acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2011


From The Eponymous Pickle

The Begone Movement

The Begone Movement

Begone.  A movement to make it easy to get off of mailing lists promoted by Forrester's Josh Bernoff.  Nice idea, we need it, but I wonder if the marketers will agree?  Check the link for more information.


From The Computing Community Consortium Blog

Live blogging the NSF-OECD Smart Health Workshop, Day 2

Live blogging the NSF-OECD Smart Health Workshop, Day 2

Day 2 of the two-day


From Schneier on Security

Romanian Hackers

Romanian Hackers

Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Triangle Shooter

Triangle Shooter

Kenny Spade is a Microsoft Academic Developer Evangelist out in California who has been writing a series of blog posts that help one learn how to write a Windows Phone game using XNA. There is code, pictures, explanations ofI


From Putting People First

Paul Dourish and Genevieve Bell on ubicomp mythology

Paul Dourish and Genevieve Bell on ubicomp mythology

Divining a Digital Future: Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell MIT Press, April 2011, 264 pages ISBN 978-0-262-01555-4 264 pages Amazon page | MIT Press page Ubiquitous computing (or “ubicomp”)…


From Wild WebMink

? Is Eclipse Open-By-Rule?

? Is Eclipse Open-By-Rule?

The Eclipse Foundation is home to a family of projects related to enterprise software development. Its Executive Director Mike Milinkovic has very kindly supplied the data for an Open-By-Rule evaluation. In his submission Mike…


From The Eponymous Pickle

Publishing in the Digital Era

Publishing in the Digital Era

Fascinating statistics and surveys in this study by Bain & Company: Publishing in the digital era by Bain partner Patrick B


From The Eponymous Pickle

Unified Intelligence from Attivio

Unified Intelligence from Attivio

Had to miss this today, but find it interesting:Unified Intelligence: Closing the Loop on Unstructured Data,  by James Taylor of AttivioAnd here's a link to a PDF of the slides for the slides they used ...via Eric Kavanagh, Host…


From The Eponymous Pickle

Calculating the Amount of Information in the World

Calculating the Amount of Information in the World

In Engadget:  An overview of a USC Annenberg study.  Quite a few exabytes, and growing.  The current capacity for digital is about 295 exabytes they say ... An exabyte is ten to the eighteenth bytes, or a million terabytes. 


From The Eponymous Pickle

Progress in Artificial Intelligence

Progress in Artificial Intelligence

A good non technical overview of the progress of AI in the NYT.  Quite naturally people have hopes and fears of this world.  The broad expectations of the early 90s were not fulfilled, but then were refocused in a number of useful…


From The Eponymous Pickle

Organizational Design and Structure

Organizational Design and Structure

A post in the HBR on the importance of thinking about organization.


From Schneier on Security

The Seven Types of Hackers

The Seven Types of Hackers

Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.

He says the seven types are:

  • Cyber criminals
  • Spammers and adware spreaders
  • Advanced persistent…


    From Apophenia

    Tweeting teens can handle public life

    Tweeting teens can handle public life

    Alice Marwick and I co-authored this piece for The Guardian. The Press Complaints Commission in the UK has now ruled that there is no “reasonable expectation” of privacy on Twitter. With this decision and the fact that teenagers…


    From Putting People First

    Documentary highlights how Programma 101 put people first

    Documentary highlights how Programma 101 put people first

    The upcoming documentary Programma 101


    From BLOG@CACM

    Who Needs a Netbook?

    Who Needs a Netbook?

    In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their demise.


    From The Female Perspective of Computer Science

    Communication and Presentation Skills in Computer Science

    Communication and Presentation Skills in Computer Science

    In my TA workshop yesterday on communication skills, we had a discussion/brainstorm session that I captured in a document (shown on the projector) as we went along.  Here are those notes, as well as some other resources thatCommunication…


    From Computer Science Teacher - Thoughts and Information From Alfred Thompson

    Computing Education and Education Reform

    Computing Education and Education Reform

    One of my frustrations these days is that with all the talk of education reform there is not much talk about computing education in that mix. It is as if people are willing to sacrifice computing for other changes. Of courseThere…


    From The Computing Community Consortium Blog

    Building a Smarter Health & Wellness Future [live blog]

    Building a Smarter Health & Wellness Future [live blog]

    As noted in this space last week,


    From Wild WebMink

    links for 2011-02-15

    links for 2011-02-15

    With A Little Help: The Early Returns Excellent and honest account from Cory of his experiment in self-publishing. From reading this it's clear that there is still a roll for publishing agents – notably in securing volume pricing…


    From Schneier on Security

    Societal Security

    Societal Security

    Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except for a few simplistic counterexamples, it's unique among life on…


    From The Eponymous Pickle

    Watson Jeopardy Competition Review

    Watson Jeopardy Competition Review

    I saw the first half hour of this competition between two former Jeopardy champions and the Watson IBM Supercomputer.  . Far too small a sample to make much of a conclusion about the generality of the technique. Watson did not…


    From The Eponymous Pickle

    Alone Together

    Alone Together

    Just reading:  Alone Together: Why We Expect More from Technology and Less from Each Other, by MIT technology and society prof Sherry Turkle.   I have missed her last two books, but this is about a topic that particularly interests…


    From The Noisy Channel

    Life

    Life

    Heading to Punta Cana for a week. Feel free to keep writing great comments — will catch up when I get back!


    From The Eponymous Pickle

    Mining Published Research

    Mining Published Research

    Article on mining published research from the University of Chicago. Some intriguing ideas: " ... Metaknowledge researchers are using natural language processing technologies, such as machine reading, information extraction,Metaknowledge…


    From The Eponymous Pickle

    Book Citation App

    Book Citation App

    A simple idea that has a smartphone App create citations for books in papers.  The idea is good, though they say there are some issues with choosing the right style of citation.  Just the idea of capturing any kind data in  the…


    From Michael Nielsen

    A logo for the Polymath wiki

    A logo for the Polymath wiki

    The Polymath wiki needs a logo. Can you suggest or even design one?


    From The Eponymous Pickle

    The Value of Text Analytics

    The Value of Text Analytics

    Good overview piece on the value of text analytics and current approaches.  We started using it when it was still called content analysis and can vouch for its value.


    From Wild WebMink

    ? Why You Need Document Freedom

    ? Why You Need Document Freedom

    Document Freedom Day is March 30th this year. Why should you join in? See my article on ComputerWorldUK!


    From The Computing Community Consortium Blog

    Monday Morning Roundup

    Monday Morning Roundup

    Several items of interest this Monday morning: President’s FY 2012 Budget Unveiled President Obama will reveal his


    From U.S. Public Policy Committee of the ACM

    Hill Tech Happenings, Week of February 14

    Hill Tech Happenings, Week of February 14

    This week the President released his Fiscal Year 2012 budget request. As a result, there will be several events, many of them today, where federal agencies discuss their portion of the request. Congressional hearings on this…

    « Prev 1 3 4 5 6 7 10 Next »