The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
There was quite a
A long post on how companies can use data to be disruptive. Scattered but useful information to scan. All companies create data, and you might as well leverage that to be more efficient and profitable.
(INNOVATIONS CONFERENCE: here)
(While preparing this two other bloggers wrote on the same topic, Scott here and Lipton/Regan here. Our slogan: Complexity Blog: You heard it here THIRD.)
Let w be the exponent for matrix…
I worked for some time on using business analytics methods to create coffee flavors. Here CBS 60 Minutes talks about creating flavors. As might be expected for them they develop a 'hit' angle regarding the addictive aspect…
After working for a number of years as a commercial programmer, I decided to become a teacher here in New Zealand. As part of my teacher training, I had to chose three subjects to teach and the main subject I chose was Maths…
Google giving business tours. Stepping inside from just giving the street view. I like the general idea.
I mentioned in a previous post P&G building virtual retail spaces and using this idea to better understand the shopping consumer. Now an article about how they are outsourcing the management of some 20 P&G virtualization centers…
The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology:
The virus is an H5N1 avian influenza strain that has been genetically altered…I recently met with Brian Moon of Perigean Technology, practitioner of the what is called 'Concept Mapping', an advanced form of what is also called mind mapping. We have used it in the enterprise for years and it a well worn…
Two relevant challenges announced recently that are placing emphasis on prize-based innovation: DEBUT Challenge (for undergraduate students): The National Institute of Biomedical Imaging and Bioengineering (NIBIB) has announced…
I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied:
But others inside the American intelligence community say sloppy "tradecraft" -- the method of covert…I had the following question via Twitter the other day
It’s that time of the year again. If you don
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves with poisons. They pump their roots with highly toxic insecticides…The Defense Advanced Research Projects Agency’s (DARPA)
Steve Sands of SandsResearch reports on neuromarketing activity in China. The link below constains considerable detail: It's the fastest growing market and neuromarketing's the fastest growth area of market research. A great…
I like doing things artfully, but I always prioritize being able to objectively understand and interact with data first beyond sheer 'Form'. Nevertheless the following TED talk shows some useful techniques that might be used…
Apache has been criticised for preventing new Incubator projects using Git. In its defence, some have claimed this is a criticism of the idea of the Foundation. It’s not, and I use the case of the Koha community to explain why…
Gamification is certainly a hot topic these days. Jesse Schell opened Pandora's Box with his Visions of the Gamepocalypse talk. Sebastian Deterding discussed the promises and pitfalls of gamification. Ian Bogost came right…
CS is declared to be the hottest major on campus based on enrollment at the top institutions. But is it rising everywhere? We don't really know how to measure computing knowledge. Is that a problem?
An interesting computer security research result making news this morning — and stirring some controversy — courtesy of msnbc.com: Could a hacker from half-way around the planet control your printer and give it instructions so…
Electronic surveillance is becoming so easy that even marketers can do it:
The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd., a Portsmouth, U.K.-based company. It uses sensors placed throughout…The power of knowing what your customers want before they do.
Aileen Lee, partner at venture firm Kleiner Perkins Caufield & Byers, believes that the best way to cost-effectively attract valuable users is harnessing a concept called social proof. “What is social proof? Put simply, it’s…
The Computer Science Teachers Association runs what I consider the single best and most important professional development events of the year for computer science educators - the Annual Computer Science & Information Technology…
Keith Weed, Chief Marketing and Communications Officer of Unilever writes:
The Speaker is BJ Fogg head of Stanford's Persuasive Technology lab who we used in several projects in the enterprise: Aetna sponsors a Challenge: " ... Seniors are plagued by disability, declining health, and social isolation…
Towards a taxonomy of all things. Which would be a very useful thing but turns out to be quite difficult.
Innovative Guy Kawasaki visits Cincinnati and P&G and takes pictures of the background and industrial processes. I did something like this years ago but they didn't let me take pictures. Security has mellowed considerably. Via…
A recent paper out of Google, "Extracting Patterns From Location History" (PDF), is interesting not only for confirming that Google is studying using location data from mobile devices for a variety of purposes, but also for the…