Practice vocabulary on the go! The original idea conceived by a fellow …
Practice vocabulary on the go! The original idea conceived by a fellow Chinese language student, this flashcard exercise is an engaging and effective way to review vocabulary terms from the convenience of your mobile device.
Chinese Take-In provides an interactive environment where first-year Chinese learners can practice …
Chinese Take-In provides an interactive environment where first-year Chinese learners can practice listening outside the classroom according to individual needs and paces while receiving immediate feedback.
This course is an introduction to three of the major genres of …
This course is an introduction to three of the major genres of traditional Chinese literature—poetry, fiction and drama, with a focus on vernacular fiction. We will read translations of a number of the “masterworks” of Chinese literature. We will also examine the intertextuality between these genres — how poetry blends into narrative, how fiction becomes drama, and drama inspires fiction. Through reading these selected works of traditional Chinese literature, we will examine some of the major features of traditional Chinese society: religious and philosophical beliefs, the imperial system and dynastic change, gender relations, notions of class and ethnicity, family, romance and sexuality. All works are read in translation; no language background is necessary.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
Today many small businesses benefit from QuickBooks (Desktop and Online) as a …
Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.
What can small business owners do in QuickBooks to manage these security risks?
Attendees to this webinar will learn about the following topics: - Introduce a security architectural approach to QuickBooks data protection. - Learn about the default data integrity protections built into QuickBooks. - Practice stronger authentication into QuickBooks. - Practice role-based access on QuickBooks accounting. - Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.
Presentation Time: 50 minutes plus 10 minutes on Q&A.
Back in May 2021 a cyber-attack known as ransomware shut down the …
Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems. Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks? Attendees will learn about the following topics: • Background on ransomware. • Current state-of-the-art Information Technology against ransomware. • A risk-based protection strategy. • Practical tools & tips against ransomware.
The Payment Card Industry (PCI) has created an industry-wide digital security standard. …
The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include:
- What is PCI/credit card data security? - Why do small businesses need to plan for PCI security compliance? - Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider and website hosting service provider. - IT audit requirements and stages for PCI compliance.
Presentation Time: 50 minutes plus 10 minutes Q&A. Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a …
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).
Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include: - What are the business requirements for HIPAA security? - What stages of IT audit do small businesses need to plan for HIPAA security compliance? - What technology and tools can be used to protect HIPAA-related data and to assure compliance?
Presentation Time: 50 minutes plus 10 minutes Q&A.
This subject is an introduction to various forms of culture in East …
This subject is an introduction to various forms of culture in East Asia (focusing on China, Japan and Korea), including both traditional and contemporary examples. Critically examines the shared cultural elements that are widely considered to constitute “East Asian culture,” and also the diversity within East Asia, historically and today. Examples include religious and philosophical beliefs (Confucianism and Buddhism), literature, art, food, architecture, and popular culture. The study of gender will be an integral part of this subject. The influence and presence of Asian cultural expressions in the U.S. are also considered. This class is suitable for students of all levels, and requires no Asian language background. Students who wish to fulfill the MISTI-Singapore requirement may do the final project on Singapore. Taught in English. The course includes field trips to the Museum of Fine Arts and the Peabody Essex Museum.
This course provides an overview of Asian American history and its relevance …
This course provides an overview of Asian American history and its relevance for contemporary issues. It covers the first wave of Asian immigration in the 19th century, the rise of anti-Asian movements, the experiences of Asian Americans during WWII, the emergence of the Asian American movement in the 1960s, and the new wave of post–1965 Asian immigration. The class examines the role these experiences played in the formation of Asian American ethnicity. The course addresses key societal issues such as racial stereotyping, media racism, affirmative action, the glass ceiling, the “model minority” syndrome, and anti-Asian harassment or violence. The course is taught in English.
This book titled “Learning QuickBooks® Online - Essential Knowledge for Beginners, 2nd …
This book titled “Learning QuickBooks® Online - Essential Knowledge for Beginners, 2nd Edition” is written for people without a college degree. The intent is to help people acquire the essential knowledge on QuickBooks with minimum technology education. The book starts from the setup of QuickBooks Online via the web. Readers are taught to use a free version of QuickBooks Online for learning purposes. The learning tool with some restrictions is provided by Intuit Inc. at no cost to learners. The content in this book uses a large number of visual graphics to ease the learning curve. Completion of the QuickBooks Online study in this book can be accomplished in a self-paced learning manner outside of the classroom.
It is hoped that this book will broaden the career development of many office workers including administrative assistants. This can be accomplished by improving their technology skills towards jobs in data entry, bookkeeping, and financial management for small and large businesses.
In this seminar we will examine various issues related to the intersection …
In this seminar we will examine various issues related to the intersection of race and gender in Asian America, starting with the nineteenth century, but focusing on contemporary issues. Topics to be covered may include racial and gender discourse, the stereotyping of Asian American women and men in the media, Asian American masculinity, Asian American feminisms and their relation to mainstream American feminism, the debate between feminism and ethnic nationalism, gay and lesbian identity, class and labor issues, domestic violence, interracial dating and marriage, and multiracial identity.
We will discuss numerous research problems that are related to the internet. …
We will discuss numerous research problems that are related to the internet. Sample topics include: routing algorithms such as BGP, communication protocols such as TCP, algorithms for intelligently selecting a resource in the face of uncertainty, bandwidth sensing tools, load balancing algorithms, streaming protocols, determining the structure of the internet, cost optimization, DNS-related problems, visualization, and large-scale data processing. The seminar is intended for students who are ready to work on challenging research problems. Each lecture will discuss:
methods used today issues and problems formulation of concrete problems potential new lines of research
A modest amount of background information will be provided so that the importance and context of the problems can be understood. No previous study of the internet is required, but experience with algorithms and/or theoretical computer science at the graduate/research level is needed.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.