A New Prototype: Research Desktop

Fact: The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009, next July in Athens, Greece) today issued its call for papers on “experimental and theoretical works on social network analysis and mining,” particularly relating to online social Web sites, email logs, phone logs and instant messaging systems “which are widely analyzed using graph theory and machine learning techniques.”  Interested authors are encouraged to submit abstracts of up to 300 words by December 10, 2008; the full papers aren’t due until January 31, 2009.  More info at www.asonam.org.

Analysis: Several Microsoft Research people are preparing papers based on their current research, and I’m considering attending myself (I’ve written before about MSR’s work in analyzing large social networks). There are three Microsoft scientists on the Committee (Dou Shen, Haizheng Zhang, and Rina Panigrahy – check out Rina’s publications on hashing and sketching algorithms).  It should be a top-notch conference, co-hosted by ACM and IEEE.

But that’s way off in the future – what if you want to look at some research stuff right now? Well, I’ve been going through the related “Socio-Digital Systems” work of MSR Cambridge (UK), and they’ve just added more information to their section here of the main MSR site.  That’s some neat stuff, more on the side of the actual social uses of digital data and the effects on our (still-human?) everyday lives.

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

%d bloggers like this: