acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Onboarding Users
From The Eponymous Pickle

Onboarding Users

On how to onboard new users.  Its harder that you think.  Different users have very different expectations of how they expect to be introduced to your great idea...

Seeking Data Cubes
From The Eponymous Pickle

Seeking Data Cubes

Data Cubes came up in a meeting yesterday and though I knew in general what they were, I sought out a more general and useful definition.  I found this.  Comments...

Simplify Outdated Corporate Processes
From The Eponymous Pickle

Simplify Outdated Corporate Processes

In the HBR, where registration for full text is now required.  Yes, simplify is always good to consider.   " ... rebuilding your processes from the ground up with...

Predicting Product Success
From The Eponymous Pickle

Predicting Product Success

Predicting Product Launch success.  We worked on this using a number of simulation based methods.  Interesting case study here:   " ... Back in May, Kaggle ran...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

A T-shirt with a drawing of a squid reading. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

IRATEMONK: NSA Exploit of the Day
From Schneier on Security

IRATEMONK: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: IRATEMONK (TS//SI//REL) IRATEMONK provides software application persistence...

Reinventing Explanation
From Michael Nielsen

Reinventing Explanation

My new essay on the use of digital media to explain scientific ideas is here.

Computer Science Has An Identity Problem
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Has An Identity Problem

Where does computer science fit? At the university level I’ve seen it in Business departments/Schools of Business. I’ve seen it in various science schools – Schools...

What's Watson for Midsize Companies?
From The Eponymous Pickle

What's Watson for Midsize Companies?

Back on January 9th I attended the IBM announcement of its group for Watson applications.  I tweeted the announcement at @FranzD #IBMWatson.  Full announcement....

Attributing Attacks on the Internet of Things
From The Eponymous Pickle

Attributing Attacks on the Internet of Things

A discussion of the implication of security on the Internet of Things.  If everything is connected, the path to us or our households brings insecurity yet closer...

Connecting Cloud and Business
From The Eponymous Pickle

Connecting Cloud and Business

Connecting the cloud and big data for business.  A piece from Pneuron, which I am looking into.   I was struck by this statement: " ... Data is more volatile than...

Systems to Prevent Deception Fail
From The Eponymous Pickle

Systems to Prevent Deception Fail

A discussion of systems that are meant to prevent deception and unethical behavior.  In Knowledge@Wharton.  A topic in any system that is meant to gather human"...

Another Credit-Card-as-Authentication Hack
From Schneier on Security

Another Credit-Card-as-Authentication Hack

This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...

The Facebook ethnography kerfuffle
From Putting People First

The Facebook ethnography kerfuffle

At the center of this kerfuffle is an anthropologist, Daniel Miller, his ethnographic research with teenagers in a small town in the UK, and a press report on a...

HOWLERMONKEY: NSA Exploit of the Day
From Schneier on Security

HOWLERMONKEY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: HOWLERMONKEY (TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...

From Gödel's Lost Letter and P=NP

Global Warming?

It snowed in Atlanta, and we are closed, for the foreseeable future—where is global warming? Atlanta is frozen. Here is what we looked like the other night. Today...

Meaning of Quality Assurance
From The Eponymous Pickle

Meaning of Quality Assurance

This CW article led me to the meaning of QA ... " ... Long undervalued, quality assurance is in the limelight -- and QA pros in demand -- following the disaster...

Motivation via a Connected Cosumer
From The Eponymous Pickle

Motivation via a Connected Cosumer

Quite obvious, people are always looking at the motivation of recommendations.  Can we now get at the motivation more clearly?  (In Supermarket News, requires registration...

Side-Channel Attacks on Frog Calls
From Schneier on Security

Side-Channel Attacks on Frog Calls

The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...

Social Media in the Enterprise
From The Eponymous Pickle

Social Media in the Enterprise

Charlene Li speaks on the topic, relating to a recent study: " .... Overall, we found that investment in headcount and infrastructure have steadily grown, as companies...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account