The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Reputation Economics: Why Who You Know Is Worth More Than What You Have by Joshua Klein Palgrave Macmillan Publisher November 2013, 256 pages [Amazon link] Abstract As the internet has increasingly become more social, the value…
Kevin Simler is clearly a highly informed and engaging writer. In this essay, he argues that “UX is etiquette for computers“. “A focus on appearance is just one of the ways UX is like etiquette. Both are the study and practice…
Artefact Group, the Seattle based design company, has posted the first installment of its Behavior Change toolkit. “We’ve curated this selection of cards to give you a sample of principles and strategies that you can apply to…
Richard Heinberg, author of The End of Growth, gave the keynote address at the ‘Seoul Youth Hub Conference 2013, Reshaping the Way We Live’, held in Seoul, Korea from 6 to 8 November 2013. The conference was co-hosted with 8…
The more our data is used to determine our needs and desires, the less chance there is for serendipity, writes Bronwen Clune. Are we willing to make this concession in the name of progress? “Tracking, data mining and collaborative…
Wizard Events announces that they have been around for twenty years. I have scoped out some events with them. Congratulations! Their founder Russell Brumfield was an early innovator in this space, and is impressive in their…
Debating a standard:Whats in a 95 percent confidence?Is there something special about a 95 percent probability? Absolutely not; a recent paper referred to it as "seemingly arbitrary." It's simply been arrived at through the consensus…
In GigaOM: Not unexpected, have been impressed by Intel's analytical work for some time. " ... Intel is using big data to improve everything from manufacturing efficiency to sales, and is increasingly looking toward technologies…
New way to create infographics about your competitors. The well known petal diagram. " .... The Petal Diagram drives your business model canvas ... What the chart is saying is, “we think our customers will come from these…
One of the buzzwords in education today is the flipped classroom. I was prompted to try out this model last year when I came down with a stomach bug that prevented me from going to school for four days. We were about to start…
From New Scientist and ACM: An experimental method to unmask sock-puppets (usually phony paid commenters, reviewers or contributors) based on the way they write.
In the past year or so, I've gotten reviews back on multiple papers with the complaint that the result was too simple. My interpretation of review: sure you might have come up with an efficient data structure that solved anSuresh…
November 19 Hearing: The House Science, Space and Technology Committee will hold a hearing on the data security of the Healthcare.gov website. 1o a.m., 2318 Rayburn Building The Health Subcommittee of the House Energy and Commerce…
Suppose that you are researching a given issue. Maybe you have a medical condition or you are looking for the best algorithm to solve your current problem. A good heuristic is to enter reasonable keywords in Google Scholar. This…
This video is so beyond awesome that it deserves its own blog post. I may or may not have shed a few tears watching it. Keep on kicking butt, GoldieBlox. We need you.
Read more about this video and project here.View this post…
SC13 is featuring sixteen companies on the exhibit floor that have adopted HPC as part of their core business and, as a result, have transformed their ability to compete and succeed. From NASCAR to diapers, the HPC Impact Showcase…
Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to defend against it. Remember that while QUANTUM is an NSA program…
I made a quick trip to Tucson AZ over the weekend for the CSTA Board meeting. Beautiful part of the country and I wish I had more time to explore it. But meeting are meetings. Still had a good time as the weekend was filled with…
Need help with business analytics? Big Data visualization, analysis and mining? Writing, Speaking, Managing. Strategy and Tactics. Over thirty years of experience. Available.My updated resume.Use the contact information…
President Barack Obama has announced his intent to nominate two new members to the President’s Council of Advisors on Science and Technology Policy (PCAST). The new appointees are J. Michael McQuade, Senior Vice President of…
After publishing a item about an infographic I liked, about products we buy, it was pointed out that some of the data was incorrect. That is true. But I was also pointed to another infographic about c-Suite connections to"…
More on the IBM giving access to Watson technologies to allow the building of cognitive Apps in the cloud. A good direction. The App style of infrastructure would allow lots of new experiments by developers. And it is experiments…
In the HBR: Indicating that they constantly audit their business model. Which has led to increases in the number of US warehouses, and their recent proposal to use the US postal service for Sunday deliveries in select regions…
In Freebeacon: How can social media information be mined for indications of health related behavior? " ... Specifically, NLM will look at the “value of tweets and other messages as teaching tools and change-agents for health…
As we approach the start of the new calendar year, it is time to start the CSTA Board of Directors nominations and elections process once again. CSTA is a member organization led by a working board of directors. The affairs …
In Adage: We have an Ikea store nearby. The number of items they have is so large that it is hard to believe anyone can recognize one that is out of place. So a design agency surreptitiously placed a product there in the right…
In the HBR: I like this argument about not being defensive in communications. Found myself in this position. And has some practical methods to implement it that I will try.
An aspect I had never thought about very much, but very true. " ... Let’s look at IT in a simple way. There are users, there are applications, there is hardware and there is data – just four distinct things that work together…
The last part of our interview with Gödel two years ago src Kurt Gödel is said to have been a latecomer to appreciating the power of Model Theory. He was of course the greatest architect of Proof Theory, which stands in contrast…
Cool photo.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.