{"title":"Everything you always wanted to know about FDDI basics (part 1)","authors":"D. Katz","doi":"10.1145/1098849.1098851","DOIUrl":"https://doi.org/10.1145/1098849.1098851","url":null,"abstract":"FDDI is a Local Area Network technology based on the use of optical fiber and is likely to become a big part of the networking industry in the near future.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding e-mail addresses","authors":"C. Gedney","doi":"10.1145/1098849.1098850","DOIUrl":"https://doi.org/10.1145/1098849.1098850","url":null,"abstract":"Electronic mail, with its gamut of benefits and advantages, can still cause some share of tribulation, especially when one tries to get a message to someone on a seemingly far-out network, or when that someone tries to send mail in return. This is the first in a series of articles designed to help the typical UIUCnet user understand the e-mail address environment.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selecting a computing system with the cognitive cone","authors":"Guillermo A. Collado","doi":"10.1145/382071.382073","DOIUrl":"https://doi.org/10.1145/382071.382073","url":null,"abstract":"This paper introduces the Cognitive Cone---a system of rating scales organized as a decision-making tool, which a university can use to select computer resources for establishing its academic computing target environment. The Cognitive Cone can be visualized as a six-dimensional solid cone, converging forward. The dimensions are: Obsolete vs. State-of-the-art hardware technology; Vendor-specific vs. Industry-standard operating system; Curriculum-irrelevant vs. Curriculum-relevant software; Isolation vs. Connectivity of mainframes, minicomputers, and microcomputers; Non-resource sharing vs. Resource sharing between the Schools; Stultifying vs. Facilitating faculty productivity. The shape of the Cognitive Cone is explained and the definitions of its dimensions are presented. The principles underlying its construction are discussed. Its theoretical and measurement foundations are articulated. And finally, the writer describes how San Francisco State University has been using the Cognitive Cone as a decision making tool for helping select computer resources and establish its academic computing target environment.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127073310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bringing technology into pedagogy: a session presented at CCMS, March 1989","authors":"Jim Moss, L. Levine, William E. Ayen","doi":"10.1145/382262.382263","DOIUrl":"https://doi.org/10.1145/382262.382263","url":null,"abstract":"Moss: Let me introduce these two distinguished gentlemen on my left. Lt. Col. William Ayen is the Associate Dean of Resources at the Air Force Academy. He has a Ph.D. from Ohio State and did his undergraduate work at Wisconsin. He has done quite a remarkable job advancing the efforts of computing at the Air Force Academy. Immediately on my left is Larry Levine who is from Dartmouth College as the Director of User Services. He has a Ph.D. in Education from Indiana University and he will talk about the program at Dartmouth. The third member of the panel who was unable to attend, unfortunately, was Col. Lance Leach who is the Assistant Dean for Computing at the Military Academy and also a Ph.D. in Electrical Engineering from Rensselaer. Since he's not here, I'm substituting.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125458819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for student computing","authors":"S. Stager, L. Boesen","doi":"10.1145/382262.383033","DOIUrl":"https://doi.org/10.1145/382262.383033","url":null,"abstract":"At some point in time, on every college and university campus, computing diffuses to the \"masses,\" or to the multitude of diverse computer users. Services geared to early adopters of computing technology, such as faculty and graduate students in the hard sciences and engineering, are often inappropriate for the masses. Due to their numbers, students become the largest user group among the masses, requiring restructuring, expansion, and enhancement of traditional computing services.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"219 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer conferencing: a versatile new undergraduate learning process","authors":"R. Hoare, W. Race","doi":"10.1145/382071.382685","DOIUrl":"https://doi.org/10.1145/382071.382685","url":null,"abstract":"This paper presents a case study of the introduction of computer conferencing at The Polytechnic of Wales. A brief description of the software is provided. The benefits of computer conferencing are reviewed. An account is given of the development of each of a number of the conferences introduced so far, and comments are made regarding the ways in which students have taken advantage of the new medium. The paper concludes with an evaluation of progress to date, and discussion of plans for its extension.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114952049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fair share job scheduling approach for MVS","authors":"L. Conrad, C. Hsu","doi":"10.1145/382260.382786","DOIUrl":"https://doi.org/10.1145/382260.382786","url":null,"abstract":"One of the more challenging problems to handle in a university computing center is how to schedule the use of scarce computing resources fairly among the various elements of the customer community. The researcher community on our campus does a good job of monitoring for possible \"holes\" in our resource allocation schemes that might be exploited to the benefit of some ... and the detriment of others. This paper discusses the MVS scheduling problem we encountered and describes the approach taken to solve it.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for OS/2 support","authors":"Cathy Leffler","doi":"10.1145/382260.382261","DOIUrl":"https://doi.org/10.1145/382260.382261","url":null,"abstract":"Whether we plan for it or not, there is little doubt that the OS/2 operating system will be one of many significant new elements in the diverse computing environments on university and college campuses. As user services professionals, we must help our constituents make educated decisions as to whether or not they will migrate to OS/2, and when they should do so. We must then be prepared to help them make a smooth transition to this new computing environment.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"39 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending against viruses and worms","authors":"S. Kurzban","doi":"10.1145/68695.68697","DOIUrl":"https://doi.org/10.1145/68695.68697","url":null,"abstract":"\"Computer viruses\" have received a lot of attention. In fact, the best-known \"viruses\" have not been viruses at all, but \"worms,\" programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. But that is only one type of defense. Preventing or limiting the effect of the harm that their components can cause is another. Still other measures are specific to known viruses. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corporate contributions: Is the tail wagging the dog?","authors":"M. Draper, R. Lutz, J. Nicholson","doi":"10.1145/68695.68696","DOIUrl":"https://doi.org/10.1145/68695.68696","url":null,"abstract":"Nicholson: Before I go directly to my argument that the tail is not wagging the dog, let me share with you a little information about Howard University and how computing fits into the overall organization.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}