acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2013


From The Eponymous Pickle

Sentiment Analysis from SAP

Sentiment Analysis from SAP

Also had not realized SAP was into sentiment analysis.  An overview via an interview here.  " ... SearchSAP spoke to Sameer Patel, global vice president and general manager for enterprise social and collaborative software at…


From Schneier on Security

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?

I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here:

More recently, two sources familiar with the investigation told CNN that Russell…


From The Eponymous Pickle

Creating Effective Analytics

Creating Effective Analytics

Good article about the idea.  Summarized by linking to executive champions and truly understanding where the analytics intersects with decision process.


From The Eponymous Pickle

Gap Analysis Paper

Gap Analysis Paper

New from Tom Ritchey:For those who are interested in computer-aided GAP Analysis – especially concerning problem areas that are difficult to quantify – a new article is available: “Morphological Gap Analysis: Using GMA to identify…


From The Eponymous Pickle

Catalina Adaptive Mobile Advertising

Catalina Adaptive Mobile Advertising

Mobile advertising from Catalina.  Had not seen them in this space before, but admit have not followed them closely.  " .. “BuyerVision Mobile represents a huge breakthrough in mobile advertising,” said Chris Henger, Catalina…


From Writing

Shit recruiters say

Shit recruiters say

Just today, I got my 1,000th recruiter email in the last ~4 years. I know this is the number because I'm slightly obsessed with organization and have added a specific label to each and every recruiter email I've gotten in my[1]…


From The Eponymous Pickle

Disrupting Education

Disrupting Education

In CACM:  Research on the ongoing and imminent disruption of education.  A model that has existed for 800 years sees itself threatened.  What will make the new methods work?  How will they be blended with traditional learning…


From My Biased Coin

Congratulations to Justin and Jon

Congratulations to Justin and Jon

Justin Thaler and Jon Ullman had back-to-back thesis defenses today.  Both talks were excellent -- Justin's on his work on verification methods (for cloud computing), and Jon on his work on differential privacy.  While there…


From Schneier on Security

Intelligence Analysis and the Connect-the-Dots Metaphor

Intelligence Analysis and the Connect-the-Dots Metaphor

The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have ignored such a dangerous person? How do we reform the intelligence…


From Gödel's Lost Letter and P=NP

A Most Perplexing Mystery

The discrete log and the factoring problem Antoine Joux is a crypto expert at Versailles Saint-Quentin-en-Yvelines University. He is also one of the crypto experts at CryptoExperts, having joined this startup company last November…


From The Eponymous Pickle

Wal-Mart Does e-Commerce Development in House

Wal-Mart Does e-Commerce Development in House

Perhaps an unusual choice.  Most large non-tech companies use off the shelf or outsource such capabilities.  Wal-Mart feels it has special understanding of it needs to keep the development internal.


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of May 6

Hill Tech Happenings, Week of May 6

May 8 Hearing: The Subcommittee on Crime and Terrorism of the Senate Judiciary Committee will hold a hearing on responses to cyberthreats. 9 a.m., 226 Dirksen Building May 9 Hearing: The Subcommittee on Government Operations…


From Schneier on Security

Michael Chertoff on Google Glass

Michael Chertoff on Google Glass

Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass.

Now imagine that millions of Americans walk around each day wearing the equivalent of a drone on their head: a device capable of capturing…


From Putting People First

Tweeting Minarets: joining quantitative and qualitative research methodologies

Tweeting Minarets: joining quantitative and qualitative research methodologies

In the last post of the EthnographyMatters Ethnomining edition (edited by Nicolas Nova), David Ayman Shamma @ayman gives a personal perspective on mixed methods. Based on the example of data produced by people of Egypt who stood…


From Putting People First

It’s time to reinvent the Personal Computer

It’s time to reinvent the Personal Computer

Although Windows and Macintosh are both showing their age, Michael Mace of Cera Technology thinks there is enormous opportunity for a renaissance in personal computing. In this post he describes the next-generation personal computing…


From The Eponymous Pickle

Michael Schrage

Michael Schrage

Just started to review some of Michael Schrage's posts in his HBR blog that had to do with analytics, data visualization and the digitization of business.  Well worth reading. We followed him the simulation space a number ofSerious…


From Computational Complexity

Are you smarter than a fifth grader? I'm not.

