Sign In

Communications of the ACM

Blogs


Blogroll


US National Guard is Getting Into Cyberwar
From Schneier on Security

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...

Riken Research
From The Eponymous Pickle

Riken Research

A long time research resource on Japan, Riken Research writes:" ... The latest printed edition of RIKEN Research, containing a selection of articles published on...

Big Data, Marketing and Finance
From The Eponymous Pickle

Big Data, Marketing and Finance

Some thin case studies in the HBR blogs.  But it is clear that the deeper use of analytics techniques on growing and complex gathered data will from now on be essential...

Pipelines and Forecast Timing
From The Eponymous Pickle

Pipelines and Forecast Timing

In E-Commercetimes: The timing of forecast value is an important aspect.  It's part of the decision process that is often forgotten." ... Analytics should be able...

When science, customer service, and human subjects research collide. Now what?
From Putting People First

When science, customer service, and human subjects research collide. Now what?

Mary L. Gray wrote a long essay for ethnographymatters that argues that technology builders and interface designers, data scientists and ethnographers (working...

Ethnography : an antifragile practice?
From Putting People First

Ethnography : an antifragile practice?

Simon Roberts of Stripe Partners continues his three part series on ethnography. In the first two posts in this series he examined ethnography as practiced in two...

From Computational Complexity

Elfdrive

New York Times, dateline June 11, 2019 With a near record-setting investment announced last week, the self-driving car service Elfdrive is the hottest, mostpiece...

Hackers Steal Personal Information of US Security-Clearance Holders
From Schneier on Security

Hackers Steal Personal Information of US Security-Clearance Holders

The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...

MOOCs and MBA Programs
From The Eponymous Pickle

MOOCs and MBA Programs

In Knowledge@Wharton, Interview and video:" ... In a new research paper, Christian Terwiesch, professor of operations and information management at Wharton, and...

From Gödel's Lost Letter and P=NP

Constructive Sets

An approach to complexity lower bounds? Book source Kurt Gödel did it all, succinctly. His famous 1938 paper “The Consistency of the Axiom of Choice and of the...

IBM and Apple Partnership for Mobile
From The Eponymous Pickle

IBM and Apple Partnership for Mobile

I was struck by this announcement yesterday because it includes many of the needs we addressed in the enterprise when we understood that mobile capabilities would...

Searching for Live Hangouts
From The Eponymous Pickle

Searching for Live Hangouts

Interesting idea to search for live events in Google Hangouts.  In test.  Have now used hangouts a number of times for small group communications.  Simple interface...

Save The Date for the 2015 CSTA Annual Conference
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Save The Date for the 2015 CSTA Annual Conference

Yes, we just finished the Computer Science Teachers Association conference. And it was a great one. You can get copies of many of the presentation decks at http...

IT is Cracking the C Suite
From The Eponymous Pickle

IT is Cracking the C Suite

In the HBR Blog: Well yes, but it has been there selectively, for a long time.  Well understood for several decades that its values are not overhead, but essential...

Creating Future IT Organizations
From The Eponymous Pickle

Creating Future IT Organizations

In CIOInsight:  Transformation yes, but also making things work efficiently." ...  If I have one major complaint about how IT executives have seen their role, it...

Security Against Traffic Analysis of Cloud Data Access
From Schneier on Security

Security Against Traffic Analysis of Cloud Data Access

Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....

Samsung and SmartThings
From The Eponymous Pickle

Samsung and SmartThings

In GigaOM: Samsung is in negotiation to buy home automation company SmartThings.   The connection makes lots of sense.  Though as I have mentioned here before,"...

The Saga Of The Stank
From Don't Panic

The Saga Of The Stank

My hand is over my mouth, my eyes are watering, and I'm trying to hold my breath, but every few seconds, my throat tries to turn itself inside out. Most smells,...

CSTA 2014 Day Two
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

CSTA 2014 Day Two

CSTA like so many great conferences is as much about learning from face to face informal conversations as it is about formal sessions. I’ve been able to talk with...

Risks of Keyloggers on Public Computers
From Schneier on Security

Risks of Keyloggers on Public Computers

Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Human Subjects Research for the Twenty-First Century, or, What Can We Learn from the Facebook Mood Study?
Human Subjects Research for the Twenty-First Century, or, What Can We Learn from the Facebook Mood Study?
07.20.2014

There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects …

The Perfect Candidate
The Perfect Candidate
07.15.2014

What makes a good candidate for a research position?

If You Want to Teach Kids CS, First Teach the Adults
If You Want to Teach Kids CS, First Teach the Adults
07.14.2014

The pathway to CS in schools starts with teaching the adults.

View More Blog@CACM