acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

December 2011


From The Eponymous Pickle

New Disruptions in Retail

New Disruptions in Retail

We will continue to see additional changes based on technology.  Ne prepared in engagement proposals.  As the article suggests, the gold will be in the data.


From The Noisy Channel

HCIR 2011: Now on YouTube!

HCIR 2011: Now on YouTube!

The Fifth Workshop on Human-Computer Interaction and Information Retrieval (HCIR 2011), held on October 20th at Google’s main campus in Mountain View, California, was a resounding success. We has almost a hundred people, presenting…


From Schneier on Security

Friday Squid Blogging: Squid Season

Friday Squid Blogging: Squid Season

It's squid season off the coast of Southern California.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From Schneier on Security

Me Speaking on Cryptography in 1997

Me Speaking on Cryptography in 1997

In 1997, I spoke at the Beyond HOPE Conference in New York. (HOPE stood for "Hackers Over Planet Earth.) A video of that talk is available online.


From Schneier on Security

Cameo in a Rock Video

Cameo in a Rock Video

At the 1:46 mark, you'll see my first cameo appearance in a transvestite-themed rock video.


From Schneier on Security

More on the Captured U.S. Drone

More on the Captured U.S. Drone

There's a report that Iran hacked the drones' GPS systems:

"The GPS navigation is the weakest point," the Iranian engineer told the Monitor, giving the most detailed description yet published of Iran's "electronic ambush" of…


From The Eponymous Pickle

Unilever Changing the Mix

Unilever Changing the Mix

I am often asked questions about continuing TV ad dominance.  Is this an indicator of major media buyers making significant mix changes?


From The Eponymous Pickle

CEOs and the Cloud

CEOs and the Cloud

A good HBR article on what every CEO needs to know about the Cloud.   As usual the comments are also thoughtful.   Requires registration for full article or payment for a pdf copy.


From Schneier on Security

Snow Cone Machines for Homeland Security

Snow Cone Machines for Homeland Security

When you give out money based on politics, without any accounting, this is what you get:

The West Michigan Shoreline Regional Development Commission (WMSRDC) is a federal- and state-designated agency responsible for managing…


From The Eponymous Pickle

Tools for SemanticTechnologies

Tools for SemanticTechnologies

Mark Montgomery points me to this useful post on tools for semantic technologies.  Work at least a scan and a selective drill down.  Things are changing rapidly and maturing.  Overall a thousand plus tools.  " ... this is the…


From Computer Science Teachers Association

CSTA Teacher Leader Champions Women in STEM at White House

CSTA Teacher Leader Champions Women in STEM at White House

CSTA was recently recognized by the White House as a Champions of Change. This blog piece by CSTA Leadership Cohort member Baker Franke is reprinted with permission from White House blog. Baker was invite to represent CSTA at…


From The Eponymous Pickle

Answer Set Programming

Answer Set Programming

We examined what is often called declarative problem solving  for AI applications in the enterprise. Here an article in the CACM (abstract) on what is called Answer Set Programming.They call it a promising new method.


From The Eponymous Pickle

Valuation of Media Content

Valuation of Media Content

On the  Valuation of media content.  An increasingly important topic.  Always looking for ways to make this resource efficient.  More on the method.  Examining.  Comments?


From Computational Complexity

Algorithmic Driving

In my post last week, my commentors took me to task on my prediction that cars will drive us in ten years. Some thought Americans would wise up and learn to love mass transit. They don't know Americans. Others thought the hardware…


From Schneier on Security

The EFF's Sovereign Key Proposal

The EFF's Sovereign Key Proposal

Proposal here.


From The Computing Community Consortium Blog

MIXHS11 Challenges & Visions Session a Success

MIXHS11 Challenges & Visions Session a Success

The following is a special contribution to this blog from


From My Biased Coin

This Week, I Am A Scientist

This Week, I Am A Scientist

This week, I am a scientist;  I know this, because I have an article in Science.  It's nice to have something to point to that my parents can understand.  I don't mean they'll understand the paper, but they'll understand that…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

First Do No Harm

First Do No Harm

I came across a great quote by Pablo Picasso the other day


From My Biased Coin

Consulting

Consulting

As I've probably mentioned, I generally enjoy my consulting work.  Besides the obvious remunerative aspects, consulting provides challenges, insights, and experiences that are quite different from academic work.On the other hand…


From The Eponymous Pickle

SAP and NetBase

SAP and NetBase

More on the use of social media analytics to manage client reputation and interaction." ... Taking a cue from rivals such as Salesforce.com, SAP on Monday announced a partnership under which it will resell and support socialmore…


From The Eponymous Pickle

P&G Shaping the Store Case Study

P&G Shaping the Store Case Study

Again brought to my attention: "P&G Shapes the Store".  The virtualization of the store and its use with shoppers and designers to bring science to bear on the shelf.  Read the article.  So what is next?  The use of simulation…


From Putting People First

Towards an ethics of persuasion

Towards an ethics of persuasion

As design becomes more sophisticated in influencing user behavior, it’s important that we start to think critically about the ethical boundary between persuasion and outright manipulation, argues Stephen P. Anderson. “You can’t…


From Putting People First

Highway to health

Highway to health

Incorporating wireless technology into its newest cars, Ford prepared to roll out vehicles capable of monitoring everything from pollen counts to glucose levels. “[Ford] started concentrating on the aging population in 1999,…


From Putting People First

Nokia foresight on the future of mobile design

Nokia foresight on the future of mobile design

Sondre Ager-Wick, Nokia’s Head of Design Strategy and Foresight, discusses the evolution and future of mobile design. His new trends: - DIY design - Electronically enhanced senses - The smartification of everything - Less digital…


From Putting People First

The digital other

The digital other

In an article for DMLCentral Nishant Shah, founder and director of research for the Bangalore-based Centre for Internet and Society, wants to explore new ways of thinking about the Digital Native. “Based on my research on young…


From Putting People First

For the love of experience: Changing the experience economy discourse

For the love of experience: Changing the experience economy discourse

In September 2011, researcher Anna Snel defended her Ph.D thesis, entitled “For the love of experience: Changing the experience economy discourse“, at the University of Amsterdam. It is now available for download. The attention…


From Putting People First

Yes, experience can be designed

Yes, experience can be designed

Experience designers investigate the motivations behind users’ behaviors to develop skill in predicting and guiding those behaviors. A short article by designer Sorin Pintilie. “So, yes, experience can be designed


From The Female Perspective of Computer Science

Digital Media - New Learners of the 21st Century

Digital Media - New Learners of the 21st Century

PBS aired this program back in February this year.  It is almost an hour long and features many of the big names in 21st century learning, including James Paul Gee and Katie Salen.  If you're interested in game-based education…


From Schneier on Security

Investigative Report on "Buckshot Yankee"

Investigative Report on "Buckshot Yankee"

This is a really good analysis about the Buckshot Yankee attack against the classified military computer network in 2008. It contains a bunch of details I had not previously known.


From Computer Science Teachers Association

Pre-Holiday CT Activities

Pre-Holiday CT Activities

Heading into the holidays and the end-of-semester, I was thinking about activities that have students engage in computational thinking but without involving a lot of work for the teacher and are engaging. These aren't as good…

« Prev 1 3 4 5 6 7 11 Next »