Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

October 2011


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

More Access to the ACM Digital Library

More Access to the ACM Digital Library

One of the great resources available on the Internet is the ACM Digital Library. One of the problems for many is that access to this library is not free. I am a long time member of the ACM especially of SIGCSE


From The Eponymous Pickle

KDNuggets

KDNuggets

A site that covers news and resources in the data mining and predictive analytics realm.  It has been around for a long time and we used it in the enterprise.  Was just reminded of it by the need to scout some software references…


From Computational Complexity

The Cup Holder Principle

The story goes that when Toyota engineers started to design the first cup holders in the 80's, they went to a local 7-11 and got every different cup 7-11 had to make sure their design would work on all the cups in current use…


From The Eponymous Pickle

Coke is top Facebook Brand

Coke is top Facebook Brand

Good case study on Coke as a brand on Facebook.  Though it started as a brand with global recognition. 


From The Eponymous Pickle

Complex Health Care Networks

Complex Health Care Networks

Local talk of interest, via Uday Rao: [email protected]You are invited to attend the next Operations and Business Analytics seminar on Friday Oct. 28, 10:30 AM, at the University of Cincinnati Lindner College of Business.Title…


From The Computing Community Consortium Blog

We Want You!

We Want You!

Today the Computing Community Consortium


From Schneier on Security

Google Enables SSL by Default for Search

Google Enables SSL by Default for Search

This is a good thing.


From Wild WebMink

Radical Openness in Lyon

Radical Openness in Lyon

Next week I will be speaking at the fOSSa conference in Lyon, France. The theme for the day is “openness” and I have the day’s closing slot. Here’s the abstract I’ve sent: Our society – government, laws, economy, businesses,…


From The Noisy Channel

HCIR 2011: We Have Arrived!

HCIR 2011: We Have Arrived!

If you followed the #hcir2011 tweet stream, then you already know what I have to say: the Fifth Workshop on Human-Computer Interaction and Information Retrieval (HCIR 2011) was an extraordinary success. We had over 100 people…


From The Eponymous Pickle

Hyatt House Extended Stay

Hyatt House Extended Stay

In 2003 I participated in a brainstorming innovation workshop for the hotel industry in Helsinki.  We went far and wide to construct some new ideas about the social context of how hotels would operate in the future.  In particular…


From The Eponymous Pickle

Crowdsourcing for Intelligence

Crowdsourcing for Intelligence

In the CACM:  University studies crowdsourcing for intelligence.  " ... The U.S. intelligence community is studying how to tap the power of crowdsourcing through a multi-university effort.  George Mason University professors…


From The Eponymous Pickle

3M Visual Attention Service Update

3M Visual Attention Service Update

We examined the 3M VAS Attention Service scanning tool several times,  some new developments.  Press release. An Explanatory video.  Worth looking at  closely, free trial available. " ...3M launches the fourth generation of its…


From The Eponymous Pickle

Customer Base Analysis

Customer Base Analysis

I see that long time correspondent Professor Peter Fader at Wharton has an upcoming workshop on Probability analysis of the customer base. This is an area I did work on in the enterprise.   Important things to think about.:  …


From The Eponymous Pickle

DemandTec Research on Social Networks for Business Plans

DemandTec Research on Social Networks for Business Plans

I reported previously about DemandTec developing collaborative, social networking based interaction for business plans.   They are about to reveal some business research they have sponsored at an Orlando conference.  Will follow…


From The Eponymous Pickle

Hybrid Media

Hybrid Media

Like the article says, I am also becoming tired of social media marketing.  Yet, there are lots of people assembling 'there', so it makes sense to be there as well.  But it does not replace mainstream yet, and perhaps will not…


From The Eponymous Pickle

Circles of Trust

Circles of Trust

In Visual Complexity:  An intriguing visualization about circles of trust.  I have been experimenting with a related topic that deal with 'circles of competencies' in the health care area.   Introduces some further thoughts that…


From The Computing Community Consortium Blog

New Nanotechnology Strategy Touts Big Data, Modeling

New Nanotechnology Strategy Touts Big Data, Modeling

During a webinar earlier this afternoon, the National Nanotechnology Initiative (NNI) — spanning 25 Federal agencies engaged in nanotechnology research –


From Putting People First

Philips launches

Philips launches

Today Philips presented its latest forward looking design project


From The Eponymous Pickle

Beating Humans

Beating Humans

Wired: A Lego NXT and a smart phone beat a human in solving the Rubiks cube.   Intelligence advances.


From My Biased Coin

An Apple a Day

An Apple a Day

Reviewing papers for a conference is a slow, time-consuming process.  Suppose you had 20 reviews due and about 4 weeks to do them.  What's your approach?I take the tortoise approach.  I first try to do a quick pass over all the…


From The Computing Community Consortium Blog

In today’s IEEE Spectrum: Imagine if you could conjure up a key piece of knowledge you had forgotten by having a computer summon everything you were seeing, hearing, and doing at the time to help jog your memory. Researchers…


From Schneier on Security

Random Passwords in the Wild

Random Passwords in the Wild

Interesting analysis:

the hacktivist group Anonymous hacked into several BART servers. They leaked part of a database of users from myBART, a website which provides frequent BART riders with email updates about activities near…


From Putting People First

Google

Google

In a long interview, Matias Duarte, Android


From Putting People First

Metamemory and the user experience

Metamemory and the user experience

When people expect to be able to access information in the future, they tend to have reduced memory for the actual information, but enhanced memory for where to find the information. A feature article on UX Magazine: “Researchers…


From Putting People First

Cadillac User Experience (CUE)

Cadillac User Experience (CUE)

Last week, Cadillac launched its new “CUE” vehicle infotainment system. The name is an acronym that stands for Cadillac User Experience


From Putting People First

The psychology of UX

The psychology of UX

When UX designer Vanessa Carey read Susan Weinschenk’s article “The Psychologist’s View of UX Design” (published in UXMag last year), she decided to explore each of Susan’s ten points in more detail. “I will break down Susan


From Wild WebMink

Should Justin Bieber Go To Jail?

Should Justin Bieber Go To Jail?

If you found my article in ComputerWorldUK yesterday too long and/or complicated, this cmpaign web site is the perfect alternative: Free Justin Bieber.


From The Computing Community Consortium Blog

Illustrating the Role of Fundamental Computing Research

Illustrating the Role of Fundamental Computing Research

White House Office of Science and Technology Policy (OSTP) Deputy Director Tom Kalil and Senior Advisor Kumar Garg have highlighted the role of fundamental computing research in many of the breakthrough technologies we now use…


From Computer Science Teachers Association

Motivating Students and Teachers While Raising the Bar

Motivating Students and Teachers While Raising the Bar

During the past year, a good deal of my work time has revolved around revising our state Business, Finance, and IT Essential Standards. We have organized our standards around three of the States' Career Clusters: Business Management…


From Schneier on Security

New Malware: Duqu

New Malware: Duqu

A newly discovered piece of malware, Duqu, seems to be a precursor to the next Stuxnet-like worm and uses some of the same techniques as the original.

« Prev 1 3 4 5 6 7 12 Next »