Wednesday, December 29, 2010

Publication Venues in Computer Science

In academic Computer Science, there are basically three publication venues that "count": peer-reviewed conferences, peer-reviewed journals, and peer-reviewed workshops/symposia. There are of course many other perfectly credible ways to publish one's work (e.g., technical reports, books), but these are the top three.

Unlike in most scientific fields, including our closest cousins Engineering and Mathematics, journals are not the de facto place to publish papers. I can't speak for all subfields of CS, but basically everyone I know only publishes in journals because they feel they have to (e.g., multi-disciplinary tenure and promotion committees that expect journal publications, research rankings organizations that still don't seem to 'get' conferences, etc.). Some subfields this is not the case, such as in interdisciplinary fields like Bioinformatics and CS Education, but for most major areas of CS, conferences are where the action is.

For these fields, the top conferences have extremely low acceptance rates, many less than 17%. The program committees are comprised of the top scholars in the field. And in some fields, anyone who is anyone attends these conferences, so managing to get a paper accepted is a pretty big deal that gets a researcher much visibility.

Some journals have similarly rigorous standards of review and are known for their quality, for example the IEEE Transactions and ACM Transactions family of journals are highly regarded. There are occasionally other journals that are good, but the vast majority are either decidedly mediocre or utter rubbish. We don't really have any comparable C/N/S type journals.

Workshops and symposia generally have a much higher acceptance rate than conferences and journals, but they are still peer-reviewed and are often archival (e.g., ACM Digital Library, IEEE Xplore). They have quite a few advantages. First, they are usually co-located with a conference, which means you can often go to both on your University's dime. Second, they present a fantastic opportunity to float half-baked ideas and get one-on-one feedback from your peers. And third, oftentimes workshops are the only place you can meet other scientists interested in the same area of specialized research as you, which nearly always leads to good things.

But the most useful thing about conferences and workshops over journals is that you have the opportunity to tell potentially hundreds of people about your work. These are all people who learn your name and face and start to match it to a research area. This is invaluable, because it leads to professional relationships that will see you through your career - jobs, funding, tenure/promotion letters, etc.

Journals don't really get your name and face out there as well, unless some news outlet picks up on your article. People do read journals, but I suspect most readers associate papers more strongly with an institution than a name, particularly if it's a new name on the research scene.

So I think it's nice to have a diverse portfolio when it comes to publishing. It's good to have a mixture of papers in the top conferences with low acceptance rates, in journals that are well-respected, and in workshops that are useful to the researcher.

Monday, December 20, 2010

"You only got in because you are a [woman, person of color, person with disabilities]"

I recently stumbled across a fantastic blog called "What Is It Like To Be A Woman In Philosophy". Philosophy probably has more underrepresentation than CS does, or maybe we're tied, I'm not sure. In any case, this blog is set up in such a way that women in Philosophy submit anecdotes which get posted anonymously.

Today I read this post, and the lines at the end really struck a chord:
"As one of the only female graduate students, I was very involved in a recent job search in which the only fly outs were women. After the final job talk I was stopped in the hall and asked by a group of male faculty members what my thoughts on the candidates were. I said that I thought they all seemed equally qualified, but that candidate X was particularly friendly, approachable, and outgoing while also setting an excellent example of professionalism for the female grad studens. One senior male faculty member interrupted me midsentence with: 'Well they’re all women, so what more do you want?' This was the same faculty member who told me in my first year that I had only been accepted to the PhD program because they 'went out of their way to accept more women' that year. None of the other faculty members reproached him, they all just wandered away into their offices."
Two things about this are problematic. First, someone from a majority group telling someone from a minority group that the only reason they achieved (or can achieve) something was because they are a minority. Statements like this are extraordinarily hurtful because in addition to implying the minority person is not capable of quality, competitive work, it also says very clearly: I do not accept you, and you are not a part of my club.

Ouch.

But double ouch is this: the other faculty members did nothing. This makes me sadder than I can say. Are these faculty members so risk and conflict-averse that they don't stand up to such malarky? When my cousin-in-law made racist jokes at a New Year's Eve party last year, I immediately splashed water in her face. It's like when the cat scratches the couch and you spray them with the water bottle. Conditioning 101.

For the menfolk and other majority folks out there who want to help:  if you truly want to make your workplace hospitable for women, people of color, people with disabilities, etc, you have to help socialize the people who didn't get the memo. Pick those fights - take some risks to help out someone else. This is what it takes to help change things.

