acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2009


From insideHPC

The most dangerous

The most dangerous

…from a computer program, as a professor at my alma mater used to say, is an answer that looks “about right.” Dan Reed has an interesting post on his blog right now on accuracy in scientific applications The parallel application…


From Putting People First

Gemalto, Microsoft, Nokia and Philips team up to advance

Gemalto, Microsoft, Nokia and Philips team up to advance

At the Future of the Internet conference in Prague today, Gemalto, Microsoft, Nokia and Philips announced a new initiative that will address the fundamental societal issue of trust in new and emerging digital services. The initiative…


From CSDiary

Back from Qatar

Back from Qatar

In a week it will be commencement weekend at Carnegie Mellon. The ceremony will hold special interest for the School of Computer Science, since Google CEO Eric Schmidt will be the keynote speaker. But in fact, we’ve already had…


From The Eponymous Pickle

Asymmetric Following

Asymmetric Following

O'Reilly on asymmetric following. This is an aspect of social media I had been thinking about since being introduced to them. He has some excellent points here. Complete symmetry is unscalable. You cannot effectively experience…


From The Eponymous Pickle

Netezza Links with eHarmony

Netezza Links with eHarmony

Another interesting application of advanced data warehousing capabilities. With other applications matching consumers and retailers:" ... Online dating service eHarmony has tapped data warehouse and business analytics company…


From Putting People First

Book: Identity in the Age of Cloud Computing

Book: Identity in the Age of Cloud Computing

Identity in the Age of Cloud Computing: The next-generation Internet’s impact on business, governance and social interaction J.D. Lasica The Aspen Institute, 2009 Smart Mobs reports: “Recently, The Aspen Institute has published…


From The Eponymous Pickle

The End of Voice Mail

The End of Voice Mail

Now that I am using systems like Google Voice I thought about the ultimate demise of voice mail. Yet that system does not always provide a good transcription of the audio, and there always has to be some sort of backup. And…


From Wild WebMink

links for 2009-05-10

links for 2009-05-10

Fascinating, and now it's discovered so obvious you wonder why no-one else has observed it before. I wonder if this has any implications for prime-based cryptography…


From Putting People First

Journal of Business Strategy on design innovation

Journal of Business Strategy on design innovation

A special issue of Journal of Business Strategy on


From The Noisy Channel

Designing for Faceted Search

Designing for Faceted Search

While I was inundated with conferences a couple of weeks ago, I missed s a nice article by Stephanie Lemieux at User Interface Engineering (a site I recommend in general) entitled “Designing for Faceted Search“. It briefly explains…


From The Noisy Channel

Designing for Faceted Search

Designing for Faceted Search

While I was inundated with conferences a couple of weeks ago, I missed s a nice article by Stephanie Lemieux at User Interface Engineering (a site I recommend in general) entitled “Designing for Faceted Search“. It briefly explains…


From insideHPC

Shareholders file suit to block Oracle purchase, Sun fears it bribed foreign

Shareholders file suit to block Oracle purchase, Sun fears it bribed foreign

Sun gave the SEC some bad news on Friday. Computerworld is reporting that in a recent SEC filing Sun reveals that 3 different lawsuits have been filed by shareholders to block the sale. All three actions are aimed at blocking…


From The Noisy Channel

The Twouble with Twitter Search

The Twouble with Twitter Search

There has been a flurry of reports about Twitter search–whether about Twitter’s plans to improve their search functionality or about alternative ways to search Twitter. But Danny Sullivan makes a great point in a recent post…


From The Noisy Channel

The Twouble with Twitter Search

The Twouble with Twitter Search

There has been a flurry of reports about Twitter search–whether about Twitter’s plans to improve their search functionality or about alternative ways to search Twitter. But Danny Sullivan makes a great point in a recent post…


From The Eponymous Pickle

First Experience with WolframAlpha

First Experience with WolframAlpha

Yesterday I finally got early access to WolframAlpha. I understand it will be coming out publicly in the coming week(s). It is being positioned as '... Making the world's knowledge computable ... '. I have also seen two demonstrations…


From Computer Science Teachers Association

Student Speaks Out About Computer Science Curriculum

Student Speaks Out About Computer Science Curriculum

CSTA has spent the last several years arguing for rigorous computer science courses in high school, for emphasizing critical, computational thinking skills, and for standards-based curriculum. Many teachers have told us of their…


From The Eponymous Pickle

Dating Sites and Smell

Dating Sites and Smell

In Discovery. An approach that makes sense, but without a practical aroma interface, difficult to implement: " ... Two companies, Basisnote and Scientific Match, are developing technology to match couples based on the genetic…


From Wild WebMink

links for 2009-05-09

links for 2009-05-09