acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

January 2013


From The Eponymous Pickle

Cisco Seeks to Tame the Videoscape

Cisco Seeks to Tame the Videoscape

It has been a while since I have written about Cisco, despite working with them for years in the enterprise.    We actively used video in our innovation centers, and managing the wealth and quantity and interpretation of video…


From Geeking with Greg

Kids, programming, and doing more

Kids, programming, and doing more

I built Code Monster and Code Maven to get more kids interested in programming. Why is programming important? Computers are a powerful tool. They let you do things that would be hard or impossible without them. Trying toseven…


From Computer Science Teachers Association

On Being a Technology Teacher in Newtown

On Being a Technology Teacher in Newtown

Editor's Note: This special blog piece was written by our Board member, Patrice Gans, who teaches at an elementary school in Newtown Connecticut, five miles from Sandy Hook Elementary School and deals with her experiences during…


From The Eponymous Pickle

Live CES Blog

Live CES Blog

I have been to several Consumer Electronic Shows (CES).  But it has been years and I have found it just as easy to stay in touch virtually.  For example, with this live blog. It helps to understand the direction of technology…


From The Eponymous Pickle

Health Gamification

Health Gamification

 A review of articles in 2012 on health gamification.   An obvious area of application of enhanced engagement via game dynamics. And with our personal mobile devices, always there at the ready.   But how well does it work?


From BLOG@CACM

Teaching Real-World Programming

Teaching Real-World Programming

In this post, I describe a ubiquitous style of programming that, to my knowledge, has never been formally taught in the classroom.


From Computational Complexity

Do daughtered candidates to better- Look at the Data!

Someone in my election night party predicted Obama because: Ever since women got the right to vote (1920) if one candidate has a daughter and one does not, then the one with the daughter won. This is because they know how to With…


From The Eponymous Pickle

UC Data Visualization Day: January 24

UC Data Visualization Day: January 24

I have been reading Stephen Few's book "Show Me the Numbers: Designing Tables and Graphs to Enlighten",  Second Edition.  It was good to see that Stephen Few will be speaking at the University of Cincinnati on Thursday January…


From Schneier on Security

Details of an Internet Scam

Details of an Internet Scam

Interesting details of an Amazon Marketplace scam. Worth reading.

Most scams use a hook to cause a reaction. The idea being that if you are reacting, they get to control you. If you take the time to stop and think things through…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 7 January 2013

Interesting Links 7 January 2013

Everyone back at school yet? A lot of universities are not while other have short January terms. Most K-12 schools in the US though are back. Some have started a new semester while others are finishing up their first. EitherLate…


From The Eponymous Pickle

Leaders Make the Future

Leaders Make the Future

Bob JohansenIFTF Distinguished FellowInstitute for the Future124 University Avenue, 2nd FloorPalo Alto, CA 94301Author of Leaders Make the Future, Second Edition  Ten New Leadership Skills for an Uncertain World.At Procter &Institute…


From The Eponymous Pickle

Data Science as the Future of IT

Data Science as the Future of IT

In GigaOM:  Another overstatement, but a useful one to think about.  Analytics, necessarily based upon data, is the essence of driving value from information, and as analytics is a key part of data science, it does make broad…


From My Biased Coin

Security, Disclosure, Legality

Security, Disclosure, Legality

I guess I'm late to this news, but I stumbled across the case of Andrew Auernheimer, who was convicted of one count of identity fraud and one count of conspiracy to access a computer without authorization, for posting to Gawker…


From updated sporadically at best

What is Computer Science?

What is Computer Science?

