Browsing by Subject "Harvard University"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Biogeochemical patterns and processes in buoyant, deep-sea hydrothermal plumes(2011-08-11) Wendt, KathleenAlong the global mid-ocean ridge, sub-seafloor hydrothermal circulation results in the exchange of heat and chemical species between seawater and the ocean crust. The resulting thermally and geochemically altered fluids are vented at the seafloor. The mixing of cold, oxic deep-ocean waters with hydrothermal fluids creates plumes with physically and chemically dynamic features. Hydrothermal plumes represent a globally distributed interface where marine hydrothermal circulation exerts its biogeochemical influence on elemental budgets of ocean basins. The goal of the present study is to describe the microbiological niches created by physical and geochemical gradients in plumes. One of our central hypotheses is that microorganisms respond to and alter the geochemistry of hydrothermal plumes. To achieve this goal and test our hypothesis, a field study was undertaken at the Eastern Lau Spreading Center (ELSC). While multiple vent sites along the ELSC are included in the larger study, here we report on an integrated, biogeochemical investigation of a single buoyant plume within ABE vent field. A series of replicate sample sets were collected by in situ filtration at 0.5m, 40m, 200m within a buoyant plume using the ROV JASON. Above plume background and near bottom background sample sets were also collected. Hydrothermal plume particles in sample replicates or splits have been queried for bulk geochemistry, particle-by-particle mineralogy, and microbial community composition. These three data streams are being evaluated individually to characterize the geochemical and microbiological changes throughout the plume with respect to above and below plume backgrounds. In addition, an iterative and integrated analysis is being used to compare: (1) calculated mineralogy to direct measurements; and (2) predicted energy yields from chemoautotrophy to observed microbial composition.Item Oral history interview with Butler Lampson(Charles Babbage Institute, 2014-12-11) Lampson, ButlerTuring Award winning computer scientist Butler Lampson briefly discusses his education and work in time-sharing with Project Genie, the Cal Time-Sharing System (Cal Computer Center), and the Berkeley Computer Corporation (BCC), as well as his seminal work at Xerox PARC (systems and graphics work to create the office of the future—the ALTO and the basis for the Xerox STAR—the primary achievements that led to his receiving the Turing Award in 1992). The interview, part of an NSF-funded CBI effort to document computer security history, concentrates on Lampson’s many contributions to the computer security research field, and his broader perspectives on various aspects of computer security developments (including the economics of computer security). Lampson talks about his work to build a capability machine, and expresses that despite considerable interest from some research scientists, this is not a fruitful path for computer security. He explores the context to his important note on the confinement problem. He also discusses the context of his access matrix. Finally, he discusses his work at Digital Equipment Corporation (DEC) and Microsoft, including his work at DEC on distributed system security, and Microsoft’s Palladium Assurance stack. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Don Norman(Charles Babbage Institute, 2020-01-28) Norman, DonThis oral history, with one of Human Computer Interaction’s (HCI) and Cognitive Science’s foremost pioneers Don Norman, is part of a CBI project done for ACM SIGCHI. It briefly addresses Norman’s early life, before focusing on his graduate education and prolific career. This includes Norman’s discussion of his mentors and influences, career launch, leadership in Cognitive Science, and his intellectual and organizational contributions to HCI as field and ACM SIGCHI as an organization (the field and SIGCHI’s evolution). He recounts his leadership of UCSD’s Design Laboratory, his Chairing the UCSD Psychology Dept., educational philosophies, research management, and collaborations (with George Mandler, Danny Bobrow, and many others). He also touches upon his consulting, and his time working in industry (Apple, HP). Finally, the interview offers contexts on some of his principal publications, including his seminal book The Psychology of Everyday Things (POET), which along with his other scholarship developed and propelled forward a science of design.Item Oral history interview with Peter G. Neumann(Charles Babbage Institute, 2013-06-03) Neumann, Peter G.In this interview, computer security pioneer Peter G. Neumann relates his education at Harvard University (A.B. in Math, S.M. and Ph.D. in Applied Math), including an influential (to his perspective and career) two-hour long meeting/discussion as an undergraduate with Albert Einstein (discussing “complexity” and other topics). The vast majority of the interview addresses the many facets of his highly influential career in computer security research. With regard to the latter, this includes discussion of his work at Bell Labs and extensive involvement with MULTICS security, and his subsequent four-decade (and continuing) career as a research scientist at SRI International. He tells of his work and leadership with the Provably Secure Operating System (PSOS), research and writing on risks (including moderating the ACM Risks Forum), insider misuse and intrusion-detection systems (IDES, NIDES, EMERALD), and his current work on two DARPA-funded projects that builds on key lessons of the past to design and develop secure/trustworthy computer systems. He also relates the computer security research infrastructure and how it evolved, as well as comments on a number of other topics such as the major computer security conferences and the range of perspectives of researchers in the computer security research community. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”