Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2014


From The Eponymous Pickle

Steps to Avoid Losing Your Credibility

Steps to Avoid Losing Your Credibility

Former P&G CIO Bob Herbold in his blog on credibility. Nice short piece on a recent CIA contract proposal by Amazon and IBM.   " .... Beware! Too many leaders get to the point where they believe they can excite their audience


From Schneier on Security

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind

Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From Schneier on Security

"Tips For Crafting A Strong Password That Really Pops"

"Tips For Crafting A Strong Password That Really Pops"

Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about using a password as a mantra for personal change....


From CERIAS Blog

Videos from the 15th Annual CERIAS Symposium

We are now releasing videos of our sessions at this year’s CERIAS Symposium from late March.

We had a fascinating session with David Medine, chair of the PCLOB discussing privacy and government surveillance with Mark Rasch, currently


From The Eponymous Pickle

Samsung Advanced Appliances

Samsung Advanced Appliances

Samsung Digital Showroom: Have always seen Samsung as a company that was destined to introduce the most advanced online appliances.  We tested early versions in a smart home environment.   However, I have now had to directly


From The Eponymous Pickle

Google Shopping Express and Retail Partnership Risk

Google Shopping Express and Retail Partnership Risk

Was unaware of this in particular, interesting points are made.   " ... Whether it is Amazon or Google, the retailer who decides to partner with one of these services has to think long and hard about the impact on their relationship


From The Eponymous Pickle

Creating User Journey Maps

Creating User Journey Maps

Did not know there was so much process behind this, but here a Step by Step Guide to Creating User Journey Maps.   Nice idea.  " ... User journey mapping is one of the tools that UX pros use to find and address the weakest points


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

CS Principles Virtual Summit

CS Principles Virtual Summit

Are you interested in the new CS Principals course that will be the new (additional) Advanced Placement Computer Science course? CSTA is helping to host a CS Principles Summit next week. While most of us can’t be there in person


From Schneier on Security

This Leaked NSA Memo Will Restore Your Faith in Humanity

This Leaked NSA Memo Will Restore Your Faith in Humanity

Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with Russia on anyone who is a mutual target (and that, ironically,


From The Eponymous Pickle

BigDataLens Revisited

BigDataLens Revisited

I revisited the site of BigDataLens.  Most interesting, their blog.  A form of interestingly constructed pattern recognition / predictive analytics.  Worth a look, the examples given are useful and readable.


From The Eponymous Pickle

Nature of Creativity of the Brain

Nature of Creativity of the Brain

Replay of some recent talks and discussion at the Santa Fe Institute.   " ... Creativity is a key ingredient of both science and art, but how much can scientific inquiry tell us about creativity?“Science can study creativity,


From Schneier on Security

How Google Glass Snoops Steal Your Passcode

How Google Glass Snoops Steal Your Passcode

Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated over-the-shoulder password stealing. But Fu notes that older


From The Eponymous Pickle

Augmented Pixels Update

Augmented Pixels Update

I am following a number of Augmented Reality companies.  Here are the latest updates from Augmented Pixels. in Odessa. " ... First of all, Large Silicon Valley Plug and Play Incubator invested in Augmented Pixels selected itFull


From The Eponymous Pickle

Managing Supply Chain Risk

Managing Supply Chain Risk

In CGMA Mag:   Good ideas here.   You can can manage your risks, often by simulating alternatives.   " ... A global poll of more than 1,000 senior executives by consulting firm Accenture found that managing operational risksBut


From The Eponymous Pickle

Facts about the Internet of Things

Facts about the Internet of Things

Some obvious yes, but useful thoughts about the internet of things." ... If something isn't connected to the Internet—whether human, animal, household appliance, automobile, factory tool, etc.—does it exist? If you're going all


From Gödel's Lost Letter and P=NP

High School Theorems

Taking a conjecture about identities to college Alex Wilkie is a Fellow of the Royal Society, and holds the Fielden Chair in Mathematics at the University of Manchester. Ken knew him at Oxford in 1981—1982 and again from 1986


From Schneier on Security

This Common Home Appliance Can Compromise Your Entire Security

This Common Home Appliance Can Compromise Your Entire Security

LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password from the light bulb. It's a problem with the communications


From The Eponymous Pickle

Lovelace Test versus Turing Test

Lovelace Test versus Turing Test

More powerful in testing machine intelligence than the Turing test, it is claimed, from Slashdot.   I had not heard of this particular term.  A generalized non technical article. With an element of measuring actual creativity


From Computational Complexity

Is there a word for the top part of a binomial coefficient?

Consider the sequence: x/y,  (x+1)/y, (x+2)/y, ..., (x+z)/y one could say  in this sequence of fractions the numerators goes through z-1 consecutive numbers. Consider the sequence (x choose y), (x+1 choose y), (x+2 choose


From Computer Science Teachers Association

You Can Be An Advocate!

Yes, you can! If I can be an advocate you can be one too! It is not difficult to get started. I began by advocating at my school site for computer science with the counseling staff and the administration to help grow enrollment


From The Eponymous Pickle

Google Map Hacking

Google Map Hacking

Had never heard of this, but in Wired.  It is a pretty serious thing if a supposedly perfect map and associated business list is hacked. It is happening.  A Danger of crowd sourcing.


From CERIAS Blog

Update on “Patching is Not Security”

A few weeks ago, I wrote a post entitled “Patching Is Not Security.” Among other elements, I described a bug in some Linksys routers that was not patched and was supporting the Moon worm.

Today, I received word that the same


From Apophenia

The Cost of Contemporary Policing: A Review of Alice Goffman’s ‘On the Run’

The Cost of Contemporary Policing: A Review of Alice Goffman’s ‘On the Run’

Growing up in Lancaster, Pennsylvania in the 80s and 90s, I had a pretty strong sense of fear and hatred for cops. I got to witness corruption and intimidation first hand, and I despised the hypocritical nature of the “PoPo.”


From Schneier on Security

NSA Spied on Prominent Muslim Americans

NSA Spied on Prominent Muslim Americans

The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading it in its entirety. I have a few observations. One, it's hard


From The Eponymous Pickle

What is Hadoop?

What is Hadoop?

A non technical introduction by colleague Bernard Marr, nicely done, an intro to some big data concepts  as well.


From The Eponymous Pickle

Barriers to Open Innovation

Barriers to Open Innovation

With a link to a broader article: Interview with Anders Hjalmarsson of Viktoria Swedish ICT, Götegorg, Sweden. Author of “Beyond Innovation contest: a framework of barriers to open innovation of digital services”  .... .


From Daniel Lemire's Blog

Extrinsic motivations are harmful…

Extrinsic motivations are harmful…

I have argued that when seeking professional success, it is best to avoid zero-sum games (e.g., compete for one prestigious slot). It is more fun, less distracting and more productive to focus on non-zero-sum games. That is,


From The Eponymous Pickle

Python most Popular Teaching Language

Python most Popular Teaching Language

Although most larger non tech enterprises these days do little internal programming themselves, it is interesting to see what programming languages are being taught these days, and what skills are thus most readily available.


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

As The Top Universities Go So Goes Who Actually?

As The Top Universities Go So Goes Who Actually?

Philip Guo had an interesting post on the Blog @ CACM titled Python is now the most popular introductory teaching language at top U.S. universities which summarizes his survey of the 39 top US PhD granting university CS departments


From The Eponymous Pickle

Company Initiative Overload

Company Initiative Overload

Have seen it. There can even be be overload in figuring out which initiatives to work on. Ao how should we address this?   Some good embedded ideas, in Forbes:  " .... If you work for a large company, you may be suffering from