Functional Problem Solving (CSC 151 2014S) : Handouts
Primary: [Front Door] [Schedule] - [Academic Honesty] [Disabilities] [Email] - [FAQ] [Teaching & Learning] [Grading] [Rubric] - [Calendar]
Current: [Assignment] [EBoard] [Lab] [Outline] [Partners] [Reading]
Sections: [Assignments] [EBoards] [Examples] [Handouts] [Labs] [Outlines] [Partners] [Readings]
Reference: [Setup] - [Functions A-Z] [Functions By Topic] - [Racket] [Scheme Report (R5RS)] [R6RS] [TSPL4]
Related Courses: [Davis (2013F)] [Rebelsky (2010S)] [Rebelsky (2013F)] [Weinman (2012F)] [Weinman (2014S)]
Misc: [SamR] [Glimmer Labs] [CS@Grinnell] [Grinnell] [Issue Tracker (Course)]
I get way too much email, hundreds of messages each day. I rely on programs to automatically file my email and to search my email. Hence, I'd appreciate it if you'd help me process email from you more carefully. Here are a few short guidelines.
Most of us, myself included, don't think much about email, other than that it's a convenient way to communicate. But a few recent events suggest that we should be a bit more thoughtful. Hence, I encourage you to consider using mail encryption software, particularly the GNU Privacy Guard (GPG).
Since I use GPG, I've written a really brief introduction. There are a host of more useful and more comprehensive introductions to and tutorials about GPG, so I'm not going to write much here, other than to recommend that you learn about using GPG. I will say that, depending on what email package I'm using and who I'm communicating with, encryption is either trivial (one click and one password when I'm using Mail.app on the Macintosh and sending email) or a slight pain (saving the encrypted message as a file and then running a decryption program when I'm receiving an encrypted message via Webmail).
GPG is available for all three major operating systems (and probably for others, too).
If you send me your public (or a link to your public key) and ask me to encrypt email to do you, I will do my best to remember (although I may not always succeed). You can find my public key at http://www.cs.grinnell.edu/~rebelsky/rebelsky.gpg or at the MIT key server, http://pgp.mit.edu/.
Primary: [Front Door] [Schedule] - [Academic Honesty] [Disabilities] [Email] - [FAQ] [Teaching & Learning] [Grading] [Rubric] - [Calendar]
Current: [Assignment] [EBoard] [Lab] [Outline] [Partners] [Reading]
Sections: [Assignments] [EBoards] [Examples] [Handouts] [Labs] [Outlines] [Partners] [Readings]
Reference: [Setup] - [Functions A-Z] [Functions By Topic] - [Racket] [Scheme Report (R5RS)] [R6RS] [TSPL4]
Related Courses: [Davis (2013F)] [Rebelsky (2010S)] [Rebelsky (2013F)] [Weinman (2012F)] [Weinman (2014S)]
Misc: [SamR] [Glimmer Labs] [CS@Grinnell] [Grinnell] [Issue Tracker (Course)]
Samuel A. Rebelsky, rebelsky@grinnell.edu
Copyright (c) 2007-2014 Janet Davis, Samuel A. Rebelsky, and Jerod Weinman. (Selected materials are copyright by John David Stone or Henry Walker and are used with permission.)
This work is licensed under a Creative Commons Attribution 3.0 Unported License. To view a copy of this
license, visit http://creativecommons.org/licenses/by-nc/3.0/
or send a letter to Creative Commons, 543 Howard Street, 5th Floor,
San Francisco, California, 94105, USA.