MODULE 2: MARKETS
Intro to EPP Spring 2016
Class work last week graded but not recorded,
will have Thursday.
TA visit hours TODAY
Aviva 10:30 11:30 and
Tests in progress
HW2 graded this week
Blackboard grade center working on it this
Looking ahead this is a down week so make
progress on project.
BEHAVIOR, RISK AND
19-101 Spring 2016
MODULE 1: WHAT IS
Intro to EPP Spring 2016
Objectives for today
Syllabus review (SR on later slides), answer
Continue with policy process of usage of
electronic devices in class
Discuss why it is so hard
1 handout to pick up
And an index card
HW1 due today (4:00pm, PH 126C)
Organization of the Course
Solutions to the reading questions posted.
HW2 posted may work with another student
and submit one response.
EPP Open House today, 4:30-6:00 PH 107E
Poll on Piazza for CIT FY students regarding
planned primary major.
POLICY OF CFCS
Turn in one copy of class prep at back,
keep the other for class activity.
Pick up hand out, index card.
Compare your notes on market failures
with a classmate.
HW0 due by 5:00pm (nothing to submit).
HW1 on blackboard, due Jan 2
Blackboard grade center should be up to date
do you see?
Project 1 due Tuesday, 3/1, 4pm, my office
(earlier is fine, too)
Current event tangents
Death of Scalia Senate rules
FBI asks Apple to aid in unlocking gu
TED Case Studies
Montreal Protocol on CFCs
The Montreal Protocol on Substances that Deplete the Ozone
Layer is one of the first international environmental
19-101 Introduction to Engineering and Public Policy
Department of Engineering and Public Policy
Dr. Deanna Matthews (email@example.com)
Office Hours: Thursdays, 3:00pm, PH 126C
Appointments: www.cmu.edu/epp/eppadvising and select
Homework Assignment #8
1. (10 points) Explain the difference between reuse, repair, remanufacture and
Reuse refers to taking an unwanted but functional product and providing it to
Homework Assignment #2
1. (15 points)
In 2012 the Cellular Telecommunications Industry Association (trade group
of U.S. cellular operators) submitted t
Homework Assignment #3
1. (5 points) ) If you own a cellphone, use the website at
http:/www.phonescoop.com/phones/, to look up your phone and find its
Hearing Aid Compatibility rating. Rep
Homework # 5
1. (20 points) Two years ago, the New York Times had the following article:
On average, two children die and about 50 are injured every week
when someone accidentally backs over them in a vehicle,
Your solutions to these problems will not be collected or graded. However, working
on them for practice should assist you in preparing for the quiz on Thursday.
You are a cellphone
Homework # 4
1. (10 points) Consider the following variation of the dice game known as craps. A
player wagers on the outcome of throwing 2 six-sided dice. If a player wages $1 on
his initial throw,
Homework # 7
1. (10 points) Short power outages happen more frequently than long power
outages. Suppose that over a ten-year period, the expected number N of power
outages lasting longer than T hours is
Homework Assignment #1
1. (5 points) What is the relationship between frequency and wavelength for an
f= wavelength * frequency = velocity of propagation (=c, the velocity of light,
Homework Assignment #6
(10 points) What is the SAR rating of your phone? (Hint: See the links to
manufacturers at http:/www.fcc.gov/encyclopedia/specific-absorption-
You may have one 8 x 11 sheet of paper with notes; otherwise this exam is
Read over all the questions before starting and note the number of points for
each question. Allocate y
A Cable Being Laid
A Few Months Later
Most modern cables are constructed in rings If a failure occurs, data is automatically rerouted around the other direction of the ring It takes 2 failures on different segments to b
Wi-Fi In 1999 the IEEE completed and approved the standard known as 802.11b, and WLANs were born. (802)
Finally, computer networks could achieve connectivity with a useable amount of bandwidth without being networked via a w
Issues in Cryptography and Encryption
Passwords Of course my password is my pet`s name.
Its name is Q47pY!3 I change it every 90 days.
The art or science of secret wr
The Computer Security Institute (CSI) today released its 2007 report with news that the average annual loss reported by U.S. companies in the 2007 CSI Computer Crime and Security Survey more than doubled, from $168,000
From Botnets to Cross Site
Emergence of Bots
hacking scripts &
first IRC bot
1st worm to
use IRC as
Backdoors, Trojans, Rootkits.
The Spread (US)
At its peak, Witty flooded the Internet with more than 90 Gbits/second of traffic. Locations infected within the first 60 seconds are shown in red, while locations infected after the first 60 seconds
A bit of history
In 1988 Morris released a program which succeeded in infecting thousands of Unix hosts on the Internet. One of the methods Morris used to gain access to a vulnerable system was a buffer overflow bug in the finge
Importance of Buffer overflows
Buffer overflows are the most common form of security threat in software systems today, and vulnerabilities attributed to buffer overflows have consistently dominated CERT advisories. In the year 200