Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Jones, Kipp
Georgia Institute of Technology
Atlanta, Georgia
 
   Featured Reviewer
   Reviewer Selected
Follow this Reviewer
 
 
 

Kipp Jones has been an avid computing enthusiast since his first introduction to a TRS-80 in a rural Nebraska junior high school. Not satisfied with the cassette tape interface, he quickly graduated to an Apple II+ on which he produced his first commercial software package at the age of 14. The Apple also inspired Kipp to help found an early user’s group, the Northwest Kansas Prairie Apples, in 1982. He has been serving various roles in the computing industry since that time.

Fast forward to today: Kipp is a founder and Chief Technology Officer of nuBridges, a growing software and services company providing fully-managed inter-enterprise eBusiness connections and communities. This role requires a broad and deep understanding of technology and its impacts on companies of all types.

Prior to nuBridges, Kipp was Vice President of Internet Services at Pathfire, a digital video management and content distribution company, where he led the efforts to build the core Internet distribution offering. Kipp has an entrepreneurial background, having served in critical roles in the early creation of companies including Harbinger Net Services, HomeCom, and DirectSight. Kipp has substantial experience with information exchange systems, and has written several papers in this area.

Kipp holds a B.S. in Computer Science from the University of Nebraska, and an M.S. in Computer Science from Georgia Tech, where he split his research time between physically realistic animation and Web research during the Web’s nascent years. He continues to be interested in a broad array of topics including B2B, distributed computing, semantic technologies, sensor networks, information quality, and cyberinfrastructure.

 
 
Options:
Date Reviewed  
 
1
- 6 of 6 reviews

   
   An approach to security and privacy of RFID system for supply chain
Gao X., Xiang Z., Wang H., Shen J., Huang J., Song S.  CEC-East ’04 (Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business,Sep 13-15, 2004) 164-168, 2004.  Type: Proceedings

The security and privacy issues that surround radio frequency identification (RFID) systems in practice are becoming ever more obvious, as the technology moves from the concept and pilot phase into full-scale production systems. While ...

Jun 22 2005  
   An approach to security and privacy of RFID system for supply chain
Gao X., Xiang Z., Wang H., Shen J., Huang J., Song S.  CEC-East ’04 (Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business,Sep 13-15, 2004) 164-168, 2004.  Type: Proceedings

The security and privacy issues that surround radio frequency identification (RFID) systems in practice are becoming ever more obvious, as the technology moves from the concept and pilot phase into full-scale production systems. While ...

Jun 22 2005  
   Pervasive computing goes the last 100 feet with RFID systems
Stanford V. IEEE Pervasive Computing 2(2): 9-14, 2003.  Type: Article

Radio frequency identification (RFID) is one element of ubiquitous computing. It is also a highly publicized technology, receiving an unprecedented amount of attention from research, business, and privacy watch groups. The capabilities...

Apr 12 2005  
   A ReScUE XML/EDI model
Lu E., Wu C. Software--Practice & Experience 34(3): 315-338, 2004.  Type: Article

Lu and Wu clearly have a lot of experience and knowledge about the electronic data interchange (EDI) and Extensible Markup Language (XML) business information exchange problem domain. They use this knowledge to provide a good backgroun...

Aug 30 2004  
   Influences on cheating practice of graduate students in IT courses: what are the factors?
Sheard J., Dick M. ACM SIGCSE Bulletin 35(3): 45-49, 2003.  Type: Article

Sheard and Dick attempt to address the dearth of quality research related directly to the factors influencing cheating within the graduate information technology student body. Through this research, the authors attempt to identify not ...

Jul 15 2004  
   Influences on cheating practice of graduate students in IT courses: what are the factors?
Sheard J., Dick M. ACM SIGCSE Bulletin 35(3): 45-49, 2003.  Type: Article

Sheard and Dick attempt to address the dearth of quality research related directly to the factors influencing cheating within the graduate information technology student body. Through this research, the authors attempt to identify not ...

Jul 15 2004  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy