acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Facebook Ethnographically
From The Eponymous Pickle

Facebook Ethnographically

On a report that has gone viral.    Teens are leaving Facebook as their parents send them friend requests.    " ... Comprehensive study has found teens are moving...

Future of Analytics
From The Eponymous Pickle

Future of Analytics

In CIO Insight:The future of analytics Is Streaming in the Cloud:" ... Business analytics is becoming more prescriptive and making information available in real...

Discern Analytics
From The Eponymous Pickle

Discern Analytics

Just brought to my attention, with some former colleagues in its management:  Discern Analytics. They write:" ... We love data. Massive amounts of it.Our cloud-based...

On Fair Use
From The Eponymous Pickle

On Fair Use

In TechDirt:   Good extended piece on recent hearings on copyright and fair use.  A concept often made use of in this blog.   " .... It is twenty years since the...

Getting People to Share Knowledge
From The Eponymous Pickle

Getting People to Share Knowledge

Big issue in the enterprise.  A good gook at the topic.   Actual implementation is tougher." ... 9 steps to get people to share knowledge ... From launching a community...

Why Counting CS as a Foreign Language Credit is a Bad Idea
From Computer Science Teachers Association

Why Counting CS as a Foreign Language Credit is a Bad Idea

Sometimes what seems like a very good idea in principle, even a good idea put forward with the best intensions, can turn out to be a very bad idea in practice.Computer...

Onboarding Users
From The Eponymous Pickle

Onboarding Users

On how to onboard new users.  Its harder that you think.  Different users have very different expectations of how they expect to be introduced to your great idea...

Seeking Data Cubes
From The Eponymous Pickle

Seeking Data Cubes

Data Cubes came up in a meeting yesterday and though I knew in general what they were, I sought out a more general and useful definition.  I found this.  Comments...

Simplify Outdated Corporate Processes
From The Eponymous Pickle

Simplify Outdated Corporate Processes

In the HBR, where registration for full text is now required.  Yes, simplify is always good to consider.   " ... rebuilding your processes from the ground up with...

Predicting Product Success
From The Eponymous Pickle

Predicting Product Success

Predicting Product Launch success.  We worked on this using a number of simulation based methods.  Interesting case study here:   " ... Back in May, Kaggle ran...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

A T-shirt with a drawing of a squid reading. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

IRATEMONK: NSA Exploit of the Day
From Schneier on Security

IRATEMONK: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: IRATEMONK (TS//SI//REL) IRATEMONK provides software application persistence...

Reinventing Explanation
From Michael Nielsen

Reinventing Explanation

My new essay on the use of digital media to explain scientific ideas is here.

Computer Science Has An Identity Problem
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Has An Identity Problem

Where does computer science fit? At the university level I’ve seen it in Business departments/Schools of Business. I’ve seen it in various science schools – Schools...

What's Watson for Midsize Companies?
From The Eponymous Pickle

What's Watson for Midsize Companies?

Back on January 9th I attended the IBM announcement of its group for Watson applications.  I tweeted the announcement at @FranzD #IBMWatson.  Full announcement....

Attributing Attacks on the Internet of Things
From The Eponymous Pickle

Attributing Attacks on the Internet of Things

A discussion of the implication of security on the Internet of Things.  If everything is connected, the path to us or our households brings insecurity yet closer...

Connecting Cloud and Business
From The Eponymous Pickle

Connecting Cloud and Business

Connecting the cloud and big data for business.  A piece from Pneuron, which I am looking into.   I was struck by this statement: " ... Data is more volatile than...

Systems to Prevent Deception Fail
From The Eponymous Pickle

Systems to Prevent Deception Fail

A discussion of systems that are meant to prevent deception and unethical behavior.  In Knowledge@Wharton.  A topic in any system that is meant to gather human"...

Another Credit-Card-as-Authentication Hack
From Schneier on Security

Another Credit-Card-as-Authentication Hack

This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...

The Facebook ethnography kerfuffle
From Putting People First

The Facebook ethnography kerfuffle

At the center of this kerfuffle is an anthropologist, Daniel Miller, his ethnographic research with teenagers in a small town in the UK, and a press report on a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account