Skip to main content

Computers & Technology

Featuring two television programs popular in the 1980's and 1990's: Computer Chronicles and Net Café, this library showcases videos about computing and technology. Collection topics include BBS, the Open Source movement, and Internet governance.

Many of these movies are available for free download.


More right-solid
More right-solid
More right-solid
SHOW DETAILS
up-solid down-solid
eye
Title
Date Reviewed
Creator
The end of Microsoft Messenger, Amazon delivers to Staples, an orchestra of printers perform a Bob Dylan classic, and Donald Trump has a Twitter meltdown.
( 1 reviews )
Topics: revision3, rev3, geekbeattv, GeekBeat.TV, John Pozadzides
Hak5 Show
May 27, 2018 Revision 3
movies
eye 64
favorite 0
comment 1
We head out to DC for Shmoocon, our favorite hacker conference on the east coast, to talk to some of the brightest minds in security. Dave Kenedy on his project FastTrack. Michael Ossmann about sniffing bluetooth. Joshua Abraham on his software GIS-Kismet. Mister X, author of Aircrack-ng and Johnny Long, author and security guru on Hackers for Charity.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: hak5, revision3, rev3, Darren Kitchen, Shannon Morse, Matt Lestock, Dave Kenedy, Michael Ossmann,...
Microsoft Research Video
movies
eye 74
favorite 2
comment 1
Human beings are information carnivores: we are constantly collecting, labeling, and organizing data-yet our previous 'systems' cannot keep up with the levels of information we now receive. The Dewey Decimal system is stretched beyond the breaking point, Rand McNally is obsolete, and the shift to online digital music stands as the model for the future in virtually any industry. In order to embrace the new 'miscellaneous' world, we need to understand some basic tenets: There is no such thing as...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Microsoft Research, Microsoft Research Video Archive, Kim Ricketts and Kirsten Wiley, David...
Microsoft Research Video
Jan 10, 2016 Microsoft Research
movies
eye 126
favorite 0
comment 1
We live in a world of great and increasing complexity, where even the most expert professionals struggle to master the tasks they face. Longer training, more advanced technologies: neither seems to prevent grievous errors. There is a remedy in the most humble and simple of all techniques: the checklist. We can identify successful people in many fields who turn to checklists to pull off some of the most difficult tasks, and places where the impact of the checklist is huge:-in the complex world...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Microsoft Research, Microsoft Research Video Archive, Kirsten Wiley, Atul Gawande
Microsoft Research Video
movies
eye 298
favorite 0
comment 1
Levy processes are random measures that give independent mass to independent increments. I will show how they can be used to model various types of data such as binary vectors or vectors of counts, with applications to text and images. These techniques fall in the category of nonparametric Bayesian methods, and are related to the better known Dirichlet process. ©2008 Microsoft Corporation. All rights reserved.
( 1 reviews )
Topics: Microsoft Research, Microsoft Research Video Archive, Emre Kiciman, Romain Thibaux
We get a pro race car driver's opinion on Gran Turismo 5. We also show you some hot Sony gear for the holiday season.
Topics: revision3, rev3, sgnlbysony, Anthony Carboni, Melody Akhtari, Tony Brakohiapa
Are you craving some Windows 7 goodness in a slate? Samsung is going to answer your cravings with its new Series 7 Slate.
Topics: revision3, rev3, technobuffalo, Jon Quach, Jon Rettinger
In today's episode, Jon R talks about his futuristic (but not-so-quiet) blue Dyson fan. He also shares his thoughts about the new feature-packed Asus Eee Pad Transformer Prime tablet / imitation laptop, as well as the HTC Rezound vs. the Droid Razr. Jon concludes the show with some insight into hateful comments and the ideas of fanboyism.
Topics: revision3, rev3, technobuffalo, Jon Quach, Jon Rettinger
Revision 3: Soldier Knows Best
movies
eye 11
favorite 0
comment 0
In this video, I review the new Sony PS Vita. Is it worth the hype? Watch and find out!
