tag:blogger.com,1999:blog-25917758173265467982024-03-13T03:48:29.291-07:00The Chartered StudentAutumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-2591775817326546798.post-18000771930259227582008-04-07T19:43:00.000-07:002008-04-07T20:02:32.848-07:00Economics RuleIn today's society, where information and content are freely available and easily distributed, infinite goods will eventually become free. This is basic economics: scarcity creates value, so infinite goods are inherently less valuable. When those infinite goods are free to produce (or copy), then the price of the good is pushed towards free. I believe that within 20 or 30 years, we will see an explosion of availability to goods that are currently tied up behind copyright and licensing agreements. This includes television, movies, pictures, music, and even books as they become more widely available in e-book formats. We are already seeing this with publishing companies distributing their e-book catalogs for free and networks that are, for the first time, allowing free internet access to their television programs. <br /><br />The question then becomes, who will pay for all this free content to be created? The answer is simple; free, infinite goods will help sell the scarce goods produced by companies and individuals. This could be any number of things, such as a free music track helping create fans for an artist or an e-book sparking a desire to buy a book you never would have considered. The point is that, at the core, it is all basic economics.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-79917931134944923762008-04-01T08:08:00.000-07:002008-04-01T08:54:18.196-07:00Redefining Internet SafetyThe Internet is full of new and exciting things. However, like anything, it can be misused; often in ways we can't imagine until it happens. Take, for example, <a href="http://www.wired.com/politics/security/news/2008/03/epilepsy#">this recent attack on a forum for epileptic individuals</a>. It difficult to comprehend someone reaching out through the web and physically causing harm to someone else, but that's exactly what happened with these individuals. New ways to use the Internet to cause damage are dreamed up daily, just as new ways to benefit society are being created. As the Internet becomes ever more important in our daily lives, the opportunity to be harmed by something or someone online increases. The answer to fixing this problem isn't to curl up and hide from the Internet, but to become more aware that there is risk involved in everything, and recognize how much risk we are willing to accept from this important medium.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com1tag:blogger.com,1999:blog-2591775817326546798.post-84918883017128695832008-03-27T08:28:00.000-07:002008-03-27T08:40:21.029-07:00The Art of the Prototype"Plan to throw one away; you will, anyhow.'' (Fred Brooks, <i xmlns="http://www.w3.org/1999/xhtml">The Mythical Man-Month</i>, Chapter 11) This highlights a point that's often overlooked in software: it's impossible to fully understand a problem until you attempted to solve it; therefore, your first solution will always be lacking. In software we tend to assume that we can do a few case studies, put together some user stories, and then roll out a piece of software that will meet the needs of our users. This has led to some major disasters in software; for some shining examples, just look at the market of enterprise software.<br /><br />These problems could be lessened if more companies would invest in a serious prototyping stage. I'm not talking about a PowerPoint presentation showing the imagined functionality of your software. I mean pulling out the rapid prototyping tools, creating something that meets the core needs of your users to solve the basic problem, and rolling it out to 20-30% of your users to watch while they use it for 6 months. When we do this, we are following Brooks' council in planning to throw away the prototype, but saving time and energy by not wasting a lot of time creating a tool that has a good probability of begin fundamentally flawed.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-76895238939540768182008-03-20T09:13:00.000-07:002008-03-20T09:14:43.244-07:00Outsourcing is your friendEnrollment rates in computer science dropped over 60% from 1999 to 2005. <span style=""> </span>There are lots of theories attempting to explain why students are not choosing computer science, but one that has popped up assumes that students don’t want to enter a field which they perceive as being outsourced.