Updating search results...

Search Resources

17 Results

View
Selected filters:
Chinese Dialogues Podcast
Unrestricted Use
CC BY
Rating
0.0 stars

This podcast series consists of simple dialogue exchanges. The listening materials are suitable for beginners and help them take the first step toward becoming proficient listeners. The contents of these 72 dialogues are completely based on the beginning level Chinese curriculum; they are creative yet realistic scenarios on topics that listeners can relate to, such as the social, family and school aspects of one’s life. Full transcripts transcripts in both traditional and simplified characters as well as English translations are provided as downloadable PDF documents. The podcast format enables a generation of increasingly ‘mobile’ learners to study the material ‘on-the-go’.

Subject:
Arts and Humanities
Languages
Material Type:
Lesson
Provider:
University of Texas at Austin
Provider Set:
COERLL
Author:
Wen-Hua Teng
Date Added:
01/17/2017
Chinese Flashcards
Unrestricted Use
CC BY
Rating
0.0 stars

Practice vocabulary on the go! The original idea conceived by a fellow Chinese language student, this flashcard exercise is an engaging and effective way to review vocabulary terms from the convenience of your mobile device.

Subject:
Arts and Humanities
Languages
Material Type:
Activity/Lab
Provider:
University of Texas at Austin
Provider Set:
COERLL
Author:
Wen-Hua Teng
Date Added:
01/17/2017
Chinese Take-In
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Chinese Take-In provides an interactive environment where first-year Chinese learners can practice listening outside the classroom according to individual needs and paces while receiving immediate feedback.

Subject:
Arts and Humanities
Languages
Material Type:
Activity/Lab
Provider:
University of Texas at Austin
Provider Set:
COERLL
Author:
Teng
Wen-Hua
Date Added:
01/17/2012
Classics of Chinese Literature
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course is an introduction to three of the major genres of traditional Chinese literature—poetry, fiction and drama, with a focus on vernacular fiction. We will read translations of a number of the "masterworks" of Chinese literature. We will also examine the intertextuality between these genres — how poetry blends into narrative, how fiction becomes drama, and drama inspires fiction. Through reading these selected works of traditional Chinese literature, we will examine some of the major features of traditional Chinese society: religious and philosophical beliefs, the imperial system and dynastic change, gender relations, notions of class and ethnicity, family, romance and sexuality. All works are read in translation; no language background is necessary.

Subject:
Arts and Humanities
English Language Arts
Literature
Reading Literature
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Teng, Emma
Date Added:
09/01/2011
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
East Asian Culture: From Zen to K-Pop
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This subject is an introduction to various forms of culture in East Asia (focusing on China, Japan and Korea), including both traditional and contemporary examples. Critically examines the shared cultural elements that are widely considered to constitute "East Asian culture," and also the diversity within East Asia, historically and today. Examples include religious and philosophical beliefs (Confucianism and Buddhism), literature, art, food, architecture, and popular culture. The study of gender will be an integral part of this subject. The influence and presence of Asian cultural expressions in the U.S. are also considered.
This class is suitable for students of all levels, and requires no Asian language background. Students who wish to fulfill the MISTI-Singapore requirement may do the final project on Singapore. Taught in English.
The course includes field trips to the Museum of Fine Arts and the Peabody Essex Museum.

Subject:
Anthropology
Arts and Humanities
Social Science
World Cultures
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Teng, Emma
Date Added:
02/01/2015
Introduction to Asian American Studies: Literature, Culture, and Historical Experience
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course provides an overview of Asian American history and its relevance for contemporary issues. It covers the first wave of Asian immigration in the 19th century, the rise of anti-Asian movements, the experiences of Asian Americans during WWII, the emergence of the Asian American movement in the 1960s, and the new wave of post–1965 Asian immigration. The class examines the role these experiences played in the formation of Asian American ethnicity. The course addresses key societal issues such as racial stereotyping, media racism, affirmative action, the glass ceiling, the "model minority" syndrome, and anti-Asian harassment or violence. The course is taught in English.

Subject:
Anthropology
Arts and Humanities
History
Social Science
World Cultures
World History
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Teng, Emma
Date Added:
09/01/2013
Learning QuickBooks® Online - Essential Knowledge for Beginners, 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book titled “Learning QuickBooks® Online - Essential Knowledge for Beginners, 2nd Edition” is written for people without a college degree. The intent is to help people acquire the essential knowledge on QuickBooks with minimum technology education. The book starts from the setup of QuickBooks Online via the web. Readers are taught to use a free version of QuickBooks Online for learning purposes. The learning tool with some restrictions is provided by Intuit Inc. at no cost to learners. The content in this book uses a large number of visual graphics to ease the learning curve. Completion of the QuickBooks Online study in this book can be accomplished in a self-paced learning manner outside of the classroom.

It is hoped that this book will broaden the career development of many office workers including administrative assistants. This can be accomplished by improving their technology skills towards jobs in data entry, bookkeeping, and financial management for small and large businesses.

Subject:
Accounting
Applied Science
Business and Communication
Computer Science
Computing and Information
Education
Educational Technology
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Module
Student Guide
Unit of Study
Author:
Henry S. Teng
Date Added:
04/02/2024
Race and Gender in Asian America
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this seminar we will examine various issues related to the intersection of race and gender in Asian America, starting with the nineteenth century, but focusing on contemporary issues. Topics to be covered may include racial and gender discourse, the stereotyping of Asian American women and men in the media, Asian American masculinity, Asian American feminisms and their relation to mainstream American feminism, the debate between feminism and ethnic nationalism, gay and lesbian identity, class and labor issues, domestic violence, interracial dating and marriage, and multiracial identity.

Subject:
Anthropology
Arts and Humanities
Gender and Sexuality Studies
History
Social Science
U.S. History
World Cultures
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Teng, Emma
Date Added:
02/01/2006
Topics in Theoretical Computer Science : Internet Research Problems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

We will discuss numerous research problems that are related to the internet. Sample topics include: routing algorithms such as BGP, communication protocols such as TCP, algorithms for intelligently selecting a resource in the face of uncertainty, bandwidth sensing tools, load balancing algorithms, streaming protocols, determining the structure of the internet, cost optimization, DNS-related problems, visualization, and large-scale data processing. The seminar is intended for students who are ready to work on challenging research problems. Each lecture will discuss:

methods used today
issues and problems
formulation of concrete problems
potential new lines of research

A modest amount of background information will be provided so that the importance and context of the problems can be understood. No previous study of the internet is required, but experience with algorithms and/or theoretical computer science at the graduate/research level is needed.

Subject:
Applied Science
Career and Technical Education
Computer Science
Electronic Technology
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Leighton, Tom
Maggs, Bruce
Sundaram, Ravi
Teng, Shang-Hua
Date Added:
02/01/2002