Sunday, December 15, 2013

Scientific Computing


Computational science, or scientific computing, focuses on mathematical models and quantitative analyses to solve scientific problems. The approach here is to gain knowledge through analysis of mathematical models implemented with computers. 
Scientists at ETH Zurich, collaborating with IBM Research, Technical University of Munich and Lawrence Livermore National Laboratory have set a new record in fluid dynamic super computing using one of the fastest computer in the world, the Sequoia IBM BlueGene/Q. The team employed 13 trillion cells and reached a 14.4 Petaflop sustained performance. This is 73% of the theoretical peak! With a 200-fold improvement over previous research, it paves the way for cloud cavitation. Cloud cavitation happens when vapor cavities form in a liquid due to the pressure change. Damaging shockwaves can be created when the bubbles implode.

The simulation helped resolved many situations associated with the collapsing of bubbles, such as the shattering of kidney stones or design improving for high-pressure fuel injectors. Another area that this simulation can help improve upon is cancer treatment, specifically destroying tumorous cells or delivering drugs to a very precise location. It is pretty obvious to see how impactful this area of computer science can be for many aspects of our future.

Sunday, December 8, 2013

Computer Graphics

There term computer graphics can be described as “almost everything on computers that is not text or sound.” It refers to several different specific areas of computer science, but all with the underlying focus on the creation, representation and manipulation of visual data. There are many kinds of image types including 2D, pixel art, vector graphics, 3D, and computer animation.
The termed coined with computer graphics is rendering. When an image is drawn on a computer it is considered to be rendered. Since the term was first coined by William Fetter, in 1960, computer graphics have come a long way. Starting out as interactive interfaces on appliances, the video game and movie industry quickly realized the appeal. Over the years, renderings became more and more life-like. The texture and fluidity of water has just recently been mastered. Human skin seemed to be a tough task to simulate for a while, but I have noticed huge improvements in recent video games such as Tomb Raider.
An article regarding the most cutting edge research in computer graphics showed me just where this area of computer science is headed. The advancement made in rendering is unbelievable. Scientists  used different types of tools to help them achieve near perfection. Density functions and thermal imaging are just a few to name. Check out this video of multiple SIGGRAPH Asia papers to see just how real these simulations can be!

Sunday, November 24, 2013

Artificial Intelligence


The study of artificial intelligence, or AI, is a branch of computer science that deals with the simulation of intelligent behavior in computers. Some task require a robot, others just a program. Current AI attempts are focused on the tasks that are easy for people, yet difficult for a computer, such as vision, understanding and speaking natural language and manipulating objects. Some useful AI system that we can all recognize include Google Translate, recommendation systems on Amazon or YouTube, and ATM machines. Strong AI has even higher ambitions, attempting to build systems which are equal to people in ALL respects, presumably consciousness. The human brain is so very complex, though. It builds itself from experiencing the world and learning. This is something that has not yet been captured  by engineering.

The progress that has been made in AI, since the beginning of the 21st century is amazing. Self-driving cars, weather predicting software, investment software, smart security systems, and robotic assistants are all cutting edge technology. I am excited to see what the future holds for artificial intelligence. One particular article focusing on “creative machines”, caught my attention.  I had always thought of robots as data analyzers, making predictions and performing accordingly. Then I read about these programs that can compose original music and create original paintings. There is even talk about robots writing original novels, and how it would effect the copyright laws. The thought of a robot relieving us from the need to be creative, feels quite strange and intriguing. The advancement is quite impressive but it seems to focus only on the product. Creativity is not only appreciated by the audience. It begins with the artist creating something from emotion. The creative process can even be a type of therapy for the creator. But a computer can’t feel. It it simply mimicking creativity.

Sunday, November 10, 2013

File Sharing

File sharing is providing access to information that is digitally stored. Sharing the files can be achieved in many ways including manual sharing using removable media, centralized servers, hyperlinked documents and peer-to-peer networking. For this blog I would like to focus on peer to peer, or P2P sharing.

