Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Bayard Kohlhepp
Nexus Technologies Inc
Fletcher, North Carolina

Bayard Kohlhepp received a BS degree in computer science from Millersville University, Millersville, PA, in 1981. He spent the next 20-plus years designing software, managing project teams, teaching Unix and C programming, and running data centers. Most of his time was spent creating distributed real-time embedded (DRE) systems. He culminated his "geek" career as VP of R&D for a point-of-sale hardware manufacturer, and then traded science for art to pursue new creative paths.

Bayard now resides in the Blue Ridge Mountains of North Carolina where he works as a professional photographer, music producer, video editor, and high school math and science teacher.


Read our Q&A with Bayard Kohlhepp here.


Mobile sensors and context-aware computing
Gajjar M.,  Morgan Kaufmann Publishers Inc., San Francisco, CA, 2017. 356 pp. Type: Book (978-0-128016-60-2)

I am disappointed in this book. I’m an engineer designing distributed Internet of Things (IoT) systems as well as a part-time college instructor, and I was hoping for a future-oriented discussion of the evolution of contextual computing. Whi...


SleepExplorer: a visualization tool to make sense of correlations between personal sleep data and contextual factors
Liang Z., Ploderer B., Liu W., Nagata Y., Bailey J., Kulik L., Li Y.  Personal and Ubiquitous Computing 20(6): 985-1000, 2016. Type: Article

For sleep researchers, this paper is interesting for two reasons. One, the authors have contributed a useful new tool called SleepExplorer that correlates multiple contextual measurements and even introduces a new structure for organizing sleep me...


Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “privacy information pr...


Improving resource efficiency at scale with Heracles
Lo D., Cheng L., Govindaraju R., Ranganathan P., Kozyrakis C.  ACM Transactions on Computer Systems 34(2): Article No. 6, 2016. Type: Article

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses real-time feedback and static modeling rules to ...


Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Schrittwieser S., Katzenbeisser S., Kinder J., Merzdovnik G., Weippl E.  ACM Computing Surveys 49(1): 1-37, 2016. Type: Article

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication has steadily increased since then. Commercial vendors obfuscate their software to block reverse en...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy