Republican Presidents and Jobs
http://nyti.ms/NfQshn
Labels: Outrageous, Policy, Stimulating


Items of interest in computer and network security, privacy, voting, public policy, etc., plus a few that just tickled my fancy or provoked my outrage.
Labels: Outrageous, Policy, Stimulating
Labels: Outrageous, Policy, Stimulating
Labels: Assorted, Policy, Risks, Stimulating
Labels: Assorted, Policy, Stimulating
Curb cuts for wheelchairs also guide blind persons into street crossings and prevent accidents for baby strollers, bicyclists, skateboarders, and inattentive walkers. The “curb cuts” principle is that removing a barrier for persons with disabilities improves the situation for everybody. This hypothesis suggests erasing the line that labels some technologies as assistive and certain practices as accessibility to maximize the benefits for future users of all computer-enabled devices. This paradigm requires a new theory of design that recognizes accessibility flaws as unexplored areas of the design space, potential harbingers of complexity and quality loss, plus opportunities for innovation in architectures and interfaces.
Labels: Assorted, Policy, Stimulating
Labels: Assorted, Outrageous, Policy, Risks, Stimulating
At a time when more and more digital technologies are becoming indispensable to millions of people, the field of computer science (CS) is in trouble. Enrollment and retention of CS students, particularly those historically underrepresented in the field (women, African-Americans, Native-Americans, and Hispanics) has declined sharply. According to the Computing Research Association, CS enrollment in the U.S. was at its peak in 2000, with 15,958 undergrads. By 2006, enrollment declined by roughly half: 7,798 undergrads. And enrollment among already-underrepresented groups has dropped even more sharply.Kudos to Google for recognizing the problem and doing something innovative and concrete to address it. Of course, 17 students is a drop in the bucket compared to the shortfall, but hopefully other companies will follow their lead.
We hope to address this problem (and potential shortage) with a variety of programs beyond our scholarship initiatives. Recently, our educational outreach group, University Programs, and Diversity and Talent Inclusion teams joined forces to create the Computer Science Summer Institute (CSSI). This special institute included an interactive and collaborative CS curriculum, as well as a living-learning residential experience for student networking. We chose 17 college sophomores, all aspiring computer scientists, to attend the all-expenses-paid CSSI in Mountain View from August 3–15.
Labels: Assorted, Policy, Risks, Stimulating
Labels: Assorted, Stimulating
Any technology that is going to have significant impact over the next 10 years is already at least 10 years old... Here's the message to be heeded: Innovation is not about alchemy. In fact, innovation is not about invention. An idea may well start with an invention, but the bulk of the work and creativity is in that idea's augmentation and refinement.
Labels: Policy, Stimulating
The aviation and telecommunication revolutions have conspired to make distance increasingly irrelevant. An important consequence of this is that US citizens, accustomed to competing with their neighbors for jobs, now must compete with candidates from all around the world. These candidates are numerous, highly motivated, increasingly well educated, and willing to work for a fraction of the compensation traditionally expected by US workers.
If the United States is to offset the latter disadvantage and provide its citizens with the opportunity for high-quality jobs, it will require the nation to excel at innovation—that is, to be first to market new products and services based on new knowledge and the ability to apply that knowledge. This capacity to discover, create and market will continue to be heavily dependent on the nation’s prowess in science and technology.
Indicators of trends in these fields are, at best, highly disconcerting. While many factors warrant urgent attention, the two most critical are these: (1) America must repair its failing K-12 educational system, particularly in mathematics and science, in part by providing more teachers qualified to teach those subjects, and (2) the federal government must markedly increase its investment in basic research, that is, in the creation of new knowledge.
Only by providing leading-edge human capital and knowledge capital can America continue to maintain a high standard of living—including providing national security—for its citizens...
Labels: Policy, Stimulating
Labels: ACM, Assorted, Stimulating
Labels: ACM, Assorted, Stimulating
[This can lead to substantial anomalies: E.g., Xerox could afford to "invest" millions in speech recognition technology (by purchasing Kurzweil--certainly not for the book value of its assets) at the same time it could not afford the "expense" of a major speech recognition research program.]- As long as a firm's knowledge assets are fairly static (or can be treated as proportional to other assets), knowledge accounting will not significantly change the picture. However, if they are dynamic (e.g., if the firm is investing in new technology or relying on technology with a finite lifetime), then the picture can be significantly distorted by any accounting method that ignores them.
[This may explain some of the leisurely corporate pace in exploiting the knowledge capital acquired by PARC. Business planners might have acted differently three years ago had the books shown that the technology demonstrated at Boca Raton was depreciating at $10,000,000 a year.]3. Knowledge isn't destroyed or lost by being used.
- Annual employee "appraisals" can take on an entirely new significance.Employee education can be treated as a capital expense.
The cost of losing an employee will show up on the books; the cost of employee benefits can then be compared rationally with the value of expected reductions in employee turnover.
When an employee moves between profit centers within a firm, his "book value" provides a reasonable estimate of the "transfer price" that should be associated with the transaction.
Labels: Assorted, Stimulating
The first step is to measure whatever can be easily measured. This is okay as far as it goes.Daniel Yankelovich, quoted by Adam Smith in Supermoney.
The second step is to disregard that which can't be measured or give it an arbitrary quantitative value. This is artificial and misleading.
The third step is to presume that what can't be measured easily really isn't very important. This is blindness.
The fourth step is to say that that which can't be easily measured really doesn't exist. This is suicide.
Labels: Assorted, Policy, Risks, Stimulating
The US has lost its position as the world's primary engine of technology innovation, according to a report by the World Economic Forum.
