The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
There are still a couple of weeks of school for me and my students. Well the seniors are done with their finals on Friday but underclassmen have some time after that. I should be thinking about summer vacation but I find myself…
I have long argued that the ability to patch something is not a security “feature” — whatever caused the need to patch is a failure. The only proper path to better security is to build the item so it doesn’t need patching — so…
I have long argued that the ability to patch something is not a security “feature” — whatever caused the need to patch is a failure. The only proper path to better security is to build the item so it doesn’t need patching — so…
In EMarketer, continued brand focusing of ads:Study: $4.2B CPG digital ad market focuses on brandingConsumer packaged goods and consumer products companies in the U.S. will spend roughly $4.2 billion on digital media this year…
Close your eyes and imagine what it was like to be a teenager in the 1920s. Perhaps you are out late dancing swing to jazz or dressed up as a flapper. Most likely, you don’t visualize yourself stuck at home unable to see your…
A good overview, non technical article on Swarms. We did some thinking about using robot swarms for repetitive tasks. You can build cheap robot swarms, making them think like swarms that have have useful goals is harder. Preparatory…
Our well-being centers on the meaningfulness of our relationships: our intimate ties, our associations with a larger circle of people, and our sense of interconnectivity with a collective tribe. Technology has become deeply embedded…
Detailed piece by Vincent Granville. Useful for reference and application. Tutorial: How to detect spurious correlations, and how to find the real onesSpecifically designed in the context of big data in our research lab, the…
(Abstract, full article requires purchase)FingerReader: a wearable device to support text reading on the goVisually impaired people report numerous difficulties with accessing printed text using existing technology, including…
Short piece that addresses typical techniques. But it is not all about technique, it is how the technique is connected to the data from the domain of the problem, and ultimately connected to a real world decision." ... In this…
I envy economists. Unlike computer scientists, they seem to be able to publish best-seller books with innovative research. One such book is Piketty’s Capital. The book is reminiscent of Marx’s capital in its scope. If you haven’t…
When I first joined CSTA almost a decade ago, computer science education was absent from most school districts. Rigorous computer science courses were often tucked away in the classrooms of exclusive private schools and affluent…
What STOC might have been like in old times src Mikolaj Kopernik was a student of the professor mathematum Domenico Novara in 1500. They traveled from Bologna to Rome where Novara gave lectures on mathematics. We imagine that…
What STOC might have been like in old times src Mikolaj Kopernik was a student of the professor mathematum Domenico Novara in 1500. They traveled from Bologna to Rome where Novara gave lectures on mathematics. We imagine that…
Del Campo, a restaurant in Washington DC, has a Bloody Mary made with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Biologist Alan Watts makes some good points: Mammals don’t respond well to surveillance. We consider it a threat. It makes us paranoid, and aggressive and vengeful. [...] "Natural selection favors the paranoid," Watts said. Those…
It is very useful to have a lab to experiment with your data. Here is Teradata's approach. " ... Promote Exploration & ExperimentationA Teradata Data Lab lets you explore and examine new ideas by combining new data with existing…
In OReilly: A new blog that appears to be of interest: " ... Today we’re kicking off Intelligence Matters (IM), a new series exploring current issues in artificial intelligence, including the connection between artificial intelligence…
New from Metaio. A video describe the future possibilities. Another level of sensor data will be possible. In the press release: " ... With “Thermal Touch”, a wearable headset user could turn any surface into a touch-screen…
An important consideration is often what the size of the time step needs to be. I often have to ask, What does your 'real-time' look like? In TDWI. " ... "Real time" of course, means different things depending on users…
In the fall we list theory jobs, in the spring we see who got them. Similar to last year, I created a fully editable Google Spreadsheet to crowd source who is going where. Same rules as last year: I set up separate sheets for…
In Knowledge@Wharton: Interesting how this will change the results. Interesting overview is provided here. Has been a long time since I have looked at domain name generated issues. Consider the ultimately ontology of some"…
There's a debate going on about whether the U.S. government -- specifically, the NSA and United States Cyber Comman -- should stockpile Internet vulnerabilities or disclose and fix them. It's a complicated problem, and one that…
This evening listened in on a #Cognitivecomputing presentation given in NYC. See it recorded here. A good broad overview of work done by ETH Zurich and IBM to deliver Watson as a service. See more about their purchase of assistance…
In CACM: A critical look at Agile. I have taken a look at Scrum for development, but not used it in a real application. And a warning about hype. Bertrand Meyer in a new book. " .... an attempt to sort out the jewels from…
I am regularly asked what is the most surprising thing about the Snowden NSA documents. It's this: the NSA is not made of magic. Its tools are no different from what we have in our world, it's just better-funded. X-KEYSCORE is…
The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) hosted Demo Day 2014 to highlight DARPA’s ongoing contributions to preserving and expanding Information Technology superiority on May 21…
In Quanta magazine. A relatively non technical article about building a quantum bit, the Qubit, the foundation for the quantum computer. Nicely described. " ... Willet is attempting to harness that state to build a “topological…