18 results
Search Results
2. Technology & access in an enterprise society.
- Subjects
- *
PUBLIC libraries , *INFORMATION technology , *HIGH technology , *COMPUTER science - Abstract
Presents an edited version of a paper presented by Richard De Gennaro, Director the New York Public Library, at the Second Pacific Conference on New Information Technology, dealing with the need for libraries to become innovative in order to survive. Introduction to technology to libraries; Libraries in the info marketplace; Erosion of the free library ethic and the blurring of roles.
- Published
- 1989
3. Papers.
- Subjects
- *
COMPUTER graphics research , *COMPUTER-generated imagery , *COMPUTER science , *CONFERENCES & conventions , *SPECIAL events - Abstract
The article provides information on the SIGGRAPH Papers program, an international forum for disseminating new scholarly work in computer graphics. SIGGRAPH 2007 Papers chair and professor of Computer Science and Electrical Engineering at Stanford University Marc Levoy, together with a three-person Papers Advisory Board and 54-person Program Committee, accepted a record number of papers for the 2007 event. Paper presentations are limited to 20 minutes and will be followed by five minutes of discussion with the session chair serving as moderator. Attendees can submit questions to discussants electronically or via passed notes.
- Published
- 2007
4. Security Policy A Paper Tiger.
- Author
-
Thurman, Mathias
- Subjects
- *
COMPUTER security , *DATA protection , *COMPUTER network security , *COMPUTER access control , *COMPUTER science , *INFORMATION technology - Abstract
The article highlights problems encountered by the author as a result of routinely ignored computer security policies. The installation of unauthorized application processors (AP) has been a continuing problem, so when he detected one the other day, he was not surprised. He called the network engineering group and gave his device's media access control address and location, thinking that they could log into the switch that was serving the location, look up his MAC address, identify the port and trace it to a specific wall jack. In the past, the author has successfully identified rogue AP in this manner. However, in this instance, the group was not able to find his MAC address. So he tried using AirMagnet's Find utility, which works as a signal-strength meter to help locate the AP. It worked like a charm. He could see the AP sitting right on top of an employee's monitor. A few weeks back, in the aftermath of a SQL Slammer outbreak, a manager proposed that the author's group take on incident-handling and remediation issues. The author discovered that information technology security is not the only group with a written incident-handling policy. To rectify that, the author wrote a single-page incident-protocol document that outlines the main steps all departments should take when responding to an incident. The author focused on four areas: preparation, identification, response and containment. Although they are getting better at responding to incidents, common problems arise. One is that no one wants to take charge. Another problem is that there is always confusion as to who should conduct certain activities. Hopefully, by creating a common incident-response protocol and ensuring that everyone is on the same page, responses to all events will become standardized, and incident management will become a routine aspect of doing business.
- Published
- 2004
5. Information Navigation 101.
- Author
-
Foster, Andrea L.
- Subjects
- *
EDUCATION research , *INTERNET searching , *LIBRARY science , *COMPUTER science , *INFORMATION technology , *COLLEGE students - Abstract
The article discusses the use of the Internet by college students for academic purposes. While almost all college students use the Internet on a regular basis, very few distinguish between peer-reviewed, scholarly sources, and any random Internet page. This can cause problems when students use improper sources for their academic research, which has a side effect of lowering the quality of papers as a whole. Accrediting agencies are now considering information-literacy programs as measures of an institution's performance to encourage education in the use of academic resources.
- Published
- 2007
6. Yet another new idea for FPGAs: Relays?
- Author
-
Prophet, Graham and Wilson, Ron
- Subjects
- *
FIELD programmable gate arrays , *ELECTROMECHANICAL technology , *RANDOM access memory , *COMPUTER science , *CYBERNETICS - Abstract
The article offers information on a paper on field programmable gate arrays (FPGA) using electromechanical relays, presented at the International Symposium on FPGAs in February 2011. The paper included works by Stanford University department of electrical engineering and computer science professors and students and researchers at Altera Corp. A conventional FPGA fabric in which MEMS (microelectromechanical-system) relays replace the static random-access memory (SRAM) cells is described.