This type of sharing allows users to access media such as books, music, movies and more using software that searches for other computers allowing the shared access. An early P2P network that you may remember was Napster. Many more softwares popped up following  Napster’s popularity, including Bearshare and Winamp, to the current favorite BitTorrent.
An increase in bandwidth and the capabilities of residential computers are just a couple reasons why P2P networks had such a widespread adoption. The fact that this type of sharing is not illegal, also boosted it’s popularity. For the most part, this type of sharing is completely legitimate. Legal issues only arise when the file sharing contains copyrighted material. Referring to the music and film industry, copyright infringement has been a controversial and undetermined argument. Most studies concluding that file sharing has a negative effect on record sales are unofficial.

Sunday, November 3, 2013

Data Structures

Data structures refer to a way of organizing related pieces of information and storing them in files so that they may be retrieved and used efficiently. They also provide manageability for large amounts of data, such as databases or internet indexing services.  There are many different kinds of data structures and they each suit specific needs. 
An array is a type of data structure that stores many elements in a specific order, each identified by at least one array index or key. They are stored in a way such that the position of each element can be computed from its index tuple by a mathematical formula.Arrays can be expandable or may be a set length. They are among the oldest and most important data structures, being used in almost every program. They are even used to implement other data structures such as lists or strings.
A record is another type of data structure. They form a necessary base  Also, called structs or tuples, a record is a value that contains other values. They are typically indexed by names and are usually fixed numbered and sequenced, distinguishing them from arrays. Records can exists in any storage medium. Many files are usually grouped as arrays and then grouped into larger records.
A set is yet another type of data structure which is abstract. Abstract in this context, means an aggregate, or a collection of data. It can store specific values, without order and with no repeated values. Some sets are static while others are dynamic. Static, or frozen, sets do not change after the construction. Dynamic, or mutable, sets allow for insertion or deletion of elements in the set after construction.

Monday, October 28, 2013

Hacking



A hacker is someone who uses a computer to gain unauthorized access to a network. But why do hackers hack? Some may do it for the challenge and thrill of gaining access to government computers, while others may hack to obtain certain information. Others still, have malicious intent, using gained access to damage other computers. Sounds pretty sneaky, right? I guess it all depends on which side you are on. http://ethics.csc.ncsu.edu/abuse/hacking/study.php
The infamous hacker group, Anonymous, is one such organization whose side I want to be on. They are an international network of activists and "hacktivists". For companies and organizations that are targeted, Anonymous must be a terrifying threat. But for citizens who have been jaded or treated unjustly by these corporations, Anonymous can be seen as a group of heroes. They have retaliated against anti-digital piracy campaigns, tracked down internet predators and threatened Mexican drug cartels. Aside from this, they have also attacked the pentagon, threatened to shut down Facebook and waged war on Scientology. 
Anonymous has no official leadership, but rather a group of people working together to accomplish various goals. One characteristic of the group, which I admire, is the fact that their motivation always comes from an unrelenting moral stance on issues and rights. I feel as if these hackers are looking out for the greater good and give voices to those who are unable to be heard. Even if action is not taken, sometimes the threat is all that is needed. And their threat is fairly intimidating: 

Sunday, October 6, 2013

Agile

What is Agile?
Agile development is an umbrella term for methods based on iterative and incremental project management, regularly used in software development. Agile methodology is an alternative to the traditional project management methods typically used. With a coordinated and organized team, the solutions can evolve through collaboration. It helps teams respond to unpredictability with each successive "sprint". This technique encourages adaptive planning with rapid and flexible responses to change. It's conceptual framework allows the ability to see beforehand, the interactions throughout the development cycle.

How did Agile begin?
In 1970, Dr. Winston Royce published an very influential article, Managing the Development Of Large Software Systems. In his paper, he criticized sequential development and asserted that software development should not be conducted as if an assembly line. He introduced several project managing models including what we now know of as agile. At a software developers meeting in Utah, in 2001, a group published The Manifesto for Agile Software Development to define this specific approach.
Martin Fowler is widely recognized as one of the key founders of agile methods.