Thursday, December 16, 2010

Active Directory Explorer v1.42

http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx
Active Directory Explorer (AD Explorer) is an advanced Active Directory (AD) viewer and editor. You can use AD Explorer to easily navigate an AD database, define favorite locations, view object properties and attributes without having to open dialog boxes, edit permissions, view an object's schema, and execute sophisticated searches that you can save and re-execute.
AD Explorer also includes the ability to save snapshots of an AD database for off-line viewing and comparisons. When you load a saved snapshot, you can navigate and explorer it as you would a live database. If you have two snapshots of an AD database you can use AD Explorer's comparison functionality to see what objects, attributes and security permissions changed between them.


Computer Repair Lakeland, FL
863-521-1079
      

Wednesday, December 15, 2010

How to Backup using Batch Files

Sometimes it is useful, or even necessary to simply copy existing directories to another hard disk or network drive, rather than using more complicated backup methods. Multiple directories can be backed up comparatively easy with a simple click, by creating and running a batch file. That file can be executed manually from your desktop, can be added to startup or scheduled for periodic execution as needed.

Batch files have comparatively easy syntax and can have many uses, so this method could also be a good learning experience by example. You can simply copy the text below, and paste it into Notepad. Create a new file with either .bat or .cmd extension, rather than txt.

http://www.speedguide.net/articles/how-to-backup-using-batch-files-1547
Visit SpeedGuide.net for full article and detailed command lines.


Computer Repair Lakeland, FL
863-521-1079
      

QuickBooks,Windows Vista 64bit PDF Printing Problems

Make the PDF Converter compatible with settings in a 64-bit OS environment.
Windows Vista:
Make sure that you are logged in as a user with administrator rights.
Click the Windows button, select Control Panel, and click Printers.
Right-click the QuickBooks PDF Convertericon and select Run as administrator and Properties.
Click Continue.
Select the Ports tab, then click the Add Port… button.
Select Local Port and click the New Port… button.
Enter PDF1 for the new port name and click OK. Close the Printer Ports window.
Ensure that the PDF1 port is selected in the Ports list.
Select the Advanced tab.
Select the Spool print documents radio button to make the options below it clickable.
Clear (uncheck) the box labeled Enable advanced printing features.
Select the Print directly to printer radio button again.
Ensure that Amyuni Document Converter 300 is selected in the Driver: drop-down arrow
Click the Apply button, and then click OK.

Important: In order for the changes to take effect, you must restart your computer.Reboot your computer and then try to print, email, or create a pdf from QuickBooks.


Computer Repair Lakeland, FL
863-521-1079
      

QuickBooks won't print

This issue most often occurs if that file has become damaged or corrupted
The printer settings for QuickBooks are stored in a file called QBPRINT.QBP. To fix the problem: Delete the QBPRINT.QBP file and allow QuickBooks to generate a new one.
Detailed instructions:
1 Open My Computer or Windows Explorer and navigate to the correct directory below for your version or QuickBooks.
2 For QuickBooks 2007: Windows XP:
C:\Documents and Settings\All Users\Application Data\Intuit\QuickBooks 2007
3 For QuickBooks 2007: Windows Vista: C:\ProgramData\Intuit\QuickBooks 2007
( You might have to do an advanced search and search in hidden files)
4 For QuickBooks 2006 and earlier: C:\Program Files\Intuit\[QuickBooks Version]
1. Locate the QBPRINT.QBP file and delete it.
2. Open QuickBooks.
3. Click the File menu and select Printer Setup.
4. Click any one of the transactions in the Form Name drop-down and click OK. This will re-create the QBPRINT.QBP file. (This does not have to be done for each transaction.)
5. Open and print the transaction that was having problems.


