Citation Teaching at a research university, I see a slew of high-tech gadgets, or even low-tech ones, that we are asked to consider to enhance the educational experience of our students. As a broader theme, some technologies have been put up as disrupting the “traditional” college mode of education dating way back to the turn […]
Citation We are moving into a world of internet connected things. This is the world where your aging grandmother’s medicine cabinet reminds her when her medication has become due, when the irregular heart beat of your father triggers the scheduling of a cardio checkup, and when the home automation device decides that lowering the temperature […]
Citation The flying car has become a cliche in how a technology promise was not kept. Flying cars were quite a common prop in movies in the 1950’s and 60’s with the implicit promise that they were around the corner. And if you are kind that follows tech news obsessively and have a great memory, […]
Citation We all know that some technical topics become hot, stay hot for some length of time, and then fade away from attention in academia, and the research world more generally. And then there are some topics that stay more stable for extended periods of time, for say one career span of years. This post […]
Citation “The only thing necessary for the triumph of evil is for good men to do nothing.” Edmund Burke When diktats come down from the high up, i.e., the corridors of administrative power, and these are not helpful to society at large, does the crowd, i.e., a mass of people, mobilized through technology have the […]
Datacenters – these distant, idealized instantiations of our digital present – do fail at times. When they do, they affect our physical present. Here is one (of several) reason why this happens and this one is only too human.
Citation The latest crippling ransomware to hit our digital world has been Wanna Cry, which raised its head around May 12. Ransomware is a kind of software used by bad actors (or simply put “bad guys”) to make data in computer systems unavailable, such as, by encrypting the data. The bad actors promise to make […]