- Published
- 2010
7. Building CoPs for knowledge flow.
- Subjects
- *
KNOWLEDGE management , *SOCIAL computing , *INTERPERSONAL relations , *COMPUTER science , *INFORMATION services management - Abstract
The article presents a step-by-step approach to a low-cost knowledge management program using social computing. The approach focuses on the functionality that has been touted but rarely delivered by communities of practice. The paper also provides tips on naturalizing approach to building communities for knowledge flow using blogs.
- Published
- 2008
8. Tryouts, Try-Nots, and Rip-Offs.
- Author
-
Padgett, Lauree
- Subjects
- *
INFORMATION technology , *INTERNET , *COMPUTER science - Abstract
The article provides an overview of several papers about information technology. In "Building a Web-Based Laboratory so Users Can Experiment With New Services," Jason Battles and Jody Combs posit that librarians are not as adept at taking the time to find out what patrons really want. In "When InterNET Is InterNOT," Arno Rueser shares six basic aspects of Internet bias and search queries that can be used to show how a skilled librarian can outperform the typical Internet searcher . In "'Copyfraud' and Public Domain Works," Carol Ebbinghouse looks at reasons why people and corporations place copyright symbols on public domain items and then centers on four basic questions pertaining to the complexities that often make copyright law confusing.
- Published
- 2008
9. THE 100-Year Archive DILEMMA.
- Author
-
Mearian, Lucas
- Subjects
- *
DATABASE management , *ELECTRONIC data processing , *INFORMATION retrieval , *INFORMATION science , *COMPUTER science - Abstract
As more organizations store more data longer, the information technology industry in the U.S. seeks a better way for data management in 2005. A record is a record, whether it's a sheet of paper, an e-mail, an electronic document or a digital image. It is the content that drives retention, not the media it's written on. Recent federal regulations are requiring more companies to save more content for longer periods of time. While content may be king in theory, in practice, the media on which it's stored and the software that stores it present problems. As digital tapes and optical discs pile higher and higher in the cavernous rooms of offsite archive providers, businesses are finding them increasingly expensive to maintain. The storage industry is working on the problems of data archiving from various angles. One solution to the backward-compatibility problem is to convert data to common plain-text formats, such as ASCII or Unicode. Another approach is to use PDF files to store long-term data. On the media side, the Storage Networking Industry Association is working toward solving what it calls the '100-year archive dilemma' through a standards effort for media.
- Published
- 2005
10. Portraits From Clips and Bytes.
- Author
-
SHEETS, HILARIE M.
- Subjects
- *
COMPUTER science , *COMPUTER training , *ALGORITHMS , *ARTISTS , *EXHIBITIONS - Abstract
The article profiles visual artists and composer R. Luke DuBois which presents his exhibition at the National Portrait Gallery in Washington. It mentions the how DuBois create different kind of search algorithm which basically enables the seminal computer science paper. It also notes that DuBois is one of the few artists who can actually understand his own software and his work as programmer.
- Published
- 2014
11. Apple Motion 2.
- Author
-
McMahon, Frank
- Subjects
- *
TECHNOLOGY , *COPYING , *INVENTIONS , *COPYING services , *REPRODUCTION paper , *COMPUTER science - Abstract
The article reports on the continual advancement of Apple in motion graphics and compositing program Motion with version 2.0. The updated version program add new ways and ideas to work for digital construction. Motion also offers a streamlined Apple interface. Finally, the new in Motion 2 is the Replicator which creates multiple copies of a single item.
- Published
- 2005
12. What Has Driven Women Out of Computer Science?
- Author
-
Stross, Randall
- Subjects
- *
COMPUTER science , *WOMEN computer scientists - Abstract
ELLEN SPERTUS, a graduate student at M.I.T., wondered why the computer camp she had attended as a girl had a boy-girl ratio of six to one. And why were only 20 percent of computer science undergraduates at M.I.T. female? She published a 124-page paper, ''Why Are There So Few Female Computer Scientists?'', that catalogued different cultural biases that discouraged girls and women from pursuing a career in the field. The year was 1991. Computer science has changed considerably since then. Now, there are even fewer women entering the field. Why this is so remains a matter of dispute. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
13. Firefox Web Browser Introduces Campus Edition - Chronicle.com.
- Author
-
Young, Jeffrey R.
