The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
In IEEE Computing:Social Computing: From Social Informatics to Social Intelligenceby Fei-Yue Wang, Kathleen M. Carley, Daniel Zeng, and Wenji MaoReaders are introduced to social computing's theoretical, methodological, and technological…
You will recall I reviewed Herb Sorensen's book: Inside the Mind of the Shopper", some time ago. Highly recommended for its insight into the scientific understanding of retail, based on actual consumer behavior. He has been a…
Martin Kruskal invented Soliton Waves which were a very important concept in Physics.
Rebecca Kruskal (Martin's Granddaughter): Daddy, how come they are not called Kruskal Waves?
Clyde Kruskal (Martin's Son, Rebecca's…
CONTENTS
[1] Newsletter Highlights [2] First Computer Science Education Week Finishes Strong [3] USACM Supports Expanded FCC Technical Advice [4] FY 2010 Budgets Show Increases for Science Agencies [5] Data Security Bills Pass…Last week I attended a workshop day at Stevens Institute of Technology where Michael Kolling, University of Kent and creator of Greenfoot was the keynote speaker. Some of the things he said really resonated with me. One of them…
Scott Hill of Alternet looks at how technology facilitates “the human sentient understanding of how to take cruel advantage of human weakness”. “Indeed, humans are exceptional when it comes to using technology to prey upon weaknesses…
The New York Times reports that President Obama’s proposed budget includes substantial increases for science research, including an 8% increase for the National Science Foundation from last year’s budget, rising to $7.4 billion…
In Digital Nation: Life on the Virtual Frontier, FRONTLINE presents an in-depth exploration of what it means to be human in a 21st-century digital world. Continuing a line of investigation she began with the 2008 FRONTLINE report…
Preliminary stats show 55 students in my algorithms course. That's probably close to the mean and slightly above the median. It's certainly not the largest course in the School of Engineering and Applied Sciences (SEAS), but…
Mark Montgomery posts on: Systemic Failures, by Design. See also the newletter of his company: Kyield.
Constantine Valhouli, principal of the Massachusetts based Hammersmith Group, which consults to developers on the marketing and branding of luxury properties, and to city leaders on reviving historical downtowns, just published…
" ... The year in flavor will be heavily influenced by bitter, warm and earthy notes," said Kevan Vetter, executive chef at McCormick. "We see America's palates embracing stronger flavors -- high-impact combinations that areIn…
On the 4th annual Data Protection day (28th January 2010) the European Commission announced the intention to reform the 1995 European Union (EU) Data Protection Directive 95/46/EC. “Our privacy faces new challenges: behavioural…
If you are a grad student and want to goto STOC 2010 there is travel support money that you can apply for. See here for details.
What is the best way to get this information out? What is the best wayy to get any kind of…
Stowe Boyd arguest that the metaphors of computing user experience are holding us back from new ways of structuring our interaction through computers. “the thing that is blocking us from moving forward, to a better user experience…
Have been members of GS1 for many years, download their excellent 34-page paper on Mobile retail below, they write:" .... We're pleased to announce the publication of the "Mobile in Retail" White Paper. You can download it from…
There will be various events all week in connection with the rollout of the President's Fiscal Year 2011 Budget Request. Check with agency websites for additional information.
February 3
Hearing: The Research and Science Education…The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made from smoke detector parts, planning via online games, and botulinum…
Ross Anderson reports:
Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified by VISA" and "MasterCard SecureCode". This is now the most widely…Given the well known increased risk of burnout for an extended "Crunch Time," why do developers put up with it?
All sorts of good things last week. Tops among them was a visit to Stevens Institute of Technology for a workshop with a great group of high school computer science teachers. You