Computer Repair Lakeland, FL
863-521-1079
      

Backing up the Windows registry

Offered by Symantec but not a Symantec tool.
Run a tool to backup your Windows registry.
The backup is saved in C:\ with the file name SYM_REGISTRY_BACKUP.
RUN IT NOW

Manual Instructions:
Back up the entire registry (Recommended by Microsoft)
To back up the entire registry in Windows XP/Vista, follow the instructions in the Microsoft
Knowledge base article (Article ID 322756):
How to back up and restore the registry in Windows


To back up the entire registry in Windows Me/98, follow the instructions in the Microsoft Knowledge base article (Article ID 322754):
How To Backup, Edit, and Restore the Registry in Windows 95, Windows 98, and Windows Me


To back up the entire registry in Windows 2000, follow the instructions in the Microsoft Knowledge base article (Article ID 322755):
How to back up, edit, and restore the registry in Windows 2000




Computer Repair Lakeland, FL
863-521-1079
      

Make your thumb drive bootable

Here are some sites I found that instruct you on how to make your thumb drive bootable:


Create Bootable USB Flash Drive for Windows 7 or Vista Netbook Install ?
http://www.youtube.com/watch?v=98xlSjTyCaQ
http://www.youtube.com/watch?v=mwX9cmJ8BoM&feature=related


Tools You Might Need:
Virtual CloneDrive (Freeware)




Other sites for creating a bootable thumb/flash drive.
  1. http://www.ehow.com/how_4587665_thumb-drive-bootable.html
  2. http://www.microsoft.com/whdc/archive/usb-boot.mspx
  3. http://www.bootdisk.com/pendrive.htm
  4. http://www.pcmag.com/article2/0,2817,1846793,00.asp
Tools You Might Need:
HP Bootable Flash Utility



Computer Repair Lakeland, FL
863-521-1079
      

Email Settings for popular email accounts

Taken from DS Solutions. Visit their site for full details.
Mail Server Settings
Hotmail:
Hotmail Incoming Mail Server (POP3) - pop3.live.com
(logon using Secure Password Authentification - SPA, mail server port: 995)
Hotmail Outgoing Mail Server (SMTP) - smtp.live.com (SSL enabled, port 25)

Yahoo! Mail:
POP3 protocol and use the following mail server settings:
Yahoo Incoming Mail Server (POP3) - pop.mail.yahoo.com (port 110)
Yahoo Outgoing Mail Server (SMTP) - smtp.mail.yahoo.com (port 25)
POP Yahoo! Mail Plus email server settings
Yahoo Plus Incoming Mail Server (POP3) - plus.pop.mail.yahoo.com (SSL enabled, port 995)
Yahoo Plus Outgoing Mail Server (SMTP) - plus.smtp.mail.yahoo.com (SSL enabled, port 465, use authentication)

Google GMail:
Google Gmail Incoming Mail Server (POP3) - pop.gmail.com (SSL enabled, port 995)
Outgoing Mail Server - use the SMTP mail server address provided by your local ISP or smtp.gmail.com (SSL enabled, port 465)

MSN Mail:
MSN Incoming Mail Server (POP3) - pop3.email.msn.com
(port 110, using Secure Password Authentication - SPA)
MSN Outgoing Mail Server - smtp.email.msn.com
(select "My outgoing server requires authentication")

Lycos Mail Settings:
Lycos Mail Plus service:
Lycos Mail Incoming Mail Server (POP3) - pop.mail.lycos.com (port 110)
Outgoing Mail Server - smtp.mail.lycos.com or use your local ISP SMTP mail server

AOL Mail Settings
AOL Incoming Mail Server (IMAP) - imap.aol.com (port 143)
AOL Outgoing Mail Server - smtp.aol.com or use your local ISP SMTP mail server

Mail.com:
The Mail.com email service allows you to use POP3 and SMTP servers for accessing your Mail.com mailbox.
Mail.com Mail Incoming Mail Server (POP3) - pop1.mail.com (port 110)
Outgoing Mail Server - use your local ISP SMTP mail server

Netscape Internet Service Mail Settings:
Netscape Internet Service Incoming Mail Server (POP3) - pop.3.isp.netscape.com (port 110)
Netscape Internet Service Outgoing Mail Server - smtp.isp.netscape.com (port 25, using a secure SSL connection)

Tiscali Mail:
Tiscali Incoming Mail Server (POP3) - pop.tiscali.com (port 110)
Outgoing Mail Server - use your local ISP SMTP mail server

Freeserve Mail;
Freeserve Incoming Mail Server (POP3) - pop.freeserve.com (port 110)
Outgoing Mail Server - use your local ISP SMTP mail server

Supanet Mail:
Supanet Incoming Mail Server (POP3) - pop.supanet.com (port 110)
Outgoing Mail Server - use your local ISP SMTP mail server