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 6
favorite 0
comment 0
In this video, I explain why I think most consumers think the PS4 is better over the Xbox One.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 13
favorite 0
comment 0
In this episode, I cover some of the upcoming products and services that Google is releasing soon and what things you should be looking forward to.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 21
favorite 0
comment 0
SoldierKnowsBest reviews the big and powerful LG Optimus G Pro for AT&T!
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 33
favorite 0
comment 0
HTC One M8 Review
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 7
favorite 0
comment 0
In this episode, I show you the Arrows Waterproof Tablet and cellphone.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 18
favorite 0
comment 0
ere's my review of the new Moto G. At $179, is it a good buy? Watch my review and find out!
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 5
favorite 0
comment 0
In this video, I give you a quick tour of the new changes to YouTube.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
In this episode, I take a look the new solar powered Eton Ruckus Sound System.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
APPJUDGMENT (Revision 3)
movies
eye 22
favorite 0
comment 0
This free widget lets you take control of your Android layout without adding additional screens or home replacements.
Topics: revision3, rev3, appjudgment, Anthony Carboni
Revision 3: Technobuffalo
movies
eye 6
favorite 0
comment 0
The VAIO Tap 20 is a totally unique product. It's half a Windows 8 desktop computer and half a portable laptop. But how portable is 20-inches for a tablet really? Not at all, I'd wager.
Topics: revision3, rev3, technobuffalo, Jon Quach, Jon Rettinger
Panel discussion at day 1 of the 2010 Microsoft Research Asia Faculty Summit held in Shanghai, China. Session chair: Tony Hey, Corporate Vice-President, Microsoft Research ©2010 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive
Revision 3: Soldier Knows Best
movies
eye 11
favorite 0
comment 0
Here is some of the latest news and rumors about upcoming products from Apple!
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Revision 3: Soldier Knows Best
movies
eye 4
favorite 0
comment 0
In this video, I talk about the verdict in the Apple versus Samsung case and give you my opinion on the matter.
Topics: revision3, rev3, soldierknowsbest, Mark Watson
Researchers from the University of Washington (UW) and Microsoft Research Connections (MRC) are working together to develop a non-invasive, technological solution that promises to improve both the health and overall quality of life for diabetics: a contact lens that monitors blood glucose levels. This innovative solution represents a trend in technology, the Natural User Interface (NUI). ©2011 Microsoft Corporation. All rights reserved. Learn more Functional Lens Promises to Improve the...
Topics: Microsoft Research, Microsoft Research Video Archive
I'll talk about two projects I worked on this summer at MSR. The first project was to find local dynamics that lead to balanced outcomes in exchange networks, an equilibrium concept that combines notions of stability and fairness. I'll present a distributed algorithm that computes a balanced outcome on bipartite graphs that builds on the auction algorithm for the assignment problem. The second project was to find local dynamics that lead to equilibrium in the Linear Fisher Market. I'll describe...
Topics: Microsoft Research, Microsoft Research Video Archive, David Wilson, Ben Birnbaum
In kidney exchanges, patients with kidney disease can obtain compatible donors by swapping their own willing but incompatible donors. The clearing problem involves finding a social welfare maximizing set of non-overlapping short cycles. We proved this NP-hard. It was one of the main obstacles to a national kidney exchange. We presented the first algorithm capable of clearing these exchanges optimally on a nationwide scale. The key was incremental problem formulation. We adapted two paradigms...
Topics: Microsoft Research, Microsoft Research Video Archive, Eric Horvitz, Tuomas Sandholm
There is a future of medicine where a brain surgeon in Stockholm will remove a brain tumor from a patient in Brazil, using remote robotic surgical hands. The hospitals of the future will have smart alarms that alert a doctor immediately that his patient, in room 246, has a abnormally low blood pressure—before a nurse or pager could do so. There will be thought controlled wheelchairs steered by brainwaves, man- made organs, human hibernation and tiny molecular machines that hunt and kill...
