Archive for the 'GENERAL' Category
September 27th, 2010, by Krishnamurthy Viswanathan, posted in Books
The Banned Books Week (BBW) is an annual event that celebrates the “freedom to read”. The campaign was started in 1982 and is held during the last week of September. The United States campaign, sponsored amongst others, by the American Library Association “highlights the benefits of free and open access to information while drawing attention to the harms of censorship by spotlighting actual or attempted bannings of books across the United States.” 
During this week, the Amnesty International directs attention to “the plight of individuals who are persecuted because of the writings that they produce, circulate or read”. 
The idea behind the event is to promote intellectual freedom: it encourages individuals to read books that have been challenged due to the unorthodox viewpoints expressed in these works of literature. Every year, the American Library Association’s Office for Intellectual Freedom records attempts by individuals and groups to ban books from libraries and classrooms. If you thought that censorship was a thing of the past, take a look at the Top Ten Most Frequently Challenged Books of 2009. At-least 46 of the Radcliffe Publishing Course Top 100 Novels of the 20th Century have been targeted. The list includes acclaimed classics such as Catcher in the Rye, and To Kill a Mockingbird.
While some books are banned or restricted, a majority of them are not banned due to the efforts of librarians, booksellers, students, teachers, and the reading community at large. It is due to events like these that attention is drawn to the dangers of imposing restrictions on the availability of information in our world.
September 20th, 2010, by Tim Finin, posted in GENERAL
Got Linux? Let your computer know who is boss! The UMBC Linux Users Group (LUG) is holding a Linux Installfest from 10:30am to 4:30pm on Friday 24 September in the Main Street concourse of the UMBC Commons. Bring your computer and the LUG experts will help you install Linux on it in addition to your current operating system.
September 18th, 2010, by Tim Finin, posted in GENERAL
This sounds like a book worth reading, Proofiness – The Dark Arts of Mathematical Deception by Charles Seife. It is reviewed in tomorrow’s New York Times — Fibbing With Numbers.
It goes without saying that what you learn in a book like this should only be used for defensive purposes. Do not turn to the Dark Side!
The book reminds me of the classic How to Lie with Statistics published in the 1950s.
September 7th, 2010, by Tim Finin, posted in AI, GENERAL
According to a recent post in the Microsoft Careers JobsBlog the top three hottest new majors for a career in technology are
- Data Mining/Machine Learning/AI/Natural Language Processing
- Business Intelligence/Competitive Intelligence
- Analytics/Statistics, specifically Web Analytics, A/B Testing and
Happily these are all strengths of the IT programs at UMBC. In fact, we have placed a large number of graduates at leading edge technology companies in the past few years, including Microsoft, Google, Amazon, IBM, and Yahoo.
August 24th, 2010, by Tim Finin, posted in Humor, Security
August 18th, 2010, by Tim Finin, posted in GENERAL, Semantic Web, Social media
Analog computers were a hot idea — in the 1950s! But I find this intriguing because I’ve come around to the position that a lot of our human “intelligence” is the result of acquiring and using probabilistic models. So supporting this in hardware might be a big win, especially for low-cost, low-power devices. It will also support lots of other common tasks in social computing, image processing and language technology.
Technology review has a short article, A New Kind of Microchip, on computer chip being developed by Lyric Semiconductor that process signals representing probabilities rather than digital bits.
“A computer chip that performs calculations using probabilities, instead of binary logic, could accelerate everything from online banking systems to the flash memory in smart phones and other gadgets. … And because that kind of math is at the core of many products, there are many potential applications. “To take one example, Amazon’s recommendations to you are based on probability,” says Vigoda. “Any time you buy [from] them, the fraud check on your credit card is also probability [based], and when they e-mail your confirmation, it passes through a spam filter that also uses probability.”
All those examples involve comparing different data to find the most likely fit. Implementing the math needed to do this is simpler with a chip that works with probabilities, says Vigoda, allowing smaller chips to do the same job at a faster rate. A processor that dramatically speeds up such probability-based calculations could find all kinds of uses.”
Lyric’s chip is called LEC and was developed with support from DARPA. It is 30 times smaller in size than current digital error correction technology according to Wired. Although small it yields “a Pentium’s worth of computation,” according to Lyric CEO Vigoda. His 2003 dissertation at MIT was on a related topic, Analog Logic: Continuous-Time Analog Circuits for Statistical Signal Processing.
You can also read about the LEC chip in a story in yesterday’s NYT, A Chip That Digests Data and Calculates the Odds.
