The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
The security connection is pretty tenuous, so I figured I'd blog this on a Saturday.
Once it infects an ant, the fungus uses as-yet-unidentified chemicals to control the ant's behavior, Hughes told LiveScience. It directs the…In the NYT Fashion and Style section: Don
Interdisciplinary Computing Blog. by Lisa C. Kaczmarczyk. Brought to my attention recently. In particular an article on earthquake preparation and response and the importance of computing as it is used in cultural anthropology…
It used to be a feature of RFID tags that they contained very small amounts of data, with the tag acting as a link to data sources. Yet there appears to be an increase of high memory tags, containing multiple kilobytes of self…
In Technology Review: Hacking into cars wirelessly. More holes in the infrastructure.
Good piece in Fast Company on Telehealth. Which seems to say that it is effective to use remote sensors and expertise to deliver health. I further think that the use of sensors integrated in simple, consumer owned and friendly…
What is the big deal with Java?
I teach at a public school of excellence that can best be described as a magnet school for the state. We are currently in our recruiting season where we have information sessions and students…In Engadget: A set of sensors that can monitor many aspects of your life, like exercise, then award you with experience points, compete with others, etc.
If you are a grad student and want to goto STOC 2011 there is travel support money that you can apply for. See here for details.
We are particularly interested in getting people who normally ARE NOT able to get to STOC…
The European Union is planning to enshrine in law the right to be forgotten on the internet, but we can’t live outside society, argues investigative journalist and filmmaker Tessa Mayes in The Guardian. “Being forgotten might…
“Companies should lead their users, not the other way around.” So say Jens Skibsted and Rasmus Hansen in their recent post, User-Led Innovation Can’t Create Breakthroughs, on Fast Company’s Co.Design blog. “They
Skype security weaknesses could endanger 'vulnerable users' | Technology | guardian.co.uk This Privacy International report covers a few of the reasons citizens in surveilled society should avoid Skype. I avoid it for these reasons…
The last several yeas the University of New Hampshire has put on a
When we consider software patents, it’s easy to believe they are something outside the open source communities. Mentally, many of us model them as a weapon belonging to “patent trolls” – companies who don’t make products in the…
We developed a 'Home of the Future' back in '00 .... and have always been interested how the home would evolve to integrate internet technologies. We saw Phillips efforts in this area, which used mirrors to display online information…
I have been looking for a good App to run site analytics on mobile. I found BAM Analytics, which the reviews claimed worked well for Running Google Analytics on the IPhone. At first it repeatedly crashed, but after an update…
In SASCom, a review of Tom Davenport's talk on converging analytics in analytics, from Analytics World. Largely obvious, but worth looking at.
Long time readers may recall that 17x17 problem that I posted on Nov 30, 2009 here. I am sometimes asked if the problem is still open. Alas it is. Is the bounty on it still available. Alas it is. Some thoughts and experiences
…An intriguing experiment with augmented reality ideas by consumer goods giant Unilever. Seems mostly stunt-like but probably got lots of local attention. This does not appear to utilize any devices owned by the consumer. Reactrix…
White House wants new copyright law crackdown | Privacy Inc. – CNET News This repeated lack of balance and failure to consider the overall cultural and technical picture of the change the Internet is catalysing is just so bad…
CONTENTS
[1] Newsletter Highlights [2] 2010 ACM A.M Turing Award Recognizes Les Valiant [3] USACM Supports Defense Against FY '11 Cuts [4] USACM Comments on Federal Trade Commission Online Privacy Report [5] USACM Joins Statement…Everyone knows that publicly funded education is good. Right? Wait! Why? “Education has substantial non-financial benefits.” This argument assumes that people who forgo schooling are uneducated. It is weaker in the Wikipedia…
Clever hack:
The thieves glue down the "enter," "cancel" and "clear" buttons on the keypad and wait until the customer goes into the bank for help before withdrawing money from their account. The robbed customers have already…You’ll recall about this time last year I was honoured to join the OSI Board and expressed hopes OSI could move towards representative governance. Well, I spent the weekend in San Francisco at an OSI Board face-to-face meeting…
The New York Times has published no less than eight articles at once on the topic of social media, internet, technology and museums. Note the article about the Arduino! Speaking digitally about exhibits Museums around the world…
Welcome to the Microsoft Kodu Cup: A game design competition for students 9
Revelatory piece in Popular Mechanics on this mostly overlooked aspect of data privacy. Bottom line, it is unclear: ' ... Our lives are inundated with more data than ever. But when we die, our passwords and online accounts may…
A simple clever idea in Mashable: " ... Scan QR codes to save your place on multiple wait lists.Proving that nine guys can successfully launch a startup in 48 hours on a bus, WalkIN is walking away from SXSW Interactive a big…
New on Oracle and Supply Chains. I like that these systems are being delivered for mobile use. Linking to sensors and other real time connections makes sense as we start to immerse ourselves in these complex networking problems…
Google, using analytical methods, discovers that it is listening and asking good questions that are better qualities of a manager than having deep technical experise.