credit to Abdou Illia RECAP AND HIGH-LEVEL

More information

Practical C Programming (Nutshell Handbooks) Ebooks Free

Practical C Programming (Nutshell Handbooks) Ebooks Free Practical C Programming (Nutshell Handbooks) Ebooks Free There are lots of introductory C books, but this is the first one that has the no-nonsense, practical approach that has made Nutshell HandbooksÂ

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

Course Learning Outcomes (CLO): Student Outcomes (SO):

Course Learning Outcomes (CLO): Student Outcomes (SO): Course Coverage Course Learning Outcomes (CLO): 1. Understand the technical limitations and challenges posed by current mobile devices and wireless communications; be able to evaluate and select appropriate

More information

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin 1 P a g e Contents 1. Introduction... 5 2. Who is it for?... 6 3. Community v/s PRO Version... 7 3.1. Which version is

More information

DATA COLLECTION. Slides by WESLEY WILLETT 13 FEB 2014

DATA COLLECTION. Slides by WESLEY WILLETT 13 FEB 2014 DATA COLLECTION Slides by WESLEY WILLETT INFO VISUAL 340 ANALYTICS D 13 FEB 2014 WHERE DOES DATA COME FROM? We tend to think of data as a thing in a database somewhere WHY DO YOU NEED DATA? (HINT: Usually,

More information

Zombie Apocalypse Workshop

Zombie Apocalypse Workshop Zombie Apocalypse Workshop Building Serverless Microservices Danilo Poccia @danilop Paolo Latella @LatellaPaolo September 22 nd, 2016 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

More information

The COS 333 Project. Robert M. Dondero, Ph.D. Princeton University

The COS 333 Project. Robert M. Dondero, Ph.D. Princeton University The COS 333 Project Robert M. Dondero, Ph.D. Princeton University 1 Overview A simulation of reality In groups of 3-5 people... Build a substantial three tier software system 2 Three-Tier Systems "Three

More information

Standard 1 The student will author web pages using the HyperText Markup Language (HTML)

Standard 1 The student will author web pages using the HyperText Markup Language (HTML) I. Course Title Web Application Development II. Course Description Students develop software solutions by building web apps. Technologies may include a back-end SQL database, web programming in PHP and/or

More information

ITG Software Engineering

ITG Software Engineering Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building

More information

Advanced Crypto. 2. Public key, private key and key exchange. Author: Prof Bill Buchanan

Advanced Crypto. 2. Public key, private key and key exchange.  Author: Prof Bill Buchanan Advanced Crypto 2. Public key, private key and key exchange. Bob Alice Key Entropy. Key generators. Private key (AES, Twofish, CAST, IDEA, Blowfish, DES, 3DES, RC2, RC4/RC5, Skipjack, Camellia, Affine).

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM UNIVERSITY OF WASHINGTON CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development

More information

Modern Web Application Development. Sam Hogarth

Modern Web Application Development. Sam Hogarth Modern Web Application Development Sam Hogarth Some History Early Web Applications Server-side scripting only e.g. PHP/ASP Basic client-side scripts JavaScript/JScript/VBScript Major differences in browser

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) Perfecto Coffee Xpress Consistent Perfection Team 5 Chloe Good Yekaterina Glazko Edwards Hays Yucheng Hsieh Atreya Lahiri Jaimin Patel Yun Shen Andrew

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

Daily Diary Studies App User Guide

Daily Diary Studies App User Guide Daily Diary Studies App User Guide Monitoring Participant Compliance in Daily Diary Studies Developers: Michael Dai, Alysa McCall, Aman Mishra, Surti Sundaresan Project Coordinator: Siwei Liu Assistant

More information

AES Java Technology Comparisons

AES Java Technology Comparisons February 7, 1999 AES Java Technology Comparisons Alan Folmsbee, Sun Microsystems, Inc. Advanced Encryption Standard candidate algorithm comparisons based on the Java technology implementations. 1.0 Introduction

