Top 10

The Top 10 Things Executives Should Know About Software

Communications of the ACM, July 2019
By Thomas A. Limoncelli

“In 2011, Marc Andreessen wrote an article predicting, ‘Software will eat the world.’ By that he meant two things: First, many traditional businesses are being replaced by software companies. Second, all other companies are finding the value they deliver is increasingly a result of software.

When Andreessen wrote his article none of the 10 biggest companies (by market value) were in software-driven businesses. Today, six of the 10 biggest companies are primarily driven by software. The others are ripe for a transformation.”

Read More

A New Labor Market for People with ‘Coolabilities’

Communications of the ACM, July 2019
By David Nordfors, Chally Grundwag, V. R. Ferose

“Powerful technologies are today ready to open the door to a new paradigm of work: instead of squeezing people into existing job slots, companies can tailor work that fits individuals’ unique skills, talents, and passions, matching them with inspiring teams and offering them a choice of meaningful tasks. This has tremendous benefits for both the employee and employer by creating a “long-tail labor market” in which diversity brings competitive advantage.”

Read More

Smart Cities – Who Benefits?

Communications of the ACM, July 2019
By Susan J. Winter

“This column uses the case of smart cities to illustrate the ethical dilemmas created by an otherwise innocuous-seeming issue. … Cui bono, which means “who benefits?” … Cui bono? In principle, everyone. But a closer look at the smart cities rhetoric shows the benefits focused on a subset of the total.”

Read More

Electric guitar in orbit

The Sounds of Silence: In salute to landing on the moon 50 years ago

MIT Technology Review, June 26, 2019
By Chuck Klosterman. Illustration by Keith Rankin.

“The rock era and the space age exist on parallel time lines. The Soviets launched Sputnik in October 1957, the same month Elvis Presley hit #1 with “Jailhouse Rock.” The first Beatles single, “Love Me Do,” was released 23 days after John F. Kennedy declared that America would go to the moon (and not because it was easy, but because it was hard). Apollo 11 landed the same summer as Woodstock. These specific events are (of course) coincidences. Yet the larger arc is not. Mankind’s assault upon the heavens was the most dramatic achievement of the 20th century’s second half, simultaneous with rock’s transformation of youth culture. It does not take a deconstructionist to see the influence of the former on the latter.”

Read More
2018-19 Snow Season at Mid-Gad

2018-19 Snow Season at Mid-Gad

Article by WWD Webmaster.
May 22, 2019

Records? I think so. Granted I’m comparing Mid-Gad snow study plot to the Alta Guard station study plot, so it’s not exact. But, if you look at season totals at Alta Guard you will see that there are only 2 seasons where we’ve had 700″ or more at Alta Guard. In my book 711 inches at Mid-Gad is fairly rare. Record-worthy to be sure.

Read More
Why I Still Love Tech

Why I Still Love Tech

Wired, May 14, 2019
By Paul Ford

“I was exceptionally lucky to be born into this moment. I got to see what happened, to live as a child of acceleration. The mysteries of software caught my eye when I was a boy, and I still see it with the same wonder, even though I’m now an adult. Proudshamed, yes, but I still love it, the mess of it, the code and toolkits, down to the pixels and the processors, and up to the buses and bridges. I love the whole made world. But I can’t deny that the miracle is over, and that there is an unbelievable amount of work left for us to do.”

Read More

Corp to Cloud: Google’s Virtual Desktops

Communications of the ACM, November 2018
By Matt Fata, Philippe-Joseph Arida, Patrick Hahn, Betsy Beyer

“Until recently, our virtual desktops were hosted on commercially available hardware on Google’s corporate network using a homegrown open source virtual cluster-management system called Ganeti. Today, this substantial and Google-critical workload runs on Google Cloud Platform (GCP). This article discusses the reasons for the move to GCP, and how the migration was accomplished.”

Read More

Will Supercomputers Be Super-Data and Super-AI Machines?

Communications of the ACM, November 2018
By Yutong Lu, Depei Qian, Haohuan Fu, Wenguang Chen

“High-performance computing (HPC) plays an important role in promoting scientific discovery, addressing grand-challenge problems, and promoting social and economic development. Over the past several decades, China has put significant effort into improving its own HPC through a series of key projects under its national research and development program. Development of supercomputing systems has advanced parallel applications in various fields in China, along with related software and hardware technology, and helped advance China’s technological innovation and social development.

To meet the requirements of multidisciplinary and multidomain applications, new challenges in architecture, system software, and application technologies must be addressed to help develop next-generation exascale supercomputing systems.”

Read More

China’s Computing Ambitions

Communications of the ACM, November 2018
By Elliott Zaagman

“China plans to become the world’s high-tech leader, and quickly. In 2015, the Chinese government’s State Council approved “Made in China 2025,” an initiative designed to position China as a world leader in fields such as robotics, aviation, advanced information technology, and new-energy vehicles in less than a decade. In support of this governmental initiative, China’s Ministry of Industry and Information Technology (MIIT) released a three-year action plan to drive growth in areas including smart drones, facial recognition, AI-supported medical diagnosis, speech recognition, and language translation. If successful, the initiative would grow China’s AI industry to a size of $150 billion by 2020, approximately 100 times its size in 2016. As China pushes AI forward, here are a few names, trends, and technologies to watch.”

Read More

Weighing the Impact of GDPR

Communications of the ACM, November 2018
By Samuel Greengard

“When the European Union (EU) General Data Protection Regulation (GDPR) went into effect on May 25, 2018, it represented the most sweeping effort yet to oversee the way businesses collect and manage consumer data. The law, established to create consistent data standards and protect EU citizens from potential privacy abuses, sent ripples—if not tidal waves—across the world.”

Read More
DoD Cyber Strategy - 2018

DoD Cyber Strategy – 2018

Cyber Strategy: Summary, 2018
U.S. Department of Defense

“American prosperity, liberty, and security depend upon open and reliable access to information.  The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services.  Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”

Read More
William Hugh Murray

An Interview with William Hugh Murray – A discussion of the rapidly evolving realm of practical cyber security

Communications of the ACM, March 2019
By Peter J. Denning

“What has changed over those years is not the need for security, but the risks and costs of insecurity. It should be clear to a casual reader of the news, let alone those with access to intelligence sources, that what we are doing is not working. It is both costly and dangerous… Most of the resistance to using these practices comes from loss of convenience. Good security is not convenient. But it is absolutely necessary for the security of our assets and the reliability of the many critical systems on which we all depend.”

Read More
Krebs on Security

The Market for Stolen Account Credentials

Krebs on Security, December 18, 2017
By Brian Krebs

“Today’s post looks at the price of stolen credentials for just about any e-commerce, bank site or popular online service, and provides a glimpse into the fortunes that an enterprising credential thief can earn selling these accounts on consignment.”

Read More
Krebs on Security

The Value of a Hacked Email Account

Krebs on Security, July 10, 2013
By Brian Krebs

“This post aims to raise awareness about the street value of a hacked email account, as well as all of the people, personal data, and resources that are put at risk when users neglect to properly safeguard their inboxes. ”

Read More
Krebs on Security

The Value of a Hacked Company

Krebs on Security, July 14, 2016
By Brian Krebs

“If you help run an organization, consider whether the leadership is investing enough to secure everything that’s riding on top of all that technology powering your mission: Chances are there’s a great deal more at stake than you realize.”

Read More