The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves…
This method was brought to my attention my a colleague. We had looked at it some time ago and it has come back as a possible exploratory solution.The Open Graph Viz Platform" ... Gephi is an interactive visualization and exploration…
In Mind Hacks: Why the other line in a queueing situation always moves faster than yours. A good example of how perception beats out rational thought. In my early days we worked on many industrial simulation problems thatwith…
In Innovation Excellence: We used exactly this approach in the enterprise new product development world. Its very useful if you have many competing efforts: " ...As I’ve written before, the portfolio is the pivotal tool for…
Cashless Vending machines are now smarter. We examined machines like this in Japan that could adapt to supply chain and demand problems.
Programmers often want to count things. They typically use 32-bit counters (e.g., the int type in Java). But what if you are counting small numbers? Maybe a 16-bit counter could be enough (e.g., the short type in Java). Obviously…
Diamondback squid could be a source of food. No word on taste.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
This blog piece explores the mess that is K-12 Computer Science Teacher certification in the U.S. and why this matters. It introduces CSTA's new "Bugs in the System" report and provides practical recommendations for creating…
I've now survived the first three lectures in both my classes. Both are introductory computing classes for non-majors: one is heavier on concepts but includes Python programming, while the other is heavier on programming ineven…
In the coming weeks I will be passing along some of the excellent work by correspondent Phil Hendrix. Three-part Series on Engaging Social and Mobile Consumers (link to download ZIP file with most recent reports)Philip E. Hendrix…
Four interviews with me on the NSA.
Not unexpected view and direction by IBM. Riding the hype wave, with their own considerable analytics resources. Those put together can provide a formidable capability:" ... IBM wants to help IT managers apply company policies…
SAP buys a fairly well known predictive analytics company, KXEN. Have followed SAP in the past with its other related acquisitions, like Khimetrics in 2005. Historically it has taken a long time to integrate these companies…
The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet. The point of the story was that the NSA engages in economic espionage…
I love xkcd. It’s probably the nerdiest comic strip around. Recently the following strip appeared.
I think that people are still better at creating comic strips than computers. I think we’re also still a whole lot better at…Ted Talks on his visionary work." ... One of the pioneers of the Internet and graphic user interfaces, Engelbart is perhaps best known for inventing the computer mouse. Above, watch him lead what’s been described as the “mother…
Lots of fears regarding the influence of 'showrooming' in driving place of purchase ..." ... But a study released Thursday from Columbia Business School and loyalty management firm Aimia aims to “bust” what it calls “myths” surrounding…
From the D2 Conference in Cincinnati via AdAdge: " ... Macy's sees plenty of value in data-driven marketing and believes consumers should hear more from marketers about the benefits. But that doesn't mean the retailer willJulie…
How teaching helps you understand proofs Stanislav Žák is a theorist who has made important contributions to complexity theory. He was at the Institute for Computation Techniques of the Technical University in Prague thirty years…
Recently released: Tableau 8: The Official Guide by George Peck I am in the midst of a project that specifies this, and searched for several fairly obscure things, and found them. Good sign. It is a complex User Interface…
From the Front End of Innovation: Is Instant Entrepreneurship the future? More importantly, what precisely is it? Was the first I head of it:Interview with Shelby Lee Walsh, Shelby is President at TrendHunter:" ... This is…
An visual analysis of Gmail as metadata using Immersion from MIT. Have take a quick look at this, and as the article suggests, more art than useful visual. But this did allow me to find how my mail links have varied overtime…
I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA:
"How would it be if your doctor put rat poison in your medicine? Highly damaging…From time to time, students ask me wether such degree or certificate in computer science will help them get a good job. There is no shortage of studies showing that degrees lead to good jobs. That might be true, but there is…
Like many non-profit institutions, CSTA is always looking for new, more efficient ways to do business and for ways to keep CSTA membership free of charge for individual members. We also try to be proactive when it comes to addressing…
Brought to my attention, formerly Pingage, now Ahalogy. Previously I wrote about Pingage." ... We're building Ahalogy (formerly Pingage) to solve one simple problem: making content marketing as easy and effective as possible…
In Innovation Excellence: How can small business spot innovation and connect to it? " ... Our businesses evolve and go through so many changes on a regular basis. How do we know what ideas to stick with and which to move on…
Taiwan meets Italy this week, in a series of workshops and company visits hosted by Experientia for Taiwanese business people. The 15 chief customer experience officers from Taiwanese IT, retail, finance and telecom companies…
Back at Northwestern I occasionally taught an undergraduate cryptography class since I was the local expert in the field (a statement not even remotely true at Georgia Tech). I would cover the Advanced Encryption Standard, an…
Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems:
In security, the worst case -- the thing you most want to avoid -- is thinking you are secure when you're not…