More information

Presented by: Kevin Hieb May 2, 2005

Presented by: Kevin Hieb May 2, 2005 Presented by: Kevin Hieb May 2, 2005 Governments National Finances National Security Citizens Companies Data Loss Monetary Loss Individuals Identity Theft Data Loss Networks Firewalls Intrusion Detection

More information

of making things look better with CSS, and you have a much better platform for interface development.

of making things look better with CSS, and you have a much better platform for interface development. I ve always had an interest in the nontechnical side of software development: the user experience. It started back when I was working on teams building the core of application servers in C++. We admired

More information

CSCI 1320 Creating Modern Web Applications

CSCI 1320 Creating Modern Web Applications CSCI 1320 Creating Modern Web Applications Lecture 34: Testing I 4/23/18 CS132 Lecture 34: Testing 1 Security Challenge and Testing What were you doing in the security challenge Seeing if you could break

More information

Project Plan Survey And Voting Web Apps

Project Plan Survey And Voting Web Apps Project Plan Survey And Voting Web Apps The Capstone Experience Team Quicken Loans Kaitlin Davis Clifton Howard Michael Meldrum Jacob Nyenhuis Department of Computer Science and Engineering Michigan State

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM UNIVERSITY OF RICHMOND CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development

More information

Rails: Rails Programming In A Day!: Learn The Basics Of Rails Programming, Start Coding Today! [Kindle Edition] By AZ Elite Publishing

Rails: Rails Programming In A Day!: Learn The Basics Of Rails Programming, Start Coding Today! [Kindle Edition] By AZ Elite Publishing Rails: Rails Programming In A Day!: Learn The Basics Of Rails Programming, Start Coding Today! [Kindle Edition] By AZ Elite Publishing If you are searched for a book by AZ Elite Publishing Rails: Rails

More information

DOWNLOAD OR READ : LEARN HTML5 AND JAVASCRIPT FOR IOS WEB STANDARDS BASED APPS FOR IPHONE IPAD AND IPOD TOUCH PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : LEARN HTML5 AND JAVASCRIPT FOR IOS WEB STANDARDS BASED APPS FOR IPHONE IPAD AND IPOD TOUCH PDF EBOOK EPUB MOBI DOWNLOAD OR READ : LEARN HTML5 AND JAVASCRIPT FOR IOS WEB STANDARDS BASED APPS FOR IPHONE IPAD AND IPOD TOUCH PDF EBOOK EPUB MOBI Page 1 Page 2 touch learn html5 and javascript pdf touch You may already

More information

Go To Consulting LLC.

Go To Consulting LLC. Go To Consulting LLC. Creative Efficient Affordable http://gotoconsulting.com Info@GoToConsulting.com (215) 396-8577 Go To Consulting LLC. About the company & Portfolio Go To Consulting LLC. Go To Consulting

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

COS 333: Advanced Programming Techniques. Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University

COS 333: Advanced Programming Techniques. Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University COS 333: Advanced Programming Techniques Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University 1 Agenda Introductions Course Overview Resources Topics Assignments Project (briefly) Schedule (briefly)

More information

Homework 8: Ajax, JSON and Responsive Design Travel and Entertainment Search (Bootstrap/Angular/AJAX/JSON/jQuery /Cloud Exercise)

Homework 8: Ajax, JSON and Responsive Design Travel and Entertainment Search (Bootstrap/Angular/AJAX/JSON/jQuery /Cloud Exercise) Homework 8: Ajax, JSON and Responsive Design Travel and Entertainment Search (Bootstrap/Angular/AJAX/JSON/jQuery /Cloud Exercise) 1. Objectives Get familiar with the AJAX and JSON technologies Use a combination

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM UNIVERSITY OF WASHINGTON CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development

More information

Performance Comparison of Hive, Pig & Map Reduce over Variety of Big Data

Performance Comparison of Hive, Pig & Map Reduce over Variety of Big Data Performance Comparison of Hive, Pig & Map Reduce over Variety of Big Data Yojna Arora, Dinesh Goyal Abstract: Big Data refers to that huge amount of data which cannot be analyzed by using traditional analytics

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

Node.js Vulnerabilities

Node.js Vulnerabilities Node.js Vulnerabilities Amadou Crookes December 13th, 2013 Abstract Node.js is a fresh take on building fast, scalable network applications in the form of a server side framework. There are two main differences