Topics: Microsoft Research, Microsoft Research Video Archive, Kim Ricketts and Kirsten Wiley, William Hanson
Outliers is a book about success. It starts with a very simple question: what is the difference between those who do something special with their lives and everyone else? In Outliers we’re going to visit a genius who lives on a horse farm in Northern Missouri. We’re going to examine the bizarre histories of professional hockey players and look into the peculiar childhood of Bill Gates and spend time in a Chinese rice paddy. We will investigate the world’s greatest law firm and wonder...
Topics: Microsoft Research, Microsoft Research Video Archive, Kim Ricketts and Kirsten Wiley, Malcolm...
Over the last decade, design of enterprise wireless networks have gone through a radical shift. While initial wisdom pointed to a completely distributed design, increasingly more and more functions are getting aggregated into a centralized architecture. In our recent work, we have focused on four interesting aspects of designing robust enterprise wireless networks: (i) a systems approach to mitigating some of the most challenging scenarios in these wireless environments, — hidden and exposed...
Topics: Microsoft Research, Microsoft Research Video Archive, Jin Li, Suman Banerjee
In all sound program analysis systems there is some mechanism for modeling non-deterministic choice, which is typically used to correctly capture effects of the program's environment (Did malloc return a valid pointer or null? Which thread did the scheduler pick?) and imprecision in the analysis (Which element was read by the array reference? Is a certain key in the hash map?). In constraint-based analyses it is common to model such decisions as an unconstrained variable ranging over the...
Topics: Microsoft Research, Microsoft Research Video Archive, Tom Ball, Isil Dillig, Thomas Dillig
A large percentage of recent security problems, such as Cross-site Scripting or SQL injection, is caused by string-based code injection vulnerabilities. Most of these vulnerabilities exist because of implicit code creation through string serialization. Based on an analysis of the vulnerability class’ underlying mechanisms, we propose a general approach to out?t modern programming languages with mandatory means for explicit and secure code generation which provide strict separation between...
Topics: Microsoft Research, Microsoft Research Video Archive, Helen Wang, Martin Johns
Lifelogging is a term used to describe recording different aspects of your daily life, in digital form, for your own exclusive personal use. It is a form of reverse surveillance, sometimes termed sousveillance, referring to us - the subjects - doing the watching, of ourselves. In today's healthcare world where we react to conditions that have already developed, lifelogging technologies may offer a glimpse into a future world of proactive healthcare where symptoms of conditions are detected at...
Topics: Microsoft Research, Microsoft Research Video Archive, Mike Sinclair, Aiden Doherty
Consider the problem of visually finding an object in a mostly unknown space witha mobile robot. It is clear that all possible views and images cannot be examinedin a practical system. Visual attention is a complex phenomenon; we view it asa mechanism that optimizes the search processes inherent in vision. Here, we describea particular example of a practical robotic vision system that employs someof these attentive processes. We cast this as an optimization problem, i.e., optimizingthe...
Topics: Microsoft Research, Microsoft Research Video Archive, Zhengyou Zhang, John K. Tsotsos
Microsoft Research Video
movies
eye 45
favorite 0
comment 0
This talk describes two projects in the area of computational photography that I have recently worked on in collaboration with Microsoft Research and Virtual Earth.First, I will present a novel method for browsing, enhancing, and manipulating outdoor photographs by combining them with existing georeferenced digital terrain and urban models. A simple interactive registration process is used to align photographs with models. Once the photograph and the model have been registered, and abundance of...
Topics: Microsoft Research, Microsoft Research Video Archive, Michael Cohen, Johannes Peter Kopf
Microsoft Research Video
movies
eye 36
favorite 0
comment 0
Anonymous credential systems allow users to anonymously obtain credentials from organizations, and to anonymously and unlinkably prove possesion of valid credentials. Often in practice, however, a user authenticates using some credential chain: a root organization gives a credential to an intermediate party who can in turn use this to issue credentials to user.We address this problem by presenting the first efficient delegatable anonymous credential scheme. In such a scheme, a party can receive...