<span style=""> </span>That is to say, students believe that a degree in computer science will only prepare them to do coding jobs that have been shipped outside of the <st1:country-region st="on"><st1:place st="on">US</st1:place></st1:country-region> in the past few years.<span style=""> </span>Fortunately, this idea is easy to disprove.<o:p> </o:p> <p class="MsoNormal">First, it’s important to note that the idea that computer science graduates are only prepared to sling code is absolutely false (or, at least, should be).<span style=""> </span>Universities strive to produce well-rounded students who can not only implement projects in code, but think about long-term sustainability of the systems they design and create elegant, algorithmic solutions to a problem.<span style=""> </span>The jobs which require these skills are not being shipped across the ocean.<span style=""> </span>The jobs that are leaving the <st1:country-region st="on"><st1:place st="on">US</st1:place></st1:country-region> are typically pure implementation jobs which require less immediate oversight and are thus good candidates for remote work.<span style=""> </span>The jobs which require close interaction with users, such as system design, or require higher levels of interaction with an organization’s management team are less likely to leave the US.<span style=""> </span>These are the jobs for which CS graduates should be prepared.<span style=""> </span>Therefore, US college graduates should not be competing with overseas workers for jobs that may leave the <st1:country-region st="on"><st1:place st="on">US</st1:place></st1:country-region>.<o:p> </o:p></p> <p class="MsoNormal">The idea that jobs in IT are scarce is another falsehood.<span style=""> </span>By most accounts, the jobs available for IT workers are only increasing, and are increasing at such a rate that the current supply of US workers can’t meet the need.<span style=""> </span>Hence, companies are fighting over the ability to bring in foreign workers to fill their backlog of IT positions.<span style=""> </span>Hence the problem the past two years with the shortage of H-1B work visas. <span style=""> </span>For a qualified graduate student, there is no scarcity of jobs in IT.</p> <p class="MsoNormal">The amount of jobs existing in the <st1:country-region st="on"><st1:place st="on">US</st1:place></st1:country-region> and the type of jobs leaving should give CS graduates something to be excited about.<span style=""> </span>As the lowest level of IT positions leave, and more interesting positions open up, students have more opportunity available to them than almost any other field.</p>Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-74248606838553737012008-03-13T09:26:00.000-07:002008-03-13T09:44:37.023-07:00DRM Must DieWhen Vista first came out, the copy protection on the system was lauded as the most advanced seen in the industry. Soon after, <a href="http://techdirt.com/articles/20080303/083249411.shtml">the copy protection was broken</a> and it became possible to illegally run Vista on your machine. So the cumbersome verification system used by Microsoft does nothing to stop pirates and continues to annoy consumers. Such is the burden of DRM. The systems put in place to stop piracy only frustrate those consumers who want to legitimately use their content, and do little to stop those who wish to illegally distribute that same content. We see the same issues with the <a href="http://www.roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html">iTunes store</a> and the <a href="http://www.betanews.com/article/Gates_Bluray_DRM_is_AntiConsumer/1129572265">new Blu-Ray format</a>. Because consumers have now been burned by content that becomes unusable when you switch providers, consumers will hesitate from adopting new formats that employ DRM, which will hinder new markets such as the eReader market. Ultimately, businesses will realize the damage they are doing to their markets, but it will be a painful process.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-68485496218261000802008-03-11T08:47:00.000-07:002008-03-11T09:48:30.139-07:00Women in CSAs a woman in Computer Science, I have had a front row seat to determine, by personal experience, whether or not there exists discrimination in the field. After spending 5 years in the field (both in school and in the workplace), I have concluded that discrimination does exist, but mostly in a subtle, unconscious form, and not any outright hostility. For example, the most common discrimination I’ve experienced comes in the form of men who are uncomfortable working with women, for whatever reason. This is especially a problem at BYU, where many of the male students are married, and avoid working in a group with a woman. I have also experienced unconscious assumptions about my ability or desire to work, based on the fact that I am a woman. This happened while I was a tutor for CS courses and in my current position working for the Corporations of the Church. Fortunately, most men with whom I have worked are good people, and the discriminations I have experienced are certainly not career-altering or life-changing. I am convinced that most discrimination is completely subconscious and unintentional; therefore, the best remedy is a continuing awareness of the issue, and a commitment from men to fully include the few women that choose to enter the field of Computer Science.