Women in Computing

…Science at Yale, www.cs.yale.edu/homes/tap/Files/hopper-story.html. Lee, J. A. N. “Ida Rhodes (Hadassah Itzkowitz).” Computer Pioneers, IEEE Computer Society, history.computer.org/pioneers/rhodes.html. Lee, J A. N. “Jean E. Sammet.” Computer Pioneers, IEEE Computer Society,…

America and Holocaust Refugees

…Sources United States Holocaust Memorial Museum, United States Holocaust Memorial Museum, www.ushmm.org/collections/the-museums-collections/about/photo-archives. “U.S. Policy During the Holocaust.” The Tragedy of S.S. St. Louis, www.jewishvirtuallibrary.org/the-tragedy-of-s-s-st-louis. “The Jewish Refugees the US Turned…

Language Used In Fraudulent Emails

…on malicious motives by preying on recipients’ moral obligations.     References Radev, D. (2008), CLAIR collection of fraud email, ACL Data and Code Repository, ADCR2008T001, http://aclweb.org/aclwiki https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/nigerian-letter-or-419-fraud    …

About Page

…beauty, body type, and what it means to be “attractive” in society. One study found that 1 out of 3.8 commercials contained some sort of message about appearance (Downs and…

Remixing Aleppo

…Liban 1918-1946 – Toward an Analysis of Class Formation in Syria: Aleppo’s Textile Industrialists and Workers during the Mandate, Presses De L’Ifpo, 1 Jan. 1970, books.openedition.org/ifpo/3194?lang=en. “Nadine Méouchy.” Orient, www.lesclesdumoyenorient.com/_Nadine-Meouchy_.html….