acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

March 2013


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2013 CSTA National Survey on High School Computer Science

2013 CSTA National Survey on High School Computer Science

The Computer Science Teachers Association is conducting their annual computer science survey right now. CSTA members should have received notice in our email. I hope that all computer science educators will participate however…


From The Female Perspective of Computer Science

Coherent Emergent Stories

Coherent Emergent Stories

My thesis project is moving forward, which I'm thrilled about. Here's a high-level abstract that summarizes the system I am working on.Crafting satisfying narratives while preserving player freedom of action is a longstanding…


From U.S. Public Policy Committee of the ACM

House Hearings on Litigation Abuses

House Hearings on Litigation Abuses

Two Congressional hearings relevant to patent reforms, which were canceled last week due to “snowquester,” are scheduled for this week. House Hearing on “Examination of Litigation Abuses” Wednesday March 13, 2013, 10 am ET Subcommittee…


From The Eponymous Pickle

Blogs Outrank Other Social Media in Influence

Blogs Outrank Other Social Media in Influence

This is good to hear.  While the number of blogs seems to be decreasing in favor of easier to do media like Twitter, they still influence customers.


From The Eponymous Pickle

Innovation Ecosystems

Innovation Ecosystems

In Mediapost.  Good thoughts, rephrasing: All innovation exists within a context, makes sure you and your customers understand it. " ... Certain innovations, such as Instagram or Apple's App Store, open the door for other entrepreneurs…


From Schneier on Security

Dead Drop from the 1870s

Dead Drop from the 1870s

Hats:

De Blowitz was staying at the Kaiserhof. Each day his confederate went there for lunch and dinner. The two never acknowledged one another, but they hung their hats on neighboring pegs. At the end of the meal the confederate…


From Putting People First

Re-designing (or redefining) UXD

Re-designing (or redefining) UXD

Putting People First rarely plugs conferences (before they happen) but this one seems intriguing: RE:DESIGN/UX Design will take place in Silicon Valley on April 29–30, 2013. The events are capped at 125 attendees and the focus…


From My Biased Coin

Mike Smith Explains, Apologizes

Mike Smith Explains, Apologizes

Given the hubbub that arose this weekend over the issue of Harvard examining the e-mail of some of the Resident Deans, it's gratifying (if unsurprising) that this morning Dean of the Faculty of Arts and Sciences Mike Smith has…


From Daniel Lemire's Blog

Current Daylight saving time policies are insane

Current Daylight saving time policies are insane

Daylight saving time (DST) is this insane practice whereas twice a year, clocks are moved forward or backward by an hour. It is still widespread throughout North America and Europe. As a kid, I was told that this was meant to…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 11

Hill Tech Happenings, Week of March 11

March 13 Hearing: The House Homeland Security Committee will hold a hearing on the Department of Homeland Security’s role in cybersecurity of critical infrastructure. 10 a.m., 311 Cannon Building (rescheduled from March 6) The…


From The Eponymous Pickle

Unified Workspace

Unified Workspace

Cisco presents the Unified Workspace.  General but useful thoughts. " ... Trends such as mobility, virtualization, video, collaboration, knowledge management, and cloud have come to the forefront as companies struggle with how…


From The Eponymous Pickle

Release of Geodata

Release of Geodata

The Geodata from Wikimedia is being released.   Thought this had been done before,  very useful for mobile. " ... The WikiMedia Foundation has added a new extension to MediaWiki, the foundation for Wikipedia, that adds geographic…


From Schneier on Security

Is Software Security a Waste of Money?

Is Software Security a Waste of Money?