More information

Extract API: Build sophisticated data models with the Extract API

Extract API: Build sophisticated data models with the Extract API Welcome # T C 1 8 Extract API: Build sophisticated data models with the Extract API Justin Craycraft Senior Sales Consultant Tableau / Customer Consulting My Office Photo Used with permission Agenda 1)

More information

MySQL. The Right Database for GIS Sometimes

MySQL. The Right Database for GIS Sometimes MySQL The Right Database for GIS Sometimes Who am I? Web/GIS Software Engineer with Cimbura.com BS in IT, MGIS Michael Moore I like making and using tools (digital or physical) GIS Web Services I m most

More information

Cryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000

Cryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000 Cryptography Trends: A US-Based Perspective Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000 Outline Advanced Encryption Standard Dominant design Thoughts on key size Advanced

More information

Messaging App Forensics with Autopsy

Messaging App Forensics with Autopsy Messaging App Forensics with Autopsy Brian Carrier Motivation Show users new features around messaging, email, and chats. Show developers how to use the new infrastructure. This work was all funded by

More information

Chapter 2: Secret Key

Chapter 2: Secret Key Chapter 2: Secret Key Basics Block or Stream? Secret Key Methods Salting AES Key Entropy Prof Bill Buchanan OBE http://asecuritysite.com/crypto02 http://asecuritysite.com/encryption Conclusion Encryption

More information

SECRETS OF THE ENCRYPTED INTERNET: WORLDWIDE CRYPTOGRAPHIC TRENDS

SECRETS OF THE ENCRYPTED INTERNET: WORLDWIDE CRYPTOGRAPHIC TRENDS SESSION ID: PDAC-F02 SECRETS OF THE ENCRYPTED INTERNET: WORLDWIDE CRYPTOGRAPHIC TRENDS David Holmes Threat Researcher F5 Networks, Inc. @dholmesf5 Who is that Guy? David Holmes Childhood crypto enthusiast

More information

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu Introduction to Cryptographic Systems Asst. Prof. Mihai Chiroiu Vocabulary In cryptography, cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Decryption

More information

Functional Programming & Web Frameworks

Functional Programming & Web Frameworks Functional Programming & Web Frameworks Independent Study Report Justin Cady February 22, 2011 This report summarizes an independent study on web frameworks by Justin Cady, advised by Professor Matthew

More information

Introduction, Functions

Introduction, Functions Informatics 1 Functional Programming Lectures 1 and 2 Introduction, Functions Don Sannella University of Edinburgh Welcome to Informatics 1, Functional Programming! Informatics 1 course organiser: Paul

More information

Symmetric Encryption Algorithms

Symmetric Encryption Algorithms Symmetric Encryption Algorithms CS-480b Dick Steflik Text Network Security Essentials Wm. Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik Symmetric Cipher Model Plaintext Encryption Algorithm

More information

SERVICES. Desktop and Smartphone Apps. Databases. Stock Management Portals. Web Design and Development. Telephony Systems

SERVICES. Desktop and Smartphone Apps. Databases. Stock Management Portals. Web Design and Development. Telephony Systems Services Pack 2016 SERVICES Desktop and Smartphone Apps Databases Stock Management Portals Web Design and Development Telephony Systems DESKTOP AND SMARTPHONE APPLICATIONS iphone Objective-C, Unity, Cocos

More information

Syllabus INFO-GB Design and Development of Web and Mobile Applications (Especially for Start Ups)

Syllabus INFO-GB Design and Development of Web and Mobile Applications (Especially for Start Ups) Syllabus INFO-GB-3322 Design and Development of Web and Mobile Applications (Especially for Start Ups) Fall 2015 Stern School of Business Norman White, KMEC 8-88 Email: nwhite@stern.nyu.edu Phone: 212-998

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Android Online Training

Android Online Training Android Online Training IQ training facility offers Android Online Training. Our Android trainers come with vast work experience and teaching skills. Our Android training online is regarded as the one

More information

Free Downloads The C++ Programming Language: Special Edition (3rd Edition)

