2-26-18_Mo_6.30pm_BackTests1.1-5.2 Rev IT_Blockchain (305)OnTrial.co=(305)668-7245 A Rush's live broadcast ICO Blockchain Technology Crypto Currency Automated Trading Strategies Cloud Computing

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@thepsychco·
0.000 HBD
2-26-18_Mo_6.30pm_BackTests1.1-5.2 Rev IT_Blockchain (305)OnTrial.co=(305)668-7245 A Rush's live broadcast ICO Blockchain Technology Crypto Currency Automated Trading Strategies Cloud Computing
2-26-18_Mo_6.30pm_BackTests1.1-5.2 Rev IT_Blockchain (305)OnTrial.co=(305)668-7245 A Rush's live broadcast ICO Blockchain Technology Crypto Currency Automated Trading Strategies Cloud Computing

2-26-18_Mo_6.30p_BackTests1.1-5.2 Rev IT  (305)OnTrial.co=(305)668-7245 A  Rush's live broadcast

URL1 Short (View) HangOutsOnAir Hang0uts0nAir:	
https://youtu.be/Of5P85j8kv0	
	
	
URL2 Long (Speak) HangOutsOnAir Hang0uts0nAir:	
https://hangouts.google.com/hangouts/_/ytl/TeDa23m94mVnOv_QymmzsXWTD2joPNNmuUcFxyXXrwg=?eid=106879644319999583842&hl=en_US
	
URL3 Galaxy7 Student Table Side View "A Rush"=ChannelName:	
https://www.youtube.com/watch?v=6y3dcNoljSA



Short Watch
URL4 Note5 White Podium Front View "A Rush"=ChannelName:
https://youtu.be/jIUniDIgnpI

Today is Monday February 26, 2018. I’ll start the broadcast and I’m going to share my screen. I’m going to steemit.com/@thepsychco. The first link is usually on top, either what’s live or what’s being broadcasted. I’ll click here. We already have part of it. I’m going to go to the edit and the long link will be for participation. I’m going to go to blackboard BTE 210. We’re going to go to course documents. We’re going to be covering chapters for the exam. We’ll also have TG1 hardware and we have TG2 software, Chapter 4, which is security, chapter 5: data. I’m going to save TG3 for the second exam. There will be two parts of the exam, true/false multiple choice from the textbook and the second part will be open-ended. You should be able to see that I’m broadcasting right now. The other part that I wanted to talk about having the exam. We’ll be taking our exam and after that, we have Spring break. The rest of the semester, I want to focus primarily on your projects. Next week, we have the exam on chapters 1, 4, 5, TG1 and TG2. I would also like you to give me a preliminary proposal of your project for your group for next week. I’m thinking about this class as the demo lab. You can demonstrate technology products and areas of interests that you’d like to explore in depth. You may even want to do a business or you want to get more into blockchain or ICO’s, how to do an ICO, review products that are available. It may be other areas of interest. I’d like it to be something you have passion about rather than to do a project for a project’s sake. I want you to take it beyond this class. You can set the project to be a prototype for instance a start-up where you state for instance what is the business problem, how you are going to address it, what’s the competition, what are the limitations and how you’ll proceed. Or it could be another type of technology or ICO and blockchain. What’s ICO? Initial coin offering. You could evaluate a number of coin offerings available. If you wanted to do automated trading systems, it could be looking at different strategies that are available or possibilities of modifications you’d like to do. it could be areas in AI or machine learning. I’d like you to write up a preliminary one with your names and upload it to the audit area as a folder called proposal. I’ll look at it while you’re taking the exam. I’ll look at it and discuss it with you after the exam. One of the ways we’ll be providing it is with websites. We’ll be creating websites. If you want to do a proposal, you can also do a mobile app. We can do software where you don’t need to program but you can prototype and I’ll help you and you can present it. Along with your website, we can do videos if you want in terms of screencasts. If you want more in depth, you can attach a paper to your website. 
	If you want to code, those of you that have programming skills, it may be a way to teach. It has to surround in terms of technology with any of your interests. In the beginning, it would be evaluating what’s the availability in healthcare blockchain and healthcare. It could be what’s available now. If there’s somebody in the group that wants to do something on his/her own and no other member wants to do it, they can work alone. In terms of websites, we can do something as simple as Wix, there’s a number of other ones you can create without programming. There’s others that you can add onto. A project that you are interested in is what’s required of this class. It’s going to be due at the end of the semester and I’m going to be working on it with you every week. We’ll have milestones and we’ll have what we call agile development. Has anybody ever heard of agile development. Traditionally in software, end users said they wanted to connect to software and they contacted some programmers in an organization or enterprise. What happened is, 6 months later, they came back with the finished product. What’s the problem with that? What’s happening 6 months from now, you may not even have the same job. You may not even be interested. Agile development is along the way, I do small projects and I get tasks done and I get feedback to my group and my end users and we work together as a time. You’ll do a presentation the last week of the semester. The final part will be due after the final exam. I’ll give you feedback along the way. We’ll work together as we do every week. The final is scheduled with the university. We’re going to be doing the next half of the book. I’m going to concentrate on the project. So, I want a preliminary, you can make it one or two pages on what you’re going to be doing. It’s not set in stone. 
	One way to study is to go through the quizzes. I’ve given you those quizzes and I’ve left those quizzes open. You should be able to go through the quizzes in terms of hardware, you need to know the trends in hardware and software. What are the trends in hardware? If you go and buy a new computer, it’ll have more features than your old computer. Relatively, the price is going down not up. What are the trends in software? Developers will explode. Things are going to the cloud. It usually won’t be premise based. It’ll be software as a service. It can be more complicated because I’m taking all the outside external resources and now I have availability and it cannot be localized. The trend is its also going to be more vulnerable because its software as a service and in terms of updates, I don’t have to have my own staff. 