My darling sometimes watches TV in the middle of the night when she can't sleep.So I found myself watching (actually listening) to the quiz show Are You Smarter than a Fifth Grader? They asked the following Math Question: What…


From Daniel Lemire's Blog

How to be effective at open source: by programmers, for programmers

How to be effective at open source: by programmers, for programmers

Though it does not get much press, one of the great social and technological innovation of the last 30 years has been open source software. To about 90% of the population, this remains a mystery. Are the people producing open…


From BLOG@CACM

CHI 2013 in Paris: A Personal Review of the Conference

CHI 2013 in Paris: A Personal Review of the Conference

In this short report I offer some reflections on the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems (commonly known just as "CHI") that took place in Paris last week.  The conference had 16 parallel tracks. …


From The Eponymous Pickle

Visualizing Geographic Data

Visualizing Geographic Data

 An interesting HBR Blog case study on visualizing geographic data.  They conclude reasonably: " ... There are lots of ways to sequence development. But the end principle is simple: create more data visualizations than you need…


From Schneier on Security

Honeywords

Honeywords

Here is a simple but clever idea. Seed password files with dummy entries that will trigger an alarm when used. That way a site can know when a hacker is trying to decrypt the password file.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 6 May 2013

Interesting Links 6 May 2013

About five weeks left to my school year. I’m behind in grading. I’m behind in lesson planning. This means less time on the Internet for the next week or so. Somehow I managed to collect a bunch of interesting links last weekMakey…


From The Eponymous Pickle

IX Research

IX Research

Announcing the innovation research and delivery arm of Innovation Excellence: IX Research.  Did not know it was coming, but who tells me anything?   Research for Innovation Practitioners.  Worth looking into.


From The Eponymous Pickle

Linkedin Changing the World

Linkedin Changing the World

Only a few days ago we were looking at the first Web page, developed twenty years ago.  Now another anniversary, of Linkedin, only ten years ago.  How has this changed the world?  Establishing a one place global white pages for…


From Apophenia

How would you define work in a networked world?

How would you define work in a networked world?

(This post was originally written for LinkedIn.  Go to the LinkedIn version to engage in the conversation.) I’ve been scratching my head trying to think about how to understand the different facets of labor that are shaping contemporary…


From The Eponymous Pickle

Google Car Gathers Massive Data

Google Car Gathers Massive Data

In Kurzweil: Saying that the Google self-driving car gathers 1 GB data per second.    Quite a formidable amount.   Talk about opening yourself to analytics data mining opportunities.  Or offloaded for later analysis? The integration…


From The Eponymous Pickle

Strategic Planning

Strategic Planning

Colleague Ed Burghard on strategic planning.  A popular but often misunderstood topic.  I like his views here about communities and dreams.  Note this is first in a series that is worth following.  See also his eBook on the topic…


From The Eponymous Pickle

Sankey Diagram Blog

Sankey Diagram Blog

A blog devoted to Sankey diagrams.  Discovered in my quest for ways to deliver these.  Many good examples.  " ... With this blog I would like to share with you my fascination for Sankey diagrams. My goal is to present to you…


From My Biased Coin

Calling Out Stupidity

Calling Out Stupidity

While I greatly enjoy working at Harvard, there are many painfully stupid things said and done by people here -- as I suppose is the case anywhere -- that either I don't feel merit commenting on or I don't feel it's appropriate…


From The Eponymous Pickle

New: Visual Footprint Resources App

New: Visual Footprint Resources App

Ken Karakotsios was the author of the remarkable SimLife genetic playground game.  He worked with us to build agent based simulation models that were used for years in the enterprise to understand product demand.  Now he hasFollow…