Topics: Microsoft Research, Microsoft Research Video Archive, Kristin Lauter, Melissa Chase
In this talk I'll draw on work from my visit to Microsoft Cambridge earlier this year, in collaboration with the SDS group. The paper is a report of the results of a long-term, multi-site field trial of a situated awareness device for families called the 'Whereabouts Clock'. The Clock displayed family members' current location as one of four privacy-preserving, deliberately coarse-grained categories (HOME, WORK, SCHOOL or ELSEWHERE). In use, the Clock supported not only family co-ordination but...
Topics: Microsoft Research, Microsoft Research Video Archive, A.J. Brush, Barry Brown
Recent years have seen a significant surge in the interest and use of virtualization, driven by better hardware support, increasing power costs and low resource utilizations. While virtualization has many applications — for instance, to support legacy software, to improve fault containment and to provide strong resource guarantees — by far the most common is server consolidation. By aggregating multiple services on a single physical machine, organizations can reduce costs and increase the...
Topics: Microsoft Research, Microsoft Research Video Archive, John (JD) Douceur, Diwaker Gupta
In Play Between Worlds, T. L. Taylor examines multiplayer gaming life as it is lived on the borders, in the gaps--as players slip in and out of complex social networks that cross online and offline space. Taylor questions the common assumption that playing computer games is an isolating and alienating activity indulged in by solitary teenage boys. Massively multiplayer online games (MMOGs), in which thousands of players participate in a virtual game world in real time, are in fact actively...
Topics: Microsoft Research, Microsoft Research Video Archive, Tamara Pesik, T. L. Taylor
We consider a basestation transmitting data to a set of mobile users. At each time step the basestation receives information about the channel conditions to each user. These channel conditions are time-varying and user-dependent. The job of the scheduler is to pick a user to serve. In recent years this problem has received a great deal of attention. In the first part of the talk we give an overview of some specific models that arise from 3rd generation wireless standards. We summarize some of...
Topics: Microsoft Research, Microsoft Research Video Archive, Sudipta Sengupta, Lisa Zhang
Microsoft Research Video
movies
eye 15
favorite 0
comment 0
In the often male dominated world of computers, Rebecca Norlander has made a name for herself by taking on big challenges, and proving she has what it takes to deliver results. Join us to learn how Rebecca got her start at Microsoft, advancing through roles where she had tremendous impact on Excel, Internet Explorer, Windows XP SP2, Windows Vista Security, and now as Technical Strategist to Chief Software Architect, Ray Ozzie. Rebecca will share with us her insights around the obstacles she has...
Topics: Microsoft Research, Microsoft Research Video Archive, Jennifer Sisti, Rebecca Norlander
Experience the latest technology in research areas such as surface computing, augmented cognition and visualization and get a glimpse into future computing scenarios. Discover how Microsoft Research is shaping Microsoft® products and the world by pushing the state of the art of computing. Hear prominent Microsoft researchers discuss their work and the problems they are working to solve. ©2006 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive, Kevin Schofield, Dan Ling
An evolutionarily stable strategy (ESS) is an equilibrium strategy that is immune to invasions by rare alternative ('mutant') strategies. Unlike Nash equilibria, ESS do not always exist in finite games. In this paper, we address the question of what happens when the size of the game increases: does an ESS exist for 'almost every large' game? Letting the entries in the n x n game matrix be randomly chosen according to an underlying distribution F, we study the number of ESS with support of size...
Topics: Microsoft Research, Microsoft Research Video Archive, Yuval Peres, Sergiu Hart
Bilingual word alignment, the task of finding word-to-word connections between a sentence and its translation, is an important part of knowledge acquisition for statistical machine translation. An Inversion Transduction Grammar, or ITG, provides an efficient algorithm to align a bilingual sentence pair, by simultaneously parsing the two sentences. However, the simple bracketing grammar usually employed in ITG parsing has no linguistic content. We investigate two methods to inform the ITG parser...