Advantages and Disadvantages
  • Customers are satisfied by rapid, continuous delivery.
  • Constant interaction between the customers, developers and testers is encouraged, while keeping the process and tools understated. 
  • Daily, face-to-face conversation is the best form of communication.
  • Continuous attention to technical excellence and good design.
  • Adaptability to changing environment.
  • Even late changes in requirements are welcomed
  • In case of some software deliverables, especially the large ones, it is difficult to assess the effort required at the beginning of the software development life cycle.
  • There is lack of emphasis on necessary designing and documentation.
  • The project can easily become unfocused if the customer representative is not clear with the final vision.
  • Usually only experienced programmers are capable of taking the kind of decisions required during the development process. Hence it has no place for newbie programmers, unless combined with experienced resources.

http://istqbexamcertification.com/what-is-agile-model-advantages-disadvantages-and-when-to-use-it/

Friday, September 20, 2013

LinkedIn and Branding

With over 238 million users on LinkedIn, if you don't have your own proper profile, then you do not exists in the eyes of prospective employers. According to a study by Bullhorn, 48% of recruiters use LinkedIn exclusively, for filling employment positions. So with all the competition out there, how can your profile stand out among the crowd?
 I found some great information from Parmjit Parmar at the Huffington Post, regarding what information every profile should include. She emphasizes distinction and a defining uniqueness. If you are not remembered, then you will not be hired. The best way to achieve this is through your profile's summary. This is the space where you tell your brand story. Let your prospective employers get to know you and your professional journey. Personal branding guru, William Aruda, expresses this as your "unique promise of value".

Another helpful tip for an outstanding profile is to keep it updated. Along with your contact information, your professional photo and technical skills should be refreshed periodically. A fresh photo will keep your brand in your connections' minds. By updating your skills set, your value for continued education will be made apparent. 

Lastly, an extremely imperative part of your profile that Parmar reminds us of, is the contact section. I know this sounds so obvious, but it was mentioned across the board so I assume that missing contact information does happen. But it is not enough to only incorporate your contact information. It must be current, linkable, and most of all, offer access. You MUST make yourself available by any and all contact information which you provide. When opportunity calls, how can you seize the day if you don't answer your phone? 

Friday, September 13, 2013

QR codes: In the Information Age, what can be better than a quick response?

Originating in Japan in 1994, QR codes have become the amplified version of our all-familiar barcode. QR codes, short for quick response code, are camera scannable images of algorithmically placed markings that hold information of some useful form. It's speedy readability and immense storage capacity has allowed this technology to slowly make roots in countries around the world. As read at Marketing Charts, only about 24% of Americans reported scanning a QR code within the last 30 days.



I was actually surprised by this low percentage, thinking of all the useful information that can be communicated in this way, and with such little space! So I did some research to find out just how these codes are being used. Of course there is the marketing aspect of products, labels and brands. There are even the fun and whimsical ways that we can integrate QR codes into our lives. One such example comes from Kentaro Fukuchi, as read in NewScientist (refresh the page, if link does not work) , who envisaged a technologically savvy toaster, which burns a QR code into your morning toast. Scan it, and you now have information regarding your commute to work that day. 

Putting whimsy aside, there are also some companies that are dedicated to saving lives with the help of QR codes. I found a very interesting article on Wired that explained how Mercedes wants to do just that. On their automobiles, strategically placed QR codes are linked to information regarding the dangerous areas of that specific model. First responders can now quickly avoid a volatile system when using the jaws of life to rescue a victim of a car accident. Mercedes is actually so passionate about this idea, they are waiving the right to patent it so that any automaker has the ability to follow along. How refreshing!



Another way that QR codes can be life-saving, is by documenting personal and medical information. From BeQRious, a program called MyInfo911 in Palm Coast, Florida is already utilizing this technology to provide medical information to emergency rescuers about victims that are found hurt and unable to respond verbally to medical questions. It can also be used to identify and notify the parents of injured or missing children. 

With so many advantages to using QR codes, why are they not more popularly used in our daily lives? As the "movers and shakers" of Silicon Valley, I think it is our responsibility to make our family, friends and clients aware of the benefits of this technology. So I challenge everyone who reads my blog to create your own QR code, if you don't have one already. Link it to your webpage, or even your phone number. Put it on your business cards and on your email signatures. The only way to make something an everyday item, is to start using it...everyday.

