Coming Singularity

5059 Words21 Pages
Please read my announcements. I provided you a copy of the required cover sheet and many of you did not provide the Title page as required. Other items I noticed was the lack of APA formatting. This was inclusive of papers not being double spaced, no reference page, a lack of levels of headings, lack of one inch margins, and the lack of the title in the header. One of the most important items missing on many papers is discussed on page 23 of the APA manual - the author's name. Yes, there were students who did not provide their name on their paper. Please review APA formatting as I will require an Abstract in your final project. I also provided an announcement to assist in how to properly cite and reference your resources. You must provide…show more content…
(2009). Ray Kurzweil: A university for the coming singularity [Video file]. Retrieved Nov 11, 2011 from http://www.ted.com/talks/ray_kurzweil_announces_singularity_university.html Lemmey, T. (2001, July/August). Untethered data. Harvard Business Review. 79(7), 21-22. Lemos, R. (2002, May 23). Passwords: the weakest link. CNETAsia. Retrieved March 30, 2003, from http://asia.cnet.com/newstech/security/0,39001150,39045336,00.htm Lemos, R. (2003, March 11). Recent worms punish bad passwords. CNETAsia. Retrieved March 30, 2003, from http://asia.cnet.com/newstech/security/0,39001150,39118721,00.htm McKay, J. (2002, September). Cyber-security: Getting a grip. Government Technology. 32-34. Retrieved April 3, 2003, from http://www.govtech.net/magazine/sup_story.phtml?magid=30&id=28685&issue=9:2002 Newton, S. (2003, March 11). Security in a box: It's not enough. Computerworld. Retrieved April 1, 2003, from http://www.computerworld.com/securitytopics/security/story/0,10801,79083,00.html?OpenDocument&~f Neiderhoffer, M. (2002, August). Internet security and the CPA. In P. Warner, L. Smith, (Eds.), The CPA Journal. 72(8), 71-72. O’Rourke, M. (2003, January). Cyberattacks prompt response to security threat. Risk Management. 50(1),…show more content…
(2003, March 10). New worm targets weak windows passwords. PC World. Retrieved April 5, 2003, from http://www.pcworld.com/news/article/0,aid,109750,00.asp Steen, W and Bierer, D. (1996). Administrative policies. In C. Hall (Ed.), NetWare Security. (pp. 45). Indianapolis, IN: New Riders Publishing. Wagner, M. (2002, October 29). Report: US companies have not stepped up monitoring employees' internet use. Tech Web. Retrieved April 4, 2003, from http://www.techweb.com/wire/story/TWB20021029S0002 Wagner, M. (2003, January 6). Nevada's largest daily newspaper selects netscreen for intrusion detection and prevention. InternetWeek. Retrieved April 10, 2003, from

More about Coming Singularity

Open Document