August 13th, 2010, by Tim Finin, posted in AI, Games, GENERAL, Google, Social media
Using a combination of mathematical tricks, good programming and 35 CPU-years on Google’s servers, a group of researchers have proved that every position of Rubik’s Cube can be solved in 20 moves or less. The group consists of Kent State mathematician Morley Davidson, Google engineer John Dethridge, math teacher Herbert Kociemba, and programmer Tomas Rokicki.
This is an amazing result and a testament to more than 30 years of work on the problem. The Cube was invented in 1974 and almost immediately the subject for programs to solve it. In 1981, Morwen Thistlethwaite proved that any configuration could be solved in no more than 52 moves. Periodically, tighter upper bounds for the maximum solution length were found. This result ends the quest — there are some configurations (about 300M) that require 20 moves to solve and there are none that require more than 20 moves.
In their own words, here’s how the group solved all 43,252,003,274,489,856,000 Cube positions:
- We partitioned the positions into 2,217,093,120 sets of 19,508,428,800 positions each.
- We reduced the count of sets we needed to solve to 55,882,296 using symmetry and set covering.
- We did not find optimal solutions to each position, but instead only solutions of length 20 or less.
- We wrote a program that solved a single set in about 20 seconds.
- We used about 35 CPU years to find solutions to all of the positions in each of the 55,882,296 sets.
This reminds me of the first program I wrote for my own enjoyment, which used brute force to find all solutions to Piet Hein’s Soma Cube. In 1969 I had a summer job as the night operator for an IBM 360 and I would turn off the clock to run my program so that the management wouldn’t know how much computer time I was consuming.
See this BBC story more more information on this amazing result.
July 8th, 2010, by Tim Finin, posted in GENERAL, Mobile Computing, Security, Semantic Web
The secret message embedded in the USCYBERCOM logo
is what the md5sum function returns when applied to the string that is USCYBERCOM’s official mission statement. Here’s a demonstration of this fact done on a Mac. On linux, use the md5sum command instead of md5.
~> echo -n "USCYBERCOM plans, coordinates, integrates, \
synchronizes and conducts activities to: direct the \
operations and defense of specified Department of \
Defense information networks and; prepare to, and when \
directed, conduct full spectrum military cyberspace \
operations in order to enable actions in all domains, \
ensure US/Allied \ freedom of action in cyberspace and \
deny the same to our adversaries." | md5
md5sum is a standard Unix command that computes a 128 bit “fingerprint” of a string of any length. It is a well designed hashing function that has the property that its very unlikely that any two non-identical strings in the real world will have the same md5sum value. Such functions have many uses in cryptography.
Thanks to Ian Soboroff for spotting the answer on Slashdot and forwarding it.
Someone familiar with md5 would recognize that the secret string has the same length and character mix as an md5 value — 32 hexadecimal characters. Each of the possible hex characters (0123456789abcdef) represents four bits, so 32 of them is a way to represent 128 bits.
We’ll leave it as an exercise for the reader to compute the 128 bit sequence that our secret code corresponds to.
June 11th, 2010, by Tim Finin, posted in GENERAL
The newly restored complete version of Metropolis opens tonight the Senator Theater for a one-week run. If you like movies about robots, or dystopian futures or just like classic fims that made a difference, it is well worth seeing.
Baltimore is lucky to be one of about ten cities in the US screening it this summer and the only one on the east coast outside of Boston. From the Baltimore Sun
“This “complete” version of Lang’s silent sci-fi extravaganza restores all of its subplots and nearly all of its surging imagery. With Gottfried Huppertz’s soaring romantic score heard in full for the first time, “Metropolis” offers an engulfing audiovisual experience. It leaves you shaking your head in wonder and disbelief.
Those new to the film can sit back and be overwhelmed. Those who’ve seen it have the additional pleasure of watching a puzzle solved before your eyes. Roughly 25 minutes longer than the 2002 version, this print of “Metropolis” uses footage from a 16-millimeter dupe negative found in Buenos Aires to fill in some major bits and pieces — and some minor ones.
You can tell the 16-mm footage from the drop in picture quality. But the effect is thrilling, not jarring. This print combines the ecstasy of seeing a peak accomplishment in pristine form with the frisson movie-lovers get from viewing films as artifacts of their time, aging the way gardens or buildings do.”
June 5th, 2010, by Tim Finin, posted in CS, GENERAL, Privacy
Here’s a quick trick that could significantly speed up your Web surfing. Download and run the open source namebench on your computer. It does a thorough test of your current DNS servers and some other popular global and regional alternatives, produces a good report and recommends which ones you should use.
Here is how namebench describes what it does:
“namebench looks for the fastest DNS (Domain Name System) servers accessible to your computer. You can think of a DNS server as a phone book: When you want to dial a company on the phone, you may have to flip through a phone book by name to find their phone number. On the Internet, when you want to visit “www.google.com”, a DNS server needs to looks up the correct IP Address for you.