Topics: Microsoft Research, Microsoft Research Video Archive, Chris Quirk, Colin Cherry
High-resolution X-ray computed tomography (HRXCT) provides highly detailed three-dimensional data on the exterior form and interior structure of solid objects. The data produced by the UTCT Lab facility at the University of Texas at Austin are HRXCT scans of various biological organisms, ranging from dinosaurs to mice and geological objects including meteorites and deep sea cores. The Digital Library of Vertebrate Morphology (or Digimorph Project) has for the last eight years acquired and...
Topics: Microsoft Research, Microsoft Research Video Archive, Dan Fay, Julian Humphries
This talk will be a survey of some recent developments in average-case analysis of algorithms for combinatorial problems. I will focus on random distributions which seem to yield computationally challenging problems and where to find the 'easiest hard problems' and the 'hardest easy problems'. As a detailed example, I will describe the modular subset sum problem, where you are given n numbers, a modulus M, and a target number T, and the goal is to find a subset of the numbers which sum to T...
Topics: Microsoft Research, Microsoft Research Video Archive, Jennifer Chayes / Christian Borgs, Abraham...
There have been many graph-based approaches for semi-supervised classification. One problem is that of hyperparameter learning: performance depends greatly on the hyperparameters of the similarity graph, transformation of the graph Laplacian and the noise model. We present a Bayesian framework for learning hyperparameters for graph-based semi-supervised classification. Given some labeled data, which can contain inaccurate labels, we pose the semi-supervised classification as an inference...
Topics: Microsoft Research, Microsoft Research Video Archive, Eric Horvitz, Ashish Kapoor
As sensor networks become more and more ubiquitous, engineers face the challenge of making the sensor data accessible to the common person. For example, a building manager might want to be alerted to excess building activity over the weekends, or a safety engineer might want a histogram of vehicle speeds in the parking garage. However, most users don’t want to translate raw sensor data into building activity or vehicle speeds, nor do they want to learn how to write efficient distributed...
Topics: Microsoft Research, Microsoft Research Video Archive, Feng Zhao, Kamin Whitehouse
Clustering is one of the most common data mining tasks, used frequently for data categorization and analysis in both industry and academia. The focus of our research is on semi-supervised clustering, where we study how prior knowledge can be incorporated into clustering algorithms. We present probabilistic models for semi-supervised clustering, develop algorithms based on these models and empirically validate their performances by extensive experiments on datasets from different domains (e.g.,...
Topics: Microsoft Research, Microsoft Research Video Archive, Eric Brill, Sugato Basu
Keeping up with changing requirements, designs, and specifications requires software developers to continuously modify the existing software code base. Many conceptually simple modifications can have far-reaching effects, causing the editing process to become tedious and error-prone. For example, a change to the argument signature of a widely used function might require a systematic modification of all calls to that function to add, remove, or combine argument expressions. Although certain...
Topics: Microsoft Research, Microsoft Research Video Archive, Rob DeLine, Marat Boshernitsan
Microsoft Research Video
movies
eye 29
favorite 0
comment 0
Over the last 200 years, technology has transformed nearly every other industry across the globe except for one: our schools. They function largely as they always have – with one expert delivering instruction to a class of 25-35 students at a time. In 1983, the National Commission on Educational Excellence Released A Nation At Risk, a report that sounded a national alarm bell to improve our nation’s schools. Since then, we have increased per pupil expense, reduced class size, spent billions...
Topics: Microsoft Research, Microsoft Research Video Archive, Mike Zyskowski, Joel Rose
This talk presents feedback-driven adaptive algorithms for efficient scheduling of parallel jobs on multiprogrammed multiprocessors. Multiprocessor scheduling is often structured in two levels, where a kernel-level OS allocator allots processors to jobs and a user-level task scheduler schedules the ready tasks of a job on the allotted processors. In the context of adaptive scheduling, the demand of a parallel job may scale up and down. Therefore, the number of processors allotted to a...
