The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
The New York Times
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.
It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away the most read of 2011. The first on the list had over…
Last night I was running some code for a queuing simulation related to some research I'm doing. This is the Nth time I've used this code; I wrote up the basic simulator back in grad school for some of my thesis work (on the…
When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company, and the corporate and customer culture involved. The book also nicely…
A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to charge for map API use.
Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details of systems development, perhaps not, but a useful starting…
The story of how Subway's point-of-sale system was hacked for $3 million.
Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didn
It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away the most read of 2011. The first on the list had over 20,000 views…
Is it of value to Tech? From Wharton. It is always useful to think about, but may not be the key measurement for all innovations. The Kindle Fire is brought up as a good example.
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake frosting was "gel-like" enough to constitute a security risk…I like adding the emotion part. News release:" ... In the US, EmSense
Good WSJ piece on Heuristics. Not random hunches, but rules of thumb that work. Not always perfectly, or optimally, but are very useful to get to a real conclusion. Our brains are full of them, we learn them from birth,Stan…
As a long time cook this is a challenge. Some alternatives. But no, not impossible. As simple as a file folder. Or as complex as an associative memory.
LibreOffice Xmas, originally uploaded by elianedomingos. A very happy Christmas to everyone who reads Wild Webmink. May you find software freedom waiting for you in the coming year! If you need a last-minute gift for someone,…
It's a metaphor that will not die.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Good overall piece in GigaOM on the state of mobile smartphone payments. Have followed the idea for years, and it has been a long road. Finally in 2012? 2013? A 'good' Amex infographic sets the stage.
Mildly amusing video.
At a recent family gathering, my father-in-law delighted in the accomplishments of his four year old granddaughter who effortlessly navigated her mother's iPad. He was awed by the ease with which she used the technology and,…
As we celebrate the holidays and get set to close the books on 2011 — a banner year for the CCC Blog, with more than twice as many page views as in any previous year — we thought we would take a quick look back at some of the…
In the apparel industry where RFID item level tagging has been generally successful. We commissioned a similar study years ago with MIT and the University of Arkansas that I pushed back on unsuccessfully, given the management…
I have mentioned Saffron Technologies a number of times here, since visiting them five plus years ago. Just now re-examining their associative memory techniques for several applications. " ... For example, a new situation…
A look at a technologically impressive new vending machine. Will this concept machine engage, sell? Japan Gets Vending Machine 2.0 With See-Through Full HD Display, Facial Recognition The comments suggest it is too complex in…
Google is calling for applications to its 2012 Google Policy Fellowships, which offer
One of the great things in my job is the chance to make connections between people doing interesting things. Lately a lot has been happening in the world of educational uses for the Kinect Sensor utilizing the Kinect for Windows…
I thought I should give a brief description of MIC and MINE, the topic of our Science paper. Although you're probably better off, if you're interested, looking at our website, http://www.exploredata.net/. Not only does it have…
In Digital Signage Today: A video of cool out of home digital signage deployments from 2011. By Keith Kelsen. I am currently reading his 2010 book: Unleashing the Power of Digital Signage: Content Strategies for the 5th Screen…
Fairly remarkable result. Technology purchases continue to move forward. Will we all be virtual in the Cloud soon?
Seeking to motivate the development of novel solutions to serious computer security threats, Microsoft Corp. has launched an inaugural BlueHat Prize contest, offering a grand prize of $200,000 to the most innovative submission…