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-37501213643969273862008-02-27T20:34:00.000-08:002008-02-27T20:53:55.958-08:00Hey Corporations: We Loath DRMEven as we see another <a href="http://blog.washingtonpost.com/fasterforward/2008/02/tuesday_tidbits_music_and_drm.html">victory </a>scored against the kitten-killing DRM monster, Adobe takes a giant leap backward and <a href="https://www.eff.org/deeplinks/2008/02/adobe-pushes-drm-flash">proposes putting DRM into Flash</a>. I don't understand why big companies refuse to see the light when it comes to DRM. If companies would <a href="http://www.eff.org/deeplinks/2008/01/2008-drm-continues-punish-paying-customers">open</a> <a href="http://techdirt.com/articles/20080121/05083917.shtml">their</a> <a href="http://www.codinghorror.com/blog/archives/001052.html">eyes</a> to the headache consumers experience when they try to use DRM-encumbered devices, they would see that it's hurting their businesses by alienating consumers. Someday, the madness will stop, and companies will realize that people don't want to be thieves; people just want things delivered and consumed in the most convenient way possible. (Hint: DRM doesn't fit the bill.)Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-27525721076912102552008-02-21T16:37:00.000-08:002008-02-26T08:42:44.879-08:00Government needs help governing technology<p class="MsoNormal" style="">The government clearly has issues handling technology.<span style=""> </span>There are questions regarding jurisdiction and application of laws written before certain technologies existed. The problems, as I see it, are two-fold. First, lawmakers misunderstand technology and its ramifications. Second, the process for creating laws and policies is too cumbersome to rapidly respond to situations created by new technology.<o:p></o:p></p> <p class="MsoNormal" style="">For proof regarding the ignorance of policy makers, one needs only recall <a href="http://www.youtube.com/watch?v=f99PcP0aFNE">Senator Ted Stevens’ explanation of the Internet</a>. His speech is indeed concerning when we consider that he was arguing against net neutrality, an issue central to the technology sector.<span style=""> </span>The same misunderstanding displayed by Ted Steven’s is rife throughout the upper echelons of our government, and we see examples of it in recent laws such as the one tying federal funding for universities to a prevention plan for illegal downloading.<span style=""> </span>My personal belief is that age, more than anything, contributes to the inability of our lawmakers to understand technology.<span style=""> </span>Examine today’s successful technology companies; most were started by younger individuals who had grown up with new technologies and had a more intuitive understanding of its true applications.<span style=""> </span>While age isn’t necessarily an indicator of technical understanding, there is a correlation. Therefore, it is concerning that most politicians are in their late 50’s to early 70’s.<span style=""> </span>We need lawmakers to understand technology so they understand its ramifications and change laws accordingly.<span style=""> </span>As long as our lawmakers don’t understand technology, laws governing things like identity theft and intellectual property will remain out of sync with the general public.<o:p></o:p></p> <p class="MsoNormal" style="">Another concern hindering our government is that the method for creating laws and policies is flawed and unusable when it comes to technology.<span style=""> </span>Let’s take, for example, the recent outbreak of <a href="http://www.nytimes.com/2007/11/22/world/europe/22data.html">data</a> <a href="http://www.msnbc.msn.com/id/4186130/">leaks</a> <a href="http://www.networkworld.com/news/2008/022008-more-uk-government-laptops-go.html">in government</a> <a href="http://techdirt.com/articles/20070615/101309.shtml">organizations</a>.<span style=""> </span>The most frequent kind of leak is a laptop or external hard drive that goes missing.