Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Mihalo, William
Northwestern University
Evanston, Illinois
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

William E. Mihalo is a senior high-performance computing systems engineer with the Academic and Research Technologies group within Northwestern University's Information Technologies division.

He graduated with a doctorate in sociology from Bowling Green State University in the late 1970s. His specialties were social organization and demography. His computer programming background started by taking an elective programming course as an undergraduate, and continued with additional programming classes as a graduate student. In 1974, he started work on his doctorate and provided programming support for the Professional Development Project at Bowling Green State University.

He joined Indiana University Northwest (IUN) in 1977 as a visiting assistant professor of sociology. In 1978, he became a tenure-track assistant professor of sociology at IUN. During this time, he developed skills using IBM and CDC mainframes and also using the newly introduced Apple II computer.

After teaching sociology courses for about five years, he realized that supporting large, complex computer clusters was much easier than trying to understand the complexities associated with human societies.

He joined Vogelback Computing Center at Northwestern University in 1981, and specialized in providing support for statistical analysis. He also worked on a number of computer graphics projects and helped users debug software programs.

He joined Purdue University Calumet in 1985 and provided the background information that was obtained from the user community to justify the purchase of Purdue Calumet's VAX computer cluster in 1986.

In 1987, he joined Loyola University Medical Center where he started as a manager of academic computing and spent 16 years as a computer systems manager for radiation oncology. At Loyola, he specialized in providing support for highly available computing clusters running within a Windows and Unix environment. He also introduced the radiation oncology department to a storage area network and provided support for high-performance Unix workstations that did 3D treatment planning for radiation oncology patients. He also provided software support for the computers associated with the Varian 23 EX linear accelerators that were located at Loyola University Medical Center and Hines Veterans Administration Hospital.

In 2006, he joined the University of Chicago and Argonne National Laboratory as a systems administrator. At the University of Chicago and Argonne National Laboratory, he provided support for the National Microbial Pathogen Data Resource (NMPDR), Globusonline, Globus toolkit, TeraGrid, and the Transportation Research and Analysis Computing Center (TRACC) projects. Within this environment, he specialized in supporting computer clusters, grid computing, grid computing software, and working within a number of cloud environments.

He returned to Northwestern University in May 2011.

He has been a reviewer for Computing Reviews since 1983, specializing in reviews on the social effects of computing, computer graphics, privacy, and systems administration.

 
 
Options:
Date Reviewed  
 
1
- 5 of 5 reviews

   
   Multiscale event detection in social media
Dong X., Mavroeidis D., Calabrese F., Frossard P. Data Mining and Knowledge Discovery 29(5): 1374-1405, 2015.  Type: Article

How do you detect and analyze collective behavior? Behavioral scientists have pondered this problem for over a century....

Mar 7 2016  
   Combining human error verification and timing analysis: a case study on an infusion pump
Rukšėnas R., Curzon P., Blandford A., Back J. Formal Aspects of Computing 26(5): 1033-1076, 2014.  Type: Article

A poor design interface can contribute to major problems within a medical computing environment. The biggest problem is user error. This can range from treating the wrong patient to entering the wrong value into a medical device....

Jan 7 2015  
   Secret history: the story of cryptology
Bauer C., Chapman & Hall/CRC, Boca Raton, FL, 2013. 620 pp.  Type: Book (978-1-466561-86-1), Reviews: (2 of 2)

This is a fascinating book. Bauer begins with a brief discussion of ancient ciphers and then proceeds into chapter 2--a 50-page discussion on monalphabetic substitution ciphers (MASCs). Chapters 2 through 9 cover cryptography ...

Dec 30 2013  
   Hadoop operations
Sammer E., O’Reilly Media, Inc., Sebastopol, CA, 2012. 298 pp.  Type: Book (978-1-449327-05-7)

About ten years ago, there was a movement away from the expensive, dedicated storage area network (SAN) architectures that were available at the time, and toward more inexpensive storage systems using transmission control protocol/Inte...

Aug 14 2013  
   Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L.  SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012.  Type: Proceedings

This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...

Nov 21 2012  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy