acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

January 2015


From The Eponymous Pickle

Kimberly-Clark and Advanced Technologies

Kimberly-Clark and Advanced Technologies

Piece in Mediapost about how CPG companies are looking at advanced technologies.   Some curious examples." ... Many brand marketers make the annual pilgrimage to CES in search of the next big thing. On Monday, a team from CPG…


From Wild WebMink

Responding to terrorism

Responding to terrorism

I am appalled and horrified by the wicked and murderous attack on Charlie Hebdo in Paris. Settling scores with violence is the recourse of ignorant, cowardly barbarians – lower than animals. I am heartbroken for every person…


From The Eponymous Pickle

Gamifying Business Travel

Gamifying Business Travel

From Amex: Pointers to some work that American Experss has done, mention of using gamification to reduce costs.  Have downloaded but not read the results.


From The Eponymous Pickle

Graph Analytics and Gephi

Graph Analytics and Gephi

In Forbes, an article on Graph Analytics.    Good overview,  it will become important, but no mention of Gephi,  an Open Graph Viz Platform.   Its free for experimentation.  It is not the same thing that Forbes describes, but…


From Schneier on Security

Fidgeting as Lie Detection

Fidgeting as Lie Detection

Sophie Van Der Zee and colleagues have a new paper on using body movement as a lie detector: Abstract: We present a new robust signal for detecting deception: full body motion. Previous work on detecting deception from body movement…


From The Eponymous Pickle

Twitter and this Blog

Twitter and this Blog

Many of the posts here are supported by tweets, my address on twitter is @FranzD. In addition I will often retweet supporting and related information on topics here by others in Twitter.  Google + is also used,  but much less…


From The Eponymous Pickle

Hot Innovation Tools

Hot Innovation Tools

Innovation Excellence on hot innovation tools.  This is more about innovation processes rather than specific tools.  Worth a look.


From The Eponymous Pickle

Grocery Attracting Millennials

Grocery Attracting Millennials

In MediaPost: Creativity, engagement will help retailers attract millennials " ... Retailers should tap creativity and engagement to attract millennial shoppers, who will account for 80 million consumers and boast more than $200…


From The Computing Community Consortium Blog

Exploiting Parallelism and Scalability Deadline Approaching

Exploiting Parallelism and Scalability Deadline Approaching

The National Science Foundation (NSF) issued a new solicitation for the Exploiting Parallelism and Scalability (XPS) program.  The Computing Community Consortium (CCC) 2012 White Paper “21st Century Computer Architecture” was…


From The Computing Community Consortium Blog

Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences

Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences

The Council on Library and Information Resources (CLIR) is seeking applicants for Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences. The Data Curation Fellowships will provide recent Ph.D.s with professional…


From Wild WebMink

DLC 1: Hotel arrogance, the no-win laptop and more

DLC 1: Hotel arrogance, the no-win laptop and more

Originally posted on Meshed Insights & Knowledge:Digital Life Clippings from week 1 Marriott will ban shareable WiFi if the FCC don’t let them block it – NYT – Their arrogance in attempting to protect their high-margin abuse…


From The Eponymous Pickle

Innovation Capacity and Smart Service Systems

Innovation Capacity and Smart Service Systems

Building Innovation Capacity Using Smart Service SystemsNSF proposalsSmart Service Systems—Unrestricted as to domain knowledge and application areas. This topic has been further refined and defined, including a stronger emphasis…


From Schneier on Security

Attributing Cyberattacks

Attributing Cyberattacks

New paper: "Attributing Cyber Attacks," by Thomas Rid and Ben Buchanan: Abstract: Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of…


From Computational Complexity

Why do students do this?