Free Downloads The C++ Programming Language: Special Edition (3rd Edition) Free Downloads The C++ Programming Language: Special Edition (3rd Edition) More than three-quarters of a million programmers have benefited from this book in all of its editions Written by Bjarne Stroustrup,

More information

Modern App Architecture

Modern App Architecture Modern App Architecture Brent Edwards Principal Lead Consultant Magenic Level: Intermediate BrentE@magenic.com @brentledwards http://www.brentedwards.net https://github.com/brentedwards BRENT EDWARDS MyVote

More information

Block ciphers. CS 161: Computer Security Prof. Raluca Ada Popa. February 26, 2016

Block ciphers. CS 161: Computer Security Prof. Raluca Ada Popa. February 26, 2016 Block ciphers CS 161: Computer Security Prof. Raluca Ada Popa February 26, 2016 Announcements Last time Syntax of encryption: Keygen, Enc, Dec Security definition for known plaintext attack: attacker provides

More information

How s your Sports ESP? Using SAS Event Stream Processing with SAS Visual Analytics to Analyze Sports Data

How s your Sports ESP? Using SAS Event Stream Processing with SAS Visual Analytics to Analyze Sports Data Paper SAS638-2017 How s your Sports ESP? Using SAS Event Stream Processing with SAS Visual Analytics to Analyze Sports Data ABSTRACT John Davis, SAS Institute Inc. In today's instant information society,

More information

Json Parse Error - No Json Object Could Be Decoded Django Rest Framework

Json Parse Error - No Json Object Could Be Decoded Django Rest Framework Json Parse Error - No Json Object Could Be Decoded Django Rest Framework It supports REST framework's flexible request parsing, rather than just supporting form data. ParseError: JSON parse error - No

More information

Housing4u Design Specification Version 1.0

Housing4u Design Specification Version 1.0 March 4 2014 Housing4u Design Specification Version 1.0 Prepared for CS189A Chandra Krintz Geoffrey Douglas Members: Site Mao Jason Horsley Austin Alameda Alvin Tan Trae Washburn Table of Contents 1. Introduction

More information

ITP 342 Mobile App Development. APIs

ITP 342 Mobile App Development. APIs ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually

More information

Connect to CCPL

Connect to CCPL Connect to Tech @ CCPL Charleston County Public Library TECH NEWS January February March 07 Technology Training Catalog Want to receive this publication by email each month? Sign up for our monthly newsletter!

More information

Crypto for Hackers. Eijah. v1.00 August 7 th, 2015

Crypto for Hackers. Eijah. v1.00 August 7 th, 2015 Crypto for Hackers Eijah v1.00 August 7 th, 2015 Hello World Shall we play a game? Joshua/WOPR Who am I? Founder Programmer Hacker 4 Last year at Defcon Saving Cyberspace by Reinventing File Sharing We

More information

SmartPark Senior Project Report Author: David Cosgrove Advisor: Professor Slivovsky 6/12/13

SmartPark Senior Project Report Author: David Cosgrove Advisor: Professor Slivovsky 6/12/13 SmartPark Senior Project Report Author: David Cosgrove Advisor: Professor Slivovsky 6/12/13 1 Introduction and Project Charter 4 Project Overview 4 Goals and Objectives 4 Goals 4 Stretch Goals 4 Objectives

More information

Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017

Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 1 Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 MSUFCU Contacts: Emily Fesler Collin Lochinski Judy Lynch Benjamin Maxim Andy Wardell Michigan

More information

Software Engineer Development of the Agent Support Tool (AST) for Instant Ink, applying TDD in Ruby on Rails.

