11 results
Search Results
2. Papers.
- Subjects
- *
COMPUTER graphics research , *COMPUTER-generated imagery , *COMPUTER science , *CONFERENCES & conventions , *SPECIAL events - Abstract
The article provides information on the SIGGRAPH Papers program, an international forum for disseminating new scholarly work in computer graphics. SIGGRAPH 2007 Papers chair and professor of Computer Science and Electrical Engineering at Stanford University Marc Levoy, together with a three-person Papers Advisory Board and 54-person Program Committee, accepted a record number of papers for the 2007 event. Paper presentations are limited to 20 minutes and will be followed by five minutes of discussion with the session chair serving as moderator. Attendees can submit questions to discussants electronically or via passed notes.
- Published
- 2007
3. Security Policy A Paper Tiger.
- Author
-
Thurman, Mathias
- Subjects
- *
COMPUTER security , *DATA protection , *COMPUTER network security , *COMPUTER access control , *COMPUTER science , *INFORMATION technology - Abstract
The article highlights problems encountered by the author as a result of routinely ignored computer security policies. The installation of unauthorized application processors (AP) has been a continuing problem, so when he detected one the other day, he was not surprised. He called the network engineering group and gave his device's media access control address and location, thinking that they could log into the switch that was serving the location, look up his MAC address, identify the port and trace it to a specific wall jack. In the past, the author has successfully identified rogue AP in this manner. However, in this instance, the group was not able to find his MAC address. So he tried using AirMagnet's Find utility, which works as a signal-strength meter to help locate the AP. It worked like a charm. He could see the AP sitting right on top of an employee's monitor. A few weeks back, in the aftermath of a SQL Slammer outbreak, a manager proposed that the author's group take on incident-handling and remediation issues. The author discovered that information technology security is not the only group with a written incident-handling policy. To rectify that, the author wrote a single-page incident-protocol document that outlines the main steps all departments should take when responding to an incident. The author focused on four areas: preparation, identification, response and containment. Although they are getting better at responding to incidents, common problems arise. One is that no one wants to take charge. Another problem is that there is always confusion as to who should conduct certain activities. Hopefully, by creating a common incident-response protocol and ensuring that everyone is on the same page, responses to all events will become standardized, and incident management will become a routine aspect of doing business.
- Published
- 2004
4. Yet another new idea for FPGAs: Relays?
- Author
-
Prophet, Graham and Wilson, Ron
- Subjects
- *
FIELD programmable gate arrays , *ELECTROMECHANICAL technology , *RANDOM access memory , *COMPUTER science , *CYBERNETICS - Abstract
The article offers information on a paper on field programmable gate arrays (FPGA) using electromechanical relays, presented at the International Symposium on FPGAs in February 2011. The paper included works by Stanford University department of electrical engineering and computer science professors and students and researchers at Altera Corp. A conventional FPGA fabric in which MEMS (microelectromechanical-system) relays replace the static random-access memory (SRAM) cells is described.
- Published
- 2010
5. Building CoPs for knowledge flow.
- Subjects
- *
KNOWLEDGE management , *SOCIAL computing , *INTERPERSONAL relations , *COMPUTER science , *INFORMATION services management - Abstract
The article presents a step-by-step approach to a low-cost knowledge management program using social computing. The approach focuses on the functionality that has been touted but rarely delivered by communities of practice. The paper also provides tips on naturalizing approach to building communities for knowledge flow using blogs.
- Published
- 2008
6. Tryouts, Try-Nots, and Rip-Offs.
- Author
-
Padgett, Lauree
- Subjects
- *
INFORMATION technology , *INTERNET , *COMPUTER science - Abstract
The article provides an overview of several papers about information technology. In "Building a Web-Based Laboratory so Users Can Experiment With New Services," Jason Battles and Jody Combs posit that librarians are not as adept at taking the time to find out what patrons really want. In "When InterNET Is InterNOT," Arno Rueser shares six basic aspects of Internet bias and search queries that can be used to show how a skilled librarian can outperform the typical Internet searcher . In "'Copyfraud' and Public Domain Works," Carol Ebbinghouse looks at reasons why people and corporations place copyright symbols on public domain items and then centers on four basic questions pertaining to the complexities that often make copyright law confusing.