Before my midterm in ugrad  Theory of Computation  I gave the students a sheet of practice problems to do that I would go over before the midterm. One of them was: Let L be in DTIME(T(n)). Give an algorithm for L*. Try to make…


From Putting People First

A manifesto for qualitative research (and more)

A manifesto for qualitative research (and more)

TNS, a global company specialised in market research, global market information and business analysis, has published some papers that are quite aligned with what the UX research and design community has been practicing for years…


From The Eponymous Pickle

Samsung and the Smart Home

Samsung and the Smart Home

Continue to follow Smart Home directions.  At CES Samsung promotes its Tizen OS. I have said before I am unimpressed with Samsung software in the Smart TV realm.  Here I will see. " ... Samsung Hopes Software Will Make It the…


From U.S. Public Policy Committee of the ACM

FCC Invites Nominations for the 4th Annual Chairman’s Awards for Advancement in Accessibility

FCC Invites Nominations for the 4th Annual Chairman’s Awards for Advancement in Accessibility

The FCC invites nominations for the 4th Annual FCC Chairman’s Awards for Advancement in Accessibility. The Chairman’s Awards aim to highlight and encourage innovation in accessible technologies, standards, and best practices…


From U.S. Public Policy Committee of the ACM

FCC Invites Nominations for Disability Advisory Committee

FCC Invites Nominations for Disability Advisory Committee

The Federal Communications Commission (FCC) invites nominations for a new Disability Advisory Committee. Appointees will serve a two-year term and will be compensated. The FCC anticipates appointing 25 people. Appointees should…


From The Eponymous Pickle

Digital Shopper Marketing Magazine

Digital Shopper Marketing Magazine

From the Path to Purchase Institute.  Contains the 2015 trends report for Shopper Marketing.  Good resource.   See also their Linkedin Group.


From The Eponymous Pickle

Couponing and Retailing

Couponing and Retailing

Some of the earliest data analyses I did in CPG were evaluating the efficacy of coupons.  The debate continues about their value, now in many different media.  In Retailwire.


From The Computing Community Consortium Blog

Young Scientists Invited to Apply for Third Heidelberg Laureate Forum

Young Scientists Invited to Apply for Third Heidelberg Laureate Forum

Preparations for the third Heidelberg Laureate Forum (HLF) are in full swing, and applications from young researchers to attend are now being accepted. HLF will once again bring together winners of the Abel Prize and Fields Medal…


From The Eponymous Pickle

Protective Swarmware

Protective Swarmware

As expected we are seeing the application of swarms for military and defense applications.  We saw the application suggested a long time ago.  Expect there to be many more such examples.  See the link below for much more


From U.S. Public Policy Committee of the ACM

President Signs Cybersecurity Legislation

President Signs Cybersecurity Legislation

The President signed several cybersecurity bills toward the end of 2014.  Much of the legislation signed by President Obama affects various cybersecurity functions within the Department of Homeland Security (DHS): Federal Information…


From Schneier on Security

Loitering as a Security System

Loitering as a Security System

In Kyoto, taxi drivers are encouraged to loiter around convenience stores late at night. Their presence reduces crime. In Kyoto about half of the convenience stores had signed on for the Midnight Defender Strategy. These 500…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 5 January 2015

Interesting Links 5 January 2015

First interesting links post of the new year! I hope your year is off to a good start. Classes started back up for me today. I think I’m ready even though I didn’t get all the grading done that I planned. Oh well I needed the…


From The Eponymous Pickle

Data Architecture and Big Data

Data Architecture and Big Data

An overview of the challenges." ... The big data onslaught will continue for the foreseeable future, and is only going to grow more intense from exponential data growth.  But here’s the challenge: the human mind tends to think…


From Gödel's Lost Letter and P=NP

Mathematics: It’s About the Future

How some predictions fared in 2020 and other years Zimbio source Simon Donaldson, Maxim Kontsevich, Terence Tao, Richard Taylor, and Jacob Lurie (photo order) won the 2015 Breakthrough Prize in Mathematics. This did not happen…


From The Eponymous Pickle

The New Investor Rush to AI

The New Investor Rush to AI

In the Financial Times (May require registration)    A look at investment in AI style systems today. Excellent comparative numbers. Emphasizing the largest investments.  I was involved with the last wave, in the late 1980s which…


From Wild WebMink

A Europe Of Treaties?

A Europe Of Treaties?

I am no fan of elitist bureaucracy, but I am not a euro-sceptic. I am convinced the European Parliament and the civil service around it is close to the best available compromise for this part of history. Without getting too starry…


From The Eponymous Pickle

Illusion Coatings

Illusion Coatings

Pretty scary ideas that have all sorts of implications.  But I suggest that this also lead to all sorts of countermeasures as well.