The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
The U.S. Department of Commerce’s Internet Policy Task Force will hold a multistakeholder forum to discuss the DMCA notice and takedown system on March 20, 2014 at the USPTO main campus in Alexandria, Virginia. Subsequent public…
The U.S. Copyright Office invites public comments on the rights of “making available” and “communication to the public,” particularly in the digital age. The deadline for comments is April 4, 2014. A public roundtable will be…
The M-Enabling Summit conference invites program proposals for presentations and case studies. The conference will be held June 9-10, 2014 in the Washington, D.C. area and is co-sponsored by G3ict, the Federal Communications…
Patrick Prémont, functional programming architect from local consulting firm Tindr, came to speak to my Programming Paradigms class last week. We're currently learning functional programming in Racket, so who better to speak …
The FCC is seeking nominations for the 3rd Annual FCC Chairman’s Awards for Advancement in Accessibility until March 31, 2014. The Chairman’s Awards aim to highlight and encourage innovation in accessible technologies, standards…
The FCC’s Accessibility and Innovation Initiative Speaker Series will feature Dr. Juan E. Gilbert presenting on “Innovation in Voting Accessibility” on Tuesday, March 11, 2014, at 9 am ET. The presentation will be followed by…
Last week was school vacation week and I spent a lot more time than usual off line. I even got in a day of snowboarding. I don’t have as many links as usual but I think the ones I do have are good ones.
You can find non paying…In Mediapost: " ... More than half of men now shop for groceries and household items more often than their spouses, and 65% of men surveyed said they were the primary shoppers for their households in certain product categories…
I have continued to update my earlier post about women in cybersecurity. Recent additions include links to some scholarship opportunities offered by ACSA and the (ISC)2 Foundation. Both scholarship opportunities have deadlines…
I have continued to update my earlier post about women in cybersecurity. Recent additions include links to some scholarship opportunities offered by ACSA and the (ISC)2 Foundation. Both scholarship opportunities have deadlines…
I have been asked to give a talk and write up about how classic relational database providers have been positioning the phenomenon of Big Data. From an analytic, decision improving perspective. Whenever you are asked to look…
It is suggested that the recent 'muslim' ruling that would pull critical content from You Tube videos could change the way content is managed. Will providers need to get permission from every participant in a video, regardless…
The topic is an interesting one, and not as science fiction as we think. It has applications in a number of practical areas. Out of China: " ... Chinese scientists upbeat on development of invisibility cloak | South China…
In Mashable: We examined audible interaction. Both internally and with shoppers in retail. Sound and vision have different bandwiths. Different precision. What are the implications for wearing a sound manipulated device? …
Graphical analysis has been covered here a number of times. In particular using the GePhi package. We see that this is written about in the Teradata blog, using their Aster package. Had not looked at that approach, but will…
Chat series from Tribeca awards. Points also to the Disruptor Foundation. I am suspicious of awards meetings. But they have value if they bring together practitioners and provide actual incentive to get something new done.…