SlideShare a Scribd company logo
Who am I?
● Student at Indiana Tech majoring in Computer
Science and Networking
● Google Summer of Code contributor to the
Fedora Project
● Vice-President of ACM
● Former Captain of the Cyber Defense Team and
Vice-President of the Cyber Security Club
● Someone who really likes conferences...
Choosing a Major
Here at Indiana Tech...
● Computer Science
● Networking
● Software Engineering
Here at Indiana Tech...
● Computer Science – Theory then code
● Networking – What is code?
● Software Engineering – Code then theory
The student population at Tech...
● Computer Science – The Mercenary, the
Shadow. Not often seen in any of the labs or
working with others. Smallest group.
● Networking – The IT guys, the Paper Tigers. Two types: the
hyper career/success focused or just learned that a firewall
doesn't have any fire.
● Software Engineering – The Mafia, the Swarm .
Always in the SE lab with at least four other
people. Two types: The occasionally seen
programming and Carson.
● Computer
Science
● Software
Engineering
● Information
Technology
● Networking
What's in a name?
● Cyber
Security
● Information
Systems
My choice / Your Choice
Certifications?
Training:
http://www.professormesser.com/
http://www.cybrary.it
Potpourri Mode = Enabled
Desktop Environments
Examples of Gnome, KDE, Xfce, and LXDE
● http://spins.fedoraproject.org/
Virtualization
Contributing to Open Source
● http://whatcanidoformozilla.org
● Dplug – I know you are going to do this summer
– http://dgplug.org/summertraining15.html
● http://whatcanidoforfedora.org
Programming At Scale
Git and Github
Programming At Scale
Useful commands:
● git push (remote repo, usually 'origin')
● git pull
● git clone https://....
● git status
● git log
Programming At Scale
git clone https://github.com/jsemu/gba
Programming At Scale
https://try.github.io
When the student is ready, the master appears...
Further resources:
https://github.com/vinta/awesome-python
https://github.com/vhf/free-programming-books

More Related Content

Viewers also liked

Be Equipped portfolio
Be Equipped portfolioBe Equipped portfolio
Be Equipped portfolio
Leah Johnson
 
Beukers LS2014-120 afl 2 (1)
Beukers LS2014-120 afl 2 (1)Beukers LS2014-120 afl 2 (1)
Beukers LS2014-120 afl 2 (1)Elène Beukers
 
TJ14091-Nova-Industries-ASTM-E-84
TJ14091-Nova-Industries-ASTM-E-84TJ14091-Nova-Industries-ASTM-E-84
TJ14091-Nova-Industries-ASTM-E-84
Duct Doctors, LLC
 
Ahmed adel cv2
Ahmed adel cv2Ahmed adel cv2
Ethics
EthicsEthics
Ethics
Samar Abbas
 
Law Journal
Law JournalLaw Journal
Law Journal
Maryam Kalhor
 
SBWR Test Loop Slide Show
SBWR Test Loop Slide ShowSBWR Test Loop Slide Show
SBWR Test Loop Slide Show
Robert Edwards
 
Madhukar's Resume
Madhukar's ResumeMadhukar's Resume
Madhukar's Resume
Madhukar Pavani
 
Databases -Screenshots
Databases -ScreenshotsDatabases -Screenshots
Databases -Screenshots
Jorge Alvarez
 
El costo de la historia
El costo de la historiaEl costo de la historia
El costo de la historia
ElcostodelaHistoria456
 
Triple S - Shared Services Standard
Triple S - Shared Services StandardTriple S - Shared Services Standard
Triple S - Shared Services Standard
Rajit Kabadi, MBA, MA, CAPP
 
IAEA_report
IAEA_reportIAEA_report
IAEA_report
Robert Edwards
 
Curriculum VITA as Associate Professor
Curriculum VITA as Associate ProfessorCurriculum VITA as Associate Professor
Curriculum VITA as Associate Professor
Robert Edwards
 
Technology in Procurement
Technology in ProcurementTechnology in Procurement
Technology in Procurement
SANJAY KUMAR PANDA
 
iface_product catalog
iface_product catalogiface_product catalog
iface_product catalog
Yun Seo Am
 
MINDSHARE Vol 2 Issue 3
MINDSHARE Vol 2 Issue 3MINDSHARE Vol 2 Issue 3
MINDSHARE Vol 2 Issue 3
Maryam Kalhor
 
RESUME saneesh
RESUME saneeshRESUME saneesh
RESUME saneesh
SANEESH DEVASIA
 

Viewers also liked (20)

IBM Brochure 9-88
IBM Brochure 9-88IBM Brochure 9-88
IBM Brochure 9-88
 
Be Equipped portfolio
Be Equipped portfolioBe Equipped portfolio
Be Equipped portfolio
 
Beukers LS2014-120 afl 2 (1)
Beukers LS2014-120 afl 2 (1)Beukers LS2014-120 afl 2 (1)
Beukers LS2014-120 afl 2 (1)
 
TJ14091-Nova-Industries-ASTM-E-84
TJ14091-Nova-Industries-ASTM-E-84TJ14091-Nova-Industries-ASTM-E-84
TJ14091-Nova-Industries-ASTM-E-84
 
