Computer and Technology

In: Computers and Technology

Submitted By humanres
Words 37567
Pages 151
T HE P H .D. G RIND
A Ph.D. Student Memoir

Philip J. Guo
philip@pgbovine.net

Third Anniversary Reprint
with margin notes from the perspective of a first-year assistant professor

To read the original version without margin notes, visit:
http://www.pgbovine.net/PhD-memoir.htm

Current release: May 28, 2015
Original release: July 16, 2012

Copyright Philip J. Guo

To the unexpected.

Contents

Prologue

1

Year One: Downfall

5

Year Two: Inception

21

Year Three: Relapse

33

Intermission

45

Year Four: Reboot

53

Year Five: Production

69

Year Six: Endgame

85

Epilogue

99

Preface
This book chronicles my six years of working towards a Ph.D. in com-

These margin notes are

puter science at Stanford University from 2006 to 2012. A diverse

years after The Ph.D.

variety of people can benefit from reading it, including:

At this time, I have just

written in mid-2015, three
Grind was published.
finished my first year
as an assistant professor

• undergraduates who might be interested in pursuing a Ph.D.,
• current Ph.D. students who are seeking guidance or inspiration,

of computer science, so
these notes reflect my
current opinions as a
new faculty member.
To download a version
without these notes, visit

• professors who want to better understand Ph.D. students,
• employers who hire and manage people with Ph.D. degrees,
• professionals working in any creative or competitive field where
self-driven initiative is crucial,
• and educated adults (or precocious kids) who are curious about
how academic research is produced.
The Ph.D. Grind differs from existing Ph.D.-related writings due
to its unique format, timeliness, and tone:
Format – The Ph.D. Grind is a memoir for a general educated
audience, not a “how-to guide” for current Ph.D. students. Although
Ph.D. students…...

Similar Documents

Ethics in Computer Technology

...Mike Young Instructor: James Michael Hughes Ethics 13 December 2011 Ethics and Piracy “Ethics is everything … If you don’t have a strong moral standing, if you don’t have an ethical foundation, you just crumble” (Shays). Computer Information Systems is a job category that is projected to be growing through the next ten years according to the United States Bureau of Labor Statistics. Computer technology gives an IT (Information Technology) Professional access to computer software and other sensitive information and ethics could determine how an individual may deal with these items on a day to day basis. Should businesses and individual be allowed to pirate software? Pirating continues to be a topic of concern for the future of technology. According to dictionary.com ethics is “that branch of philosophy dealing with values relating to human conduct, with respect to the rightness and wrongness of certain actions and to the goodness and badness of the motives and ends of such actions” (Dictionary.com). “The more specific term “computer ethics” has been used to refer to applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks. “Computer ethics” also has been used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession” (Bynum...

Words: 1752 - Pages: 8

Computer Technology

... screen * Interlacing: writes to alternating lines to compensate for response rate on a CRT monitor I think that everything on this clip was very informative to monitor information and all the components on them. I learned the 2 types of monitors and how they run and how to configure your monitor to scale your screen to desired picture. I also learned you never take a monitor apart on or off because the stored charge inside the capacitors can kill you. I will use this information when I’m out looking to purchase a screen that will go with my tower by being able to purchase the compatible parts with it and be able to install it myself or on the job. Clip 1.11 Summary: In conclusion the video informs me about the 3 types of printers and some facts about each one. Also how to troubleshoot laser printers and be familiarized with interfaces on how to connect printers to computer by identifying the ports and connectors associated with the corresponding one. How to install a printer was also covered and how to possibly boost performance by knowing that spooling controls the process and performance. * Types Of Printers | * 6-step laser process | * Improving Performance | * Dot Matrix | * Problems with laser printer | * Spooling | * Inkjet | * Printer interfaces | * Queue | * Laser | * Install a printer | | Thermal Queue: Uses heat to force ink through nozzle Piezoelectric Technology: electrical charge that force ink through......

Words: 810 - Pages: 4

Computer Technology

...Chapter 1 The Problem and its Settings Background of the study As we move into the 21st century, technology has greatly improved and has become better. It is continuously growing and changing in many aspects until now. It makes the people’s life easier than the usual and is greatly helpful and useful especially to the students. Technology invented gadgets like computers and laptops that students can use in their studies. These gadgets changed how students learn, process and obtain new or old information. These can also use when it comes to finishing their task and completing their school works because students can freely visit many educational websites. Students can also play educational games, which can help them improve their critical thinking and problem-solving skills. However, technology has also negative effects like other things. Like computers, instead of using it for research purposes, students tend to use it for playing games like DOTA and Couter Strike. Students also use it for just viewing or signing in their social networking pages. Computer is a factor that distracts or steals away the attention or the focus of the students in their studies. Students abuse the power of technologies. Computer technology has positive and negative effects in the lifestyle of the students. Computer were invented to help students and not the be abused by the students which brings negative effects. But, majority of the results that were gathered presents that most students...