- Subjects
- *
WEB browsers , *COMPUTER science , *INTERNET in education , *WORLD Wide Web - Abstract
The article reports that Mozilla, maker of the popular Firefox Web browser, released Firefox Campus Edition for free download in September 2007. A key feature of the new browser is the Zotero citation system developed by George Mason University's Center for History and New Media. The system is designed to help students and scholars mark and manage information on the Web that they want to cite in research papers. It also includes a plug-in that allows users to listen to music and manage playlists.
- Published
- 2007
14. ONLINE.
- Author
-
Foster, Andrea L.
- Subjects
- *
GRADUATE students , *COMPUTER science , *FUNDRAISING - Abstract
The article reports that three graduate students at the Massachusetts Institute of Technology attracted a flurry of attention in April after an academic conference accepted their randomly generated, nonsensical paper. Now the students are stars of a lighthearted video they made when they went to the conference even though their invitations had been withdrawn. The three, Jeremy A. Stribling, Maxwell Krohn, and Daniel Aguayo, are computer-science students studying parallel and distributed operating systems. The students were nevertheless able to raise enough money online to travel to the meeting, held in July at an Orlando hotel.
- Published
- 2005
15. Professor Develops Software to help Grade Essays.
- Author
-
Carnevale, Dan
- Subjects
- *
COMPUTER software , *GRADING of students , *INFORMATION technology , *COMPUTER science - Abstract
The article presents information according to which Ed Brent, a professor of sociology at the University of Missouri in Columbia has developed a computer program that not only grades his students' essays but also gives feedback on how they can improve their work. The program simply runs through the students' papers to see if those elements are thoroughly presented, analyzing the semantics and assessing the writer's understanding of the topic. If a student leaves something out or gets something wrong, the program will flag those mistakes, to help the student improve the next draft.
- Published
- 2005
16. THE Million-Dollar BACKUP TAPE.
- Author
-
Lipner, Bill
- Subjects
- *
TECHNOLOGY & state , *ACTIONS & defenses (Administrative law) , *INFORMATION technology equipment , *COMPUTER science , *HIGH technology , *DIGITAL media , *LEGAL procedure - Abstract
The article discusses the impact of adopting information technology (IT) innovations on the recent procedures of the legal system. The tedious work of using papers in maintaining records of lawsuits were being replaced by electronic backup media. The author demonstrates the role of IT in the system through a review on the lawsuit case of businessman Ron Perelman and Morgan Stanley regarding a complicated deal. Perelman won the case over Stanley after Stanley failed to inform Perelman regarding the backup tapes in his possession.
- Published
- 2006
17. Evidence-based IT Improves a….
- Subjects
- *
INFORMATION technology , *TEAMS in the workplace , *OPTICAL disks , *COMPUTER science - Abstract
The article presents views regarding the use of information technology. According to Jeffrey Pfeffer and Robert I. Sutton, Stanford University professors, evidence-based information technology improves the probability of a team to succeed in a project. Adam Miller, CEO of Cornerstone OnDemand Inc. says that team creation is a science given the right tools. Nien-Ling Wacker, CEO of Compulink Management Center Inc., had observed that disks are cheaper than toilet paper. Mark Palmer, vice president of event stream processing at Progress Software Corp., contends that most programmers need to revise their thinking when it comes to creating applications that apply intelligence.
- Published
- 2006
18. Geeks outgeeked.
- Subjects
- *
STUDENTS , *CYBERNETICS , *COMPUTER science , *INFORMATION science - Abstract
Reports that three students at Massachusetts Institute of Technology in Cambridge, Massachusetts, have submitted two computer-generated works of gibberish masquerading as academic papers, and had one accepted for a scientific conference in Multi-Conference on Systematics, Cybernetics & Informatics for Orlando, Florida on July 10-13, 2005 meeting.
- Published
- 2005
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.