acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2012


From The Computing Community Consortium Blog

CISE AD Issues Letter to Community on FY 13 Budget Rollout

CISE AD Issues Letter to Community on FY 13 Budget Rollout

NSF/CISE Assistant Director


From The Eponymous Pickle

How Brands Grow

How Brands Grow

I had the need to look at How Brands Grow, by Byron Sharp again.  A really great book that inspires me to look at the numbers behind brand growth again.   It is rare that I consult a book of this kind more than once.  This one…


From Schneier on Security

SSL Traffic Analysis on Google Maps

SSL Traffic Analysis on Google Maps

Interesting.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Magic Numbers Are Bad

Magic Numbers Are Bad

I had my friend Clint Rutkas review some code of mine. Now I have been writing code longer than Clint has been alive but he


From The Eponymous Pickle

Cloud Enhanced Innovation

Cloud Enhanced  Innovation

IBM on how the cloud can drive new, innovative business models.  A largely non technical post with some useful  thoughts.


From Schneier on Security

Trust Requires Transparency

Trust Requires Transparency

Adam Shostack explains to Verisign that trust requires transparency.

This is a lesson Path should have learned.


From The Computing Community Consortium Blog

NSF

NSF

The deadline for preliminary proposals to the National Science Foundation’s (NSF) next Expeditions in Computing


From Michael Nielsen

How you can help the Federal Research Public Access Act (FRPAA) become law

How you can help the Federal Research Public Access Act (FRPAA) become law

As many of you no doubt know, the Federal


From The Eponymous Pickle

Data Science e-Book from AnalyticsBridge

Data Science e-Book from AnalyticsBridge

A first draft of a data science e-Book available for free from the AnalyticBridge social network for analytics professionals. . From business analytics professionals. Join and review it.   Some interesting topics are included…


From My Biased Coin

A Systems Complaint

A Systems Complaint

I think of myself as a person who works both in systems and theory.  And I've found that's often a challenging position.  I've been vocal before that I think theory conferences, to their detriment, downplay experimental workWhile…


From The Eponymous Pickle

iPads in the Bedroom

iPads in the Bedroom

A recent survey shows that most tablets are used at home rather than on the road.  And in the bedroom, where this post says tablets have become a fixture.  (68% of 880+ respondents use them there often) Mostly because they are…


From The Eponymous Pickle

Is Twitter Serious?

Is Twitter Serious?

David Carr on the implied seriousness of Tweets.  He makes some interesting points about the difficulty of considering a communications channel very informal, but then paying the price when it upsets someone.  I remember a similar…


From The Eponymous Pickle

SuperBetter Labs

SuperBetter Labs

Some game designers have put together a system that lets you join an all star team. SuperBetter is an online, social game designed to help you build up personal resilience.Document your SuperBetter journey for our blog. Get personal…


From Wild WebMink

? Eric Whitacre

? Eric Whitacre

Back in December I mentioned that Eric Whitacre’s wonderful choral album “Light and Gold” [Amazon UK | Amazon US] had been nominated for a Grammy award. Well … he won! If you’ve not heard his choral music, I suggest you take…


From Schneier on Security

<i>Liars and Outliers</i> Update

<i>Liars and Outliers</i> Update

Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versions are available for download. I have received 250 books myself. Everyone…


From The Eponymous Pickle

Redefine the employee

Redefine the employee

With changes in how people communicate, in both social and technical terms, we need to think of new ways to vaul e people.  More thoughts in Chief Learning Officer.


From The Eponymous Pickle

Towards Better Shopper Marketing Strategies

Towards Better Shopper Marketing Strategies

In Mediapost:   Takes a look at a Booz & Company Study: " ... The big challenge, concluded Booz, is for manufacturers to


From The Computing Community Consortium Blog

The President

The President

Later this morning, President Obama will unveil his budget request for FY 2013. A number of budget briefings by Federal funding agencies are scheduled throughout the day, including one at 3:30pm EST at the National Science Foundation…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 13

Hill Tech Happenings, Week of February 13

February 16 Hearing: The Senate Homeland Security and Government Affairs Committee will hold a hearing on the Cybersecurity and Internet Freedom Act of 2012. 2:30 p.m., 342 Dirksen Building February 17 Hearing: The House Science…


From Computational Complexity

Barney the Evil Dinosaur

This is an old story from before I had a blog, but one of my favorite on when technology goes bad. In the late 90's, the undergraduate CS coordinator at the time, Don Crabb, also wrote a column on technology for the Chicago…


From The Computing Community Consortium Blog

This Thursday, a Symposium on the Impact of NITRD

This Thursday, a Symposium on the Impact of NITRD

Since the dawn of the digital age, fundamental research sponsored by the Federal


From Schneier on Security

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?

Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the key.

What happens now? It seems as if this excuse would always…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 13 February 2012

Interesting Links 13 February 2012

Home again after a week in Texas! Had a great time in Texas both at the TCEA conference and the steering committee meeting for the CS 2013 project. All in all I talked to a lot of people, learned a lot and still managed to get…


From The Eponymous Pickle

Message Mapping

Message Mapping

Over the years I have been investigating all sorts of mapping methods.  Concept, process and Mind maps are common approaches that I have used in my work for years.  now I see there are also message maps, here described by Ed.   …


From The Eponymous Pickle

More Big Data Thoughts

More Big Data Thoughts

In the NYT Sunday Review:  On the impact of big data.  Personally I think it is how business analytical methods  can be effectivey used against the right amount and form of data that is readily available to solve a problem. …


From The Eponymous Pickle

On Teaching with Technology

On Teaching with Technology

In the Chronicle of Education:  A teacher rethinks teaching with technology.  Like the  solution to any difficult problem, it is never all just about technology. 


From The Eponymous Pickle

Adaptive Marketing

Adaptive Marketing

Adaptive Marketing was a new term to be.  Apparently devised by Mindshare to describe consumer focused and data based marketing.  It is good to be as adaptive as possible, because your world of context is constantly changing.


From The Computing Community Consortium Blog

A great piece


From The Computing Community Consortium Blog

DoE Announces

DoE Announces

As part of the


From The Noisy Channel

Enjoying Seattle

Enjoying Seattle

My excursion to Seattle was delightful, and I thought I’d share some details with readers. I spent most of Friday at the University of Washington, meeting with graduating PhD students.  I’ve always known that UW is a top school…

« Prev 1 5 6 7 8 9 11 Next »