Some links to creating and customizing your very own QR code: 

http://www.qrcode-monkey.com/

http://d2c.es/
http://www.visualead.com/qurify2/



Friday, September 6, 2013

Social Networking and the Lack of Security When Promoting Your Brand: the Dark Side of Social Media


Recently, hacks of major corporations and publications have been on the rise. As reported by Business Insider, even Mark Zuckerberg’s Facebook account was targeted last month in an effort to reveal a bug in their security. Although this was not an act of malicious nature, control was momentarily gained over Facebook’s brand identity. All of our reputations are vulnerable in this way and, by nature of social media, a moment is all that is needed. With followers upon followers, “news” spreads like wildfire across the internet. 

This is not just an issue for personal or corporate accounts, though. It became apparent on April 23rd of this year, that a lack of social network security can turn into a national financial panic in an instant. That afternoon, at 1:07 p.m. ET, the Twitter account for the Associated Press was hacked by the syrian electronic army. A bogus tweet read:

 “Breaking: Two Explosions in the White House and Barack Obama is injured.” 

Immediately, the false claim was being re-tweeted by the thousands. Panic set in and the Dow, at 134 points, plummeted a staggering 145 points in the 3 short minutes. Pacifying the situation, the American Press announced the information as false, bringing the markets back up in almost the same amount of time. 



Since this security breach, many other accounts have been also attacked by the syrian electronic army. The Gaurdian, The Onion, and even more well known news sources were targeted, such as The Washington Post, CNN, and most recently The New York Times. Luckily for them, big business can survive a security breach like this, but what about the small businesses that are being targeted? Phishing scams are the main culprits of successful small business account hacking. According to the National Cyber Security Alliance, 36% of small business are attacked each year and of those, 60% go out of business. 



Many small business owners are not aware that they are vulnerable to such attacks. Awareness, then is the fundamental aspect to their protection. I found some good tips from Cisco that can put the power back into the hands of small business owners. You can check them out here: http://www.cisco.com/web/solutions/smb/need_to/secure_my_business_primer.html

Here is a clip from the Rachel Maddow show discussing the security breach of the AP's Twitter account:

Visit NBCNews.com for breaking news, world news, and news about the economy




Friday, August 30, 2013

New Beginnings: an Indroduction





Hi everyone! Welcome to my blog and thank you for visiting. This is my first blog and I am super excited to be a part of the community. As a new student, who has decided to make a career change, I look forward to sharing and exploring ideas with you all. 



Working in the dental profession for 11 years, most of my technical expertise is concentrated within the health industry. I have proficient experience working with radiographics, Cadcam, and TSCAN (or Tekscan) technology. Specifically in the area of radiology, I am certified to collect, process and translate 2D and 3D data for diagnostic purposes. Many people are familiar with radiography and how useful it is for patients and health professionals, but I would like to share more with you about Cadcam and Tekscan.

Cadcam technology is something fairly new to the dental field, with early prototypes clumsily emerging in the mid 80's. This technology allows the operator to use a compact, mobile laser to scan a real-world object on multiple planes and angles, achieving a precise 3D rendering. In this case, the object of interest would be your tooth. After a few design modifications for aesthetics and fit, a separate milling machine manufactures a solid restoration from the rendering. After many years and much improvement, Cadcam technology has become an important part of dentistry by increasing work efficiency while minimizing laboratory costs.

Tekscan technology is something that I find particularly exciting. It is a pressure mapping system which, in the dental industry, is used for mostly diagnostic purposes. This ultra useful technology makes visualizing pressure data easy. A sensor is used to record pressure and movements which are being applied to it. In dentistry, the pressure would be from your jaw and your opposing teeth. The recordings are then played back as video and can be analyzed at each moment. Much like a heat map, different colors indicate individual levels of psi overlaid onto models of the object being evaluated. These visualizations allow for improved patient awareness and allow health professionals to make accurate and confident diagnostic records. 

A love and curiosity for new technology has led me back to academia. Beginning with Mathematics for a solid foundation, my goal is to follow through with a degree in Aeronautics. For a long time now, I have dreamt of working for a company such as Google, SpaceX, Boeing or NASA, and make a significant contribution to society. I have great interest in the area of computer science and find the most exciting thing to be the constant push forward of information and development. With enough information, it seems anything is possible! With my skill set, I will be able to recognize important problems, gather data, conduct experiments and work together with others to find a solution to the problem.

I have included a few links if anyone is still curious about Cadcam or Tekscan technology.
 Enjoy!