Every now and then, a non-technical friend--or stranger at a party--will ask me, "What is computer science?"  As your typical antisocial computer scientist, I am often too tired to do justice to this question.  From now on, I…


From The Eponymous Pickle

Competitors Address Myths with Vaginal Knowledge

Competitors Address Myths with Vaginal Knowledge

In Adage:  Interesting approach from Kimberly-Clark that competes with work by my former enterprise, P&G.  The positioning seems to be delivering expertise vs the addition of a social element.  Any reaction to how well the two…


From The Eponymous Pickle

Neuromarketing Video

Neuromarketing Video

An MSN Canada video on the use of neuromarketing.  Nothing very new here, but I like that they show an application of eye-tracking, neuroactivity analysis and emotion integration in a specific live retail application.  This gives…


From The Eponymous Pickle

Gamification as Concept Waning

Gamification as Concept Waning

I was involved in a number of applications in the enterprise that would today be called gamification.  Involving people to engage with systems and data to compete for better value.  Using the concepts used in online games.  Since…


From Gödel's Lost Letter and P=NP

Predictions and Principles

With a year end thank-you to Ken Ken Regan is the co-editor of GLL and is one of the internationally-ranked chess players in the US. He has won the city championship of Buffalo every time he has played. He is also a great friend…


From Schneier on Security

Friday Squid Blogging: Giant Squid Finally Captured on Video

Friday Squid Blogging: Giant Squid Finally Captured on Video

We'll see it later this month.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From Daniel Lemire's Blog

Experience is everything

Experience is everything

We learned recently that one of the leading opponents to genetically modified organisms (GMOs), Mark Lynas, decided that he had it all wrong. GMOs save the Earth by reducing the need for pesticides, getting poor farmers out of…


From The Eponymous Pickle

Upcoming OBAIS Seminars

Upcoming OBAIS Seminars

Upcoming at the University of Cincinnati:The OBAIS department invites you to attend the following four seminars in January, all of which will be in Lin 217 from 1:30 - 2:30 PM on either Wednesday or Friday.Talk title, abstract…


From The Computing Community Consortium Blog

Secure and Trustworthy Cyberspace Meeting

Secure and Trustworthy Cyberspace Meeting

On November 27-29, 2012, the National Science Foundation (NSF) Secure and Trustworthy Cyberspace (SaTC) Principal Investigator Meeting was held. The SaTC program is NSF’s flagship for cybersecurity research. NSF program officers…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Nerd Score, Geek Code and Over Reaching the Geek

Nerd Score, Geek Code and Over Reaching the Geek

The other day I was bouncing around the Internet an came across of quiz to compute ones “Nerd Score.” It was a fun little quiz and I knew I’d come out fairly nerdy as these quizzes tend to run. It reminded me of the old GeekThe…


From Putting People First

Steelcase’s anthropologist on remaking offices to create happier workers

Steelcase’s anthropologist on remaking offices to create happier workers

Anthropologist Donna Flynn directs Steelcase’s WorkSpace Futures, a 19-member independent research group within the global office design company, that is responsible for “thinking into the future”: understanding the trends shaping…


From Putting People First

Big Data, healthcare, and the human lens

Big Data, healthcare, and the human lens

Now and then somebody writes something that you don’t only wholeheartedly agree with, but that is so deliciously written that it’s a pure joy to read. Ian Eslick, a PhD candidate at the MIT Media Laboratory and co-founder of…


From Putting People First

Fitness by design

Fitness by design

Can data heal? Yes, argues Dan Hon, whose type 2 diabetes spurred him to embrace “personal informatics” devices such as the Nike FuelBand and the Fitbit. Yet as such devices become a part of everyday life, a new challenge emerges…


From My Biased Coin

No Stress

No Stress

Greg Morrisett points me to this bit of silliness to start my morning: University professors have a lot less stress than most of us. Unless they teach summer school, they are off between May and September and they enjoy long…


From The Eponymous Pickle

Cleveland Indians Using ThinkVine

Cleveland Indians Using ThinkVine

I just got a press release from marketing mix optimization and simulation modeling company Thinkvine saying that the Cleveland Indians baseball organization is using their technology for marketing mix type applications.  …


From The Female Perspective of Computer Science

Carleton Quest Now Available in the App Store

Carleton Quest Now Available in the App Store

I celebrated New Year's by getting my first iPhone app into the App Store! It's a story-based QR code activity (currently but probably not permanently called Carleton Quest) intended to help new students at Carleton University…


From Schneier on Security

What Facebook Gives the Police

What Facebook Gives the Police

This is what Facebook gives the police in response to a subpoena. (Note that this isn't in response to a warrant; it's in response to a subpoena.) This might be the first one of these that has ever become public.