Ahmed adel cv2
Ahmed adel cv2Ahmed adel cv2
Ahmed adel cv2
 
مدیریت دانش
مدیریت دانشمدیریت دانش
مدیریت دانش
 
Ethics
EthicsEthics
Ethics
 
Law Journal
Law JournalLaw Journal
Law Journal
 
SBWR Test Loop Slide Show
SBWR Test Loop Slide ShowSBWR Test Loop Slide Show
SBWR Test Loop Slide Show
 
Madhukar's Resume
Madhukar's ResumeMadhukar's Resume
Madhukar's Resume
 
Databases -Screenshots
Databases -ScreenshotsDatabases -Screenshots
Databases -Screenshots
 
El costo de la historia
El costo de la historiaEl costo de la historia
El costo de la historia
 
Triple S - Shared Services Standard
Triple S - Shared Services StandardTriple S - Shared Services Standard
Triple S - Shared Services Standard
 
IAEA_report
IAEA_reportIAEA_report
IAEA_report
 
Curriculum VITA as Associate Professor
Curriculum VITA as Associate ProfessorCurriculum VITA as Associate Professor
Curriculum VITA as Associate Professor
 
Technology in Procurement
Technology in ProcurementTechnology in Procurement
Technology in Procurement
 
iface_product catalog
iface_product catalogiface_product catalog
iface_product catalog
 
Special Olympics 2014
Special Olympics 2014Special Olympics 2014
Special Olympics 2014
 
MINDSHARE Vol 2 Issue 3
MINDSHARE Vol 2 Issue 3MINDSHARE Vol 2 Issue 3
MINDSHARE Vol 2 Issue 3
 
RESUME saneesh
RESUME saneeshRESUME saneesh
RESUME saneesh
 

Similar to Potpourri - Indiana Tech Summer Camp 2015

Computer Science.pptx
Computer Science.pptxComputer Science.pptx
Computer Science.pptx
NeilDuraiswami
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
Ollie Whitehouse
 
I hack you hack we all hack
I hack you hack we all hackI hack you hack we all hack
I hack you hack we all hack
KaraMichelleHarkins
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
MITRE ATT&CK
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
KharimMchatta
 
Hardware hacking and internet of things
Hardware hacking and internet of thingsHardware hacking and internet of things
Hardware hacking and internet of things
GeekNightHyderabad
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Becoming a world class engineer
Becoming a world class engineerBecoming a world class engineer
Becoming a world class engineer
Oluwasegun Matthew
 
Science to Cyber security
Science to Cyber securityScience to Cyber security
Science to Cyber security
Abida Shariff
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Satria Ady Pradana
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
Indranil Banerjee
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Core Security
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSec
ThreatReel Podcast
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
ALVAREZAPRILROSE
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
ALVAREZAPRILROSE
 
So, you wanna be a pen tester ctsc2017
So, you wanna be a pen tester   ctsc2017So, you wanna be a pen tester   ctsc2017
So, you wanna be a pen tester ctsc2017
Adrien de Beaupre
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
Careervira
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
Adam Shostack
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
 

Similar to Potpourri - Indiana Tech Summer Camp 2015 (20)

Computer Science.pptx
Computer Science.pptxComputer Science.pptx
Computer Science.pptx
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
 
I hack you hack we all hack
I hack you hack we all hackI hack you hack we all hack
I hack you hack we all hack
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Hardware hacking and internet of things
Hardware hacking and internet of thingsHardware hacking and internet of things
Hardware hacking and internet of things
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Becoming a world class engineer
Becoming a world class engineerBecoming a world class engineer
Becoming a world class engineer
 
Science to Cyber security
Science to Cyber securityScience to Cyber security
Science to Cyber security
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSec
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
 
So, you wanna be a pen tester ctsc2017
So, you wanna be a pen tester   ctsc2017So, you wanna be a pen tester   ctsc2017
So, you wanna be a pen tester ctsc2017
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Potpourri - Indiana Tech Summer Camp 2015

Editor's Notes

  1. Turner England 4th year, Computer Science and Networking
  2. Here at Indiana Tech there are three primary disciplines so study: -Computer Science - Software Engineering - Networking
  3. Each of the three disciplines takes a unique approach to learning “computers”. For CS, you learn how a computer works primarily by theory and program to reinforce key concepts. For SE, programming takes a central role in your discipline and there are several SE programming related classes. And finally Networking: - With Networking you will take two introductory programming classes (both in Java) but mainly focus on Cisco and enterprise networking equipment.
  4. At Tech we have a rather peculiar collection of students. Computer Science and Software Engineering students will have a lot of overlapping coursework. On the whole, Computer Science students are much more rare in terms of numbers and considering the “CS Lab” is the Mac lab (and is generally used by the design/digital imaging classes/majors) the are not frequently around on campus. SE's have their own lab and generally do nothing but play games (League anyone?) The Networking lab due to its size and layout is the most active of the labs (both classwork and otherwise). Some student groups (ITGS) will rely on Networking majors for their IT related needs for events.
  5. https://try.github.io/levels/1/challenges/1
  6. https://try.github.io/levels/1/challenges/1
  7. https://try.github.io/levels/1/challenges/1
  8. https://try.github.io/levels/1/challenges/1
  9. Additional Resources: File system structure http://www.tldp.org/LDP/intro-linux/html/sect_03_01.html