What we do?

  • We help people act with insight.
  • We help companies grow from the inside.
  • We help employees turn into thinkers.

We ignite thought

If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of every one, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me.

--Thomas Jefferson
on Patents and Freedom of Ideas

“Don’t tell people how to do things. Tell them what to do and let them surprise you with their results.” - George Patton


Acadinnet’s mentoring program essentially follows General Patton’s advice. Acadinnet will not solve problems nor create inventions. In fact, Acadinnet will not do anything under the mentoring program that would legally entitle its members to become a coauthor or a joint-inventor with a mentee’s intellectual output. Acadinnet will help mentees learn the business of solving a problem or inventing; it will not solve or invent for them. It will help mentees appreciate that failure is a stepping stone to success and that the path to success is usually a trail of tears, not a bed of roses, no matter how talented they are. It will help them learn that questioning conventional wisdom is a powerful tool for creative people in solving problems.

Acadinnet’s mentoring program is both directed and particular. Directed in the sense that it helps mentees to focus on innovative technology, business model or service that may actually change society. Particular in the sense that we ask, in the context of the client’s business: (1) Is it worth doing (impact and significance)? (2) Can the mentee do it? (3) Does the client have patience to let the mentee succeed?

At the end of the mentoring program, it is expected that the mentee will have a higher probability of coming up with inventions of importance to the client. In terms of impact, with increasing statistical probability, the mentee may come up with disruptive, radical, or incremental inventions. We hope our best mentees will find the courage and perseverance to work in novel and uncrowded areas where the risks are higher but the rewards for success are amazingly higher. It is in the process of studying a new system that something original almost certainly shows up. Meticulousness and perseverance eventually pay off.

Acadinnet offers two other abbreviated mentoring programs called Super-internship and Mentoring Students for PhD Admission each with its specific focus.

In the Super-internship program, Acadinnet takes university students who wish to focus on the mathematical modeling of complex systems, products and processes. We interpret systems in a broad sense; it includes systems from the engineering, biological, ecological, business, etc. disciplines.

In the Mentoring Students for PhD Admission program Acadinnet mentors candidates seeking admission to PhD programs in top 100 universities in the world.

Acadinnet will not provide mentoring services to organizations and individuals that violate legal principles related to patent protection or accepted standards and conventions of authorship of research publications. Mentees who violate their employer’s employment policy of confidentiality by exposing employer-confidential information to Acadinnet will be expelled from the mentoring program.

Acadinnet does not try to “sell” the mentoring program. If we believe that the client company does not have mentees we can mentor, we will forthrightly say so.

Acadinnet does not have a standard identification process (nor does anyone else) for identifying free-thinking, curiosity-driven individuals with potential for innovation (our preferred mentees). Clients can nominate and at its discretion Acadinnet may agree to mentor the nominee. Acadinnet’s preferred approach is to identify potential mentees in the client’s organization, present their names to the client, and let the client choose from that list. Acadinnet’s identification process includes a mix of activities that includes giving a short series of lectures drawn from its Insights in Science lectures series at a location chosen by the client for the client’s employees, observing and assessing individual employee responses during the lecture series to the lectures, one-on-one discussions with employees, discussions with probable mentees’ managers, areas where the client is willing to support innovative activities and invest risk capital, gut feelings about each probable mentee of the Acadinnet mentors, comfort level matrix of potential mentees with potential mentors from Acadinnet, etc. The process is not quantifiable, is subjective and is dependent on the experience of Acadinnet’s mentors. Trust among all parties involved in the process is crucial. It is an exercise in picking needles out of a haystack. The Insights in Science lectures provide us with the first inkling whether the haystack (client organization) has enough needles (mentees) to be found.

Mentee related information deemed confidential by the client will not be shared with others by Acadinnet unless required by law or approved by the client. Acadinnet assumes that a client (mentee’s employer) has taken adequate steps to retain the mentee, without prejudice to the mentee’s constitutional right to employment, once the mentoring program for the mentee is concluded or terminated.