<span style=""> </span>Because of this, some organizations have begun to require hard drives to be encrypted in order to mitigate the damage when a hard drive does get lost or stolen.<span style=""> </span>Unfortunately, that won’t help the situations, as just a few weeks ago hard drive encryption was <a href="http://techdirt.com/articles/20080221/232021319.shtml">cracked by a team of researchers</a>.<span style=""> </span>From the rise of data leaks to the breaking of the encryption only took about a year, rendering all the budding policy around encrypting hard drives essentially useless.<span style=""> </span>The organizations created to implement policies are so cumbersome that they simply can not keep up with the rapid changes in the technology world.<o:p></o:p></p>Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-37538648397221251812008-02-21T06:17:00.000-08:002008-02-21T06:43:53.678-08:00RIAA at it againThe RIAA has made it obvious <a href="http://techdirt.com/articles/20080111/184249.shtml">time</a> <a href="http://techdirt.com/articles/20080109/032038.shtml">and</a> <a href="http://techdirt.com/articles/20080207/131223199.shtml">time </a>again that suing their loyal fans is a better business strategy than actually finding new and innovative business models. Of course, they don't want to go at it alone, and <a href="http://www.news.com/8301-13578_3-9813358-38.html?part=rss&subj=news&tag=2547-1_3-0-20">would love to get DAs</a> to prosecute more pirating cases. Their latest tactic is a doozy: a <a href="http://gizmodo.com/358648/leaked-riaa-training-video-for-prosecutors-find-pirates--find-crack%20dealing-terrorist-murderers-too">training video</a> created for the National District Attorneys Association. <br /><br />Apparently, the RIAA is claiming that prosecuting piracy can be used to convict known criminals who the DAs can't convict on more serious charges. Think Al Capone, who was convicted on tax evasion charges. One gem from the video: Frank Walters is asked if people who have committed serious crimes are "gravitating to this type of piracy." Walters replies "More often than not, we find that most of the defendants we deal with...have spent time incarcerated on much more serious crimes." If that's the case, I wonder that the RIAA repeatedly <a href="http://techdirt.com/articles/20070724/112821.shtml">claims that college campuses are the biggest source of piracy</a>? Most college students hardly fit the picture of a typical music pirate painted by Frank Walters and Deborah Robinson.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-75428369107477980472008-02-06T20:11:00.000-08:002008-02-06T20:27:24.733-08:00Family History is not just GenealogyRegarding family history, the council from church leaders frequently centers around genealogy, which is identifying your direct ancestor. My father has traced almost all of our family lines at least 10 generations back; the work that needs to be done to find names requires, at least, knowledge of languages I don't know. Continuing my family's genealogy has proven to be extremely difficult. Fortunately, the church emphasizes not only genealogy, but family history work, which calls people to "turn their hearts" to their ancestors. I believe we will soon see an increased emphasis from the church on that aspect of family history as more and more individuals trace their families so far back that traditional genealogy becomes too daunting to the average member.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-3414615160523795242008-01-31T09:13:00.000-08:002008-01-31T09:38:51.683-08:00Working for the ChurchI'm in my third year working for the Corporations of the Presiding Bishopbric. It's fascinating watching, from the inside, how an organization I've been a member of all my life operates. I've grown up knowing the this is Christ's organization, but I've never thought of the very human errors and processes that make up all the levels of the Church. The Church is an inspired organization, run by individuals called of God, but the average person working for the Church doesn't have big revelations regarding exactly what they should do in their day to day lives. The Church operates much as we are told to run our lives; stay in tune with the Spirit, make decisions, check in frequently to make sure your not far off base, and move ahead. It's wonderful watching the principals of the Gospel put into action by those who steer this world-wide organization.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-44523031204447876092008-01-28T19:53:00.000-08:002008-01-29T06:48:59.773-08:00Send in the designersThe medical industry has undergone a <a href="http://the-hospitalist.org/blogs/wachters_world/archive/2008/01/27/how-clinical-it-is-transforming-hospital-care-for-better-and-worse.aspx">veritable revolution </a>when it comes to provider technology, but patient technology is stuck in a 70's time warp. <a href="http://www.diabetesmine.com/2007/04/an_open_letter_.html">The insulin pump is a good example</a>: the device is functional and reliable, to be sure, but there's no thought given to the usability and design of the pump.<br /><br />Young technology companies with a fresh industry perspective can help <a href="http://www.diabetesmine.com/2007/04/an_open_letter_.html">fix this problem</a>. Unfortunately, the inherent risk in developing a life device is too high for new companies. If an insulin pump's hardware fails silently, or a software glitch causes insulin to be dosed at the wrong levels, the patient's life is at risk. This exposes young companies to legal liabilities they can't financially handle. <br /><br />If a revolution is going to happen, the existing medical device manufacturers need to rise to the challenge. They stand to benefit the most by by making devices that integrate smoothly with life.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-34210344674560610312008-01-23T19:20:00.000-08:002008-01-24T09:53:03.461-08:00College isn't the end of learning<a href="http://enfranchisedmind.com/blog/2008/01/21/what-good-is-a-cs-degree/">Nobody</a> <a href="http://weblog.raganwald.com/2008/01/no-disrespect.html">knows</a> <a href="http://www.stsc.hill.af.mil/CrossTalk/2008/01/0801DewarSchonberg.html">what</a> a CS degree should be teaching, but it doesn't matter. College can't teach everything needed to be successful in a future job; the decisions made about curricula will always be random choice from a myriad of possibilities, and there will always be people who think those choices were bad.<br /><br />Once I get a job, the rest of life will have little to do with what I'm learning in school and everything to do with my personal drive and learning patterns. The <a href="http://scienceblogs.com/goodmath/2008/01/databases_are_hammers_mapreduc.php">cool things</a> I learn are almost never in class, but through my own study. This won't change when I graduate, and it's this capacity to learn on my own that will determine what kind of employee <span class="blsp-spelling-corrected" id="SPELLING_ERROR_0">I'll</span> be.Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-19603173813414030722008-01-17T08:48:00.000-08:002008-01-17T08:51:54.406-08:00The RIAA == Neil Postman<p class="MsoNormal">The RIAA is run by people like <a href="http://en.wikipedia.org/wiki/Neil_Postman">Neil Postman</a>.<span style=""> </span>The core problem with governance in the RIAA is they don’t understand their business.<span style=""> </span>Postman shows the same flaw of understanding; take this gem from a <a href="http://itrs.scu.edu/tshanks/pages/Comm12/12Postman.htm">speech</a> he gave in ’98:</p> <p class="MsoNormal"></p><blockquote>“School teachers who are enthusiastic about [television’s] presence always call to my mind an image of some turn-of-the-century blacksmith who not only is singing the praises of the automobile but who also believes that his business will be enhanced by it. We know now that his business was not enhanced by it; it was rendered obsolete by it, as perhaps an intelligent blacksmith would have known.”<o:p> </o:p></blockquote><o:p></o:p><p></p> <p class="MsoNormal">If the blacksmith’s business is defined by using a forge and handling all metal work in the area, then yes, that sort of blacksmith is gone.<span style=""> </span>But if you define the blacksmith as someone who works with metal to create and fix, then <a href="http://en.wikipedia.org/wiki/Machinist">blacksmiths are very much in business</a>.<span style=""> </span>Postman didn’t recognize automobiles were a boon to blacksmiths because he didn’t understand their real business.<span style=""> </span>Similarly, the RIAA doesn’t recognize that <a href="http://techdirt.com/articles/20070125/004949.shtml">file-sharing is beneficial</a> because they don’t understand their business isn’t only distributing music, but providing entertainment through music.<span style=""> </span></p>Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-62986711431277547922008-01-14T17:59:00.001-08:002008-01-14T18:00:21.096-08:00Post the Second<a href="http://technorati.com/claim/4sy2jbu7g8" rel="me">Technorati Profile</a>Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0tag:blogger.com,1999:blog-2591775817326546798.post-56201724935378470432008-01-14T17:50:00.000-08:002008-01-14T17:51:24.002-08:00Post the FirstOh good, the world can see me = )Autumnhttp://www.blogger.com/profile/03793600359969740564noreply@blogger.com0