Topics: Microsoft Research, Microsoft Research Video Archive, Jim Larus, Yuxiong He
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the rapid and widespread adoption of CSMA technology, a critical question is that whether CSMA networks can...
Topics: Microsoft Research, Microsoft Research Video Archive, Jin Li, Minghua Chen
We study random walks on the uniform spanning tree (UST) on Z 2 . We obtain estimates for the transition probabilities of the random walk, the distance of the walk from its starting point after n steps, and exit times of both Euclidean balls and balls in the intrinsic graph metric. In particular, we prove that the spectral dimension of the uniform spanning tree on Z 2 is 16/13 almost surely. In order to prove these results, we use the work of Barlow, Jarai, Kumagai, Misumi and Slade on random...
Topics: Microsoft Research, Microsoft Research Video Archive, Yuval Peres, Robert Masson
Microsoft Research Video
movies
eye 28
favorite 1
comment 0
When systems rely on a "human in the loop" to carry out a security-critical function, cyber trust indicators are often employed to communicate when and how to perform that function. Cyber trust indicators typically serve as warnings or status indicators that communicate information, remind users of information previously communicated, and influence user behavior. They include a variety of security- and privacy-related symbols in the operating system status bar or browser chrome,...
Topics: Microsoft Research, Microsoft Research Video Archive, MSR & Trust User eXperience (TUX), Lorrie...
Does evolutionary selection operate on groups as well as individuals? Why are exchanges often fair when they could be exploitative? Why are there stable societies at all? These are classic questions of evolution and sociology, and are often answered by recourse to psychological properties (e.g., fear of retribution), genetic statistics (e.g., kin selection), or the properties of specific behaviors (e.g., hunting in packs). We show that these properties of social species may be accounted for by...
Topics: Microsoft Research, Microsoft Research Video Archive, Ashish Kapoor, Ankur Mani
Microsoft Research Video
movies
eye 27
favorite 0
comment 0
The Satisfiability problem (SAT) is the problem of assigning a value to a vector x in 0,1ⁿ of boolean variables so that the falue of a function F(x)=∏ i=1 m C i (x c i )=1. Each c i is a subset of x and each function C i takes the value 1 everywhere but on a single point, where it takes the value 0. Recently, an algorithm called Survey Propagation has been proposed which, along with a decimation procedure, can solve random instances of SAT that are known to be difficult for other...
Topics: Microsoft Research, Microsoft Research Video Archive, jwinn, Jeremy Thorpe
Plenary session at day 1 of the 2010 Microsoft Research Asia Faculty Summit held in Shanghai, China. Presenter: Wei-Ying Ma, Assistant Managing Director, Microsoft Research Asia ©2010 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive
We consider a seller who wishes to sell K goods by time T. Potential buyers enter IIDover time and are patient. At any point in time, profit is maximized by awarding the goodto the agent with the highest valuation exceeding a cutoffs. These cutoffs are characterizedby a one-period-look-ahead rule and are deterministic, depending only on the number ofunits left and the time remaining. The cutoffs decrease over time and in the inventory size,with the hazard rate of sales increasing as the...
Topics: Microsoft Research, Microsoft Research Video Archive, Jennifer Chayes, Andzej Skrzypacz
As a community, storage systems practitioners are just beginning to scratch the surface with regard to leveraging all that erasure codes have to offer. The higher RAID levels (4-6, 10 and 01) use very limited erasure codes to protect systems from small numbers of failures. More advanced systems are being built to satisfy the goals of large-scale storage, archival storage and widescale data distribution, and these systems make use of erasure codes that are far richer than those required by RAID....
