Microsoft Research Reclaims Value of Pi

pi-techFACT: Educators in the state of Alabama are chafing as the state celebrates a dubious anniversary: today marks ten years since the Alabama state legislature voted to change the value of the mathematical constant pi from 3.14159… to the “Biblical value” of 3.0.  Ramifications were felt across the state. 
Now, a team of Microsoft Research computer scientists have announced success in a groundbreaking effort to refactor the Biblical value, using modern high-performance computing hardware and machine-translation technologies on the original Old Testament texts.
  
ANALYSIS:  Looking back, an April 1998 issue of Science and Reason newsletter written by physicist Mark Boslough recounts the political and cultural battles which went behind the Alabama legislative change. The legislature of the “Yellowhammer State” justified the change by citing biblical injunction. As one supporter put it: “the Bible very clearly says in I Kings 7:23 that the altar font of Solomon’s Temple was ten cubits across and thirty cubits in diameter, and that it was round in compass.”

The use of “3.0” as the value of pi led to problems in schools, businesses, and local scientific pursuits, including a group of frustrated engineers at the NASA research facility in Huntsville.  According to NASA/Huntsville’s director of special projects “Dr.” Jim Simon (doctorate pending), “We had strayed from using our Microsoft software and instead had been trying to figure out how to use an advanced Google search platform, which was sold to us as a powerful Cloud Computing system.”

Unfortunately, that effort proved frustrating for the “rocket scientists” any time they used calculations involving pi, based on the Alabama-standard value of 3.0, mostly because they were under the mistaken impression that they were contractually barred from using Cloud Computing on any sunny days. Given the hospitable local weather that left them unable to use their computers for an average of 290 days each year.

Continue reading

Do Voters Love the Candidates… or their Fonts?

FACT:  John McCain, Hillary Clinton, and Barack Obama have chosen distinctively different typeface fonts for their campaign posters, bumper stickers, and TV-ad logos. 

font-gotham-obama.jpgObama uses sans serif Gotham.  McCain uses sans serif Optima. Only Clinton uses a serif, New Baskerville.  According to the Los Angeles Times yesterday, many typographers are following the usage choices closely, and now some political analysts are finding message in the medium; Obama’s choice is “the hot font of 2008,” Clinton’s font flourishes “conjure trustworthiness,” while McCain’s communicates an “old-fashioned yet quirky vibe.”

ANALYSIS:  Anyone who remembers their first experience with a personal computer’s word-processing program recalls that initial thrill when the realization hit: I can choose any font? I can choose any font!!!

Billions of funky emails, resumes, and yard-sale posters later, we’re all perhaps jaded by the profusion of font styles, and tend to have built up biases and defenses regarding certain looks.

Continue reading

From Microsoft’s Cloud – PopFly

I mentioned PopFly in my last post – many Web users are now beginning to appreciate how it enables the fun and ease of innovation for non-technical people. Go to www.popfly.com/ and set up your own account (free of course), and you’ll be able to create usable, powerful “tools” out of the Cloud, or with your own data. 

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

The Future of Enterprise Computing – and Social Computing

I wrote the other day about how highly ranked the University of Virginia’s undergrad business school is (a close second in BusinessWeek’s annual ranking), and mentioned that one reason is the creative research and programs they sponsor.

In fact, thanks to UVA’s McIntire School of Commerce, I enjoyed a great day recently exploring some of my favorite topics with leading experts.  I was an invited speaker at their one-day conference on The Future of Enterprise Computing on March 14th, presented by McIntire’s Center for the Management of Information Technology (CMIT).  It was a fascinating day….

Continue reading

Massive Data Centers, Right in your Cellphone

I try to keep my cellphone on “vibrate” during meetings; no one needs to know my taste in ringtones. But more importantly, I keep it on so that I can use the browser and web search ability, which I wind up doing almost as often as I check my email.

Yesterday was a good example of the utility of ever-handy web search. My group and I had brought together an international group of government officials to visit Microsoft Research’s annual TechFest.  Tuesday was the “Public Day” with the media and outsiders allowed, so we spent that day at the Microsoft Convention Center with Craig Mundie, Rick Rashid, and a hundred others, but Wednesday morning we offered a series of side briefings for the group at Microsoft’s Executive Briefing Center, on topics of interest to large government and defense agencies.  Topic one was data centers.

Continue reading

TechFest and its Value

I am spending much of the week at Microsoft Research’s annual TechFest, which is proving to be an absolutely mind-blowing experience.  So much, so cool, so out there….

There’s been some good press about the show already (ComputerWorld, and ITWorld for example), and the official Microsoft TechFest site has a wealth of material.  The media were allowed in on the “Public Day” to report on a carefully selected subset of the projects being displayed. But I think the coverage has missed an important difference between this show and something like COMDEX or CeBIT.

Continue reading

How Not to Predict Stock Performance

Google hasn’t had a great week on the stock market so far, but it isn’t often that you get to use the words “Google stock” and “kick ’em while they’re down” in the same sentence, so…

I like my own little subtle “inside jokes” a bit too much sometimes. If you’re sharp-eyed you’ll have noticed that on the left-hand margin, down a ways, is an RSS feed featuring the latest news stories which include the phrase, “the next Google.” Yes, I use Google News itself to drive the RSS feed, ha ha.

Continue reading

Manferdelli Had a Salad, I Had Meatloaf

I had a very pleasant lunch today in Reston with John Manferdelli, one of the engineering legends with whom I’m privileged to work at Microsoft.  (Check out this list, kind of my own corporate “bucket list” of people to meet and listen to).

John arrived in DC a couple of days ago; unlike mere mortals, he decided to spend a weekend day off visiting the University of Maryland Engineering  Library in the Math Building, and told me he’d found a fascinating book on random numbers….

Continue reading

Silverlight 2.0: It’s “1 better than 1.0”

Last week I was visiting an intelligence community facility which has been known for several years for housing some of the brightest and most innovative adopters of Web 2.0 approaches for classified systems. I could say who and where, but then I’d have to… well, not kill anyone, just apologize to all my other friends at other agencies who think they’re the cat’s meow on classified Web 2.0. (With any luck this anonymity now makes each of them think, “Wait, who’s more advanced than we are?  How can we catch up??!”)Well, it turns out they’re excited about something new & cool they would like to use.

Continue reading