We expect the employer to have a reasonable idea as to where the mentee is likely to fit in its strategic business plan (line of business, market, customers and competition) once the mentoring program is successfully completed. This is particularly true if the business plan is taking the business in a whole new direction and the mentee is expected to explore unchartered territories. We expect the employer has business intelligence tools in place that empowers and enables employees to stretch themselves to their potential, because employees now inevitably find themselves in an increasingly instrumented, interconnected, and intelligent environment. The influence of the Internet and social networks has an enormous influence on how people think and communicate.

Insights in Science Lecture Abstracts
From hunter-gatherer to knowledge-worker
In very broad terms, the world’s economic development can be divided into four stages: hunter-gatherer (till about 12,000 years ago; more than 99% of our time on earth), agricultural (beginning about 12,000 years ago till about 1500 AD), industrial (from about 1500 AD to later half of 20th century), and postindustrial (later half of 20th century and continuing)1 , although a substantial comingling of two or more stages can be seen even today in many countries, including the world’s most advanced nations. The hunter-gatherer stage can support only about one inhabitant per square mile and demands a nomadic life involving extraordinary land-intensive activity. In the post-industrial information (knowledge-gatherer) age, we are primarily concerned about creating knowledge and using it to produce marketable products and services as quickly and economically as possible. The focus is therefore on knowledge workers. The knowledge-gatherer stage can support several orders of magnitude more inhabitants per square mile than was possible in the hunter-gatherer stage.
Axiomatic mathematics
Euclid’s geometry is the first specific evidence of an axiomatic treatment of mathematics. Some 2000 years after Euclid, several mathematicians reexamined its axioms and discovered non-Euclidean geometry. One such geometry forms the space-time geometry of Einstein’s general theory of relativity. The discovery of non-Euclidean geometry was a revolution in mathematics, which led to what now forms the heart of mathematics—formal axiomatic systems. Formal systems form the basis of reasoning in mathematics and of all the computations we do on digital computers.
How reliably can we compute?
Several simple computations, as implemented on digital computers, will be examined. Their surprising common feature is that while there is no flaw in the coded logic, the computations fail. The reason for their failure and their remedies will be discussed. The lesson: programming is not about coding; it is about algorithms and their error propagation characteristics. We shall also take a look at some unusual ways humans prove mathematical propositions.
On symmetry
The notion of symmetry plays a central role in theoretical physics. The central theme of this lecture is the Emmy Nöther theorem, which states that for every observable symmetry in Nature there is a corresponding entity that is conserved. And for every conservation law there is a corresponding symmetry. For example, the law of conservation of angular momentum is a consequence of the isotropy of space.
Quantum cryptography and quantum teleportation
The world of quantum mechanics is truly magical. In this lecture we will look at the basic mathematical framework around which QM is built, and then look at the amazingly simple solutions to two problems: (i) the safe exchange of keys for encrypted messages, and (ii) the teleportation of matter. In both these solutions, Charles Bennett, a distinguished IBM researcher, played a pioneering role.
Chief Mentor’s Corner
  1. Bera, R. K., Method and system for processing of allocation and deallocation requests in a computing environment, Patent No. US 8,195,802 (issued June 5, 2012).
  2. Bera, R. K., Method, apparatus and computer program product for network design and analysis, Patent No. US 8,176,108 (issued May 8, 2012).
  3. Bera, R. K., Listing and modifying groups of blocks in the editing of a document, Patent No. US 8,122,349 (issued February 21, 2012).
  4. Bera, R. K., Run-Time parallelization of loops in computer programs using bit vectors, Patent No. US 8,028,281 (issued September 27, 2011).
  5. Bera, R. K., Compiler optimization of source code by determination and utilization of the equivalence of algebraic expressions in the source code, Patent No. US 8,028,280 (issued September 27, 2011).
  6. Bera, R. K., Concurrent editing of a file by multiple authors, Patent No. US 7,954,043 (issued May 31, 2011).
  7. Bera, R. K., Restructuring computer programs, Patent No. US 7,934,205 (issued Apr 26, 2011).
  8. Bera, R. K., Method, system and program product for data searching, JP3832821 (B2), (issued October 11, 2006).