Over the course of loading a single web page, your computer may need to look up a dozen of these addresses. While your Internet provider usually automatically assigns you one of their servers to handle looking up these addresses, there may be others that are significantly faster. namebench finds them.”
Namebench also points out which DNS servers do DNS hijacking — typically by intercepting the error message produced by entering a mistyped URL (e.g., http://umbc.edo/) and redirecting you to a page full of ads and “helpful” search results. Some name severs, like OpenDNS, will also automatically correct some mistyped URLS, e.g., guessing that then you typed http://umbc.edi/ you meant to type http://umbc.edu/. (Shades of DWIM!) It’s not dangerous and is a way private DNS services, like OpenDNS, get revenue to support the service and make a profit.
I have been using OpenDNS because it’s the fastest (for me) and don’t mind their NXDOMAIN hijacking. But I learned from namebench that OpenDNS reroutes www.google.com to google.navigation.opendns.com. That site redirects HTTP GET requests to and then from there onto http://www.google.de/. And Google itself redirects HTTP GET requests for http://google.com/ to http://www.google.com/. I’ll admit I am a bit confused by this. I imagine they do this to capture queries sent to Google, which provide very useful information even in the aggregate. OpenDNS says that they are doing this to correct a problem with Google-specific software installed on Dell computers. They do not seem to be doing this for Microsoft’s Bing search engine, which does lend some credence the claim. I plan on digging into this more to fully understand what is going on and why.
Namebench runs on Macs, Windows and UNIX, and has both a command line and graphical user interface. See the namebench FAQ for more information.
May 31st, 2010, by Tim Finin, posted in GENERAL, Mobile Computing, Social media, Web
Digital Capital Week (DCWEEK) is a 10 day festival running from June 11 to 20 in Washington DC focused on technology, innovation and all things digital — social media, games, policy, multi-media, activism, new media, mobile computing, animation, etc.
DCWEEK is expected to involve more than 4,000 people — artists, technologists, entrepreneurs, communicators, govies, and citizens. They will come together to participate in over 100 distributed events produced and hosted by individuals, organizations and community groups. Most of the events are free or charge a nominal cost, but pre-registration may be required.
At DCWEEK you can:
- learn from others through sessions, keynotes, workshops and panels
- meet new friends, clients, partners, investors and collaborators
- focus on the issues in DC that can be addressed in new ways
- come together to support innovative businesses, people and ideas
- work on projects that benefit the city and the world
- experiment with what’s possible
- have fun at some great parties
See the DCWEEK site for registration, schedule and details.
April 11th, 2010, by Tim Finin, posted in GENERAL, UMBC
Photo by Susan Polgar
Professor Alan Sherman reports that UMBC has won the “Final Four of College Chess” for 2010:
“Undefeated, UMBC finished the President’s Cup (Final Four of College Chess) 1/2 point above the field, winning its 6th national chess title since the championship began ten years ago. The large President’s Cup perpetual trophy will return to campus for another year.
- 8.0 UMBC [avg USCF rating 2588)
- 7.5 UTB (Brownsville) 
- 4.5 TT (Texas Tech) 
- 4.0 UTD (Dallas) 
In the first two rounds, UMBC gained a 1/2 point lead over UTB by defeating UTD and TT 3-1 each, whereas UTB beat UTD 3-1 but UTB beat TT only by 2.5-1.5.
Entering Round 3 with a 1/2 point lead, UMBC needed only two points to secure clear victory. In Round 3, UMBC tied UTB 2-2. Kritz lost on Board 1, Erenburg won on Board 2, and Margvelashvili and Kaplan drew on Boards 3-4. As part of its preparation, UTB hired a top Grandmaster consultant who in the months before the event helped prepare an opening trick against Kritz that contributed to Kritz’s third round defeat. Seeing that Erenburg was winning, Kaplan in a better position safely steered his game to a draw, clinching the team victory.
This weekend’s event was the strongest Final Four ever: there were seven International Grandmasters, one International Woman Grandmaster, at least ten International Masters, and 15 players rated over 2500. The event was intensely fought and played at an extremely high level of chess.
UMBC’s success was due to playing better than the opponents. The UMBC delegation included five Grandmasters, anchored by Kritz and Erenburg – each rated over 2600. At 2667, Kritz is the highest rated college player in Pan-America.
Three of the four UMBC players have perfect 4.0 GPAs (taking at least 19 credit hours per semester), and Team Captain Erenburg is a candidate for Valedictorian.”
For more details, see UMBC Wins Record “Final Four of College Chess” Against Strongest Field Yet.
You are currently browsing the archives for the GENERAL category.