The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Most readers of this blog are early adopters of technology. In the past we would have had to go to a computer store or mail order something to try it out. Now within a minute or so I can try most anything and have it operating…
Over at Wikibooks, they're trying to write an open source cryptography textbook.
From the CACM Blog. I still certainly still see lots of Spam.-
Another very innovative idea out of Google: . " ... Google launched on Tuesday evening Google Apps Marketplace, providing a venue for third-party, cloud-based applications to supplement Google's own online applications. The program…
There are some theorems that are surprising. I've already blogged on that (I can't seem to find the link). However, there are some theorems that some people simply do not believe. I mean people who understand the proofs and still…
It's good to dream:
IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study. Developing such experimental protocols could prove very useful…The Socio-Digital Systems (SDS) group of Microsoft Research aims to use an understanding of human values to help to change the technological landscape in the 21st century. “Beyond making us all more productive and efficient…
Twenty years after the emergence of the world wide web, Rory Cellan-Jones of the BBC World Service’s Discovery series looks at the science driving its third decade. Web 3.0 promises a world where people and objects are seamlessly…
Among cell-phone users in developed countries, IBM is betting the market with the biggest growth potential is…people over the age of 65. Fast Company reports. IBM’s two-year research program, which also involves the National…
At the request of the Office of the Director of National Intelligence, the National Research Council (NRC) is undertaking a project entitled
A CACM “Viewpoints” column by Cameron Wilson (ACM) and Peter Harsha (CRA), inspired by the Transition Team white papers commissioned by the Computing Community Consortium. “While the history of computing-related contributions…
In the area of Computing Architectures there are some well known discontinuity-inducing trends staring us in the face. The entire computing community is planning for multi-core processors, a necessary order of magnitude(s) increase…
I
A CS conference is only as good as its selection of keynote speeches, and SIGCSE 2010 offers a formidable cast of keynotes, including a Nobel Prize winner.
In StoreFrontBackTalk, a discussion of manufacturers direct selling to consumers online. This has been avoided for a long time in big CG to avoid antagonizing the very big retail channels that make up such a large percentage…
I was recently asked the following question:
Suppose you're the PC chair, and someone who has submitted a paper asks you NOT to have the paper reviewed by a specific person on the PC. Do you honor that request?It's an interesting…
New insights from science and behaviour change could lead to significantly improved outcomes, and at a lower cost, than the way many conventional policy tools are used, argues the UK Government. MINDSPACE: Influencing behaviour…
As Lance tweeted:
Izwan Ismail, a journalist at Malaysia’s New Strait Times newspaper, talked to Nokia
An idea discussed at Procter & Gamble for years, but always shied away from due to security and data ownership issues. Driven in part by complaints from new-hires that the company issue laptops were not the latest in capabilities…
Introducing new digital services in cities promises the change the way citzens live in cities around the world. “Only a few years ago, digital services were about bandwidth, wireless protocols, and emerging standards for mobile…
A good CW report on the general use of analytics in the enterprise. Its the use data, models and intelligence to find better solutions. It is a domain that I have been involved in my entire carrer, in government and in the…
Our Open Source Engineering class is a little different from most here at Carleton's School of Computer Science. The professor wants to give students an opportunity to practice their communication skills not only via the standard…
Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number 1, Jan 2010.
Those faced with the problem of how to verify…In Readwriteweb. A free system called Phonebooth has emerged to be a VOIP phone service similar to Google Voice. Likely interesting to small companies and startups. Includes call routing feature and a local phone number. I still…
Some interesting observations on the outsourcing, looking back ten years to the present. I have known many peoeple that were part of this and were ultimately influenced by it. Could be used as a case study for outsourcing.
Good piece in Ars Technica that covers the current state of online grocery shopping and the current players in this space. ' ... Shopping for groceries and household items via the Internet is making a huge comeback, however,.…
Interesting commentary:
I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent, that generates commercial value for someone else. That is the essence…The news has hit the wires -- Chuck Thacker is this year's Turing Award winner.I had the great pleasure of getting to know Chuck while I worked at DEC SRC. He's a character, a tinkerer, and a great and curious mind. I think…