Monday, October 26, 2009

Women in the Sciences

My mother graduated in CS from BYU in 1984. The field was still relatively young, and I understand it was very math-oriented. I believe computer science has since created its own ecosystem of basic concepts and has strayed from the mathiness it once possessed. If this field were to embrace its mathematical roots, there could be a surge of female math majors investigating this discipline. The long hours spent alone coding on a computer which are required to be successful may be another reason why women are discouraged from this major. My mom met my dad (also a CS major) early in her track, and they spent a great amount of time together doing projects. I also know a girl in my ward last year who is now in the major, and she will only sign up for CS classes with another girl she knows in the major. Classes like CS 240 and 345 unfortunately are light on the social aspect of an education, and can deter naturally social people from the dark lonely confines of the first floor of the TMCB.

Thursday, October 22, 2009

The New Experts

I headed over to microsoft.com this morning to see what ornate festivities Microsoft might be throwing for the launch of Windows 7. I was met, however, with an interesting surprise. Instead of a slick Silverlight movie extolling the virtues of Microsoft's new crown jewels, they had scoured the Twitter-sphere looking for positive tweets about Windows 7. These 140-character reviews were on full display, each hitting on a different aspect of the new OS. Social media has definitely changed the way computer companies do business. A few years ago, a launch like this would surely consist of industry experts sharing their lofty opinions about Windows 7, using proof by authority to demonstrate that Windows 7 is a superior product. Now the consumer has the power, and trust is placed in the common man to confirm the usefulness of Windows 7 to the next common man. Proof by quantity. I hope it's better. Windows 7 as well.

Tuesday, October 20, 2009

Good Luck

Security experts are facing a progressively uphill battle against hackers and users alike.
The Internet is becoming more pervasive in the lives of the average person, and as cloud computing becomes a more accepted paradigm, the number and severity of potential security holes becomes a greater problem. Internet services offer a greater amount of functionality every day, tempting users to upload increasingly sensitive documents, in turn tempting the online hacking community to work harder to get at the information. As more users upload information, the amount of information a hacker can pilfer increases as well, further enticing a hacker.
The number and values of online assets are increasing because of an ever growing online community. The task to educate concerning Internet security is a huge task, especially with online newcomers emerging every day both young and old. The common mantra is to vary your passwords between sites and to change monthly or semi-monthly. I worked at software company providing solutions for small banks for almost two years. They ran a tight ship, and required a password change every 6 weeks. At first my passwords were clever, imaginative and difficult. However, I remember after about the fifth password switch, I would change as little as possible in an effort to simply remember what the password was. By the eighth or ninth switch I was routinely calling security asking them to reset my password (prompting another level in the memory game). It was frustrating and very anti user-friendly, cultivating a bad relationship between myself and the network personnel.
Unfortunately, the hacker community is always one step ahead. Even if security experts are to evolve their processes, there is no doubt the criminal community will immediately begin their work to exploit the new systems. The Internet allows the international community to personally knock on your door, and since many of these visitors have no other life than to pick at your locks, security experts are more hard-pressed to provide iron-clad solutions. Thus begins a tight-rope walk between usability and security. Only time will tell if a solution will ever be developed that can satisfy both ends of the spectrum.

Tuesday, October 13, 2009

It's a boy! Now what will his username be?

Snow Leopard Guest Accounts Wiping Computers

The accelerating progress of technology is dizzying. In 50 years we have gone from mainframe computers in the back rooms of large universities and corporations to Twitter updates in the bathroom. Our user account name and password comes to mind as quickly as our favorite color or movie, and in almost every sense the information it safeguards defines us more clearly. Our reliance on computers as part of our identity casts an increasingly large burden on the designers and engineers who implement these systems to include robustness and redundancy as leading features. In this digital age that continues to emerge, we can no longer afford to bet a portion of our identity to faulty systems.