The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Report on the recent Coding, Complexity, and Sparsity Workshop Martin Strauss and Anna Gilbert and Atri Rudra are the organizers of the just-held Coding, Complexity, and Sparsity Workshop. The theme of sparsity is working with…
Hackaday is an interesting site to follow. New uses of information technology hardware and software. Which naturally cobble together many well known techniques and unconventional ideas. In this case, pressure sensors in socks…
In the Future of the CIO Series: Some very good thoughts here. I particular: Simplicity. Not to say that I follow that recommendation well. As a follower of emergent tech I have a tendency to complicate approaches. But when…
What ants know. And what complex networks of things can be made to 'know'. Known as Agent Based Models. We studies this a decade ago in the enterprise. Though fascinating, it never did produce big value, say beyond standard…
A detailed look. With a number of recent examples, such as Microsoft. Starting to see it everywhere. " ... As the name indicates, flat design is defined by flatness of style: simplifying an interface by removing extra elements…
With a squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Why is it that there are still so few video games stories with awesome female protagonists that don't play into the usual gender stereotypes? What's a gamer to do if he or she wants to experience more of them today? Narrative…
Since the President issued an Executive Order on cybersecurity information sharing back in February, several groups have worked on implementing parts of that order. The Senate Commerce Committee has also gotten in on the act,…
For several of my classes, I open Facebook groups so that my students can exchange online. In some instances, it has worked great. Facebook tends to do a better job than school-provided posting boards. A small minority of students…
Lavabit, the more-secure e-mail service that Edward Snowden -- among others -- used, has abruptly shut down. From the message on their homepage:
I have been forced to make a difficult decision: to become complicit in crimes…On Bits vs atoms: Nothing new here, our enterprise did this for years, and is one of the supporters of this effort, the post below does give a good overview of the intent, but not any technical details. It is though, all about…
As a young professor, I wrote a grant proposal and took it to a senior theory professor for comments. He told me to take out the line "The ultimate goal of computational complexity is to settle the P versus NP problem." He agreed…
It's being reported, although there's no indication of where this rumor is coming from or what it's based on.
...the new tactic allows terrorists to dip ordinary clothing into the liquid to make the clothes themselves into explosives…I used the Prezi presentation and storytelling tool for a project some years ago. Just revisited it. An introductory video. With many useful examples. It now also has an iPad version that I plan to examine. Does the zooming…
Useful R Resources. Books, online, lists, videos, examples. Will add this to my list. I find R similar to Mathematica and APL (from long ago). First language I have attempted to become adept in for a long time.
I had cause to download Bunchball's whitepaper on gamification (registration required). Logically done, as a non technical review of the underlying idea of using game dynamics in business. Previously here on Bunchball, including…
Brought to my attention, In The Financial Express, from Jyothi Satyanathan, director Mid-market & Inside Sales, IBM India/South Asia. I much agree with his opening statement:" ... Small and mid-size businesses (SMB) are some…
Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor:
The new two-factor system works like this. A user enrolls using the mobile app, which generates a 2048-bit RSA…Cursory look at the implications for security of Bring Your Own Device (BYOD) implementations. We were early experimenters with the BYOD concept, and security was an immediate concern.
In Google Operating System: An indication that Google is now showcasing long form articles. We have become very used to small sized nuggets of information on the web, but we do also appreciate longer, full explanation examples…
The further Kip Hawley has gotten from running the TSA, the more sense he has started to make. This is pretty good.
Tammy Pirmann is my mentor on the CSTA Board of Directors and is helping me understand how and what it is all about. More importantly she teaches at a public high school on the edge of Philadelphia. She agreed to answer a few…
Fascinating piece in Wired about the use of game dynamics to map connections in the brain. Another example of the use of game dynamics, one of several that are aimed at gathering scientific data." ... Called EyeWire, the browser…
In Wired: Regarding an interesting book on the theory of color, by Josef Albers, is presented on an iPad App. Not free it seems. I recall this book being mentioned in a reference for online color use. I am wondering how…
The White House has been hosting a series of Google+ hangouts called “We the Geeks” that highlight the future of scientific innovation in the United States. The next hangout will focus on Robots, scheduled for Friday, August…
The Computing Community Consortium (CCC) has a website for Computer Science Undergraduate Research and Graduate Education (CS URGE), which can be found here. You will find explanations, resources, summer research opportunities…
Juliette de Maeyer kicks off this month’s edition of EthnographyMatters which focuses on Ethnographies of Objects, with a response to two questions posed to her: ‘Why is the hyperlink an interesting object of journalism?’ And…
See furniture in your own apartment using augmented reality in IKEA's 2014 catalog. A good example of AR in mobile retail. And its potential for using AR to insert the virtual to measure the physical. " ... To take advantage…
Design can be used to introduce users to the future now, so they can act in ways that will benefit them in the future, writes Nikki Pfarr, researcher and strategist at Artefact. “What [designers] don’t often do, is think of the…
In Knowledge@Wharton: New models are at play. Note my recent piece that addresses increasing efficiency for innovation. From a recent conference. Noting that now the (mobile) consumer is now the boss. " ... Most business…