acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

September 2010


From Putting People First

Juicy stories and more

Juicy stories and more

Four new articles in today’s edition of UXmatters: Juicy stories sell ideas By Whitney Quesenbery and Kevin Brooks Storytelling fits into the design process in many places. You probably know that collecting stories is key to…


From The Eponymous Pickle

Changing Mobile Landscape

Changing Mobile Landscape

Dave Knox shares a presentation via Jim Cuene of General Mills on the changing mobile landscape. Well done. See also: Cuene's blog.


From The Eponymous Pickle

Dark Silicon and Smartphone Batteries

Dark Silicon and Smartphone Batteries

I have had discussions with several friends lately about the increasing complexity of smartphones and the contribution of that to short battery life. So I bit at an article in CACM, about dark silicon. Had to admit I had no…


From The Eponymous Pickle

Ingenuity Advisors

Ingenuity Advisors

A local company of interest that I recently talked to: Ingenuity Advisors. " ... We offer a strategy book honed by decades of experience battling in a myriad of industries, channels and size of companies. 100% Fresh, Grade A…


From The Eponymous Pickle

Stephen Few on Bullet Graphs

Stephen Few on Bullet Graphs

Stephen Few at the recent Tableau users conference talks about bullet graphs. I have been a user of Tableau systems for years, in and outside of the enterprise. I would use it for any interactive business intelligence application…


From Wild WebMink

links for 2010-09-05

links for 2010-09-05

Ultra All Stars: The 2010 Sampler for Amazon This free sampler album (only downloadable by people with US Amazon.Com accounts) has some great electronic/dance tracks on it, especially the ones from Late Night Alumni and Kaskade…


From The Eponymous Pickle

Untangling and Riding Social Web Structure

Untangling and Riding Social Web Structure

A good Economist article on the usefulness of social webs as a source of data about social connection structure. Interesting mentions of SAS social network analysis software. Also the notion of societal networks. That once…


From The Eponymous Pickle

Great Mancession

Great Mancession

Economist Mark J Perry makes the case that there is a great mancession going on. The WSJ interactive graphs show it. Yet we dare not mention it out loud.


From The Eponymous Pickle

World Without E-Mail

World Without E-Mail

One man's vision, a world without e-mail. Replacing 90% of your email with social software. Would that work for the typical person online?


From The Eponymous Pickle

Household Robotics in Japan

Household Robotics in Japan

An area we looked at closely. Aiming to include in home-of-the-future applications. An aging population may need many help-mate robots in the future. Japan is well ahead in the application of robotics in the home. This may…


From The Eponymous Pickle

Creating Knowledge from Incident Reports

Creating Knowledge from Incident Reports

Creating knowledge from events. It is like fitting a line through a number of points. Very valuable, but needs to be carefully done. We experimented with after-action-reports. And sought to include the result into example based…


From Schneier on Security

Friday Squid Blogging: Squid Car

Friday Squid Blogging: Squid Car

Squid car.


From Computer Science Teachers Association

What Does a Computer Scientist Look Like?

What Does a Computer Scientist Look Like?

Career and Technical Education exposed me to the field of computing. I joined two organizations in high school that changed my life. My participation in FBLA (Future Business Leaders of America) and ROCAME (Region O Council…


From The Eponymous Pickle

Future Internet Architecture

Future Internet Architecture

From the CACM: On the future architecture of the Internet. Should it evolve or should we wipe the slate clean?


From The Eponymous Pickle

Flying Drones into a Hurricane

Flying Drones into a Hurricane

We are gaining an increasing knowledge of 3D Space. The obvious examples are military, but I am glad to see that drones are starting to be applied in the air to understand Hurricanes and in the oceans to understand these spaces…


From The Eponymous Pickle

NCR Deli Ordering Systems at Big Y

NCR Deli Ordering Systems at Big Y

We experimented with kiosk based deli ordering systems in our store innovation spaces. It's an obvious application rather than having people stand in line. IBM featured one in its kiosk systems in 2000. Eventually I would expect…


From Putting People First

The future of screen technology

The future of screen technology

TAT, a Swedish software technology and mobile interface design company, recently ran a two-week open innovation experiment, during which they collaborate with the web community to sketch out an idea for two weeks and then build…


From The Eponymous Pickle

Smart Postage Stamp

Smart Postage Stamp

In the UK the Royal Mail has launched the first 'smart stamp'. More at the BBC. It utilizes the Junaio system on a smartphone (which is required to see the effect) to see the enhanced image. Not sure I would call this a 'smart…


From Computational Complexity

CS Happenings

Yesterday I was at a meeting of the CCC Council, add in a couple of emails and I have lots of short notes on CS stuff. In these meetings I get to hear about CS research beyond theory: High-performance (i.e. very fast) computers…


From Wild WebMink

links for 2010-09-03

links for 2010-09-03

Does the Fate of OpenSolaris Tell Us Where Unix Is Headed? No, I don't think so. But it does liberate Illumos. I coined a new law yesterday – "For every epic fail there is an equal and opposite epic win" – and this could well…


From Wild WebMink

? Gosling Webcast

? Gosling Webcast

Next week JavaZone, the conference that brought you Lady Java and Java Forever will be held in Norway. To celebrate the opening of the new ForgeRock Norway office, we’ve arranged for a party just before the conference starts,…


From Schneier on Security

UAE Man-in-the-Middle Attack Against SSL

UAE Man-in-the-Middle Attack Against SSL

Interesting:

Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte, that made near-monopoly profits from being the only providers trusted…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Students And Intellectual Property Rights

Students And Intellectual Property Rights

Earlier this week a friend sent me a couple of links to articles on intellectual property and students. One was about piracy (Future Tense: Piracy Revisited) and it consists of an author explaining how


From Wild WebMink

H.264 Is Not The Sort Of Free That Matters

H.264 Is Not The Sort Of Free That Matters

At the end of last week, the MPEG-LA consortium announced they were extending the arrangement whereby they allow ‘web uses’ of the patents reading on the H.264 standard that they administer for their members to be licensed without…


From The Eponymous Pickle

SAS Predictive Analytics

SAS Predictive Analytics

SAS has rolled out predictive analytics for business users. " ... a new toolset aimed at giving business users the ability to work with predictive analytics software, which has historically been the province of specialized…


From The Eponymous Pickle

Tesco Trials Drive Through Supermarket

Tesco Trials Drive Through Supermarket

Long time readers of this blog will remember that we examined this topic sometime ago and talked to the group building a system in the US: Autocart. Now Tesco announces the test of the drive-through concept in the UK. I am researching…


From The Eponymous Pickle

MHealth Summit

MHealth Summit

Upcoming, the summit on Mobile health, it turns out that Mobile health means two different things:" ... The National Institutes of Health to Lead 2 of 7 Concurrent Sessions at the 2010 mHealth Summit in Washington, D.C. Sessions…


From Schneier on Security

Successful Attack Against a Quantum Cryptography System

Successful Attack Against a Quantum Cryptography System

Clever:

Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without disturbing it. So, in theory, it is impossible for an eavesdropper…


From Wild WebMink

? Social Dystopia

? Social Dystopia

Serbia:


From Putting People First

Why privacy is not dead

Why privacy is not dead

The way privacy is encoded into software doesn’t match the way we handle it in real life, writes Microsoft researcher Danah Boyd in the Technology Review. “Each time Facebook