Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2010


From The Eponymous Pickle

Social Informatics

Social Informatics

In IEEE Computing:Social Computing: From Social Informatics to Social Intelligenceby Fei-Yue Wang, Kathleen M. Carley, Daniel Zeng, and Wenji MaoReaders are introduced to social computing's theoretical, methodological, and technological…


From The Eponymous Pickle

A Shopper Perspective of the Aisle

A Shopper Perspective of the Aisle

You will recall I reviewed Herb Sorensen's book: Inside the Mind of the Shopper", some time ago. Highly recommended for its insight into the scientific understanding of retail, based on actual consumer behavior. He has been a…


From Computational Complexity

Naming and Ranking

Martin Kruskal invented Soliton Waves which were a very important concept in Physics.

Rebecca Kruskal (Martin's Granddaughter): Daddy, how come they are not called Kruskal Waves?

Clyde Kruskal (Martin's Son, Rebecca's…


From U.S. Public Policy Committee of the ACM

ACM Washington Update, Vol. 14.1 (February 1, 2010)

ACM Washington Update, Vol. 14.1 (February 1, 2010)

CONTENTS

[1] Newsletter Highlights [2] First Computer Science Education Week Finishes Strong [3] USACM Supports Expanded FCC Technical Advice [4] FY 2010 Budgets Show Increases for Science Agencies [5] Data Security Bills Pass…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Surprise and Wonder in Computer Science

Surprise and Wonder in Computer Science

Last week I attended a workshop day at Stevens Institute of Technology where Michael Kolling, University of Kent and creator of Greenfoot was the keynote speaker. Some of the things he said really resonated with me. One of them…


From Putting People First

5 ways techno-gadgetry is bringing out the worst in humanity

5 ways techno-gadgetry is bringing out the worst in humanity

Scott Hill of Alternet looks at how technology facilitates “the human sentient understanding of how to take cruel advantage of human weakness”. “Indeed, humans are exceptional when it comes to using technology to prey upon weaknesses…


From The Computing Community Consortium Blog

Obama

Obama

The New York Times reports that President Obama’s proposed budget includes substantial increases for science research, including an 8% increase for the National Science Foundation from last year’s budget, rising to $7.4 billion…


From Putting People First

Digital Nation, in-depth documentary, online in full

Digital Nation, in-depth documentary, online in full

In Digital Nation: Life on the Virtual Frontier, FRONTLINE presents an in-depth exploration of what it means to be human in a 21st-century digital world. Continuing a line of investigation she began with the 2008 FRONTLINE report…


From My Biased Coin

Does Class Size Matter?

Does Class Size Matter?

Preliminary stats show 55 students in my algorithms course. That's probably close to the mean and slightly above the median. It's certainly not the largest course in the School of Engineering and Applied Sciences (SEAS), but…


From The Eponymous Pickle

Systemic Failures

Systemic Failures

Mark Montgomery posts on: Systemic Failures, by Design. See also the newletter of his company: Kyield.


From Putting People First

The Internet of things: Networked objects and smart devices

The Internet of things: Networked objects and smart devices

Constantine Valhouli, principal of the Massachusetts based Hammersmith Group, which consults to developers on the marketing and branding of luxury properties, and to city leaders on reviving historical downtowns, just published…


From The Eponymous Pickle

Stronger Flavors Continue to Surge

Stronger Flavors Continue to Surge

" ... The year in flavor will be heavily influenced by bitter, warm and earthy notes," said Kevan Vetter, executive chef at McCormick. "We see America's palates embracing stronger flavors -- high-impact combinations that areIn…


From Putting People First

Europeans

Europeans

On the 4th annual Data Protection day (28th January 2010) the European Commission announced the intention to reform the 1995 European Union (EU) Data Protection Directive 95/46/EC. “Our privacy faces new challenges: behavioural…


From Computational Complexity

Travel Support for Grad Students who GOTO STOC 2010

If you are a grad student and want to goto STOC 2010 there is travel support money that you can apply for. See here for details.

What is the best way to get this information out? What is the best wayy to get any kind of…


From Putting People First

Stowe Boyd: outdated UX metaphors are holding us back

Stowe Boyd: outdated UX metaphors are holding us back

Stowe Boyd arguest that the metaphors of computing user experience are holding us back from new ways of structuring our interaction through computers. “the thing that is blocking us from moving forward, to a better user experience…


From The Eponymous Pickle

GS1 Mobile in Retail Paper

GS1 Mobile in Retail Paper

Have been members of GS1 for many years, download their excellent 34-page paper on Mobile retail below, they write:" .... We're pleased to announce the publication of the "Mobile in Retail" White Paper. You can download it from…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 1

Hill Tech Happenings, Week of February 1

There will be various events all week in connection with the rollout of the President's Fiscal Year 2011 Budget Request. Check with agency websites for additional information.

February 3

Hearing: The Research and Science Education…


From Schneier on Security

More Movie Plot Terrorist Threats

More Movie Plot Terrorist Threats

The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made from smoke detector parts, planning via online games, and botulinum…


From Schneier on Security

Online Credit/Debit Card Security Failure

Online Credit/Debit Card Security Failure

Ross Anderson reports:

Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified by VISA" and "MasterCard SecureCode". This is now the most widely…


From [email protected]

Why Do Software Developers Tolerate "crunch Time"?

Why Do Software Developers Tolerate "crunch Time"?

Given the well known increased risk of burnout for an extended "Crunch Time," why do developers put up with it? 


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 1 February 2010

Interesting Links 1 February 2010

All sorts of good things last week. Tops among them was a visit to Stevens Institute of Technology for a workshop with a great group of high school computer science teachers. You

« Prev 1 9 10 11 Next »