One of the nicest features of Chrome is the sync between various devices: Desktop, laptop, iPod, etc. All of them will be synchronized with the same book marks, open tabs, passwords, etc. I had a small glitch that arose as follows: I bought my desktop after my laptop, and I installed my files from the laptop’s Time Machine backup. As a result, the following directory was placed on the desktop machine:
which contains Chrome’s configuration, preferences and caches. Thus, on my desktop Chrome was running with the preferences from my laptop. One of the ways that this manifested itself was that the laptop and the desktop were seen by the Chrome sync process as one and the same. The way to fix it was simple; delete the directory above, and reinstall Chrome. Here is a related post.
EMPIRES rise and fall swiftly on the internet. Google’s Chrome browser, which celebrates its fifth birthday next month, has captured much of the territory of older browsers and is now responsible for about 43% of all the web traffic generated by the world’s desktop computers. When Chrome was launched the dominant browser was Microsoft’s Internet Explorer (IE), with a 68% share—it is now down to just 25%.
An interesting article pointed out to me by Zhizhao Qian:
Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening – yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data.
University of California, Santa Barbara (UCSB) researchers have developed the Koopman Mode Analysis (KMA), an algorithm they say can predict future massive instabilities in the power grid and make power outages a thing of the past.
There is an interesting article about the role of Chairs in the December issue of the Chronicle of Higher Education. The position of a modern Chair includes, beside the standard academic duties, new duties that traditionally belonged to middle management: coordinating assessments and accreditations, fund raising, contacts with industry, etc.
Chairs are put in this difficult position where they are held accountable for documenting that their programs are succeeding, that their faculty are succeeding, and that they’re staying in budget,” says Mr. Buller, author of several books on academic administration. “We’re seeing a professionalization of higher-education administration—and that’s not such a bad thing. Because the faculty position itself has changed and because we have an accountability culture in higher education, you need people who have managerial training to serve as chair.
The article can be found here:
The School of Computer Science and Communication at KTH Royal Institute of Technology invites applications for an assistant professorship in theoretical computer science.
This is an article written for The Seattle Times by Edward D. Lazowska, an alumnus of McMaster University; here is one excerpt, and see below for the rest of the article:
… nationwide there is a well-documented shortage of graduates in computer science. The Bureau of Labor Statistics projects that 70 percent of all new jobs across all STEM fields during this decade, across engineering, the physical sciences, the life sciences, and the social sciences, will be in computer science. More than three-quarters of a million new jobs. The field is booming.