acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

September 2014


From The Eponymous Pickle

On the Vital Edge of Technology: AI

On the Vital Edge of Technology: AI

On artificial intelligence, past and present.  I do get the impression that too little attention is being paid to what we discovered before.  Especially with regard to knowledge gathering and management.   " ... What do we want…


From The Female Perspective of Computer Science

Be a GHC Community Volunteer and Change Your Life

Be a GHC Community Volunteer and Change Your Life

You should sign up to be a volunteer community note-taker or blogger by our new deadline of September 8.  It could change your life! Seriously!

Blue Jelly Social Media Icons / WebTreatsETC
I started attending the Grace Hopper Celebration…


From Daniel Lemire's Blog

Paper books are the new vinyl records

Paper books are the new vinyl records

I have always loved reading. But it is a love that has been constantly frustrated. As a young teenager, I would spend days in the library, but I quickly exhausted my interests. If you wanted to know about Einstein, you were lucky…


From The Eponymous Pickle

We are Innumerate

We are Innumerate

John Batelle on why we love visualization.  My own experiences make me agree.  But truly useful, well designed, interactive visualizations gives us capabilities that plain number stories cannot.  Visualization allows us interact…


From Computational Complexity

How hard is changing fields? Ask Sheldon!

In the last season of  The Big Band Theory Sheldon wants to change field from String theory to something else (I don't recall if he settled on what it would be, though Standard Model Physics, Quantum Loop Gravity, Calculation…


From The Eponymous Pickle

Who is Afraid of Data Driven Management?

Who is Afraid of Data Driven Management?

Late to this but brought to my attention by colleague Andy Boyd.  In the HBR.   Very nice,  simple model, but is it too simple?  I have dealt with many people that were afraid of data, but would rarely admit it. I think this"…


From Schneier on Security

Electromagnetic Weapons

Electromagnetic Weapons

Long article in IEEE Spectrum....


From Gödel's Lost Letter and P=NP

Enriching the Frankl Conjecture

See a number, make a set Henning Bruhn and Oliver Schaudt are mathematicians or computer scientists, or both. They are currently working in Germany, but wrote their survey on the Frankl Conjecture (FC) while working together…


From The Computing Community Consortium Blog

Back to School – Exploring Computer Science: from the classrooms of L.A. schools to a nationwide effort

Back to School – Exploring Computer Science: from the classrooms of L.A. schools to a nationwide effort

The following is a guest blog post from Gera Jochum, Communications Specialist for the Computer and Information Science and Engineering (CISE) Directorate at the National Science Foundation (NSF). A new video produced by the      …


From The Eponymous Pickle

Standardizing and Optimizing Containers

Standardizing and Optimizing  Containers

More work on standardizing shipping containers. A natural progression.  We examined RFID use in many kinds of shipping infrastructure.   Now companies looking at the problem from an IOT perspective, combined with deeper analytics…


From The Eponymous Pickle

Toddler Intelligence Learning

Toddler Intelligence Learning

The Baby-X Toddler simulation at the Creators Project.    Getting smarter every day, they say.  But I do wonder about what the real measure is.  True deep AI is teaching something to learn from available knowledge and in context…


From The Eponymous Pickle

Bad Data Handbook

Bad Data Handbook

I like the book title premise. Having just been involved in a project that included dealing with bad data, however it is defined.    Also to be considered:  Data and metadata that is not or miss-connected to data in use. Or stated…


From Apophenia

What is Privacy?

What is Privacy?

Earlier this week, Anil Dash wrote a smart piece unpacking the concept of “public.” He opens with some provocative questions about how we imagine the public, highlighting how new technologies that make heightened visibility possible…


From Schneier on Security

Pencil-and-Paper Codes Used by Central American Criminal Gangs

Pencil-and-Paper Codes Used by Central American Criminal Gangs

No mention of how good the codes are. My guess is not very....


From The Eponymous Pickle

Big Data for Grocery

Big Data for Grocery

Comments on grocery and loyalty data:" ... Today's technology offers supermarkets new ways to use the growing sea of customer loyalty data to their advantage as competition grows. Instant coupons and mobile promotions generated…


From The Eponymous Pickle

More Corporate Drones

More Corporate Drones

Yet another example of corporations building drone programs.  Here Google's Project Wing.  I guess this is cheaper, and apparently safer than a fleet of aircraft.  Looser regulations for now.  So will the sky soon fill up with…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 1 September 2014

Interesting Links 1 September 2014

Nothing like easing into the new school year. Last week was a four day week and so is this week. Today being Labor Day in the US most schools are closed. Here in New England and in fact much of the US tomorrow is the traditional…


From Putting People First

Pew Internet research: 15 theses about the digital future in 2025

Pew Internet research: 15 theses about the digital future in 2025

A canvassing of 2,558 experts and technology builders about where we will stand by the year 2025 finds striking patterns in their predictions, reports the Pew Research Center’s Internet Project. In their responses, these experts…

« Prev 1 8 9 10 Next »