I worry that comments about the value of software security made at the RSA Conference last week will be taken out of context. John Viega did not say that software security wasn't important. He said:

For large software companies…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 11 March 2013

Interesting Links 11 March 2013

It’s Women’s History Month and last week was International Women’s Day. Not surprisingly that there was a lot of talk about women in computer science in particular and women in STEM fields in general last week. In fact let’sI…


From The Eponymous Pickle

New P&G Open Innovation Website

New P&G Open Innovation Website

In its second decade of running their Connect & Develop approach, P&G has updated their approach and website.  See it here.  I have worked using it to connect to specific innovators.  " ... “As P&G enters its Second Decade of…


From The Eponymous Pickle

Blog Tags are Here

Blog Tags are Here

Starting now you can utilize blog tags here, also called labels.  They are found at the bottom of each post.  These tags classify the blog post with others that are of related topics.  You can click on these at the bottom ofLabel…


From The Eponymous Pickle

Recognizing Pattern with Math

Recognizing Pattern with Math

Recognizing PatternsWith today’s powerful data analysis systems, users gather a ton of information—a breakdown of Wal-Mart Stores’ (WMT) sales in the U.S. or things people “like” on Facebook (FB)—in one place and then run queries…


From The Eponymous Pickle

Experience in the Data

Experience in the Data

Apply Your Experience.Saffron Technology wants to put your data to work under a completely new approach to data analytics: Experience Management. The way we see it, countless worlds of Experience are hidden in your data. And…


From My Biased Coin

Harvard Spies on E-mails

Harvard Spies on E-mails

A strange offshoot of the Harvard cheating scandal -- a report in the Boston Globe that Harvard administrators decided it was OK to search through Resident Dean e-mails when some information marked confidential had appeared to…


From The Eponymous Pickle

Improved Check-in

Improved Check-in

Foursquare checkins become easier, which eases the whole problem of getting loyalty credit, and also makes  the implementation of location based games more powerful.  This all ends up creating better commercial opportunity,


From The Eponymous Pickle

Your Personal Brand Will be Googled

Your Personal Brand Will be Googled

Good thoughts in Mashable.   It is revealing that some of hints here also use Google to improve your personal brand, regardless you are a regular user of their services.  They have it coming and going.


From The Eponymous Pickle

Future Preview

Future Preview

Pointer to the advertising future via a video by James C Nelson. from 1967.    I remember thinking about adaptive media not long after that, but it seemed the challenges were very great.    In IT even the concept of'Notebook'…


From The Eponymous Pickle

IT Driving Employee Passion

IT Driving Employee Passion

Good IT is a magical thing that can drive employees to do new things.  My reaction to the title here. Why else does everyone have a smartphone and/or a tablet, and refers to it constantly?.  You could not have imagined old technology…


From U.S. Public Policy Committee of the ACM

ACM Washington Update Is Back!

ACM Washington Update Is Back!

After a long hiatus, the ACM Washington Update – a newsletter of computing policy activity published by the ACM Public Policy Office – is back. Yesterday we published a new issue, the second one in this new format. ACM Washington…


From The Eponymous Pickle

What Data Brokers Know About You

What Data Brokers Know About You

In Pro Publica A good overview of how personal data is currently being brokered.  First time that I had seen this much information about the topic in one place.  And addressing the implication for privacy.   " ....  Data


From The Eponymous Pickle

Coke Neuromarketing

Coke Neuromarketing

Roger Dooley provides a number of examples of Coke neuromarketing.  I had been sensing that there was a decrease in the use of these technologies to understand market engagement, but this article says otherwise.  In part that…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

It’s not lazy – its efficient

It’s not lazy – its efficient

Years ago I worked for a company that sold computers, software, terminals and many other things. A terminal salesperson worked out of the same office I did and as a result we of then got the latest and greatest terminals to use…


From Schneier on Security

Friday Squid Blogging: Squid/Whale Yin-Yang

Friday Squid Blogging: Squid/Whale Yin-Yang

Pretty.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From Schneier on Security

Ross Anderson's <i>Security Engineering</i> Online

Ross Anderson's <i>Security Engineering</i> Online

The second edition of Ross Anderson's fantastic book, Security Engineering, is now free online. Required reading for any security engineer.


From The Female Perspective of Computer Science

Damsels in Distress

Damsels in Distress

After all the terrible controversy and the failed attempts of sabotaging her Kickstarter campaign, Anita Sarkeesian's first episode of her video series on Tropes VS Women in Video Games is finally online.  It's the first instalment…