Words: 683 - Pages: 3

Computer Science and Technology

...TMC1254 Communication and Computer Network Semester 2 2013/2014 Switching 1 Learning Unit Objectives • Understand the concept of switching. • Understand and able to differentiate between different types of switching. 2 • How many connection per device? 3 Introduction • A network is a set of connected devices • How to connect them for communication? – Using mesh topology but wasteful – Used switching • Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices) 4 Switched network 3 Simple Switching Network 6 Taxonomy of switched networks 7 Circuit Switched Networks Three Phases Efficiency Delay 8 9 CIRCUIT-SWITCHED NETWORKS • consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM. 10 How circuit-switched network works? • Consist of three phases: 1. Setup phase: – When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed 2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down. – Circuit is terminated, de...

Words: 1432 - Pages: 6

Computer and Technology

...Exercise 2 Question 1 a) To lower the cost of of providing computing capability, time-sharing and multiprogramming made it possible for individuals and organizations to use ocmputer without owning one (such as in Internet Cafes, laborities in school, etc.). It also promotes the interactive sense of using computers. Some computer laboratories in schools as an instance. Because users share the system simultaneously, they have the opportunity to copy other user's file from the system. Once a user saves a file to his/her unit, other users of that group or connected system may also have an access to the file. Other users may change an information inside the file or even steal the file from the owner itself without the owner knowing it. They may also modify the files or programs that was saved or ran by the owner. Furthermore, some of the threats that the owner of a certain file may encounter is the data confidentiality. Without him not being aware of the system used as the time-sharing and multiprogramming, he may insert or have a secret or confidential data that he wants to remain at the file. Another one is the data integrity. Other users may change, add, or even remove some information in the file if he wants to.       Internet cafes also have a multiprogramming and time-sharing environment. Some internet cafes have hardwares like printers that is also connected with the system. State that a certain user is asking the attendant to...

Words: 719 - Pages: 3

Computer Technology

...Computer technology is advancing at a rapid rate, causing the diversity and availability of assistive technology computer resources to have a tremendous impact for special education students across the United States. Assistive technology provides an opportunity for students with physical, emotional, and mental disabilities to acquire universal access to tools and opportunities for learning. Despite studies showing the benefits of assistive technology, many school districts fail to achieve the fullest potential that assistive technology can offer. This paper will define assistive technology, identify several obstacles of effective implementation, and present various approaches to overcoming those obstacles.  Assistive technology is defined as "any item, piece of equipment, or product system, whether acquired commercially off the shelf, modified, or customized, that issued to increase, maintain, or improve functional capabilities of individuals with disabilities" (Individuals with Disabilities Education Act, 1997). “Is society too dependent on technology?” Tom thought to himself as he drove to Colorado. He was on a family trip to visit his parents. It was a long trip and he had never been there before so he decided to use his navigation system to get there. He typed in his destination and headed to Colorado. On the way, his four-year-old son threw a juice cup, which spilled all over the navigation system. He did not think he would need a map, and now his family and he are...

Words: 1746 - Pages: 7

Computer Technology

...Computer Technology Being a kid sitting around with your friends, there was always that one person this said, do you think this will ever happened? When I grow up all I will have to do will say door open to get in my house, everything else will be done for me. now, much to my surprise this day has now arrived. The arrival and utilization of computers in today's world is absolutely unbelievable. Things can be done with computers that could have never been done in the past. we have security systems that don't need keys, cell phones that could go on line, and receptionists are now virtually unknown due to automated voice systems. the question that everyone wants to know is, our we too dependent on computers, and what will happen when they fail us? this is an idea that nobody really likes to discuss. Going further in-depth with this idea, what have computers done to the business world. many people feel it has enhanced businesses of today's society, others feel it has ruined them. there now companies being run by very few workers due to fully automated systems, systems that need one operator a and it can produce more than that of 15 to 20 a lot of cases. what this does the company's is forces them to put new technological advances in their budget to keep up with competition and be more cost effective. This is exactly why the technology is there, to get one step ahead of the competition, and to produce more product, more often. Integrating computers into assembly...