Computer Repair Lakeland, FL
863-521-1079
      

Connect e-mail from your Windows Live Hotmail into Outlook

Outlook Hotmail Connector provides a free solution for managing your Windows Live Hotmail e-mail, calendar, and contacts from within Outlook 2003, and 2010 free of charge.
Download Free Tool Here


Computer Repair Lakeland, FL
863-521-1079
      

Monday, December 13, 2010

The Wikileaks Drama Continues

In recent news of this drama-riffic story, hackers have been attacking any organization or individual who has been deemed "unsupportive" of Wikileaks. This includes Swedish prosecutors, MasterCard, Visa, PayPal, and the Swiss Postal system. Largely these attacks have been ineffectual and meaningless, or, as one writer put it, "More like a cybermob than cyberwarfare".

As for the 1337 hackers, I have to say I'm not really following the call to arms. Because the scorecard as I see it is:
  • Someone stole raw data that was not theirs to steal. (Which, as the NY Times put it, "The Pentagon Papers this is not.")
  • These data were leaked it to Julian Assange.
  • Instead of caring about, well, anything, Assange acts like a megalomaniac drama queen pretending to be a journalist. So he dumps this raw data out on to the Internet. He encrypts some of it. Some of it he doesn't.
  • The guvvies try to get their data back, but, well, we know how that worked out
  • Assange carries on the drama by saying, "boy-o-boy, watch out guvvies, touch me and I release the key to my insurance file!!111!!" 
  • And all the bozos on Slashdot and Digg and elsewhere keep up their battle cry of this ludicrous Save Assange! Hack the Planet! Swiper No Swiping! 
This whole thing is like a teenage romance novel, except without the vampires to keep me entertained.

Frankly, I wish the black hats would actually come together to do some useful vigilanteism, like, say, help prevent child trafficking, or use computing tools to help find missing children. Assange just isn't worth it.

Sunday, December 12, 2010

HP Learning Center, Free Classes

Learning center - classes Free, online classes, available 24/7:


www.hp.com/go/learningcenter



Computer Repair Lakeland, FL
863-521-1079
      

OUTLOOK.EXE continues running after you exit Outlook

Things that may keep Outlook open or hung up in task manager:
  1. Antivirus programs that support scanning email for viruses will tend to keep Outlook open.
  2. Many spyware and adware programs hook into Outlook and other email clients.
  3. Add-ins
  4. Other causes, see website for more details.
http://www.slipstick.com/problems/close.asp

Computer Repair Lakeland, FL
863-521-1079
      

APC Software / Firmware download

Looking for APC Battery Back-UPS software or to update the firmare?


You will need to know the model & part number of your item. Or you can just search by product name.


Software / Firmware Download



Computer Repair Lakeland, FL
863-521-1079
      

Create a system repair disc

To create a system repair disc:

Open Backup and Restore:
click Start button
click Control Panel
click System and Maintenance
click Backup and Restore


In the left pane, click Create a system repair disc, and then follow the steps. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

Go to Microsoft's site and watch the video:
Learn how to create a system repair disc




Computer Repair Lakeland, FL
863-521-1079
      

Microsoft® Windows® Malicious Software Removal Tool

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.


Download Here



863-521-1079
      

Friday, December 10, 2010

How to repair a corrupt Outlook pst or ost file

Have you found that your Outlook takes forever to open or opens in safe mode or recovery every time, or gives you errors, fails to send? Then you need to run the INBOX REPAIR TOOL.


With the INBOX REPAIR TOOL you can recover folders and items from a corrupted Personal Folders (.pst) file or offline folder (.ost) file in Microsoft Outlook 2002, Outlook 2003, and Outlook 2007.


I find it best to create a new pst/ost file first so you can use your outlook to send and receive while you fix your corrupt file.


You will need to run Scanpst.exe, which is a hidden file that is installed automatically when you install Windows. You can search for it by name showing hidden files when you do. You will need to know where your pst/ost file is so find that path out before you start.



Computer Repair Lakeland, FL
863-521-1079
      

Wednesday, December 8, 2010

Digging to America

Under an avalanche of deadlines, travel, and other sundries I have been finding refuge in lightweight fiction. Last weekend at the library I borrowed Digging to America by Anne Tyler, which has at times had me rolling on the floor laughing. Other times it is less lightweight than I would have liked, but halfway through the book I'll still recommend it*.