With hardware, you have the CPU, central processing unit, which does what? We can think of it as manipulating data and controls the task performed by other components. When we think about the types of computers that we have, hardware consists of CPU. You need to know the difference between primary storage and secondary storage. Primary storage is active memory, part of it is RAM, random access memory. It’s temporary. Primary storage is faster. We have a gray area. We can think of secondary as external. Give me an example of secondary storage. A solid-state drive, a harddrive, even a flash drive. 

You need to know examples of input technologies and output technologies. Output would be a way in which I’m going to present something to the end user. Input would be ways in which I would get my data to be read by my computer or my device. Then we talk about something called client vs server. So, if you send an email, who’s going to process that? The server. And if you’re going to do some word processing on your computer, then that would be the client. Anything that you’re doing on your keyboard, its being processed on your machine as the client. We have communication technologies. We went over some that we’ve done before. Another trend is BYOD, Bring Your Own Device. There’s something called infrastructure. You need to know what that is. The IT department has to deal with the infrastructure. There’s the IT chief information officer and he has a number of people work for him. What does the infrastructure need to deal with? Does he have to deal with people? Yes. Does he have to deal with his own personnel? Yes. Does he have to deal with IT components? Yes. When we talk about the infrastructure, it’s basically the backbone of IT. 

So, we talk about the servers versus the clients, examples of input devices, examples of gestures, output devices, CPU, how CPU works, you need to know the difference between RAM, the Control unit, the ALU (the arithmetic logic unit). The ALU will deal with making A standing for what, Arithmetic operations, L is the logic. It’s basically doing any of the processing in the arithmetic areas and it sends back to the storage. ALU is part of the CPU. You can see the examples in the book with the input and output devices. Moore’s law means what? It’s by a person named Moore, and what did he say? It’s knowing that every 3 years, we’re going to be able to process information a lot faster. It’s going to be important if we’re going to do any machine learning or artificial intelligence. Even with blockchain. The biggest disadvantage with block chain is the slowness, because of the links and the trust issue. It’s very slow in processing. Maybe it’ll do 10 transactions a second, in MasterCard, they’re doing hundreds of transactions a second. Intel and others are thinking of creating the chips or transistors that process a lot faster. This is just about cost and size, everything will be miniaturized and getting cheaper. Here there’s a hierarchy, you need to know the hierarchy of memory from the smallest of the bit which is 0’s and 1’s, to a byte, which is just a character, to then a kilobyte, megabyte, gigabyte, terabyte, petabyte, Exabyte, zettabytes. When you think about server farms, think of google and amazon, how much does it cost to upload to YouTube? What kind of capacity? This is basically from chapter 1. Let me go to YouTube. Remember when I talked about SEO? What is SEO? Search Engine Optimization. Basically, it’s our algorithms to help me search to get on top of search criteria. I’m doing this as part of my research. We’re going to go to back test chapter 1. What do you see when you put back test 1.1 on YouTube? What do they look like? They’re from our class. In general, users tend to get more value from whatever technologies they use. True or false? True. If you do show more, I have true, I have difficulty in objective. For number 2, I have a combination of high school grades, application essays, letters of recommendation would be considered information. It’s true. If you type back test and the chapter onto YouTube, you can find it. I’m going to try it out for each chapter on the exam. So, you can put that in your notes here so you can see this. You may even want to study with a friend and hide the answer to see if it’s right. There’s a number of them I just put in. So, this is chapter 1. 
	You can see chapter TG1 and TG2. In order to differentiate TG1: Hardware, I did back test 01.1 TG. The other one that I have here is the TG2, which is the software. With software, you have to discuss the major software issues, You need to know what open source is. What are the two major types of software? Just name one. Okay, Windows and Word? What type of software is windows? An operating system, word is an application. What is an operating system? It’s the intermediary between my hardware and my application. I can’t run any apps on my phone without an operating system. I need that in order to communicate with the software. 
What are the software issues that I have? A lot of the times not only do I have bugs but I have threats to the software. So, you can see here the idea of hardware and applications and the intermediaries. I can have defects in my software and they sometimes don’t occur and I can have vulnerabilities in my software. 

