acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Finding Sociopaths on Facebook
From Schneier on Security

Finding Sociopaths on Facebook

On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media. My hypothesis is that scienceknow...

Managing Creative People
From The Eponymous Pickle

Managing Creative People

In Fastcompany.  Good view.  Frequently an issue.  Especially if the people involved do not have the very best people skills.  How many of us do.  Individual creativity...

GE and Industrial Data in the Cloud
From The Eponymous Pickle

GE and Industrial Data in the Cloud

In CWorld:  " ... GE thinks it's time to put industrial data in the cloud. The company is introducing a platform for collecting and analyzing data from industrial...

Fake Shops
From The Eponymous Pickle

Fake Shops

In our innovation labs we experimented with using false front displays to set contexts for consumers in a laboratory.  Interesting and obvious idea, but the coverings...

Cost/Benefit Questions NSA Surveillance
From Schneier on Security

Cost/Benefit Questions NSA Surveillance

John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...

Brazil’s Half-Miracle
From Wild WebMink

Brazil’s Half-Miracle

On all the social media networks, there’s a hashtag that I have kept seeing the last few days: #ChangeBrazil, associated with unrest across Brazil. Since I may...

Service design in the physical space and why it makes sense to design for a minority
From Putting People First

Service design in the physical space and why it makes sense to design for a minority

The physical environment in which a service plays out has a significant influence on the experience of a service. So it’s not uncommon for service design projects...

New Ericsson report on needs of today’s smartphone and mobile internet users
From Putting People First

New Ericsson report on needs of today’s smartphone and mobile internet users

A new Ericsson ConsumerLab report, Unlocking Consumer Value, identifies the needs of today’s smartphone and mobile internet users. “The rapid uptake of smartphones...

Smaller Tablets
From The Eponymous Pickle

Smaller Tablets

Looking a several projects that aim to deliver information to small executive groups.  Mobile is esential.   The question is what are the likely formats of theNow...

Porn Summit Actively Harmful
From Wild WebMink

Porn Summit Actively Harmful

The government clearly wishes to be seen to be doing something about the issues of children viewing pornography and of child pornography. To this end they have called...

Details of NSA Data Requests from US Corporations
From Schneier on Security

Details of NSA Data Requests from US Corporations

Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...

Why Game Designers Should Understand Procedural Rhetoric
From The Female Perspective of Computer Science

Why Game Designers Should Understand Procedural Rhetoric

I am sometimes asked why I think stories in games need to improve.  Considering I'm studying nonlinear stories in games for my PhD project, I was for a long time...

DunnHumby Buys Standard Analytics
From The Eponymous Pickle

DunnHumby Buys Standard Analytics

Just announced.  A further indication of movement of more data gathering and integrating companies moving towards the use of stronger predictive analytics.  ...

Sandra Hughes Coaching Strategies
From The Eponymous Pickle

Sandra Hughes Coaching Strategies

Former colleague Sandra Hughes,  For a time chief privacy office of Procter & Gamble, has just set up a blog: Sandra Hughes Strategies.  Check it out.  She does...

NSA Secrecy and Personal Privacy
From Schneier on Security

NSA Secrecy and Personal Privacy

In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...

Data and Analytics Need Stories
From The Eponymous Pickle

Data and Analytics Need Stories

In Fast Company:   Stories simplify, integrate complex things into an understandable thread, engage.   That includes data and analytics, but is not often done well...

Weave Data Visualization into Your Business
From The Eponymous Pickle

Weave Data Visualization into Your Business

Excellent overview piece on the topic, which makes the point that the business process must be woven into the quantifications and visuals,  a favorite topic of...

Communicating Data
From The Eponymous Pickle

Communicating Data

In the HBR: Data needs to be gathered, understood, communicated and embedded in the decision process.  You need quant people to make this happen.  This article"...

Presentations from the Symposium on Visions of the Theory of Computing
From The Computing Community Consortium Blog

Presentations from the Symposium on Visions of the Theory of Computing

The Computing Community Consortium (CCC) sponsored the Simons Institute Symposium on Visions of the Theory of Computing.  The three-day symposium brought together...

Evidence that the NSA Is Storing Voice Content, Not Just Metadata
From Schneier on Security

Evidence that the NSA Is Storing Voice Content, Not Just Metadata

Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading. I expressed skepticism about this just...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account