acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

January 2011


From The Eponymous Pickle

Superbowl Ad Research Competition

Superbowl Ad Research Competition

Sands Research reports on their annual comparison of Superbowl ads using neuromarketing techniques. An entertaining and instructive experiment of emerging marketing measurement methods.  Also reported in this document, an early…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Here we go loopty loop

Here we go loopty loop

I


From The Female Perspective of Computer Science

Powerpointless Workshops

Powerpointless Workshops

Today I put on a workshop for my fellow TA Mentors on Powerpointless Workshops.  While I don't think that using slides is totally evil, it's definitely the case that many people abuse them.  As Matt Might recently said in the…


From Putting People First

Innovating in the French wine industry

Innovating in the French wine industry

How does an entrepreneur successfully introduce innovation to a gastronomic tradition that is a cornerstone of French culture and identity? St


From Apophenia

why I

why I

Y’know how when you’re really really tired and your eyes refuse to focus unless you force them to? And if you force them to, you’re inviting a searing headache? Much to my dismay, that’s been my reality since I returned from…


From Schneier on Security

Security Theater, Illustrated

Security Theater, Illustrated

Security theater, illustrated.


From The Eponymous Pickle

EmPower Research

EmPower Research

Newly discovered: EmPower Research.  " ... EmPower Research provides Custom Market and Media Intelligence services to Global 2000 companies, and Advertising and PR agencies worldwide. It was founded in 2004 by MIT Sloan MBAs,…


From The Eponymous Pickle

IT's Change of Focus to the Front End

IT's Change of Focus to the Front End

Interesting thoughts about a change in IT direction.  Mobile, Front-End, Sensor based, making just-in-time and place practical sense and value of lots of data (analytics):Why today's IT focus is now on the front endThe focus…


From The Eponymous Pickle

British Library App

British Library App

An interesting British Library App.  Capabilities continue to move to mobile. Even things you might expect to be there.


From Computational Complexity

The Ideal Conference

I found the perfect CS conference. A meeting where computer scientists from all its subdisciplines come together. Not with the purpose of presenting their current research and padding their CVs, but to hear about the latest ideas…


From Wild WebMink

links for 2011-01-27

links for 2011-01-27

Bookdarts bookmarks – 50 count tin – bronze: Amazon.co.uk: Office Products I have loved these paper-thin metal page markers ever since I first discovered them in the US over a decade ago. I'm delighted to find they are now available…


From Schneier on Security

U.S. Strategy to Prevent Leaks is Leaked

U.S. Strategy to Prevent Leaks is Leaked

As the article says, it doesn't get any more ironic than that.

More importantly, it demonstrates how hard it is to keep secrets in the age of the Internet.

Me:

I think the government is learning what the music and movie …


From Putting People First

The near future of the user interface

The near future of the user interface

Two articles and one prototype provide diverging viewpoints on the near future of the user interface: Microsoft plans a natural interface future full of gestures, touchscreens and haptics An official Microsoft blog highlights…


From The Eponymous Pickle

E-Mail Use Changes

E-Mail Use Changes

In Computerworld: E-mail use advances on mobile devices, declines on laptops. Fundamental change.


From The Eponymous Pickle

Wallet Apps

Wallet Apps

In Technology Review:  Apps that could change your smartphone into a wallet. Overview of the state of the technology.


From Schneier on Security

Security Theater in the Theater

Security Theater in the Theater

This is a bit surreal:

Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature subcommittee said yesterday.

[...]

Broadway district…


From The Eponymous Pickle

Wolfram on Jeopardy

Wolfram on Jeopardy

Fascinating piece in Stephen Wolfram's blog on the IBM assault on the Jeopardy game.  Includes some intriguing comparisons about how other online knowledge search mechanisms can be used to get to the same answers, including Wolfram…


From Computer Science Teachers Association

Does Everyone Need to Learn How to Program?

Does Everyone Need to Learn How to Program?

I suspect that beneath discussions of computing/computer science/computational thinking in K-12, there is an underlying fear that the computer scientists will come along and make everyone learn to program. So here's my perspective…


From Wild WebMink

? Indemnity Article Available/Dispon

? Indemnity Article Available/Dispon

My article on the problem of indemnity requirements for open source procurement is now available in the Essays section, in English and Portuguese. O artigo “Aquisi


From The Eponymous Pickle

Personalizing the Message

Personalizing the Message

A case study of personalizing the message with Technology: " .... Digitized window displays, motion-gesture navigation signs and custom e-mail messages are some of the technological advances retailers are using to win customers…


From The Eponymous Pickle

Neuroscience Boot Camp

Neuroscience Boot Camp

Third annual Neuroscience boot camp at the University of Pennsylvania this summer, have not been, but looks to be good or those seeking to understand the space.


From Wild WebMink

links for 2011-01-26

links for 2011-01-26

ACS:Law Can


From Schneier on Security

Unsecured IP Security Cameras

Unsecured IP Security Cameras

It's amazing how many security cameras are on the Internet, accessible by anyone.

And it's not just for viewing; a lot of these cameras can be reprogrammed by anyone.


From Putting People First

Experientia trademarked its name

Experientia trademarked its name

When Experientia’s four partners decided to start a business back in 2005, one of the important discussions then was about the name. After brainstorming on the philosophy, concepts and strategies that would underlie the business…


From Putting People First

Pleasant things work better

Pleasant things work better


From Putting People First

Experientia congratulates Italy on Esperienza Italia

Experientia congratulates Italy on Esperienza Italia

2011 marks the 150th anniversary of Italian unification, and it is fitting that the celebrations are kicking off in Turin, which (in addition to being Experientia’s home base) was the first capital of the unified country. The…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Field Trip! Johnny Cupcakes and More

Field Trip! Johnny Cupcakes and More

I


From The Computing Community Consortium Blog

State of the Union

State of the Union

“Innovation” and “Internet” are on the rise.


From The Eponymous Pickle

Pay by IPhone

Pay by IPhone

More on the motivations of Apple to include near field communications and Wallet software in the IPhone.  A long expected direction ... Phone as Wallet.


From The Female Perspective of Computer Science

QR Code Story Adventures

QR Code Story Adventures

A QR code is 2D bar code that was standardized well enough that free decoders are readily available for computers and smart phones.  You can encode about 3 KB of data according to Wikipedia, and this data can simply be text. …