acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

March 2012


From The Computing Community Consortium Blog

In IEEE’s Spectrum


From Putting People First

Futurescapes

Futurescapes

FutureScapes, an open collaboration project by Sony and Forum for the Future, aims to bring together a range of expert thinkers, designers, futurologists, writers (including those from The Economist’s Intelligence Unit and Wired…


From The Computing Community Consortium Blog

Agencies Seek White Papers, Announce Cybersecurity Symposium

Agencies Seek White Papers, Announce Cybersecurity Symposium

Earlier this month, the National Coordination Office (NCO) for the Networking and Information Technology Research and Development (NITRD) Program — the Federal program that provides a framework and mechanisms for coordination…


From Putting People First

Helsinki Street Eats: a book about everyday food

Helsinki Street Eats: a book about everyday food

Helsinki Street Eats: a book about everyday food By Bryan Boyer and Dan Hill, with contributions from Ville Tikka, Nuppu G


From Schneier on Security

Unprinter

Unprinter

A way to securely erase paper:

"The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time is lower than the destruction threshold of the paper substrate. It turns…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Best and Most Innovative Teachers

The Best and Most Innovative Teachers

Being somewhat opinionated about the subject (who am I kidding


From Wild WebMink

7 Google+ Tips

7 Google+ Tips

I’ve expanded my earlier posting about Google+ and you’ll find not five but


From The Eponymous Pickle

Unilever Launches Innovation Online Program

Unilever Launches Innovation Online Program

From Consumer Goods Technology:   " ... Unilever's Open Innovation team launched a new online platform, which offers experts the opportunity to help the company find some of the technical solutions it needs to achieve its ambition…


From The Eponymous Pickle

Legal Tangles in the Cloud

Legal Tangles in the Cloud

Additional Cloud risks.  The danger of legal actions in the Cloud.  A recent example shows the danger.


From Computational Complexity

Heading South

Starting in July, I'll be chair of the School of Computer Science in the College of Computing at Georgia Tech. Annie Ant


From Computer Science Teachers Association

What's the State of (CS Ed in) Your State?

What's the State of (CS Ed in) Your State?

The March issue of the CSTA Voice (see p. 4-5) includes a look at some state-by-state results from the 2011 National Secondary Computer Science Survey . As you might expect, if you compare the responses for any state to the…


From The Eponymous Pickle

Lexus RFID Enabled Print Ad

Lexus RFID Enabled Print Ad

An NFC enabled print ad for Lexus in Wired Magazine.   Readable from NFC enabled phones or other devices.  Why this versus a QR code?  I have not tried the phone-enabled NFC lately, but likely it is easier to connect than a QR…


From The Eponymous Pickle

The New iPad and Business

The New iPad and Business

From ComputerWorld a post on the applicability of the new iPad to business.   Personnally I do not plan to upgrade from the '2' unless I need to utilize or test the new capabilities for a project.  The key capabilities I see…


From Daniel Lemire's Blog

From counting citations to measuring usage (help needed!)

From counting citations to measuring usage (help needed!)

We sometimes measure the caliber of a researcher by how many research papers he wrote. This is silly. While there is some correlation between quantity and quality — people like Einstein tend to publish a lot — it can be gamed…


From The Eponymous Pickle

Gamifying Your Life

Gamifying Your Life

Can your life processes be gamified?  Can you adjust your more mundane tasks by using game dynamics>  This article looks at Apps that claim to do this.  Had only heard of a few of these.  Useful examples of the idea.


From Schneier on Security

Hacking Critical Infrastructure

Hacking Critical Infrastructure

A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph:

At a closed-door briefing, the senators were shown how a power company employee could derail the New York City electrical…


From The Eponymous Pickle

Pitfalls in Business Process Management

Pitfalls in Business Process Management

Informs Magazine has published a short piece on the pitfalls of using Business Process Management (BPM).  Good, common sense consideration for any BPM project.  This interests me because you need to have some knowledge of the…


From The Computing Community Consortium Blog

Update:

Update:

Back in January, we described a new Defense Advanced Research Projects Agency (DARPA) program focused on innovative research proposals “in support of the development of new software-based biometric modalities” that go beyond…


From Putting People First

Behavior Driven Design 101

Behavior Driven Design 101

Design is becoming an applied behavioral science, and your art school background is no longer sufficient, says Jason Hreha, behavior designer and UX advisor. “Fields like neuroscience are starting to come of age, and are beginning…


From BLOG@CACM

Avoiding the Rabbit Hole of Bad Science

Avoiding the Rabbit Hole of Bad Science

The scandal surrounding the recently published so-called empirical evidence for precognition has caused psychologists to reconsider the way they analyze their data, and highlights the importance of replication. What can empirical…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows Phone Software Development Kit

Windows Phone Software Development Kit

I know I have mentioned the Windows Phone SDK (software development kit) a lot in the past but usually only as a reference along with other things. It really deserves a post of its own though. The Windows Phone Software Development…


From The Eponymous Pickle

SAP Business Objects on Demand

SAP Business Objects on Demand

Just brought to my attention, reviewing.    Powered by SAP HANA.  Free trial version available.   " .... SAP BusinessObjects Portfolio  On-Demand Solutions: SAP Businessobjects BI Ondemand Explore, report, and share data with…


From Wild WebMink

? New OSI Directors

? New OSI Directors

The OSI Board held a meeting on Friday to fill three vacancies on the Board. This was the first time we have had Affiliate Members, so we decided to ask them to nominate candidates to fill some of the vacancies. They came up…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 19

Hill Tech Happenings, Week of March 19

March 21 Hearing: The Subcommittee on Crime, Terrorism, and Homeland Security of the House Judiciary Committee will hold a hearing on the REAL ID Act’s standards for driver’s licenses and identification cards. 10 a.m., 2141 Rayburn…


From The Eponymous Pickle

Wal-Mart as an Experience Platform

Wal-Mart as an Experience Platform

In AdWeek:  " ... Walmart to Marketers: 'We Are an Experience Platform'   Dominating Retailer-as-Media Landscape, Behemoth Offers Brands Options Via Online, In-store TV, Social and More   ....  The appellation came in the process…


From The Eponymous Pickle

Improv and Innovation

Improv and Innovation

Long ago I attended a session at the Royal Academy of Dramatic Arts  (RADA)  on using improv techniques to drive innovation.  Also again later with a group in San Francisco.    The San Francisco example was more practical.  These…


From Schneier on Security

Avi Rubin on Computer Security

Avi Rubin on Computer Security

Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.


From Apophenia

Reflecting on Dharun Ravi

Reflecting on Dharun Ravi

On Friday, Dharun Ravi – the Rutgers student whose roommate Tyler Clementi killed himself – was found guilty of privacy invasion, tampering with evidence, and bias intimidation (a hate crime). When John Palfrey and I wrote about…


From The Eponymous Pickle

Marketing the Next Big Tech Money Sector

Marketing the Next Big Tech Money Sector

In GigaOM: " ... For the first time in history, businesses can leverage big data for the benefit of driving marketing insights. We are at the very beginning of this wave, but this fundamental shift will create several multi-billion…


From The Computing Community Consortium Blog

The Washington Post

« Prev 1 3 4 5 6 7 13 Next »