The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Collaborative design methods play a key role in aligning team members towards a shared and strategic project vision. In this article Penny Hagen and Michelle Gilmore describe how user stories stimulate and facilitate discussion…
Interesting research: "Countering Kernel Rootkits with Lightweight Hook Protection," by Zhi Wang, Xuxian Jiang, Weidong Cui, and and Peng Ning.
Abstract: Kernel rootkits have posed serious security threats due to their stealthy…Can you remember life without email and texting?
BITD B4 the EMSG, we talked, in person or on the phone, and wrote in a language that was readable. Now, most of our communication is done via email and texting. This sometimes…FuturePundit on Persuasive Technologies. I am also reminded of Stanford's Persuasive Technology lab, who we worked with several times. And their blog.
What do people think about students going to work for a year or two and then applying to graduate school? Or applying but then deferring to work for a year or two?It's that time of year when seniors are thinking about graduate…
Nick Carr on the Eternal Conference call. I think I am still on that call. Insights on asynchrony versus synchrony in communications. -
Guest Post from Aaron Sterling
Multi-Agent Biological Systems and the Natural Algorithms Workshop
I attended the Natural Algorithms Workshop on November 2nd and 3rd. This was an event held by the Center for Computational…
Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade-off. Often it's impossible to do both A and B -- there's no time…
This issue has been on the table since at least 2000. Its such a good idea, so why isn't it taken up by everyone? The benefit studies have been done, the companies are there to provide hardware and software, the problems it solves…
US Department of Justice issues a statement that's the diplomatic equivalent…
Hanging Out, Messing Around, and Geeking Out Kids Living and Learning with New Media (John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning) An examination of young people’s everyday new media practices…
I’m barely 24 hours into my new life as a Googler, and I’ve already gotten lots of questions!
Check out Experientia partner Jan-Christoph Zoels’s superb appearance on CNN’s Christiane Amanpour show yesterday… vividly describing how as an opposition member, he was among the first East Germans to cross into West Berlin…
From CW: I am a bit surprised that these are seeing very widespread use. Article also covers some of the privacy and security watchouts. ' ... People using Twitter to get the word out about their company, sales and promotions…
I am reposting this article from over a year ago to remind myself and readers of interesting work done in very large scale agent models. Here from Simulex, which positions itself as developing Synthetic Environments for Analysis…
Back in 1993 I had the following conversation with one of my relatives:
BILL: Just give me your email address and I'll email it to you.
RELATIVE: I don't have an email account. Why would I? Only you techno-geeks need …
Yes, it does cause some isolation, but also opens many new doors as well.
I believe solutions to many of the most challenging problems facing our society – medicine and health care, climate and the environment, economic security and privacy – will require fusing expertise from multiple disciplines,…
I have refrained from commenting on the case against Najibullah Zazi, simply because it's so often the case that the details reported in the press have very little do with reality. My suspicion was, that as in in so many other…
NESTA, the UK’s National Endowment for Science, Technology and the Arts, has published a 45-page discussion paper on how transforming healthcare to involve the public, i.e. the creation of people-powered public services, can…
Nokia user researcher Jan Chipchase has posted an in-depth presentation and paper on designing mobile money services for emerging markets: “Hang around a telecoms industry conference long enough and you start to get big-number…
I just finished Saturn’s children. This is my third
Recently I wrote about the difficulty of making role-based access control work, and how reasearch at Dartmouth showed that it was better to let people take the access control they need to do their jobs, and audit the results.…
Narratives are a staple of every culture the world over. Yet, argues Ben Macintyre, writer at large for The Times (UK), they are disappearing in an online blizzard of tiny bytes of information. “The internet, while it communicates…
The November 2009 edition of Mobile Money Africa, “Africa’s leading online resource for mobile financial inclusion”, is entitled “Banking the unbanked Africans” and is entirely available for download. The December edition will…
I am delighted to announce that "Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media" is now in the wild and available! This book was written as a collaborative effort by members of the Digital…
I like this reflection from Chris Messina. The OpenOfficeMouse is just part of the rich flora and fauna that happens when you're in a place that's truly open. It's …
In the NYT: ' ... Microscopes are invaluable tools to identify blood and other cells when screening for diseases like anemia, tuberculosis and malaria. But they are also bulky and expensive. Now an engineer, using software that…
For applications like augmented reality it makes sense to investigate ways to better get data directly into your eyes, without having to find a screen or move a smartphone around. And even for the most common interfaces it would…
AdAge reports about increased use of online video by a number of consumer packaged goods players.