The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
In Ad Age: Insightful, thinking now how about the interaction of privacy and big data. Are the algorithms involved also privacy sensitive? " ... In addition to all the questions it's raised about privacy expectations and…
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence agencies with information about bugs in its popular software…Last week there was an announcement of a multi-year $5.2 million grant from the NSF to fund creation of a new Advanced Placement Computer Science course called (working title at least) AP CS Principles. This is based on the work…
Mark Guzdial is one of the people I most respect in the area of computer science education so when he says something is good or bad I tend to take it very seriously. Not that I always agree but I have to think long and hard about…
Trust is a Choice – Prolegomena of Anthropology of Trust(s) by Stephanie A. Krawinkler 189 pages, 2013 Carl-Auer Verlag (Publisher) [Amazon link] [Extract] Trust is a universal but culture-bound phenomenon and a critical success…
We invite you to take a few minutes to complete a brief survey by the Computing Research Association (CRA). Your feedback is important to us and helps improve our communications. The survey deadline is Monday, July 1. If you…
I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on:
In a request today to National Security Agency director Keith Alexander and Defense…On Friday the Presidential Commission on Election Administration, established earlier this year by Executive Order, will hold its first public meeting in Washington, D.C. As part of the public comment period prior to the meeting…
Short piece on the use of innovation and digital marketing to improve CPG sales. " ... A new report by the GMA and PwC found that despite lagging sales in 2012, 2013 is proving to be a lucrative year for food, beverage and…
On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media.
My hypothesis is that science will someday be able to identify sociopaths and terrorists by their…An aggregation of tweets I posted during the ACM Awards ceremony in San Francisco on June 15.
In Fastcompany. Good view. Frequently an issue. Especially if the people involved do not have the very best people skills. How many of us do. Individual creativity still exists and can produce real value.
In CWorld: " ... GE thinks it's time to put industrial data in the cloud. The company is introducing a platform for collecting and analyzing data from industrial gear ... Internet tools are just starting to be applied to industrial…
In our innovation labs we experimented with using false front displays to set contexts for consumers in a laboratory. Interesting and obvious idea, but the coverings tend to be much more permanent than expected. Stifling innovative…
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they cost?
This essay attempts to figure out if they accomplishedthis…On all the social media networks, there’s a hashtag that I have kept seeing the last few days: #ChangeBrazil, associated with unrest across Brazil. Since I may be going there soon for the huge FISL open source conference, I…
The physical environment in which a service plays out has a significant influence on the experience of a service. So it’s not uncommon for service design projects to take the physical environment into account. In a recent project…
A new Ericsson ConsumerLab report, Unlocking Consumer Value, identifies the needs of today’s smartphone and mobile internet users. “The rapid uptake of smartphones and other connected devices has transformed the mobile broadband…
Looking a several projects that aim to deliver information to small executive groups. Mobile is esential. The question is what are the likely formats of the tablets being used in the next 18 months? Applications includeNow…
The government clearly wishes to be seen to be doing something about the issues of children viewing pornography and of child pornography. To this end they have called a summit, to be chaired by Culture Secretary Maria Miller…
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user data for about 10,000 people, although the time frames are different.much…
I am sometimes asked why I think stories in games need to improve. Considering I'm studying nonlinear stories in games for my PhD project, I was for a long time unsatisfied with my answer. But I finally figured out what myElizabeth…
Just announced. A further indication of movement of more data gathering and integrating companies moving towards the use of stronger predictive analytics. " ... Dunnhumby said the acquisition would allow it to offer clients…
Former colleague Sandra Hughes, For a time chief privacy office of Procter & Gamble, has just set up a blog: Sandra Hughes Strategies. Check it out. She does consulting and life coaching. She writes: " ... I am a consultant…
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's easy to confuse them, but they're very different.
Of course, if…In Fast Company: Stories simplify, integrate complex things into an understandable thread, engage. That includes data and analytics, but is not often done well. " ... Speaking to us backstage at SapientNitro’s iEX conference…
Excellent overview piece on the topic, which makes the point that the business process must be woven into the quantifications and visuals, a favorite topic of mine. The author discusses the various transformation your business…
In the HBR: Data needs to be gathered, understood, communicated and embedded in the decision process. You need quant people to make this happen. This article makes these points and more. In the process of several such projects…
The Computing Community Consortium (CCC) sponsored the Simons Institute Symposium on Visions of the Theory of Computing. The three-day symposium brought together distinguished speakers and participants from the Bay Area and…
Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just a month ago. My assumption had always been that everyone's compressed…