The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Begone. A movement to make it easy to get off of mailing lists promoted by Forrester's Josh Bernoff. Nice idea, we need it, but I wonder if the marketers will agree? Check the link for more information.
Day 2 of the two-day
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
Kenny Spade is a Microsoft Academic Developer Evangelist out in California who has been writing a series of blog posts that help one learn how to write a Windows Phone game using XNA. There is code, pictures, explanations ofI…
Divining a Digital Future: Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell MIT Press, April 2011, 264 pages ISBN 978-0-262-01555-4 264 pages Amazon page | MIT Press page Ubiquitous computing (or “ubicomp”)…
The Eclipse Foundation is home to a family of projects related to enterprise software development. Its Executive Director Mike Milinkovic has very kindly supplied the data for an Open-By-Rule evaluation. In his submission Mike…
Fascinating statistics and surveys in this study by Bain & Company: Publishing in the digital era by Bain partner Patrick B
Had to miss this today, but find it interesting:Unified Intelligence: Closing the Loop on Unstructured Data, by James Taylor of AttivioAnd here's a link to a PDF of the slides for the slides they used ...via Eric Kavanagh, Host…
In Engadget: An overview of a USC Annenberg study. Quite a few exabytes, and growing. The current capacity for digital is about 295 exabytes they say ... An exabyte is ten to the eighteenth bytes, or a million terabytes.
A good non technical overview of the progress of AI in the NYT. Quite naturally people have hopes and fears of this world. The broad expectations of the early 90s were not fulfilled, but then were refocused in a number of useful…
A post in the HBR on the importance of thinking about organization.
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types are:
Alice Marwick and I co-authored this piece for The Guardian. The Press Complaints Commission in the UK has now ruled that there is no “reasonable expectation” of privacy on Twitter. With this decision and the fact that teenagers…
The upcoming documentary Programma 101
In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their demise.
In my TA workshop yesterday on communication skills, we had a discussion/brainstorm session that I captured in a document (shown on the projector) as we went along. Here are those notes, as well as some other resources thatCommunication…
One of my frustrations these days is that with all the talk of education reform there is not much talk about computing education in that mix. It is as if people are willing to sacrifice computing for other changes. Of courseThere…
As noted in this space last week,
With A Little Help: The Early Returns Excellent and honest account from Cory of his experiment in self-publishing. From reading this it's clear that there is still a roll for publishing agents – notably in securing volume pricing…
Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except for a few simplistic counterexamples, it's unique among life on…
I saw the first half hour of this competition between two former Jeopardy champions and the Watson IBM Supercomputer. . Far too small a sample to make much of a conclusion about the generality of the technique. Watson did not…
Just reading: Alone Together: Why We Expect More from Technology and Less from Each Other, by MIT technology and society prof Sherry Turkle. I have missed her last two books, but this is about a topic that particularly interests…
Heading to Punta Cana for a week. Feel free to keep writing great comments — will catch up when I get back!
Article on mining published research from the University of Chicago. Some intriguing ideas: " ... Metaknowledge researchers are using natural language processing technologies, such as machine reading, information extraction,Metaknowledge…
A simple idea that has a smartphone App create citations for books in papers. The idea is good, though they say there are some issues with choosing the right style of citation. Just the idea of capturing any kind data in the…
The Polymath wiki needs a logo. Can you suggest or even design one?
Good overview piece on the value of text analytics and current approaches. We started using it when it was still called content analysis and can vouch for its value.
Document Freedom Day is March 30th this year. Why should you join in? See my article on ComputerWorldUK!
Several items of interest this Monday morning: President’s FY 2012 Budget Unveiled President Obama will reveal his
This week the President released his Fiscal Year 2012 budget request. As a result, there will be several events, many of them today, where federal agencies discuss their portion of the request. Congressional hearings on this…