Software Engineer Development of the Agent Support Tool (AST) for Instant Ink, applying TDD in Ruby on Rails. CV_3616 Technical Lead at Hewlett-Packard Summary I've started reading and writing by myself at the age of 3, then focused on electronics at 5 and later moved to computers at 7, when I found what I wanted

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Developing Mobile Applications for ios and Android the Oracle Way Frédéric Desbiens Principal Product Manager Application Development

More information

Lesson 5 Nimbits. Chapter-6 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 Nimbits. Chapter-6 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 Nimbits 1 Cloud IoT cloud-based Service Using Server at the Edges A server can be deployed at the edges (device nodes) which communicates the feeds to the cloud service. The server also provisions

More information

Tecnológico de Monterrey Coding Boot Camp LIVE ONLINE PROGRAM

Tecnológico de Monterrey Coding Boot Camp LIVE ONLINE PROGRAM Tecnológico de Monterrey Coding Boot Camp LIVE ONLINE PROGRAM Curriculum Overview The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development

More information

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Introduction to the Oracle Mobile Development Platform Dana Singleterry Product Management Oracle Development Tools Global Installed Base: PCs vs Mobile Devices 3 Mobile Enterprise Challenges In Pursuit

More information

The Now Platform Reference Guide

The Now Platform Reference Guide The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service

More information

JavaScript Fundamentals_

JavaScript Fundamentals_ JavaScript Fundamentals_ HackerYou Course Syllabus CLASS 1 Intro to JavaScript Welcome to JavaScript Fundamentals! Today we ll go over what programming languages are, JavaScript syntax, variables, and

More information

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2. 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology A Survey on AES (Advanced Encryption Standard) and RSA Encryption-Decryption in CUDA

More information

ORACLE UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

ORACLE UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP) Android Syllabus Pre-requisite: C, C++, Java Programming SQL & PL SQL Chapter 1: Introduction to Android Introduction to android operating system History of android operating system Features of Android

More information

Syllabus- Java + Android. Java Fundamentals

Syllabus- Java + Android. Java Fundamentals Introducing the Java Technology Syllabus- Java + Android Java Fundamentals Key features of the technology and the advantages of using Java Using an Integrated Development Environment (IDE) Introducing

More information

IEMS 5722 Mobile Network Programming and Distributed Server Architecture

IEMS 5722 Mobile Network Programming and Distributed Server Architecture Department of Information Engineering, CUHK MScIE 2 nd Semester, 2016/17 IEMS 5722 Mobile Network Programming and Distributed Server Architecture Lecture 9 Asynchronous Tasks & Message Queues Lecturer:

More information

Company Overview. Company based in the heart of Silicon Valley. Sources best talent around the world in order to deliver highest quality product.

Company Overview. Company based in the heart of Silicon Valley. Sources best talent around the world in order to deliver highest quality product. Game Development UE Company Overview Company based in the heart of Silicon Valley Sources best talent around the world in order to deliver highest quality product. Ensures projects are delivered in the

More information

Full Stack Mobile App With Ionic Framework PDF

Full Stack Mobile App With Ionic Framework PDF Full Stack Mobile App With Ionic Framework PDF Hoc Phan has been in the industry for 20 years. He started programming since the age of 12 with Pascal and Assembly on 486 computer. He has been working in

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST

More information

Pivotal Tracker Kanban Prototype COLORADO SCHOOL OF MINES 2017 FIELD SESSION

Pivotal Tracker Kanban Prototype COLORADO SCHOOL OF MINES 2017 FIELD SESSION Pivotal Tracker Kanban Prototype COLORADO SCHOOL OF MINES 2017 FIELD SESSION Ann Gustafson Emily Dederick Christopher Bonin Gerald Ung CLIENT Morgan Whitney Table of Contents 1. Introduction... 2 1.1.

More information

Jason Rundell. Full stack development: Genesis Land. Full Stack Developer: Portfolio

Jason Rundell. Full stack development: Genesis Land. Full Stack Developer: Portfolio Jason Rundell Full Stack Developer: Portfolio Full stack development: Genesis Land Architecture, Project Management, Client Support, LAMP, PHP, MySQL, WordPress, Amazon S3, Amazon EC2, Amazon RDS, Amazon

More information

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50 Advanced Encryption Standard and Modes of Operation Foundations of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm AES has been originally requested

More information

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System Department of Computer Science and Engineering The University of Texas at Arlington Team: TimeKeepers Project: Team Members: Dineth Hettiarachchi Damber Khadka Devkishen Sisodia Samir Shrestha Tasneem

More information