acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

September 2012


From The Eponymous Pickle

GS1 Records ten Million Products

GS1 Records ten Million Products

The GS1 Global product registry has reached 10 million products registered.   Full press release.


From The Eponymous Pickle

Useful Innovation

Useful Innovation

In Forbes:  Innovation is about nurturing ideas.  But always with a focus and strong recognition that it exists within a context.


From The Computing Community Consortium Blog

Building a “Data Eye in the Sky”

Building a “Data Eye in the Sky”

Nearly a year ago, tech writer John Markoff published a story in The New York Times about Open Source Indicators (OSI), a new program by the Federal government’s Intelligence Advanced Research Projects Activity (IARPA) seeking…


From Wild WebMink

FLOSS Weekly on JasperSoft

FLOSS Weekly on JasperSoft

I was co-host on FLOSS Weekly again this week, and the guest was the community manager from JasperSoft, who make Jasper Reports and other business intelligence software. Oh, and it was Talk Like A Pirate Day.


From Schneier on Security

Friday Squid Blogging: Beached Firefly Squid

Friday Squid Blogging: Beached Firefly Squid

Pretty photo of firefly squid beached along a coast. I've written about firefly squid before.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From Schneier on Security

Another Review of <i>Liars and Outliers</i>

Another Review of <i>Liars and Outliers</i>

I usually don't post reviews of Liars and Outliers -- they're all here -- but I am particularly proud of this one.


From The Eponymous Pickle

More Paperless Coupons

More Paperless Coupons

Another example of paperless coupons, here for Tops. Adding promotions to your loyalty account is increasing in frequency.  " .... The Click-to-Card coupons have been added to the Coupon Central area on the Tops website, which…


From The Computing Community Consortium Blog

Discovery Informatics: Science Challenges for Intelligent Systems

Discovery Informatics: Science Challenges for Intelligent Systems

This past February in Arlington, VA, Yolanda Gil (University of Southern California Information Sciences Institute) and Haym Hirsh (Rutgers University) co-organized a workshop on discovery informatics, assembling over 50 participants…


From Putting People First

Five experts on what comes after the touchscreen

Five experts on what comes after the touchscreen

Post-touch hasn’t found the killer use case that the mouse found with GUIs and the touchscreen found with mobile web browsing and apps — but it’s not for lack of trying. We’ve had a flood of prototypes, demos and art projects…


From Putting People First

Can ethnography save enterprise social networking?

Can ethnography save enterprise social networking?

In this guest post for Ethnography Matters, Mike Gotta from Cisco Systems, makes the case for bringing the human back into enterprise software design and development, starting out with enterprise social networking (ESN). The…


From BLOG@CACM

What Does 'Big Data' Mean?

What Does 'Big Data' Mean?

It is interesting to note that a substantial subset of the computer science community has redefined their research agenda to fit under the marketing banner of "Big Data."   


From BLOG@CACM

Nomenclaturing: Let's Ture to the Max!

Nomenclaturing: Let's Ture to the Max!

Christos Papadimitriou's recently published reminiscences include the fascinating story of how he learned about Turing Machines: As a bored undergraduate in a Greek university, he happened to see the definition buried within …


From Putting People First

The workplace of 2025 will be wherever you want it

The workplace of 2025 will be wherever you want it

Sampling views from a panel representing Imperial College London, the Massachusetts Institute of Technology (MIT), the University of Washington, other international academics and the UK government, research has just been published…


From Putting People First

Book: Communicating the User Experience

Book: Communicating the User Experience

Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation by Richard Caddick and Steve Cable Wiley 2011, 352 pages ISBN 978-1119971108 (Amazon | Scribd) Abstract As web sites and applications become…


From The Eponymous Pickle

Gait Recognition Revisited

Gait Recognition Revisited

In New Scientist:   When we explored a number of methods of identity recognition, the one that surprised me then was the ability to recognize people by the pattern of their walking.  We never applied it, but it was added to the…


