The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
LibreOffice can connect natively to a WebDav server, apparently. Here’s another video in the same series as the ones I posted about CMIS connections, showing LibreOffice connecting to a WebDAV server (in this case running on…
Since its inception, the EPIC conference has brought together a dynamic community of practitioners and scholars concerned with how ethnographic thinking and methods for understanding the contemporary social world are used to…
The term was a new one to me. I do agree that users are people, and you have to consider their needs to make a system that supports their decisions. Thus all design should be empathic. I have seen many designs that are non…
A very simple App for saving ideas and recommendations that I am currently trying. Simple is good. Is it more simple than using a basic note taking function?
[I was recently asked for some thoughts on the issues of professionalization and education of people working in cyber security. I realize I have been asked this many times, I and I keep repeating my answers, to various levels…
My job at Microsoft was to promote the use of Microsoft tools for computer science education. It was a great job and I was promoting tools that I had and that I currently use for teaching. I am loving teaching using Visual Basic…
The mobile technology of tomorrow may be real-time, always on and algorithm driven in its characteristics, writes designer Jessi Baker, but there is a real opportunity to design, create and promote open, empathetic systems allowing…
I agree with some of the commenters. Tools may be necessary these days, but they are not sufficient. Your BI project will mostly likely fail not because features you have in the latest tool, but because you do not understand…
There is an empathy gap in technology development, argues April Demosky on the FT’s Tech Blog. “In the analytic, data-driven world of Silicon Valley, emotions often do not get factored into the latest product design. This comes…
The White House Office of Science and Technology Policy has directed that the published results of federally funded research (final peer-reviewed manuscripts or final published documents) be freely available to the public within…
Leading high-tech executives spoke this week on the best ways to promote innovation and improve the quality of software patents at an industry-sponsored Congressional briefing. The briefing was organized by the Business Software…
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
The Computing Community Consortium is governed by an 18-member Council, with members on 3-year staggered terms. The CCC’s Nominating Committee invites nominations (including self-nominations) for members to serve on the CCC Council…
In Adage: Safeway looks at a world without print ads, moves digital. " ... Safeway is doing its best to eliminate print advertising in favor of more personalized digital ads. The fifth largest grocery player in North America…
I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.
The Computing Research Association (CRA) Outstanding Undergraduate Researchers award program recognizes undergraduate students in North American colleges and universities who show outstanding research potential in an area of…
In a Communications of the ACM Blog, Mark Guzdial raises some probing “Research Questions About MOOCs.” He points to recent articles that explore the impact of MOOCs, such as ”Will MOOCs destroy academia?” by Moshe Vardi and ”In…
I am nearing the end of my five year cycle for recertification, so I am reviewing what professional development activities I have participated in to see what qualifies for PDP's (professional development points) towards my recertification…
In Baseline Mag: Some thoughts and statistics about how people are getting addicted to the tablet format. Retailers and marketers should notice this.
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack the vote?
The rules for papal elections are steeped in tradition…A piece on Ray Kurzweil's (now at Google) latest book: How to Create a Mind: the Secret of Human Thought Revealed. Always fascinating, sometimes over the top views of a very technological future. I have yet to read in full…
An interesting HBR case study of the cost of suspicion in the enterprise. Refreshingly different piece. Also hints at how this can go beyond just the usual personnel trust/suspicion domains. In particular about the general…
On one hand this is great. The President of the United States promotes computer science education. On the other hand he talks about it primarily as a vocational subject. Something that will lead to a two year degree and an apprenticeship…
This is interesting:
In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being below the "Security Poverty Line." These folks have a couple[…Nick Hunn, CTO at Onzo, a “smarter than normal” Smart Energy start-up, criticizes the service model of the Nest thermostat: “A basic programmable thermostat in the US costs under $20, not the $250 price tag of the Nest. As such…
Looks like Python Hosting is no more. I’ve seen nothing official, but I note from veber.co.uk that the new name for their cloud hosting is Veber Cloud. My story at InfoWorld today has a few updates on what I wrote earlier in…
When anthropologist Natalie Hanson was asked last year to contribute to a new book called The Handbook of Business Anthropology, edited by Rita Denny and Patty Sunderland (who also wrote Doing Anthropology in Consumer Research…
Will design researchers (and our models and explanations) be replaced by data tables and “experience actuaries” that tell us what to build, for whom, and what it should be like? Artefact’s Dave Mc Colgin doesn’t think so. “In…
We used so-called artificial neural nets (ANN) in the enterprise over a decade ago for specific kinds of focused analysis of consumer data. Inspired by the brain's infrastructure, but not attempting to use the form of real biological…
In GigaOM: Even a cursory observation in any airport waiting room will demonstrate this. " Naysayers may continue to ignore the trend, but tablets aren’t toys and the tablet market isn’t a fad, as 2012 shipments show. This…