Words: 1040 - Pages: 5

Evolution of Computer Technology

...Evolution of Computer Technology Catherine L. Dean 2142CMIS3106380 March 9, 2014 Table of Contents I. Introduction 3 II. Reduced Instruction Set Computing (RISC) 3 III. Pipelining 3 IV. Cache Memory 4 V. Virtual Memory 4 VI. Conclusion 5 VII. Works Cited 5 I. Introduction The purpose of this paper is to investigate the evolution of and current trends in improving system performance with respect to RISC, pipelining, cache memory, and virtual memory. II. Reduced Instruction Set Computing (RISC) Reduced Instruction Set Computing also known as RISC is a type of microprocessor architecture. It is a CPU design strategy. The purpose of RISC was for design simplification. It increases the number of executed instructions thus increasing the CPU performance. (Joy) The RISC design was first proposed and implemented in the 1960s and has been constantly evolving. Since the late 1980’s, RISC has been more than doubling its performance every year and half. The RISC industry, which includes IBM and Sun Microsystems, is ever expanding with the focus on the speed of executing instructions per second along with the evolution of the computer industry. (Joy) III. Pipelining One characteristic of RISC processors is pipelining. With pipelining, instructions are able to be executed in a shorter period of time. The first step in pipelining is to find the instructions, then read the registers, decode the instructions, execute the instruction, access the...

Words: 810 - Pages: 4

Computer Technology Essay

.... The windows 7 starter edition is only available in 32-bit version. 10. The maximum amount of system memory supported by windows 7 Enterprise is Maximum RAM (32-bit)- 4 GB Page 61 1. Windows Easy transfer supports two types of migrations, called Side by Side, and Wipe and Load. 2. When a serious problem occurs windows 7, you might be able to repair it by starting the windows PE operating system and running diagnostic tools, In this scenario, windows PE is called by another name, which is Windows RE( WINDOWS RECOVERY ENVIRONMENT), 3. To migrate use profile information from one computer to another, you can use either windows easy transfer- GUI, User State Migration tool (USMT) – Command line interface. 4. A computer running windows PE will automatically reboot after 72 hours. 5. Windows easy transfer supports migration using any removable storage medium common to the two computers except Floppy Disks. 6. The windows 7 component that enables the computer to support more than one language is called the MUI – (Multi-language user Interface) 7. The reason it is possible to remove the windows 7 installation disk to supply the setup program with drivers is that windows PE run on a RAM disk. 8. To upgrade windows xp to windows 7, you must perform a Clean Install. 9. The files and settings that windows easy transfer can migrate to a windows 7 computer and primarily stored in user profile folder. 10. As a preinstallation environment,......

Words: 516 - Pages: 3

Computer Technology

...Rhubes Severe Computer Technology Have you ever heard of the expression “necessary evil?” If it is evil, how can it be necessary? Well, there are some things that are necessary but not necessarily easy. People sometimes call “evil” the things that they find difficult or complicated. Thus, a “necessary evil” may be a thing that needs to be done for a greater good but that it may not be easy at first. The incursion of technology and computers in our everyday lives seems to be one of those “necessary evils” that we all have to deal with at one time or another. Today, technology is an integral part of schools in America. Teachers need to learn to use technology in the classroom in order to teach. Children become acquainted with technology in a safe learning environment with their teachers at school. Students are also expected to learn to use computers and interact with some educational software. The child’s homework often includes reports, research and or presentations using technology. Since children become some kind of experts with computers and interact with a variety of software at an early age, they see computers a little less challenging than an adult with little experience in computers. Technology has also made its place among the needful things to have at home. Parents often times feel the need to provide the technology that the child requires in order to do homework and to help the child study. That way, parents end up learning the technology first in order...

Words: 464 - Pages: 2

Computer Technology

... |5:00 |4hrs |D. 23 Implement individual/group sessions | | | | | |The group that I was with today went to the computer lab to watch a movie.| | | | | |The movie that was being play was Toy Story. Watching a movie as a group | | | | | |was working towards their social domain by having the participants make | | | | | |sure they were quiet and understanding boundaries and personal space of | | | | | |the other participants. At one point one participant tried to stretch out,| | | | | |but there wasn’t enough room for him to so; therefore, we I gave nonverbal| | | | | |ques to him for him to stay seated like everyone else and not to stretch | | | | | |out. | |11-10-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions...