- Published
- 2008
7. THE 100-Year Archive DILEMMA.
- Author
-
Mearian, Lucas
- Subjects
- *
DATABASE management , *ELECTRONIC data processing , *INFORMATION retrieval , *INFORMATION science , *COMPUTER science - Abstract
As more organizations store more data longer, the information technology industry in the U.S. seeks a better way for data management in 2005. A record is a record, whether it's a sheet of paper, an e-mail, an electronic document or a digital image. It is the content that drives retention, not the media it's written on. Recent federal regulations are requiring more companies to save more content for longer periods of time. While content may be king in theory, in practice, the media on which it's stored and the software that stores it present problems. As digital tapes and optical discs pile higher and higher in the cavernous rooms of offsite archive providers, businesses are finding them increasingly expensive to maintain. The storage industry is working on the problems of data archiving from various angles. One solution to the backward-compatibility problem is to convert data to common plain-text formats, such as ASCII or Unicode. Another approach is to use PDF files to store long-term data. On the media side, the Storage Networking Industry Association is working toward solving what it calls the '100-year archive dilemma' through a standards effort for media.
- Published
- 2005
8. Apple Motion 2.
- Author
-
McMahon, Frank
- Subjects
- *
TECHNOLOGY , *COPYING , *INVENTIONS , *COPYING services , *REPRODUCTION paper , *COMPUTER science - Abstract
The article reports on the continual advancement of Apple in motion graphics and compositing program Motion with version 2.0. The updated version program add new ways and ideas to work for digital construction. Motion also offers a streamlined Apple interface. Finally, the new in Motion 2 is the Replicator which creates multiple copies of a single item.
- Published
- 2005
9. THE Million-Dollar BACKUP TAPE.
- Author
-
Lipner, Bill
- Subjects
- *
TECHNOLOGY & state , *ACTIONS & defenses (Administrative law) , *INFORMATION technology equipment , *COMPUTER science , *HIGH technology , *DIGITAL media , *LEGAL procedure - Abstract
The article discusses the impact of adopting information technology (IT) innovations on the recent procedures of the legal system. The tedious work of using papers in maintaining records of lawsuits were being replaced by electronic backup media. The author demonstrates the role of IT in the system through a review on the lawsuit case of businessman Ron Perelman and Morgan Stanley regarding a complicated deal. Perelman won the case over Stanley after Stanley failed to inform Perelman regarding the backup tapes in his possession.
- Published
- 2006
10. Evidence-based IT Improves a….
- Subjects
- *
INFORMATION technology , *TEAMS in the workplace , *OPTICAL disks , *COMPUTER science - Abstract
The article presents views regarding the use of information technology. According to Jeffrey Pfeffer and Robert I. Sutton, Stanford University professors, evidence-based information technology improves the probability of a team to succeed in a project. Adam Miller, CEO of Cornerstone OnDemand Inc. says that team creation is a science given the right tools. Nien-Ling Wacker, CEO of Compulink Management Center Inc., had observed that disks are cheaper than toilet paper. Mark Palmer, vice president of event stream processing at Progress Software Corp., contends that most programmers need to revise their thinking when it comes to creating applications that apply intelligence.
- Published
- 2006
11. Geeks outgeeked.
- Subjects
- *
STUDENTS , *CYBERNETICS , *COMPUTER science , *INFORMATION science - Abstract
Reports that three students at Massachusetts Institute of Technology in Cambridge, Massachusetts, have submitted two computer-generated works of gibberish masquerading as academic papers, and had one accepted for a scientific conference in Multi-Conference on Systematics, Cybernetics & Informatics for Orlando, Florida on July 10-13, 2005 meeting.
- Published
- 2005
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.