The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Esko Kilpi, the principal of Esko Kilpi Ltd, a leading research and consultancy firm focusing on the art of interaction, science of social complexity and the design of digital work, writes about how the value of a product is…
Behavioural Economics and Health: Nudging Toward a Culture of Wellness Report by David Verbeeten The Conference Board of Canada, 52 pages, January 15, 2015 This report explores “nudging,” a new, cost-effective policy tool than…
Interesting piece. I recall working on something like this for the construction of a competitive analysis database. Though it was not called a structural data object. Maintenance of an unexpectedly varying structure became…
A favorite topic. Segmentation. Classically a large amount of analytical effort in CPG has been put into this topic. Is it science or art? It is, both I agree. But the specifics of this art and how it interacts with design…
Interesting piece in the BBC on the hidden ways of traffic flows. A favorite topic. In paricular how groups of entities act and interact. Here it is more about transportation flows. We also worked the problem, but in retail…
Very good piece from McKinsey. Lots of opportunity here in the semicondictor industry. " ... The data amassed from these devices can then be analyzed to optimize products, services, and operations. Perhaps one of the earliest…
At Experientia we believe in the importance of understanding cultural differences, no matter how wide they might be. There is not much qualitative research, it seems, that aims at understanding the lived experience of Muslim…
Can Loyalty Marketing fulfill its promise? Good examination of the topic. Ultimately it can achieve its promise through the natural integration of its data with other data resources.Without that it remains simplistic.
Appelbaum, Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations to infiltrate and exploit networks around the world. There's…
Recent research from the University of Kansas looks at the way technological advancements influence interpersonal communication, with a focus on familial relationships. The study tested whether the number of media used by families…
Creating Cognitive Applications Powered by IBM Watson: Getting started with the APIby Kevin Haverlock, Sridhar Sudarsan" ... Cognitive computing systems are built to learn from how they are used and adapt to their processing.…
In Data Science Central. A simplistic view. But true in a sense that it is the most important skill you should have. Being able to come to understand and solve real business problems. Yet it is also efficient to have specialists…
(In September) Unfortunate to hear, visited a number of times. Is it because they feel they don't need a physical place to do research, or are they breaking it down into regional locations? Reminds me of our ongoing argument…
A favorite topic. Though I see my definition is broader. It is data that is not used. Maybe that is not accessible, but even that we do not know about. The Big Data solution proposed is often Store it all! But that creates…
A lengthy article that gives cues to how we can use biological models for computation. Video."... Biological systems, ranging from the molecular to the cellular to the organism level, are distributed and in most cases operate…
Classic song written by Arthur Scammell and performed by Hank Snow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
This week the Obama Administration has been previewing some of the topics the President will cover in his State of the Union address. That speech will take place next Tuesday, January 20, at 9 p.m. Eastern. (If you watch the…
It has been called lifelogging, a means to record continuous clips of point-of-view images as you work or play. It was suggested and tested for easily gathering information about in-store conditions. The Narrative-2 is a recent…
For its "Top Influencers in Security You Should Be Following in 2015" blog post, TripWire asked me: "If you could have one infosec-related superpower, what would it be?" I answered: Most superpowers are pretty lame: super strength…
Thad Starner, who we followed from his days at MIT, now a Prof at Ga Tech, discusses the history and evolution of wearbles. In Computing Now. Excellent details are included. " ... Thad Starner, who has been wearing a "homebrew"…
In Popsci: Phony cell phone towers. This has been reported on for some time, with more details emerging.
Is it all about data and leveraging analytics. And an architecture to support them.In OReilly: " ... The Internet of Things (IoT) has a data problem. Well, four data problems. Walking the halls of CES in Las Vegas last week,…
Vincent Granville started the discussion "Mining Massive Datasets - Coursera Course (Stanford)" in the group Analytics Courses on AnalyticBridge. Now looking at the scale of databases more closely.
I have long said that driving a car is the most dangerous thing regularly do in our lives. Turns out deaths due to automobiles are declining, while deaths due to firearms are on the rise: Guns and cars have long been among the…
Case study: Service innovation in the public sector Service Design Network site This case study is based on a series of public sector projects commissioned by the Chamber of Commerce in conjunction with local governments in two…
On 7-8 October around 650 global thought leaders and practitioners from sectors such as hospitality, insurance, retail, telecommunications, finance, IT and healthcare gathered in Stockholm for the 7th Service Design Global Conference…
I recall that we introduced Google to the moment of truth mantra, and they popularized the zero aspect. Just now in Thinking With Google, a collection of their writings on the topic. Twenty-one articles. A worthwhile way to…
An excellent idea: 311 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top bag; 1 bag per message placed in screening bin. The bag limits…
Natural language, our use of communications like text and speech and documents to communicate with other people, would be the ideal way to communicate with computers. Yet there are still complexities of its use that are difficult…