Words: 2031 - Pages: 9

Computer Technology

...Computer  Networks   Applica3on  Layer   1   Examples  of  network  applica3ons   •  •  •  •  •  •  •  e-­‐mail   web   instant  messaging   remote  login   P2P  file  sharing   mul3-­‐user  network  games   streaming  stored  video  clips   •  social  networks   •  voice  over  IP   •  real-­‐3me  video   conferencing   •  grid  compu3ng   2   1 Crea3ng  a  network  app   write  programs  that   application transport network data link physical –  run  on  (different)  end  systems   –  communicate  over  network   –  e.g.,  web  server  soJware   communicates  with  browser   soJware   No  need  to  write  soJware  for   network-­‐core  devices   –  Network-­‐core  devices  do  not   run  user  applica3ons     –  applica3ons  on  end  systems     allows  for  rapid  app   development,  propaga3on   application transport network data link physical application transport network data link physical 3   Applica3on  architectures   •  Client-­‐server   –  Including  data  centers  /  cloud  compu3ng   •  Peer-­‐to-­‐peer  (P2P)   •  Hybrid  of  client-­‐server  and  P2P   4   2 Client-­‐server  architecture   server:     –  always-­‐on  host   –  permanent  IP  address   –  server  farms  for  scaling   clients:   client...

Words: 855 - Pages: 4

Computer Technology

...Computer Technology Since the beginning of time technology has helped us out as a human race. From the invention of the wheel to the Internet, technology has been a great factor on the way our civilization has grown. With more and more technological advances just around the corner, our civilization will continue to grow faster and faster than ever before. Computers make life easier for people every day. They help us to do tasks quicker and communicate with friends and family with the click on a button. Computers play a significant role in the school system as well. They help students to learn more efficiently and help them do their work. Computers offer the Internet which helps students research information for projects they may have. School computers also offer programs which can help anyone learn. An example of this is the program All the Right Type. This program helps students as well as teachers, to learn how to type faster and more efficiently. Also there are other programs which younger students can go on to help them with developing and reinforcing their math skills and reading skills. Programs like Math Circus and matching the word with the picture. Programs like these make it easy to understand and use computers, yet it also makes learning fun. Computers also make writing and doing homework easier to complete. With spell check and other spelling tools, it makes it easier and faster to complete work. This is because you are not spending all your time going through...

Words: 668 - Pages: 3

Computer and Technology

...Chapter 1 HW Name: DADHICHI PATEL MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) ________ analyzes the business situation and identify the need for information and information services to meet the problems or opportunities of the business. 1)_____C________ A) Database analysts B) Users C) Systems analysts D) Programmers TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 2) Database development projects are never done in a bottom-up fashion. 2) ____F___ 3) A well-structured database establishes the entities between relationships in order to derive the desired information. 3) ___F____ ESSAY. Write your answer in the space provided or on a separate sheet of paper. 4) Provide a brief overview of the various components of the database environment. TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 5) Database processing programs are coded and tested during the design stage of the systems development life cycle. 5) ____F___ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 6) Organizing the database in computer disk storage is done in the ________ phase. 6) ____C___ A) analysis B) design C) implementation D) maintenance 7) A workgroup database is stored on a central device called a(n): 7) ____C___ A) client. B) network. C) server. D) remote PC...

Words: 582 - Pages: 3

Computer Technology

...Final Project: Expository Essay Samantha A. Medina University of Phoenix Final Project: Expository Essay Computer technology has developed tremendously over the decades and centuries to become so modern in every aspect including education and personal leisure. It is breath taking to see how modernized out computer technology is today as opposed to the limited computer technology that was available in history. The changes that have occurred over history to today will be discussed and focused upon in this essay. The Mechanical Era: Early Computing Devices The Abacus The abacus was the first machine to be used computational science. It is considered to be the first computer. This machine was inspired by one of Charles Babbage’s designs. The abacus could process 15 digit numbers and calculate fourth-order differences. In 1885 the machine won gold medal at an exhibition in Paris and also helped calculate the orbit of mars! The abacus is still in use today. Imagine that a computing device from centuries ago still being used to this day! Charles Babbage Charles Babbage was an English mathematician, philosopher, inventor and mechanical engineer ("Charles Babbage", 2012). Babbage is known to have invented the first programmable computer. As stated earlier his design inspired the abacus and other complex designs. He won the Gold Medal of the Royal Astronomical Society for inventing an engine for calculating mathematical and astronomical tables. Babbage was also Lucasian...

Words: 1624 - Pages: 7