acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

October 2013


From The Eponymous Pickle

Data Scientist Code of Professional Conduct

Data Scientist Code of Professional Conduct

I still have my doubts over the longevity of the term 'Data Scientist',  and now they are creating a professional society and a code of conduct." ... Data Scientists Create Code Of Professional ConductBig data practitioners develop…


From Schneier on Security

Silk Road Author Arrested Due to Bad Operational Security

Silk Road Author Arrested Due to Bad Operational Security

Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site.

Despite the elaborate technical underpinnings, however, the complaint portrays Ulbricht as a drug lord who made rookie mistakes…


From The Eponymous Pickle

Alex Sopko Now Writing for the Washington Times

Alex Sopko Now Writing for the Washington Times

Have always been a journalist at heart.  There are useful news stories lined up in my head waiting to emerge.  I particularly love to see examples of how young journalists are advancing the use of online.   Want to help a budding…


From Computer Science Teachers Association

What Are You Doing for Hour of Code?

What Are You Doing for Hour of Code?

That was the question I was asked in an email from a colleague who teaches in a neighboring district. I had thought about it but not in depth. It had been mentioned on Twitter and I had planned to hold two half-hour lunch periods…


From The Eponymous Pickle

Health Care Innovation

Health Care Innovation

HBR establishes a health care innovation center site.  " ...  Leading Health Care Innovation, a collaboration of the editors of the Harvard Business Review and the New England Journal of Medicine, is an eight-week online forum…


From The Female Perspective of Computer Science

Computational Art Using Processing for CS0 / GHC13

Computational Art Using Processing for CS0 / GHC13

I love the curriculum that Zoe Wood and Julie Workman created for their school's CS0 course and that they spoke about at GHC13.  It uses Processing, like the CS1 course that I'm currently teaching for non-majors, but focusesa…


From U.S. Public Policy Committee of the ACM

Review Group on Intelligence and Communications Technologies Hears from USACM

Review Group on Intelligence and Communications Technologies Hears from USACM

In light of the leaks surrounding U.S. national intelligence surveillance efforts, President Obama appointed a group to review those programs to determine if they are in the best possible balance with other national interests…


From The Eponymous Pickle

Effectiveness of Analytics

Effectiveness of Analytics

A good piece on the problem.  But ultimately it is ROI that talks.   And making sure that decision makers get the word of what is happening.    Before, during and after the work is done. Surprisingly that is often not done well…


From The Eponymous Pickle

Consumer Products and Robotics

Consumer Products and Robotics

Consumer products taking cues from robotics. We did this early on.  But the economics ultimately did not make sense.  " ... Smart thermostats, drones and other consumer goods have to take complex, traditionally expensive components…


From Computational Complexity

P vs NP is Elementary? No-- P vs NP is ON Elementary

As I am sure you all know, the TV show Elementary  (Premise- Sherlock Homes in Modern Day NY. He emails and Texts!  Watson is a female! and...) had an episode that involved P vs NP in a big way. I think they would have been better…


From Schneier on Security

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 7 October 2013

Interesting Links 7 October 2013

I’m staring off today with two other sets of links. Some good resource lists created by some friends of mine.

Joe Kmoch has a great list of CS and IT educational resources that he has collected over time in a wiki at <…


From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations by Edward Snowden and their implications for cyber security. Or…


From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations by Edward Snowden and their implications for cyber security. Or…


From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations by Edward Snowden and their implications for cyber security. Or…


From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations by Edward Snowden and their implications for cyber security. Or…


From The Eponymous Pickle

Quoting in My Blog Posts

Quoting in My Blog Posts

I was asked about how I do quotes in blog posts.    Quotes are always placed in italics, and then embedded in quote marks.  Ellipses are usually included to indicate changes in the source material. " ... Here is an example ..…


From The Eponymous Pickle

Data Science for Business

Data Science for Business

Recommended to me, now scanning and and considering for further use: Data Science for Business: What you need to know about data mining and data-analytic thinking by  Foster Provost , Tom FawcettBook's site.  This includes aAlso…


From The Eponymous Pickle

Tableau and Lavastorm

Tableau and Lavastorm

Tableau is meant to be easy to use.  So they have resisted adding analytics directly to their approach.   Their work with Lavastorm adds analytics, which should bring interest from some clients." .. Lavastorm provides the necessary…


From The Eponymous Pickle

Semantic Startup for Content Generation

Semantic Startup for Content Generation

We experimented with methods like this, first I have seen it in the wild again.  A means of combining human and machine skills.Analytically generating content based on data .....I asked Musgrove whether this kind of automated…


From The Eponymous Pickle

Fraunhofer Study on Open Innovation

Fraunhofer Study on Open Innovation

Fad or phenomena?  Download from link below. UC Berkeley and Fraunhofer study how large companies practice innovationThe Garwood Center for Corporate Innovation at the University of California, Berkeley, and the Fraunhofer-Gesellschaft…


From The Eponymous Pickle

Neuromarketing Theory and Practice

Neuromarketing Theory and Practice

A publication of the NMSBA.    You have to be a member of this to get the publication free, and I am not.   Looks to be of interest.    Neurorelay describes its content.


From The Eponymous Pickle

Web Marginal Cost

Web Marginal Cost

Seth Godin and marginal cost on the Web.  Good thoughts, including the mythical marginal cost of 'free' on the web. " ... Until you understand the true marginal cost of your products or services, you can't make smart decisions…


From The Eponymous Pickle

Randomness Ruling Our Lives

Randomness Ruling Our Lives

Late to it, but completing: The Drunkard's Walk: How Randomness Rules Our Lives by Leonard Mlodinow.  Always looking for books that do a good job of providing explanations of arcane subjects like probability and statistics. This…


From The Eponymous Pickle

Yin and Yang of Corporate Innovation

Yin and Yang of Corporate Innovation

Late to this 2012 NYT article,  Jazz meet Google and Apple" ... Apple and Google pursue very different paths to innovation, but the gap between their two models may be closing a bit. In the months after Larry Page, the Google…


From Gödel's Lost Letter and P=NP

Rating FOCS 1973

Can we rate the research topics from 1973? Janos Simon is one of Juris Hartmanis’ illustrious students. He did not have a paper in FOCS 1973, but did have one with Juris at FOCS 1974, which went into his PhD thesis in 1975. He…


From The Eponymous Pickle

Chevy and Google Glass

Chevy and Google Glass

In Adage:  Execs look at Google Glass.  Navigation, augmented reality, service support?  Lots of possibilities.


From Schneier on Security

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium

Opens spring 2014.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.


From Schneier on Security

"Trust the Math"

"Trust the Math"

I like this piece of art.

Someone should do T-shirts.


From The Eponymous Pickle

Clouds, Analytics and Advanced Patient Care

Clouds, Analytics and Advanced Patient Care

Recently pointed out to me,  “Turning Healthcare Vision into Reality with the Cloud”  by Scott Megill, CEO of Coriell Life Sciences in the IBM Smarter Planet blog.   Good read. Lately I have been more involved with cloud data…