acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

UC Analytics Summit 2013
From The Eponymous Pickle

UC Analytics Summit 2013

" ... Analytics Summit 2013  will be held on May 31, 8:15AM-5:00PM at the University of Cincinnati. Analytics Summit 2013 is the premiere analytics event of the...

Morphological Analysis for Wicked Problem Solving
From The Eponymous Pickle

Morphological Analysis for Wicked Problem Solving

A morphology is a set of structures that are used to define a category.  It is often used in one of my interest areas: Botany.  See the image on the right, where...

Measuring Advertising
From The Eponymous Pickle

Measuring Advertising

From the Penn Customer Analytics Initiative: Innovative Approaches to Measuring Advertising Effectivness.  Includes some of my favorite topics, like emotional response...

Diagnosing Expression
From The Eponymous Pickle

Diagnosing Expression

In CACM: On diagnosing Depression.  " ... Automatic systems that analyze gestures and facial expressions might improve the challenging task of diagnosing depression...

Interaction Between Robots and Jobs
From The Eponymous Pickle

Interaction Between Robots and Jobs

Do robots net create or remove jobs?  What are the classification of jobs that are lost and won?  " ... A new class of industrial robot is appearing. These robots...

Because We Are a Community
From Computer Science Teachers Association

Because We Are a Community

I believe it is only human nature that, when something terrible happens at a distance from us, we immediately ask ourselves "Are our people there? Are they safe"...

Book: Hidden in Plain Sight (by Jan Chipchase)
From Putting People First

Book: Hidden in Plain Sight (by Jan Chipchase)

Hidden in Plain Sight: How to Create Extraordinary Products for Tomorrow’s Customers by Jan Chipchase Harper Collins Publishers April 2013 256 pages (Amazon link)...

USACM Comments on Ways to Improve Quality of Software-Related Patents
From U.S. Public Policy Committee of the ACM

USACM Comments on Ways to Improve Quality of Software-Related Patents

The ACM U.S. Public Policy Council submitted comments to the U.S. Patent and Trademark Office yesterday in response to its request for recommendations on how the...

Initial Thoughts on the Boston Bombings
From Schneier on Security

Initial Thoughts on the Boston Bombings

I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...

Ericcsson Acquires MS Mediaroom
From The Eponymous Pickle

Ericcsson Acquires MS Mediaroom

Interesting because I have worked with variants of the media room idea for years.  Much more at the link.  " ... Mediaroom is the leading platform for video distribution...

Videos online of March 2013 Healthcare Experience Design conference
From Putting People First

Videos online of March 2013 Healthcare Experience Design conference

On March 25, the Healthcare Experience Design (HxD) conference took place in Boston. Speakers discussed how human centered design and design thinking can improve...

Opening Keynote: Todd Gebhart, Co-President McAfee Inc. (Summary)
From CERIAS Blog

Opening Keynote: Todd Gebhart, Co-President McAfee Inc. (Summary)

Wednesday, April 3, 2013 Summary by Gaspar Modelo-Howard The Changing Security Landscape Why do we, as cybersecurity professionals, go to work each day? Mr. Gebhart...

OSI Open Source Community Summit
From Wild WebMink

OSI Open Source Community Summit

Reblogged from Meshed Insights & Knowledge: The License Clinic for US Federal Agencies is not the only new departure for the Open Source Initiative this May. OSI...

FBI and Cell Phone Surveillance
From Schneier on Security

FBI and Cell Phone Surveillance

We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.

2013 CSTA Annual Conference Keynote Speakers Announced
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2013 CSTA Annual Conference Keynote Speakers Announced

The Computer Science Teachers Association is proud to announce the keynotes for the 2013 CSTA Annual Conference (formerly known as the Computer Science & Information...

If you’re not paying, you’re the product
From Wild WebMink

If you’re not paying, you’re the product

Thanks for the CC-BY, Geek & Poke

iHub Nairobi welcomes Michele Visciola
From Putting People First

iHub Nairobi welcomes Michele Visciola

Michele Visciola, Experientia’s president and user research director, will speak at Kenya’s iHub this week, on Friday 19th April. Michele is currently in Nairobi...

RFID System Tracks Shopper Flow
From The Eponymous Pickle

RFID System Tracks Shopper Flow

In RFID Journal :   Have tested a number of related ideas.  Notably much work by Herb Sorensen's group that was reported in his excellent book : Inside the Mind...

Cisco and GMills Open Innovation
From The Eponymous Pickle

Cisco and GMills Open Innovation

How Cisco and General Mills use Open Innovation. In APQC.  Views based on physical and virtual site visits.    Examples of how to bring in external innovation.

Solving the Problem of Customer Attacks II
From The Eponymous Pickle

Solving the Problem of Customer Attacks II

Colleague, correspondent and former co-fellow of mine at  SNCR Paul Gillin has written a book on customer attacks using social media.  I posted about it once before...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account