From Wild WebMink

Surprising Sponsor

Surprising Sponsor

You’ll never guess who’s bankrolling open source. In my column in InfoWorld this week, I look at an initiative to get some crucial software written for America’s schools. Wisely, the Council of Chief State School Officers is…


From The Noisy Channel

HCIR 2012 Symposium: Oct 4-5 in Cambridge, MA

HCIR 2012 Symposium: Oct 4-5 in Cambridge, MA

It’s the event you’ve been waiting for: the Sixth Symposium on Human-Computer Interaction and Information Retrieval! HCIR 2012 will take place October 4th and 5th at IBM Research in Cambridge, MA. Who should attend? Researchers…


From The Eponymous Pickle

Future of Smart Systems

Future of Smart Systems

In PEW Internet on the future of smart systems.   Read all of it. " ... By 2020, experts think tech-enhanced homes, appliances, and utilities will spread, but many of the analysts believe we still won’t likely be living in the…


From Schneier on Security

Accountable Algorithms

Accountable Algorithms

Ed Felten has two posts about accountable algorithms. Good stuff.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What period is it? Let me check my phone

What period is it? Let me check my phone

The Center for Advanced Technology is a great program at Lakewood Senior High School in Florida. Students in this program learn and use technology in interesting ways. These students help develop applications that help the school…


From The Eponymous Pickle

Extra Sensory Shoppers

Extra Sensory Shoppers

A short piece on 'extra sensory' means of understanding the consumer.  Along the way some new mentions of work being done I had not seen before that is worth a look.   Via Kevin Judd.


From The Eponymous Pickle

Technologies to Dominate Retail

Technologies to Dominate Retail

Kevin Judd sends this notice of a one day conference on Technology in retail.  Combining speakers from a number of companies.  On September 24 in Cambridge Mass.   " ... Although self checkout is a hot topic, turns out that NFC…


From The Eponymous Pickle

Analytics as a Database Operation

Analytics as a Database Operation

An interesting example of how a mid market company can gather and integrate and leverage data.    here transforming the way that it does business.  It seems like an additional way to then link in business analytics to better"…


From The Eponymous Pickle

Kroger Expands

Kroger Expands

Kroger experimenting with more general merchandise, like clothing, in Ohio.   A natural,higher profitability approach for the grocery retailer.


From The Female Perspective of Computer Science

To Be Published: Understanding the Power of Augmented Reality for Learning

To Be Published: Understanding the Power of Augmented Reality for Learning

I'm pleased to say that my work on cognitive theories and augmented reality is finally going to be published. 'Understanding the Power of Augmented Reality for Learning' was accepted as a full research paper for the 2012 World…


From The Computing Community Consortium Blog

The 25 “Coolest” Computer Networking Research Projects

The 25 “Coolest” Computer Networking Research Projects

Network World is out with a list of the 25 “coolest” computer networking research projects: University labs, fueled with millions of dollars in funding and some of the biggest brains around, are bursting with new research into…


From Computer Science Teachers Association

NCWIT Award for Aspirations in Computing!

NCWIT Award for Aspirations in Computing!

Do you know a digital diva, web chix, or coder girl? Encourage her to apply for the NCWIT Award for Aspirations in Computing! It is time to start those applications: competition is officially open for the NCWIT Award for Aspirations…


From Computational Complexity

Poset Games are PSPACE-complete

Consider the following game on a poset, each player takes turns picking an element x of a finite poset and removes all y ≥ x. First one to empty the poset wins. I posted last March about a high school student, Adam Kalinich,flip…


From The Computing Community Consortium Blog

New Secure and Trustworthy Computing Solicitation Issued

New Secure and Trustworthy Computing Solicitation Issued

The National Science Foundation (NSF) last week issued a new solicitation for its Secure and Trustworthy Computing (SaTC) program: Cyberspace — a global “virtual” village enabled by hyper-connected digital infrastructures – has…


From Schneier on Security

The NSA and the Risk of Off-the-Shelf Devices

The NSA and the Risk of Off-the-Shelf Devices

Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and the classified cell phone that flopped because it took so long to…