The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Last Wednesday CU-WISE held a professional development event called WISE Steps to Success for a second year. It's one of our flagship events, and was designed to give women in science and engineering the networking, negotiation…
Now that the new year has arrived, it is time to start looking forward to the summer and computer camps. Last year, I ran my first computer camp for twenty-two middle school students. I ran a week-long camp, with a mix of HTML…
Many databases engines ensure consistency: at any given time, the database state is logically consistent. For example, even if you receive purchase requests by the thousands, you will always have an accurate count of how many…
Chemoinformatics for Computer Scientists
Guest Post by Aaron Sterling
I recently completed a review of Handbook of Chemoinformatics Algorithms (HCA) for SIGACT News. (See here for the full 12 page review. I have tried…
I wanted to remind my readers that I am a consultant. I have over thirty years of experience with major companies and the US government. I have saved companies many millions of dollars in costs and led a number of major innovation…
January 31
Event:
The Information Technology and Innovation Foundation will host an event on the bandwidth cost of online piracy. noon, 1101 K Street NW
February 2
Briefing:
The National Immigration Law Center will hold…Jenkins! By a massive margin (214 to 14) the Hudson community has decided to rename itself Jenkins and rehost on independent resources. I just hope Oracle decides to stay with the community and not try to keep a fork going. ODF…
The Seattle man who refused to show ID to the TSA and recorded the whole incident has been cleared of all charges:
[The jury] returned not guilty verdicts for charges that included concealing his identity, refusing to obey a…Well my busy season is about to begin. Next week I will be in Austin TX for TCEA. I will be doing some talks and demos about Small Basic and hanging around the Microsoft booth from time to time. I also plan to attend EduBloggerCon…
Last week I broke the news that ForgeRock (where I work) had gained an architect for OpenIDM. Today is the last day of ForgeRock’s first year, and I’m pleased to say we have gained an architect for the open source LDAP directory…
See the video by Kyield Founder Mark Montgomery, at the Kyield site: " ... Kyield is an enterprise software company that revolutionizes the digital work environment through superior data governance, advanced analytics, and more…
In Technology Review: An update on camera Apps that analyze smartphone camera information and adapt and improve it to improve images.
In the midst of reading: The New Science of Retailing: How Analytics are Transforming the Supply Chain and Improving Performance by Marshall Fisher and Ananth Raman.I am currently reading the section on Flexible Supply Chains…
In Dan Ariely's excellent blog, He again positions the non rationality of the consumer. Or even of groups of consumers. I have been involved in a number of projects where we attempted to model the consumer. It turns outcredit…
In the ACM: " .... Ideally, all software should be easy to use and accessible for a wide range of people. However, software often falls short of these basic goals. We therefore need ways to help us discover usability and accessibility…
I just got home from a week in Brazil, where I gave talks for IBM and for a large ForgeRock customer and also at the remarkable Campus Party. This is the second year I have spoken at Campus Party in Brazil and once again it was…
The laws that restricted non interest fees and retroactive interest rates have resulted in rapidly increasing interest rates. Unintended consequences. And the consequences primarily hurt the riskiest accounts.  More details…
While my blog has always been and will always be a personal one, I do operate under certain constraints as someone whose subject matter relates strongly to his professional interests. I deeply appreciate how long-time readers…
Now somewhat dated, but still good article on Neuroomarketing in the NYT.What happens in our brains when we watch a compelling TV commercial? For one thing, certain brain waves that correlate with heightened attention become…
With the Egyptian crisis and talk of giving our leaders an Internet off switch, we may need to think through how to deal with non universal or non continuous access. PC World suggests that dial up modems, still available, will…
A recent Wired article made the case that songs can be Apps by adding visuals and anything else the Web can provide. Every song can be an App. It brought to mind that the same idea can be applied to any stream of data. An…
It's only a proof of concept, but it's scary nonetheless. It's a Trojan for Android phones that looks for credit-card numbers, either typed or spoken, and relays them back to its controller.
Software released for Android devices…A Computerworld short article on the details of NFC. The rumors are out that this technology will be used for i-Wallet applications in Smarpones usch as the I-Phone.
I’ve watched the video below more than a dozen times over the past year. It
I haven't written anything about the suicide bombing at Moscow's Domodedovo Airport because I didn't think there was anything to say. The bomber was outside the security checkpoint, in the area where family and friends wait …
An undercover TSA agent successfully bribed JetBlue ticket agent to check a suitcase under a random passenger's name and put it on an airplane.
As with a lot of these tests, I'm not that worried because it's not a reliable enough…It has never been easier to self-publish a book: Amazon has CreateSpace which offers a print-on-demand service and an ISBN if you want one. Self-publishing on the Amazon Kindle store could not be easier. Apple allows anyone to…
Not unusual, but a good direction for Giant Eagle:Giant Eagle will implement "behavioral cluster planning"Giant Eagle will begin using an automated computer system called "behavioral cluster planning" to ensure the company never…
The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model: if you have a key, you can open the door; if you know the combination…
O artigo “Direitos Humanos est