The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Khoi Vinh reflects on the fact (and the user experience) that almost everything on all of his computers and all of his mobile devices can only be accessed with a password. “This is a big problem, and for lots of people. Over…
Mobile First Luke Wroblewski A Book Apart October 2011 Abstract Our industry
The internet of things and yet another revolution The “internet of things” is viewed as the next big thing, but when will it allow people to create their own stuff, asks Russell M Davies on the BBC website. “It’s a world where…
Dr. Robert Schnabel, Dean of the School of Informatics at the University of Indiana and Chair of ACM’s Education Policy Committee, testified before the House Research and Science Education Subcommittee on Thursday. The hearing…
In CACM: Computational Journalism:
This uses a simple check-in loyalty model at Wal-Mart and Sam's. A collaboration with Unilever. " ... Unlike most location-based apps, Check In To Win focuses on real rewards that specifically benefit shoppers, such as gift…
The Defense Advanced Research Projects Agency (DARPA), Intelligence Advanced Research Projects Activity (IARPA), and National Institutes of Health (NIH)
The long-standing ANZUS military treaty now includes cyberspace attacks:
According to Reuters, the decision was made in discussions between the two countries this week. The extension of the treaty would mean that a cyber-attack…In CGT, an excellent and fairly detailed article on Procter & Gamble's development of the virtual store concept within it's innovation centers. The first time I have seen this detailed publicly, including a picture of a life…
I'm just off a plane coming home from the Beyond Worst Case Analysis Workshop at Stanford. It went really well, and I really enjoyed it.I think a variety of things made it work. First, and I apologize to Tim Roughgarden for…
Oracle has finally done what the business management at MySQL had been asymptotically approaching for years. It’s taking MySQL open core. It’s interesting to read both Monty’s view and the comments for this one. It’s all on ComputerWorldUK……
I had an interesting conversation with DemandTec a few weeks ago about how they have constructed a network to help retail and manufacturing companies collaborate by using merchandising and marketing optimization tools. Thistheir…
At 2pm EDT today, the House Science Committee’s Subcommittee on Research and Science Education will convene a hearing about the Federal government’s Networking and Information Technology Research and Development Program (NITRD)…
Intel’s corporate anthropologist Genevieve Bell has written an elegant introductory article for the BBC site on the role of anthropology in the corporation – particularly aimed at a lay audience. “Ultimately, my team’s role is…
Hivos (The Netherlands) and the Centre for Internet and Society (Bangalore, India) have consolidated their three year knowledge inquiry into the field of youth, technology and change in a four book collective
(Joint post by Bill Gasarch and Daniel Apon)
Recently I (Daniel) reviewed Dexter Kozen's Theory of Computation (it was AWESOME). You can find the review here. Many of the topics were standard but some we (Bill and Daniel)…
Amazon has launched a Kindle book borrowing service from over 11,000 libraries. You don't need a physical Kindle, only a free App for your device and an Amazon account. . Press release here.
From IdeaConnection: The UK retailer Waitrose is using crowd sourcing techniques with its customers to develop new products. We will continue to see more of these techniques used: " ... In May 2011 a new product hit the shelves…
Jane McGonigal thinks reality is broken. Why else would so many of us escape it to play hours and hours of video games? But among all the media hype about the bad things games supposedly to do us, have you ever considered that…
Risks of teen driving:
For more than a decade, California and other states have kept their newest teen drivers on a tight leash, restricting the hours when they can get behind the wheel and whom they can bring along as passengers…We’re launching something brand new today! The Computing Community Consortium’s Research Community & Student Outreach Subcommittee is pleased to announce a unique new website for undergraduates in computing fields hoping to learn…
Tuuli Kaskinen and Roope Mokka, researchers at Demos Helsinki, argue in an essay that we need more than mere sustainable versions of everyday products: we need new products and services based on behaviour change. “Most companies…
The key to designing social media well lies in designing it for a user
Bain & Company writes about Employee Segmentation: Using employee segmentation to bring out the best in your workforce. I had never thought about segmenting employees in quite this way, often beyond education, specific roles…
Des Traynor recently spoke at the Content Strategy Forum in London about the importance of which words used in an interface. The difference between Facebook’s Like and Google’s +1 seems superficial, but ends up influencing the…
Collaboration is often encouraged in science: it is viewed as an intrinsically good thing. Yet there are downsides to collaboration. The most obvious downside is that requirement to coordinate the efforts (e.g., hold meetings)…
Excellent Mashable piece on the use of social software inside the company. I am now involved with two projects that are seriously using this concept. It makes lots of sense to do this right. In particular linking the networks to…
Congratulations to Shwetak Patel, Assistant Professor of Computer Science and Engineering and Electrical Engineering at the University of Washington, who has just been named a 2011
A useful development reported in AdAge. GazeHawk Brings Eye-Tracking Technology to the iPad. Heatmaps Could Help Tablet Publishers and Advertisers. Yes, this could be big as tablets are being seen as replacements for the…