Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

December 2011


From The Computing Community Consortium Blog

The New York Times


From Schneier on Security

The Collar Bomb Robbery

The Collar Bomb Robbery

Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

Top Most Read Posts of 2011

It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away the most read of 2011. The first on the list had over…


From My Biased Coin

Wasted Hour(s)

Wasted Hour(s)

Last night I was running some code for a queuing simulation related to some research I'm doing.  This is the Nth time I've used this code;  I wrote up the basic simulator back in grad school for some of my thesis work (on the…


From The Eponymous Pickle

Considering Gamification

Considering Gamification

When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company, and the corporate and customer culture involved. The book also nicely…


From The Eponymous Pickle

Wikipedia of Maps

Wikipedia of Maps

A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to charge for map API use.


From The Eponymous Pickle

Teach Kid's Ruby

Teach Kid's Ruby

Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details of systems development, perhaps not, but a useful starting…


From Schneier on Security

Hacking Subway's POS System

Hacking Subway's POS System

The story of how Subway's point-of-sale system was hacked for $3 million.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 26 December 2011

Interesting Links 26 December 2011

Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didn


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

Top Most Read Posts of 2011

It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away the most read of 2011. The first on the list had over 20,000 views…


From The Eponymous Pickle

Customer Lifetime Value Equation

Customer Lifetime Value Equation

Is it of value to Tech?   From Wharton. It is always useful to think about, but may not be the key measurement for all innovations.   The Kindle Fire is brought up as a good example.


From Schneier on Security

Merry Christmas from the TSA

Merry Christmas from the TSA

Cupcakes deemed security threat:

Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake frosting was "gel-like" enough to constitute a security risk…


From The Eponymous Pickle

Ipsos Neuroscience and Emotion

Ipsos Neuroscience and Emotion

I like adding the emotion part.  News release:" ... In the US, EmSense


From The Eponymous Pickle

Rules of Thumb

Rules of Thumb

Good WSJ piece on Heuristics.  Not random hunches, but rules of thumb that work.  Not always perfectly,  or optimally, but are very useful to get to a real conclusion.  Our brains are full of them,  we learn them from birth,Stan…


From The Eponymous Pickle

Alternative Digital Recipe Libraries

Alternative Digital Recipe Libraries

As a long time cook this is a challenge.  Some alternatives.  But no, not impossible.  As simple as a file folder. Or as complex as an associative memory.


From Wild WebMink

? Open Source Xmas

? Open Source Xmas

LibreOffice Xmas, originally uploaded by elianedomingos. A very happy Christmas to everyone who reads Wild Webmink. May you find software freedom waiting for you in the coming year! If you need a last-minute gift for someone,…


From Schneier on Security

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor

It's a metaphor that will not die.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From The Eponymous Pickle

On Mobile Payments

On Mobile Payments

Good overall piece in GigaOM on the state of mobile smartphone payments.   Have followed the idea for years, and it has been a long road.  Finally in 2012? 2013?  A 'good' Amex infographic sets the stage.


From Schneier on Security

Santa Hacked

Santa Hacked

Mildly amusing video.


From Computer Science Teachers Association

Time to Change the Conversation from Consuming to Creating

Time to Change the Conversation from Consuming to Creating

At a recent family gathering, my father-in-law delighted in the accomplishments of his four year old granddaughter who effortlessly navigated her mother's iPad. He was awed by the ease with which she used the technology and,…


From The Computing Community Consortium Blog

The CCC Blog in 2011: Our Top Posts from the Year Revisited

The CCC Blog in 2011: Our Top Posts from the Year Revisited

As we celebrate the holidays and get set to close the books on 2011 — a banner year for the CCC Blog, with more than twice as many page views as in any previous year — we thought we would take a quick look back at some of the…


From The Eponymous Pickle

An Examination of RFID ROI

An Examination of RFID ROI

In the apparel industry where RFID item level tagging has been generally successful. We commissioned a similar study years ago with MIT and  the University of Arkansas that I pushed back on unsuccessfully, given the management…


From The Eponymous Pickle

Saffron Technologies

Saffron Technologies

I have mentioned Saffron Technologies a number of times here, since visiting them five plus years ago.   Just now re-examining their associative memory techniques for several applications.   " ... For example, a new situation…


From The Eponymous Pickle

Vending Machine 2.0

Vending Machine 2.0

A look at a technologically impressive new vending machine.  Will this concept machine engage, sell? Japan Gets Vending Machine 2.0 With See-Through Full HD Display, Facial Recognition The comments suggest it is too complex in…


From The Computing Community Consortium Blog

Applications Open for Google

Applications Open for Google

Google is calling for applications to its 2012 Google Policy Fellowships, which offer


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kinect Educators

Kinect Educators

One of the great things in my job is the chance to make connections between people doing interesting things. Lately a lot has been happening in the world of educational uses for the Kinect Sensor utilizing the Kinect for Windows…


From My Biased Coin

MIC and MINE, a short description

MIC and MINE, a short description

I thought I should give a brief description of MIC and MINE, the topic of our Science paper.  Although you're probably better off, if you're interested, looking at our website, http://www.exploredata.net/.  Not only does it have…


From The Eponymous Pickle

Digital Sign Deployments

Digital Sign Deployments

In Digital Signage Today: A video of cool out of home digital signage deployments from 2011.  By Keith Kelsen.   I am currently reading his 2010 book:  Unleashing the Power of Digital Signage: Content Strategies for the 5th Screen…


From The Eponymous Pickle

Apple Trumps Wal-Mart Online Sales in November

Apple Trumps Wal-Mart Online Sales in November

Fairly remarkable result.  Technology purchases continue to move forward. Will we all be virtual in the Cloud soon?


From The Computing Community Consortium Blog

Microsoft

Microsoft

Seeking to motivate the development of novel solutions to serious computer security threats, Microsoft Corp. has launched an inaugural BlueHat Prize contest, offering a grand prize of $200,000 to the most innovative submission…