The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.
I always worry about posting things on April 1st. So I didn
One of the keys to a successful open source community is appropriate transparency. A community with strong values around transparency will also be likely to respect its participants privacy. Such a community will also be unlikely…
iRobot, maker of the home task Roomba robot, gets considerable buzz in a Washington Post article. Their military/police/emergency robots seem to have value for nuclear emergencies. Meanwhile the Japanese have been working and…
@jackschofieldJack Schofield Sign in window of soon-to-close Borders store in Chicago. Someone's a little bitter http://t.co/rwmHPOD (pic) via @swansonian @bookofsand about 9 hours ago via webReplyRetweetFavorite
In Engadget: A reminder that this has been going on for some while. It also reminds me that not shortly after this date I was starting to lift these 'portables' into the overhead bins of aircraft.
Dr. Ralph-Christian Ohr, a Swiss product manager, reflects thoughtfully on the recent strong discussion on user-led innovation. “There has been quite a lot of discussion recently about a post by Jens Martin Skibsted and Rasmus…
Simplifying the workplace so customers can allocate more time and resources to their core business is fundamental to the innovation incubating today in Xerox
A number of major brands, including Kroger, had their data breached. The article describes the extent of the break, but also the implications regarding the types of customer data involved. More care and scrutiny needs to taken…
A Focus Infographic on measures of data that is worth a look.
Have been involved in a major supply chain analysis lately. It was an area I worked in early in my career. This Economist article discusses the effect of the Japanese disaster on how production capabilities and inventory safety…
A preview of the upcoming New York Celebration of Women in Computing, which is designed to bring the experience of the Grace Hopper Celebration to students in a smaller, less costly, and local setting.
In Roughtype: As a foodie much interested in how we interact with information about food and recipes online I found this quite interesting. How recipes are searched for and found in Google. Apparently this was recently changed…
UW Madison has responded to the Open Records Request regarding Professor Cronon (which I mentioned here). Here's a link to the Chancellor's message as well as the response from the UW-Madison legal counsel. Given the challenging…
In Technology Review: About Google's +1, searching and social networks. Letting your friends help prioritize search results. Like the old idea of letting friends help you choose your clothes. Not sure how successful that…
The Number Guy blogs about statistical significance. A frequently asked question: Is it significant? And it turns out often a troublesome concept. Don't let the professionals fool you, but it is not as easy as what was taught…
The Marketing Science Institute has created a web site that celebrates its 50th anniversary. Some interesting links and features.
Neat.
Finding spam using fuzzy hashing and other uses. " ... 'Fuzzy hashing' was invented to flag spam emails, but has found application in everything from malware detection to genome sequence alignment .... "
There’s an
Editor's Note: Candidates for the upcoming CSTA election have been invited to post brief blog statements so that members can have a chance to get to know them a bit better.
Hello CSTA Members, I am running for the Collegiate…For April Fool’s Day, Wikipedia editors have collected such a wonderful set of links and articles that it seems a shame to let it perish in the daily update. So here, for posterity, is the Did You Know section from the home page…
I conjecture that, everything else being equal, the level of your education is inversely correlated with innovation. At first, a new idea appears interesting, but it carries no prestige. And there are few financial incentives…
Creepy app warns of an end to privacy The biggest threat to your privacy is not the disclosure of any one piece of data. It's triangulation across all the data you're disclosing. This piece of software is more performance art…
A CS vision professor once told me "Of course we know there is an efficient algorithm for that humans can do it." Are we just nothing more than Turing machines running simple algorithms using machine learning techniques that…
For geolocation developers:" .... SimpleGeo's hosted spatial database service Storage was released from private beta. This is the flagship product from the company we named as most promising company of 2011. Storage is a hosted…
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they would mostly just allow an attacker to crash a system or siphon…Major emphasis on user-centred design, open innovation and social innovation in new EU innovation strategy On 6 October 2010, the European Commission adopted the “Innovation Union“, a strategic approach to innovation, which is…
Earlier this year, the NAE and IOM, along with Health 2.0, announced a challenge for college students throughout the U.S., to create new apps or tools that use large quantities of newly available health data: Using social networking…
@jzbJoe Brockmeier Microsoft is going to the EU about Google being anticompetitive. That's like Jack the Ripper going to the cops for getting mugged. about 18 hours ago via webReplyRetweetFavorite