Topics: Microsoft Research, Microsoft Research Video Archive, Cheng Huang, Jim Plank
Modern software is fraught with bugs that allow hackers to overtake and control computing systems. The current approach to dealing with these attacks invites the criminal hacker into the software design cycle, resulting in great losses to customers and developers. In this talk, I'll focus on a better approach to building secure software that leverages security vulnerability analysis to find the bugs that hackers love, long before they can be exploited. This approach to secure software...
Topics: Microsoft Research, Microsoft Research Video Archive, Ben Zorn, Todd Austin
Microsoft Research Video
movies
eye 20
favorite 0
comment 0
Microsoft Research Senior Program Manager Michael Zyskowski demonstrates how this add-in for Microsoft Excel gives scientists and researchers the ability to study genomic intervals and create Venn diagrams in support of publicating results. ©2010 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive, Mike Zyskowski
Traditional signal processing approaches are often built on well-known assumptions such as linearity, time-invariance, and incoherence among the signals involved. In reality, many of these assumptions are violated in physical systems built for challenging environments and therefore, conventional techniques fail to solve signal processing issues effectively in real-world systems. Examples of such problems include interference mitigation in the presence of amplifier saturation, tracking the...
Topics: Microsoft Research, Microsoft Research Video Archive, Rob Fatland, Ananya Sen Gupta
What passes for negotiation in most of the world – threats, power plays, walking out, invoking alternatives, win-wins, good cop/bad cop techniques, actually invoke resentment and retaliation, from terrorism to malicious obedience in the workplace to the kid who is kicking and screaming on the floor. As the daily news is filled with conflict, a new model of human interaction is needed. Getting More says that emotions and perceptions are more important than power and logic. Finding, valuing and...
Topics: Microsoft Research, Microsoft Research Video Archive, Kirsten Wiley, Stuart Diamond
The goal of component-based synthesis is to build a system from components. The nature of this generic problem changes as we concretize what is a component and what constitutes a composition. In this talk, we will focus on two different incarnations of component-based synthesis, and we will present approaches for solving them. The first instantiation concerns synthesizing the logic for switching between modes of a multi-mode dynamical system so as to achieve some safety and liveness guarantees....
Topics: Microsoft Research, Microsoft Research Video Archive, Sumit Gulwani, RiSE, Ashish Tiwari
There is wide acceptance that models which seek to represent biological or environmental processes should be evaluated before they are applied. Numerous technical methods have evolved in order to address this requirement. Literature in this area is further supplemented by more philosophical discussions on the role of model evaluation/validation given that models are (nearly always) known to be approximate at best. While mechanistic models tend to be detailed, they are less detailed than the...
Topics: Microsoft Research, Microsoft Research Video Archive, Matthew Smith, Neil Crout
Microsoft Research Video
movies
eye 67
favorite 0
comment 0
This video showcases three application scenarios that have been enabled in the urban computing project. 1) Finding smart driving direction based on taxi trajectories; 2) A passenger-cabbie recommender system; 3) Glean the flawed urban planning in terms of people's city-wide mobility patterns learned from taxi trajectories. Contact: Yu Zheng, Researcher at Microsoft Research Asia, yuzheng@microsoft.com ©2011 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive
Microsoft Research Video
movies
eye 35
favorite 0
comment 0
Summer interns squared off in a Windows Phone application contest, and they had their own set of tough judges to deal with—some of the company's top executives. Given only 2 months to complete this, and it could only be worked on in their spare time, and it could not have anything to do with projects they were already a part of, they had their work cut out for them. The contestants were Gary Roumanis (8 Tracks), Shreyas Thiagarajasubramanian (Breadcrumbs), Roberto Sonnino (Hands Free Cook),...
Topics: Microsoft Research, Microsoft Research Video Archive
Microsoft Research Video
movies
eye 14
favorite 0
comment 0
Today's college students have constant access to information and communication technologies. Yet we know very little about how students are incorporating digital media into their everyday lives. Recent innovations are making lots of opportunities available to students, but there exists little systematic analysis of young people's actual online behavior. This presentation will look at the types of sites and online services that a diverse group of college students (mostly first-years) are using...