Several passages in this novel have reminded me of anecdotes told by online friends Pika and GMP. There is one character, Maryam, has lived in the US for a very long time but due to her Iranian accent people still always ask her where she's from. For example, Maryam is at a party:
First he talked to Sami, on his other side... then it was Maryam's turn: How long had she been in this country? and did she like it?
Maryam hated being asked such questions, partly because she had answered them so many times before but also because she preferred to imagine (unreasonable though it was) that maybe she didn't always, instantly, come across as a foreigner. "Where are you from?" someone might just ask when she was priding herself on having navigated some particularly intricate and illogical piece of English. She longed to say, "From Baltimore. Why?" but lacked the nerve. Now she spoke so courteously that Lou could have no inkling how she felt. "I've been here thirty-nine years," she said, and "Yes, of course I love it." 
My favorite thing about this book is that the writer is extremely subtle and clever in how she brings up American cultural unawareness. There is one character, Bitsy, who tries so hard to get others to be "culturally sensitive" to her adopted daughter Jin-Ho that she is inadvertently over-the-top culturally insensitive to her Iranian friends. I find this character almost too embarrassing to read at times, but then I realize that's the entire point.

I find the "mommy wars" in this book exceptionally comical and well-penned, because all I can think is how I know people exactly like those characterized. Bitsy is often judgmental (and/or jealous) of her friend Ziba's parenting; her daughter Susan is a peer to Jin-Ho and was adopted on the same day.
A while ago, Sami and Ziba had gone away for the weekend and left Susan with Maryam. Bitsy was amazed when she heard about it. During her own brief absences - never longer than a couple hours, and only for unavoidable reasons such as doctor appointments - she used a person from Sitters Central, a woman certified in infant CPR. Anyhow, her mother was too frail to babysit and her in-laws had made it plain taht they had their own busy lives. But under no circumstances would she have considered leaving Jin-Ho overnight. She would have been frantic with worry! Children were so fragile. She realized that now. When you thought of all that could happen, the electrical sockets and the Venetian-blind cords and the salmonella chicken and the toxic furniture polish and the windpipe-sized morsels of food and the uncapped medicine bottles and the lethal two inches of bathtub water, it seemed miraculous that any child at all made it through to adulthood.
Finally, for you academic types, I'll leave you a quote in the style of FSP:
Her family visited constantly. They showed up every weekend with platters of eggplant and jars of homemade yogurt. They hugged Sami to their chest and inquired after his studies. In Mr. Hakimi's opinion, European history was not the best choice of fields. "You propose to do what with this? To teach," he said. "You will become a professor, teaching students who'll become professors in turn and teach other students who will become professors also. It reminds me of those insects who only live a few days, only for the purpose of reproducing their species. 
:-)

(*) Though if this book turns into an awful ball of mush, I will rescind this remark. 

Tuesday, December 7, 2010

Kudos to the American Mathematical Association

Hats off to the American Mathematical Association for creating a poster entitled, "Women Doing Mathematics". It highlights the accomplishments of nine women and has a personal quote from each about their interest in Math.

Print it out and put it up in your department, the library, the mall, your kid's school, etc. This is a great poster to have in circulation. If I was a young woman considering a career in STEM a poster like this would have far more reach than Computer Engineer Barbie.

Sunday, December 5, 2010

Modem/Router Default Password

Default Password List
Last updated: 10.22.2010


What a great site


http://www.phenoelit-us.org/dpl/dpl.html



Computer Repair Lakeland, FL
863-521-1079
      

Friday, December 3, 2010

The Leaky Cauldron

I've been grimly amused reading about the latest wleaks webhosting drama over the past few days because of the astounding lack of understanding of how distributed systems work displayed by both the media and lawmakers. Perhaps this is our fault as technologists, maybe we're not explaining things clearly enough.

I've decided to draw some pictures on virtual cocktail napkins to help.

This is (mostly) how servers and data flow on the internet used to work:
One server, lots of nodes connect. Server distributing bad stuff? Shut it down, problem solved:

But in today's world of peer-to-peer file sharing, we actually see a model that looks more like this:

Not so happy about that file being shared? Well, you can try to stop it...

...but, well, good luck with that.

The cat is out of the bag, that file ain't never coming back. It's time to move on, folks.

I think it's hard for people to conceptualize decentralized networks. But it's really important to think about things this way, because this is what the internet is today. That first model is long, long gone.