The US is now ranked seventh in the body's league table measuring the impact of technology on the development of nations.
A deterioration of the political and regulatory environment in the US prompted the fall, the report said.
The top spot went for the first time to Denmark, followed by Sweden.
Countries were judged on technological advancements in general business, the infrastructure available and the extent to which government policy creates a framework necessary for economic development and increased competitiveness.
Labels: Outrageous, Policy, Stimulating
Labels: Amusing, Stimulating
Labels: EVoting, Stimulating
If one is going to write an article claiming a "total failure" of information security, one should expect some strong feedback. I was not sure what to expect - total disregard, complete agreement, outrage, or indifference. Thankfully, the majority of responses have been very positive. Whether or not you believe there has been a "total failure", there seems to be almost unanimous agreement that things are pretty bad out there, and the security community faces some significant challenges. It has been six months since my article was posted and sadly the security situation is only getting worse. The Cyberworld has progressed merely from the Wild West to the 1920s mob-controlled urban centers. Shortly after my Security Absurdity article was posted online, we witnessed a remarkable series of events when cybercriminals forced Blue Security, an innovative anti-spam security company, out of business. This incident demonstrated quite dramatically that cybercriminals are indeed currently winning the battle.[Other Sources]
Labels: Outrageous, Policy, Risks, Security, Stimulating
Labels: Assorted, Stimulating
[My thanks to Cameron Wilson of USACM for a pointer to this document.]Protecting customer privacy is critically important. In many areas of the world, privacy is considered a fundamental human right. Additionally, protecting customer privacy can increase loyalty and be a market differentiator.
Customers are getting increasingly frustrated with software and Web sites that do not clearly communicate the behaviors that impact customer privacy and the controls available to them. Currently, there are no industry-wide practices to help standardize the user experience and the software development process. For some, ignoring this growing frustration has led to an erosion of trust, negative press, and even litigation.
The software industry as a whole would benefit from establishing a higher bar for respecting customer privacy. Giving customers more information about how their privacy may be impacted (i.e., transparency) coupled with improved controls can empower customers and raise their level of trust. At the same time, it is important not to annoy customers with a barrage of notices that ultimately may be ignored.
The purpose of this document is to propose a baseline for establishing this higher bar. It offers guidance for creating notice and consent experiences, providing sufficient data security, maintaining data integrity, offering customer access, and supplying controls when developing software products and Web sites. These guidelines are based on the core concepts of the Organization for Economic Co-operation and Development (OECD) Fair Information Practices and privacy laws such as the EU Data Protection Directive, the U.S. Children's Online Privacy Protection Act of 1998 (COPPA), and the U.S. Computer Fraud and Abuse Act (as amended 1994 and 1996). In the interest of developing a common set of industry best practices for privacy, we invite the community and other interested parties to participate in an open dialogue...The core principle driving these guidelines is:
Customers will be empowered to control the collection, use, and distribution of their personal information.For customers to have control over their personal information, they need to know what personal information will be collected, with whom it will be shared, and how it will be used. In addition:Before collecting and transferring personal information, you, as the entity requesting the information, must have a compelling business and customer value proposition. A value proposition that benefits customers may create a natural incentive for them to entrust you with their personal information. Only collect personal information if you can clearly explain the net benefit to the customer. If you are hesitant to tell customers "up front" what you plan to do with their information, then do not collect their data. This applies to data collected and stored locally on the customer's machine or transferred over the Internet...
- Customers must provide consent before any personal information is transferred from their computer.
- If a customer's personal information is transferred over the Internet and stored remotely, they must be offered a mechanism for accessing and updating the information.
One of the best ways to protect a customer's privacy is to not collect his or her User Data in the first place. The questions that should constantly be asked by architects, developers, and administrators of data collection systems include:
The answers must explicitly address both the primary use of the customer's data (such as providing the feature or service the customer is requesting) and any planned secondary use (such as marketing analysis). Only collect data for which there is an immediate planned use. In addition, only transfer data that is absolutely necessary to achieve the business purpose, reduce the sensitivity of the data retained (e.g., aggregate data where possible), and delete data that is no longer needed for the business purpose.
- "Do I need to collect this data?"
- "Do I have a valid business purpose?"
- "Will customers support my business purpose?"
Another important area to consider is how customers will react to the collection of their data. For example, while one customer may appreciate product recommendations derived from his or her purchase history, another may see such personalization as an invasion of his or her privacy...
The longer data is retained, the higher the likelihood of accidental disclosure, data theft, and/or data growing stale. User Data should be retained for the minimum amount of time necessary to support the business purpose or to meet legal requirements. Any User Data stored by a company should have a retention policy that states how long the data should be kept and the manner in which it should be removed from all data stores...
All products and services that collect User Data and transfer it must provide an explanation ("give notice") to the customer. The customer must be presented with a choice of whether to provide the information, and consent must be obtained from the customer before PII can be transferred from the customer's system. The type of notice and consent required depends on the type of User Data being collected and how it will be used...
Security is an essential element of privacy. Reasonable steps should be taken to protect PII from loss, misuse, unauthorized access, disclosure, alteration, and destruction. Preventive measures include access controls, encryption in transfer and storage, physical security, disaster recovery, and auditing. Security requirements vary depending on the type of User Data collected and whether it will be stored locally, transferred, and/or stored remotely. When storing Sensitive PII on a customer's system, it must be stored using appropriate security mechanisms to prevent unauthorized access (e.g., file permissions and encryption). Sensitive PII transferred to or from a customer's system over the Internet must be transferred using a secure method that prevents unauthorized access...
Labels: Privacy, Stimulating