The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Notes on elements of advanced visualizations. Sankey diagrams including multilevel forms, are available in Google Charts. " ... A sankey diagram is a visualization used to depict a flow from one set of values to another. The…
In the Local Paper: Extending their supply chain in a very natural way. Without the expense and complexity of delivery. What will the uptake be? Plan to try this service myself.
The Food and Drug Administration (FDA) has announced a workshop on medical device cybersecurity for October 21 and 22 in Arlington, Virginia. Titled “Collaborative Approaches for Medical Device and Health Care Cybersecurity,”…
In Innovation Excellence: Interesting points about how to outline a common language for innovation. Like the idea, but implementing them in a cultural context can be tough.
Re examining business process modeling (BPM) and in particular how it can connect with new methods of analytics and data sources. We used BPM extensively in the enterprise. And examined how it would link to intelligent, cognitive…
Good You Tube video: Humans Need not Apply. On the continued progress of automation, and what it means to jobs. It not only about replacing humans, it is also about making them much more efficient and extending that efficiency…
Could be quite valuable for a number of areas. This is being experimented with every day in advertising and online. The data to confirm or deny it is considerable. Have not read as yet. In Fastcocreate: " ... Riveted, …
Some additional thoughts Microsoft Research source Omer Reingold is a brilliant researcher, and now all can see that he is also a very classy and thoughtful person. As you all know by now, he and many others have suddenly lost…
Very good informal and non technical look at feature engineering. It is part of any analytic process, sometimes obvious, but also sometimes subtle. My definition: It's adjusting the data and decision problem you have to the…
To my still enthusiastic Wolfram network, a clever marketing idea. Not sure how practical. What I see are more clever than practical." ... With Tweet-a-Program, anyone can compose a tweet-length Wolfram Language program and…
I rarely highlight individual events on the blog, but one's advisor only turns sixty once. We will honor Michael Sipser at MIT on Sunday, October 26 with a one-day symposium full of great speakers in complexity. As one of Sipser's…
In the 90s, during the last rise in the use of artificial intelligence in business, we were also impressed with how the basic capabilities could improve and extend expertise. We built dozens of advisory systems that were. Management…
Ordinary lenses produce cloaking. Fascinating application that at one level is very easy to understand. Everyday applications?
Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Cognitive requires learning. At very least an intelligent system needs to be updated as its context changes. There are many kinds of learning. Passive, active, statistical, inductive, example based … If I buy a book and putWhich…
In the CACM: A view of common computing languages. Interesting, but most likely for those that have used several. Non technical in that it deals with a view of the evolution of languages and their use. Includes video.
There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals are looking for new ways to monetize stolen data....
In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe. Examples and exploration of implications. The selective and accurate redaction…
Steve Miller on 'Freak Data Science', where freak means roughly assumption-free, understandable and useful. Always like that approach, and he has much to say on the topic, like:" ... in agreement with this need to view data.…
What do two college professors, two high school teachers and a pre-service teacher have in common? CSTA membership!
I spent several enjoyable weeks this summer working with a great group of CSTA members to create a set of POGIL…Dr. James F. Kurose, Distinguished University Professor in the Department of Computer Science at the University of Massachusetts (UMass), was named the next Assistant Director for Computer and Information Science and Engineering…
In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe. Examples and exploration of implications. The selective and accurate redaction…
Of interest, on psych and design, in user experience:" ... UX Magazine is a central, one-stop resource for everything related to user experience. We provide a steady stream of current, informative, and credible information about…
From MIT, with possible use to understand data use and valuation. " ... Researchers in the Decentralized Information Group (DIG) at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) believe the solution…
An example of the ability to make a classification of an image by subtle attributes. Images are a form of unstructured data increasingly being found in large databases. Medical imagery is close behind. In Engadget. " ... Us…
The National Science Foundation (NSF) and Semiconductor Research Corporation (SRC) announced nine research awards to 10 universities totaling nearly $4 million to develop Secure, Trustworthy, Assured, and Resilient Semiconductors…
This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This is, like almost everything in tech, a trade-off: Your data is far…
A laboratory for teaching online security concepts in the form of a simulation game. We created similar simulation games for teaching and option evaluation for in store sensor applications. Includes a basic introduction to computer…
I've been trying something a little bit different for our CS2 class this semester. The course typically covers object-oriented programming in Java along with topics like recursion. In fact, students becoming proficient in Java…
It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software. If anyone has any actual data other than two instances and the…