acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

June 2010


From The Eponymous Pickle

Geofencing

Geofencing

Geofencing is a kind of virtual alert system based on a geographical line or lines drawn on a map. So if you wanted to determine if a person entered a particular supermarket aisle, you would outline that aisle with a geofence…


From The Eponymous Pickle

This Blog and How it Relates to What I Do

This Blog and How it Relates to What I Do

This blog in various forms was initially established to communicate to innovation center visitors starting around 2002. This blog's readers include executives and innovators of many kinds from retail, manufacturing, R&D, IT and…


From Schneier on Security

TacSat-3 "Hyperspectral" Spy Satellite

TacSat-3 "Hyperspectral" Spy Satellite

It's operational:

The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal imagers. This kind of detection is used on spy satellites and…


From Schneier on Security

WikiLeaks

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.

Assange is an international trafficker, of sorts. He and his colleagues collect documents and imagery that governments and other institutions…


From The Eponymous Pickle

Openness Audit

Openness Audit

Heard Charlene Li talk today introducing concepts in her new book: Open Leadership: How Social Technology Can Change the Way You Lead. Some excellent points. In her blog she includes a post about the concept of an Openness Audit…


From The Eponymous Pickle

Stories Sell

Stories Sell

In Roger Dooley's Neuromarketing blog: Why Stories Sell. With some links to previous posts on the subject. Certainly they do sell, and are much more memorable than simple statements. Our brains have some special empathy for human…


From Computational Complexity

Talking about your work with a layperson

How to best describe what we do to the layperson? It depends on what you mean by layperson.

I was in Austin Texas visiting my nephew Jason. I was also giving a talk at the University. My nephew fixes forklifts for a living…


From The Eponymous Pickle

Scented Spaces

Scented Spaces

Discovered! An excellent site and scented spaces blog by Tracy Pepe on scent design. I am following, check it out. See also her recent post on CPG scent branding, a favorite topic of mine.


From BLOG@CACM

Hope vs. Fear: Privacy Challenges in Online Health Communities

Hope vs. Fear: Privacy Challenges in Online Health Communities

 The difficulty in creating privacy controls in online health communities represents the struggle between hope and fear.


From The Eponymous Pickle

Social Media Terms

Social Media Terms

A useful glossary of social media terms. Terms in play are always changing, worth knowing.


From Wild WebMink

links for 2010-06-24

links for 2010-06-24

Marten Mickos says open source doesn't have to be fully open This was the received wisdom among the senior VPs at Sun just before the fall of the company. While there is a marginal justification for adding some closed software…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Getting Close to ISTE Time

Getting Close to ISTE Time

I am starting to put stuff together to take with me to ISTE this weekend. I get in Sunday sometime and already have a dinner meeting set up. And some stuff do to Sunday afternoon if I get in early enough. I’ve been planning on…


From Putting People First

Content strategy and the future of the online experience

Content strategy and the future of the online experience

Two new articles in UX Magazine: Fusing content strategy with design by David Gillis Context maps and content flow diagrams are just two possible ways to integrate content strategy and UX design


From The Eponymous Pickle

Auction Followup

Auction Followup

In recent posts I have been exploring auction technologies, mobile and otherwise. Part of the exploration I did was to attend a local auction at Cowan's Auctions of the papers of Mary Lincoln. I got a number of emails about that…


From The Eponymous Pickle

eBay buys RedLaser

eBay buys RedLaser

Barcode reading has been on my mind lately, see recent posts. And just as that occurs eBay buys RedLaser, with more than just code-reading on their mind. RedLaser is the best known barcode reading App, used by several shopping…


From Apophenia

Sexting: Youth Practices and Legal Implications

Sexting: Youth Practices and Legal Implications

Dena Sacco and her team have put together a fantastic document that maps out the legal and socio-legal issues surrounding sexting: Sexting: Youth Practices and Legal Implications. This is for the Berkman Center Youth and Media…


From The Eponymous Pickle

Tremor CEO Interview

Tremor CEO Interview

A CGT interview with Steve Knox, CEO of P&G's Tremor. " ... Have you ever wondered why consumers talk? Thought-leader Steve Knox shares tricks for building consumer advocacy for your brands through cognitive psychology ... "


From Schneier on Security

Popsicle Makers a Security Threat

Popsicle Makers a Security Threat

Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:

No popsicle makers are allowed through security.
Anyone have any idea…


From The Eponymous Pickle

A Checklist Manifesto

A Checklist Manifesto

Interesting piece on the power of the checklist and our aversion to it: " Checking Everything Off -- Except the Resistance to Changefrom Knowledge@WhartonErrors and omissions of the most ordinary and preventable kind kill thousands…


From Putting People First

The huge challenge of Nokia

The huge challenge of Nokia


From Wild WebMink

? Why Do Open Source Advocates Attack Each Other?

? Why Do Open Source Advocates Attack Each Other?

Maybe it’s a trend, or maybe I just noticed because I was looking, but following my article last week about the strange parallels between Life of Brian and the critics of the Free and Open Source Software (FOSS) movement, there…


From Computational Complexity

The Future of STOC

I set up a new blog, Future of STOC to discuss role of our main conference and how to achieve it. At STOC this year we had a relatively large attendance of 350 but why not 1000 or more? Why isn't our flagship conference bringing…


From Schneier on Security

How Much Counterterrorism Can We Afford?

How Much Counterterrorism Can We Afford?

In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:

"High-tech, low-tech, we can't afford to overlook any possibility in dealing with mass casualty…


From Putting People First

Why we desire, display and design

Why we desire, display and design


From Putting People First

IKEA

IKEA


From The Eponymous Pickle

Bing App does Barcodes

Bing App does Barcodes

I noticed in updates for the Bing IPhone App today that they were now allowing you to read barcodes and other images using a smartphone's camera. Then search for the items with the derived code. Smartphone barcode reading development…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How Many Types of Programmers are there?

How Many Types of Programmers are there?

Paul Vick wrote a post called


From The Eponymous Pickle

Successful Software Platforms

Successful Software Platforms

In CACM: Successful Software Platforms are the Byproducts of Successful Businesses, by Ruben Ortega Most startup business plans I have encountered over the past few years mention that a side-effect of the business will be to…


From The Eponymous Pickle

Richer Bar Codes

Richer Bar Codes

Towards richer bar codes ... This is an evolution that has been going on for years, now we are in the midst of making it useful ..." ... A shopper in a self-scan checkout line looks for the barcode on each product. Otherwise,…


From CERIAS Blog

Centers of ... Adequacy, Revisited

Centers of ... Adequacy, Revisited

Almost two years ago I wrote in this blog about how CERIAS (and Purdue) was not going to resubmit for the NSA/DHS Centers of Academic Excellence program.

Some of you may notice that Purdue is listed among this year's (2010) group…