Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

September 2014


From Schneier on Security

Medical Records Theft and Fraud

Medical Records Theft and Fraud

There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals are looking for new ways to monetize stolen data....


From The Eponymous Pickle

An Online Right to be Forgotten

An Online Right to be Forgotten

In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe.   Examples and exploration of implications.  The selective and accurate redaction


From The Eponymous Pickle

Seeking Assumption Free Data Science

Seeking Assumption Free Data Science

Steve Miller on 'Freak Data Science', where freak means roughly assumption-free, understandable and useful.  Always like that approach, and he has much to say on the topic, like:" ... in agreement with this need to view data.


From Computer Science Teachers Association

Teacher Collaboration

What do two college professors, two high school teachers and a pre-service teacher have in common? CSTA membership!

I spent several enjoyable weeks this summer working with a great group of CSTA members to create a set of POGIL


From The Computing Community Consortium Blog

James F. Kurose to head Computer & Information Science & Engineering Directorate

Dr. James F. Kurose, Distinguished University Professor in the Department of Computer Science at the University of Massachusetts (UMass), was named the next Assistant Director for Computer and Information Science and Engineering…


From The Eponymous Pickle

An Online Right to be Forgotten

An Online Right to be Forgotten

In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe.   Examples and exploration of implications.  The selective and accurate redaction


From The Eponymous Pickle

UXMag and Psychology

UXMag and Psychology

Of interest, on psych and design, in user experience:" ... UX Magazine is a central, one-stop resource for everything related to user experience. We provide a steady stream of current, informative, and credible information about


From The Eponymous Pickle

Tracking Data Use Online

Tracking Data Use Online

From MIT, with possible use to understand data use and valuation.   " ... Researchers in the Decentralized Information Group (DIG) at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) believe the solution


From The Eponymous Pickle

Computer Learning Neighborhoods from Images

Computer Learning Neighborhoods from Images

An example of the ability to make a classification of an image by subtle attributes.  Images are a form of unstructured data increasingly being found in large databases.  Medical imagery is close behind.  In Engadget.   " ... Us


From The Computing Community Consortium Blog

Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) Partnership

The National Science Foundation (NSF) and Semiconductor Research Corporation (SRC) announced nine research awards to 10 universities totaling nearly $4 million to develop Secure, Trustworthy, Assured, and Resilient Semiconductors…


From Schneier on Security

Security Trade-offs of Cloud Backup

Security Trade-offs of Cloud Backup

This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This is, like almost everything in tech, a trade-off: Your data is far


From The Eponymous Pickle

Cyber Security Lab Game

Cyber Security Lab Game

A laboratory for teaching online security concepts in the form of a simulation game.  We created similar simulation games for teaching and option evaluation for in store sensor applications. Includes a basic introduction to computer


From The Female Perspective of Computer Science

C++ and Java Together in CS2: Will it Be Great or a Disaster?

C++ and Java Together in CS2: Will it Be Great or a Disaster?

I've been trying something a little bit different for our CS2 class this semester.  The course typically covers object-oriented programming in Java along with topics like recursion.  In fact, students becoming proficient in Java


From Schneier on Security

Nasty Vulnerability found in Bash

Nasty Vulnerability found in Bash

It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software. If anyone has any actual data other than two instances and the


From The Eponymous Pickle

Company Gets Rid of Email

Company Gets Rid of Email

In FastCompany.  I saw this direction proposed some time ago.  At that time it was suggested that a wiki like structure would be set up, and any communication would be placed in its appropriate knowledge position.  So you would


From The Eponymous Pickle

Service Design and Journey Mapping

Service Design and Journey Mapping

Via the Service Innovation group, a video on Service design and journey mapping. Mulling how such systems differ from advisory applications.   Is it a matter of who is assumed to be in control?  See also the ISSIP site.


From The Eponymous Pickle

Enterprise Thinking Blog

Enterprise Thinking Blog

See Computing Now's Enterprise Thinking Blog.  Part of the IEEE Computing Now effort.  Nicely done, by Joshua Greenbaum, Principal, Enterprise Applications Consulting


From Computational Complexity

Typecasting in Dagstuhl

After this pre-recorded typecast, we learned of the tragic death of Alexey Chervonenkis, the C of VC dimension, a huge loss to the learning community. We’ll have a proper obit soon. Now onto the typecast.
Lance: Hello and2014


From Schneier on Security

Julian Sanchez on the NSA and Surveillance Reform

Julian Sanchez on the NSA and Surveillance Reform

Julian Sanchez of the Cato Institute has a lengthy audio interview on NSA surveillance and reform. Worth listening to....


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

IBM Master the Mainframe Contest

IBM Master the Mainframe Contest

For something different, IBM is running its tenth Master the Mainframe Contest for students age 13 and up.

From the web site:

What you need to know:

In Fall 2014, IBM is running its tenth Master the Mainframe Contest for students


From The Eponymous Pickle

Kraft and Data Integration for Analytics

Kraft and Data Integration for Analytics

I note in particular here the use of third party data to integrate with their own.  Good case study for CPG.   It is becoming common to understand and utilize free and syndicated data to apply with your own.  This requires understanding


From The Eponymous Pickle

Kroger Looks to Digital for Shopper Experience

Kroger Looks to Digital for Shopper Experience

Another example of increasing use of data to understand and anticipate shopper experience.Kroger looks to digital to improve shopping experience Kroger's recent acquisitions of Harris Teeter and Vitacost.com are part of its experimentation


From The Computing Community Consortium Blog

Request for Information (RFI)-National Privacy Research Strategy

Agencies of the Federal Networking and Information Technology Research and Development (NITRD) Program are planning to develop a joint National Privacy Research Strategy. On behalf of the agencies, the Cyber Security and Information…


From The Eponymous Pickle

Mining Medical Data

Mining Medical Data

On mining medical data.  " .... Your Doctor Knows You're Killing Yourself. The Data Brokers Told Her - in Bloomberg  ... ""  .... You may soon get a call from your doctor if you’ve let your gym membership lapse, made a habitThat’s


From Schneier on Security

Detecting Robot-Handwriting

Detecting Robot-Handwriting

Interesting article on the arms race between creating robot "handwriting" that looks human, and detecting text that has been written by a robot. Robots will continue to get better, and will eventually fool all of us....


From The Eponymous Pickle

On Rewards for Motivation

On Rewards for Motivation

An overview of motivational rewards as used in gamification.  In particular a comparison of instrinsic and extrinsic methods.   What works in which conditions.  Which leads to the typical methods of Points, Badges and Leaderboards


From Schneier on Security

Lesson in Successful Disaster Planning

Lesson in Successful Disaster Planning

I found the story of the Federal Reserve on 9/11 to be fascinating. It seems they just flipped a switch on all their Y2K preparations, and it worked....


From The Computing Community Consortium Blog

Computer Scientists in Popular Science’s “Top Ten of 2014″

Popular Science has released their Top Ten of 2014 which honors the brightest young minds reshaping science, engineering, and the world. Computer scientists Prabal Dutta and Roxana Geambasu made the Top Ten! In Dr. Dutta’s lab…


From The Eponymous Pickle

Buildings and Innovation

Buildings and Innovation

How much do buildings influence creativity?  Apparently they have at MIT.  An interesting study of a particular building that provided a locus for innovation for 55 years.  Chance or not?    There was hope for this at our innovation


From The Eponymous Pickle

Google Balloons will Ring the Globe

Google Balloons will Ring the Globe

In Tech Review:  Though I heard of it, its progress was new to me.  " .... The boss of the Google X research lab, Astro Teller, says his company’s experimental wireless Internet balloons will deliver Internet access throughout