	Remember when we talked about vulnerabilities of my operating system? There’s something called zero day. I have patches to my software. And here in the Zero day, it’s an exploit that exploits a previously unknown security vulnerability. A zero-day attack is also sometimes defined as an attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally unknown. A lot of the time, hackers take advantage when the company becomes aware but doesn’t patch it immediately. We talked about operating system, speech recognition, voice recognition. That’s the end of TG2. 


	Now for chapter 5. What is data governance? It’s basically who’s going to be in charge of that data. who is the owner? What do I put into the database? What rights do people have? Do they have read, or write rights? Can they delete things? People think they can delete emails. You can see it as management has to be responsible for the data and make roles available and attribute what data is sensitive, whether its top secret, whether we can share with everyone. And then to follow through if those procedures have been met. Last week on Valentine’s day with Parkland, people don’t realize what happens until emergencies come. One of the problems with the data was that they had video but the police had video 20 minutes after the fact. You need to know data trends, decide on the integrity of the data. So, there’s data integrity, data security, government regulation. One example of government regulation is PCI. Think of the payment card security council. Does the university use credit cards? Yes. They have to be compliant with PCI, payment card industry. Who’s behind this is visa, MasterCard, the big banks. If the bank has to pay for any of that fraud, they want to have their data protected. If a university is holding all your credit card information in plain text, what would be one of the standards? There would be high encryption rate on my data. I can’t just store my data anyway I want. For the banking industry, there’s some. 

