acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

December 2014


From XRDS

XRDS: Crossroads, The ACM Magazine for Students

XRDS: Crossroads, The ACM Magazine for Students


From XRDS

A shrimp's tale: why we need to fund research

A shrimp's tale: why we need to fund research

Sean Follmer, Inbal Talgam-Cohen


From XRDS

On the NLP issue

On the NLP issue

XRDS Staff


From XRDS

Wearable technologies: one step closer to gait rehabilitation in Parkinson's patients

Wearable technologies: one step closer to gait rehabilitation in Parkinson's patients

Sinziana Mazilu, Gerhard TrösterWearable computing has the potential to fundamentally alter healthcare by enabling long-term patient monitoring and rehabilitation outside of the lab.


From XRDS

Profile Trevor van Mierlo: the story of building a startup in health informatics

Profile Trevor van Mierlo: the story of building a startup in health informatics

Adrian Scoică


From XRDS

The Regenstrief global health informatics group: Indianapolis, Indiana

The Regenstrief global health informatics group: Indianapolis, Indiana

Suranga Nath Kasthurirathne


From XRDS

Radiography

Radiography

Finn Kuusisto


From The Eponymous Pickle

Autonomy Accounting

Autonomy Accounting

Remember visiting HP Autonomy in the UK in the 90s.  Was impressed what they showed us. Analytics being used with AI and Bayesian methods.  First time I had seen these approaches being used with real corporate data. proposeddue…


From The Eponymous Pickle

Elbit Skylens Heads up Display

Elbit Skylens Heads up Display

In Gizmag:Designed for the commercial aviation market and for the Clearvision EFVS family, Skylens is a lightweight wearable device consisting of a visor large enough to fit easily over the pilot’s glasses that displays high-resolution…


From Putting People First

Experientia’s Twitter feed live

Experientia’s Twitter feed live

Experientia has now its own Twitter feed. Four months of Putting People First posts and other links have already been uploaded. If you followed Experientia on Twitter through the feed of its CEO, Mark Vanderbeeken, make sure…


From Putting People First

Why Americans care more about experiences than possessions

Why Americans care more about experiences than possessions

Leslie Bradshaw, managing parter of Made by Many, describes Americans’ shifting value systems. “Young people have redefined success, and their new definition values experience over possession. The word “experience” may sound…


From The Eponymous Pickle

Human Agent Collectives

Human Agent Collectives

In the  CACM:  More simply put, it's about people and their tools. Now smart tools that are getting smarter. And unexpectedly, new forms of autonomy are emerging too. A lengthy and interesting piece on the topic. " ... We call…


From Wild WebMink

Top Clippings For December 18th

Top Clippings For December 18th

Originally posted on Meshed Insights & Knowledge:Samsung shuts down ChatOn – CNet – If only there was a way for their customers to uninstall their impotent self-defence against Google. EU software procurement breaches rules more…


From Wild WebMink

On Terrorism

On Terrorism

Some politicians seem to act as if “terrorism” means a terrible crime committed by someone who doesn’t fit the speaker’s own racial & religious profile. Just because something induces terror in some or many people, that doesn…


From The Eponymous Pickle

Hadoop as Enterprise Software

Hadoop as Enterprise Software

In BiCorner: A recent meeting made it clear that enterprises are seeing the Hadoop ecosystem this way. Was surprising to me.  Very good introduction to that ecosystem as it exists today and why that matters.


From The Eponymous Pickle

Shelf Edge Displays

Shelf Edge Displays

Experimented with the behavior influence of shelf displays. They can provide information and engage.  Here is a new example:" .. Display Solution, based in Gilching, Bavaria, Germany, is a leading developer and marketer of customized…


From BLOG@CACM

The Role of Tech Firms in Computing Education

The Role of Tech Firms in Computing Education

Computing education can't be about jobs. It has to be about schools to reach everyone.


From The Eponymous Pickle

Blockchain Studies

Blockchain Studies

Blockchains.  This was new to me, then heard it mentioned several times on one week.  " ... The blockchain is a new organizing paradigm for the discovery, transfer, and recording of all quanta (discrete units) of anything, and…


From The Eponymous Pickle

Big Data and Manufacturing

Big Data and Manufacturing

In McKinsey. On big data and manufacturing.  Talked that just yesterday with an enterprise.  It is clearly a challenge. Lots of unstructured data is common.   It becomes unusable quickly.  But they understand it can be used to…


From The Eponymous Pickle

Addressing Consumer Emotions

Addressing Consumer Emotions

In Adage: Study Uses Data to Track Consumer Emotions When They Buy ... But Is Self-Reported Emotional Data Useful for Marketers?


From Putting People First

Why Mozilla conducts qualitative user research

Why Mozilla conducts qualitative user research

“Technology and business organizations often default to a positivist worldview and subsequently believe that quantitative results that provide numeric measures have the most value,” writes Bill Sellman, Lead User Researcher on…


From The Eponymous Pickle

Brand Narratives

Brand Narratives

In Fastcocreate.  Coversations come after you established a narrative.Striking up conversations isn't enough for social media marketing, Bob Deutsch writes. Marketers need to think in terms of the narratives they're building…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

With Super Power Comes Super Responsibility

With Super Power Comes Super Responsibility

Earlier today several people told me that my name was referenced on SlashDot. Specifically it was in reference to me calling programming a super power in a post on my old blog back in 2010. The post on SlashDot said that theremember…


From Schneier on Security

Friday Squid Blogging: Squid Beard

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From Schneier on Security

Lessons from the Sony Hack

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many of the Hollywood studio's best-kept secrets, from details about unreleased…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

A Look at Computer Science Education Week

A Look at Computer Science Education Week

Computer Science Week has been around for about seven years now. In the early years I think most of us didn’t really know how to deal with it. There was talk about doing things similar what what other subjects did for special…


From The Eponymous Pickle

Best Visualization Projects of 2014

Best Visualization Projects of 2014

Flowingdata picks a number of examples.  Not the most simple, but some of the most pleasing and artistic examples that are worth a look.    As he notes, his examples are interactive, animated or both.   I agree, this is our direction…


From The Eponymous Pickle

IBM Rival Sentient

IBM Rival Sentient

An AI rival to understand: Sentient: With some emphasis on big data and genetic methods.  And the direct use of biomimicry through the use of genetic algorithms, an area we experimented in." ... Sentient was inspired becauseHe…


From The Eponymous Pickle

Thinking Futures

Thinking Futures

Newly discovered, note mention of organizational futuresThinking in new ways about the futureUnderstanding change implications, exploring possible organisational futures, choosing proactive responses today. If you're ready to…


From Schneier on Security

SS7 Vulnerabilities

SS7 Vulnerabilities

There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into SS7 for other purposes -- such as keeping calls connected as users…