Topics: Microsoft Research, Microsoft Research Video Archive, Marc Smith, Eszter Hargittai
Array of microphone structures are capable of processing acoustic signals to extract useful spatial information of three-dimensional surroundings, and are important in a plethora of applications such as beamforming, direction of arrival estimation, and spatial sound field recording. This talk first shows why the spherical harmonic analysis is the ideal tool to use in these applications. Then we review the theory of spherical microphone arrays. The spherical array of microphones is suited in...
Topics: Microsoft Research, Microsoft Research Video Archive, Ivan Tashev, Thushara Abhayapala, Aastha Gupta
Microsoft Research Video
movies
eye 52
favorite 0
comment 0
Occasionally the office of the CTO, David Vaskevitch, sits down with some of Microsoft’s most influential technical employees to capture their stories. Instead of examining specific technologies, BTC takes a closer look at the person, the career and what it takes to produce world-class software. ©2006 Microsoft Corporation. All rights reserved.
Topics: Microsoft Research, Microsoft Research Video Archive, Jennifer Sisti, Tony Williams
We present a novel framework for defining memory models in terms of two properties: thread-local Instruction Reordering axioms and Store Atomicity (SA), which describes inter-thread communication via memory. SA guarantees serializability, that is, a unique global interleaving of all operations which respects the reordering rules. It is the SA property that is enforced by cache coherence protocols. Our framework uses partially ordered execution graphs; one graph represents many instruction...
Topics: Microsoft Research, Microsoft Research Video Archive, Shaz Qadeer, Arvind
Imagine an automatic news filtering system that tracks company news. Given the news item 'FDA approves ciprofloxacin for victims of anthrax inhalation', how can the system know that the drug mentioned is an antibiotic produced by Bayer? Or consider an information professional searching for data on RFID technology - how can a computer understand that the item 'Wal-Mart supply chain goes real time' is relevant for the search? Algorithms we present can do just that. When humans approach text...
Topics: Microsoft Research, Microsoft Research Video Archive, Paul Viola, Evgeniy Gabrilovich
In April 2000, Gary Erickson, co-founder of Clif Bar, turned down a $60 million offer to buy his company. Now he’s working harder than ever, rather than enjoying a luxurious retirement on a tropical island. Why would any sane person make that decision? Erickson - competitive cyclist, jazz musician, world traveler, mountain climber, and wilderness guide (among other things) - explains how sustaining one’s employees, community, and environment are good for business, using concrete examples...
Topics: Microsoft Research, Microsoft Research Video Archive, Tamara Pesik, Gary Erickson
Werthimer will discuss the possibility of life in the universe and the search for radio signals from other civilizations. SETI@home analyzes data from the world’s largest radio telescope using desktop computers from five million volunteers in 226 countries. SETI@home participants have contributed two million years of computer time and have formed Earth’s most powerful supercomputer. Users have the small but captivating possibility their computer will detect the first signal from a...
Topics: Microsoft Research, Microsoft Research Video Archive, Dan Fay, Dan Werthimer
The factors that harm the speech recognition results for un-tethered users are the ambient noise and the reverberation. While we have pretty sophisticated noise suppression algorithms, the de-reverberation is still an unsolved problem due to the difficulties in estimation and keeping track of the changes in the room response model. Sound capturing with microphone arrays provides partial de-reverberation and ambient noise reduction due to the better directivity. This improves the speech...
Topics: Microsoft Research, Microsoft Research Video Archive, Ivan Tashev, Daniel J. Allred
The purpose of the seminar is to describe the StarSs programming model, the status of the different implementations and why we consider that it provides a global solution to the challenges raised by future processor and system architectures. StarSs is a task-based programming model where the user annotates with directives an otherwise standard sequential code that is then automatically parallelized by the run time infrastructure. The underlying execution model is a medium-grain data-flow that...
Topics: Microsoft Research, Microsoft Research Video Archive, Juan Vargas, Jesus Labarta