	What’s the healthcare standard? HIPPA, what are the initials of HIPPA? Health information patient protection act. It’s a privacy and portability act. The previous president of Umiami was one of the creators of HIPPA. It means that your data in a health record has to be secured. They can’t be advertised. There’s also KYC with the banking. KYC stands for Know Your customer. With bitcoin and other coins, people think they can go over those banks. Bank of America announced that they’re worried about cryptocurrency. You can do what’s called a private block chain. So, you can cut out a number of intermediaries and for hospitals, you can have a number of hospitals together and you know the customer or patient. Every link, having those hashes, is going to be encrypted. And then they can eliminate all that ransomware and attacks on hospitals. Multiple sources you need to know: internal, external, data governance. You need to know Data redundancy, data isolation and data inconsistency. The problem with database management systems is they want to minimize these three problems. They maximize data security, data integrity and data independents. The only problem here is database management systems maximizing these three is that you have to have back-up outside your area. 
	A lot of the time, they call it a hot site. There’s hot, warm and cold sites. If there is an emergency, I can be up and running on another site outside of my facilities. Hot, I can immediately go up and running, cold I have the basics, warm is in between. This is the hierarchy. There’s Bit, byte, field, data file and database. Fields are rows in a database table. In my database, each row would be one of my students. I could have a number of tables together that I can use to set up a database. These are key terms in a database. Would last name or C number be better for a primary key? A secondary key doesn’t necessarily have the same. We talked about big data, descriptions of big data. these are the descriptions we need to know. Its diverse, high volume, high velocity, insight discovery and process optimization. Insight discovery is new patterns I didn’t know about. When we think about the stock market data that basically has the high volume and high velocity is a good example of big data. It includes structured, unstructured and semi structured. These are the characteristics: volume, velocity and variety. You need to know these. 
	When we say big data is dirty, it means its untrusted, big data changes, especially in data streams. When we talk about relational databases, the key language is SQL, structured query language. If I have big data that isn’t structured, they call that NoSQL. One of the common SQL databases is MySQL, which is open source data. Hadoop is another one for big data that we talked about. Let’s think of data warehouse and data mart. A data warehouse is non-transactional, I put my data to do studies in. I don’t have to worry about my inventory. It isn’t messing with my day to day data. A data mart is a small portion dealing with a proposal that I have. The key to a data warehouse is its historical data. A data mart is a scaled down version. This is a really large square but it’s simple. Any time I see circles like these, this represents a database, these are coming from the outside going into my data warehouse and this is in between and these are coming from outside. This is an area in which my end user gets the output results. ERP stands for enterprise resource planning. OLTP stands for online transactional processing, it can be online or batch. 
	Has anyone heard of Tallahassee? What else is there besides FSU? The capital of Florida is Tallahassee. The state government is there and they meet once in a while. One time, they had a computer science professor give them a lecture. He lectured the difference between online transactional processing versus batch. Most things are online, but some are batch. What are batch? You can think of the police department. When they get a call, they put in a certain number of calls in. he basically said online is done immediately, batch is put in a batch and somebody processes it. There was a shooting on I-95 and what the police officer said at the time is when you speed on I95, and a cop pulls you over, what happens. They run your plates and you get out of the car and asks for license and registration. When he’s asking for that, the police officer stated that he saw that the car was stolen. Instead of going for his wallet, he was reaching for his gun. It was stolen a week before and he was the owner of the car. They didn’t find the gun. 
	How it worked there was that when the car is stolen, as soon as you see that it isn’t there, you report it. But they decided that when they retrieve the car, they batch it. It never got updated. They were talking about the importance between batch versus online. The video feed at the school had a 20-minute delay of the gunman. Of all this information that goes to the data warehouse, we’re making decisions based on that. When you’re looking at the data warehousing in these relationships here, you can have what we call one-to-one, one-to-many, and many-to-many. 
	The next chapter is chapter 4, which is security. You need to distinguish between a threat and a vulnerability. Threat comes from the outside, vulnerability comes from within. You need to know social engineering and unintentional errors. Know the difference what a virus is, a worm, a phishing attack is and what a spear phishing attack is. You should know what a Denial of service attack is and a distributed denial of service attack. A denial of service is when there’s these software bots that continuously go to a public server and they un-indate that server with so many requests that it puts down the server. They create bots that can get a thousand to do this. You need to know what a Trojan horse is, what a backdoor is and a logic bomb. Key loggers record all your keys, if you’re putting passwords, they can do it remotely. If you’re on a public computer, you don’t realize that they’re recording what you do in terms of spyware. Know the difference between what is risk, risk analysis and risk mitigation. In risk analysis, we’re implementing control and developing a data recovery plan. With risk mitigation, we’re trying to reduce those vulnerabilities. Am I 100% going to be without risk? No, I decide how much risk I can tolerate. Some companies can tolerate more risk than others. These are the terms you need to know. You need to know the difference between physical and access control. Physical can be a lock on the door, access is who can gain access to my software. A business continuity plan means if I have a security breach, what are my plans to continue. If they pull down my server and my whole operation is down, what can I do to get business up and running. With access controls, we have authorization and authentication. Authentication is something the user is, something the user has. Encryption is making my data secure since one end can’t read it in plain text. There’s something called SSL, secure socket layer, it’s basically encryption for my software or browser. 
	The second part of the exam is open-ended. I’m going to go to web-links. What I’ll do at the very beginning of the class is I’ll ask if there are last minute questions. I would select the second to last article, what is blockchain the second to last, look at the questions at the bottom: what is blockchain? What does blockchain do? how secure is blockchain? Etc. for understanding in general, you should be able to know what is blockchain, what is the blockchain in Fintech and how is it likely to evolve. I think these questions will help you write intelligently about it. You can look at other sources but I think it’s a good source. Did anyone hear about Hyper ledger? It’s supported a lot by IBM. The key of blockchain is its a peer to peer network. This one is trying to get rid of the intermediary. You can see the hash as encryption. People aren’t going to be able to hack into it as easily as other technologies. One of the biggest disadvantages in this blockchain is the slowness in terms of the process. They’re saying here that no system is un-hackable. There’s the public versus the private. They’re going to create these private blockchains within these industries. The other one we talked about would be on automated trading systems. This would be the third link, NinjaTrader. Look at the source code in terms of the logic. There should be no surprises. I’m going to try to come up with additional questions. I’ll try to put in the links where I can get additional questions. You can try even now with the back test to get samples of additional questions. 
	Go to YouTube and type Back test 1.1 and see what you get.  In terms of the open ended, I’d go to the articles and read through and search on google as well. You can go to the last link on web links. If I go down, this kind of explains what’s the difference between peer network data stores and distributed data sources, SQL and NOSQL. It shows my centralized databases versus my SQL databases. This kind of tells me my big data, my centralized and my distributed ledgers. I’ll be here on Wednesday, same time, if you want, you can come early. I’m going to do additional review and if you have questions you can come afterwards.
👍