acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Dual Axes in Visualization
From The Eponymous Pickle

Dual Axes in Visualization

From Junkcharts: The dual axes argument in data visualization.  An interesting argument.  I always believe in multiple exceptions to any rule.  Something very similar...

Amazon Online Wholesale Store
From The Eponymous Pickle

Amazon Online Wholesale Store

From Engadget: An online Amazon pantry for wholesale.  See also the comments.  " ... While Amazon has no shortage of rivals, it's now reportedly gearing up to take...

Bitcoin Commodity Exchange
From Wild WebMink

Bitcoin Commodity Exchange

Turns out you can buy and trade Bitcoin mining capacity as well as Bitcoin. As I’m gradually learning more about the Bitcoin world, I’m finding a rapidly maturing...

Kroger Believes in Long term Thinking
From The Eponymous Pickle

Kroger Believes in Long term Thinking

Kroger thinking:"  .... Kroger's Customer 1st Strategy and a focus on long-term goals were key in turning the company around in the late 1990s, CEO David Dillon...

The PhD - Tenure - Jobs Argument, Already Started for 2014
From My Biased Coin

The PhD - Tenure - Jobs Argument, Already Started for 2014

'Tis the season when graduate applications are being decided as well as the job interview process starting again, and just in time for the new year, your regularly...

Visualization Errors and Design
From The Eponymous Pickle

Visualization Errors and Design

Some common errors in visualization.  Good to think about, but I am not sure these are the most important errors you could make.    But the final section is right...

High Expectations for Health Big Data
From The Eponymous Pickle

High Expectations for Health Big Data

As expected, rich expectations, but also many constraints that are still untested.  And lack of understanding of the possibilities." ... Survey results released...

Roots of Visual Mapping and Analytical Method
From The Eponymous Pickle

Roots of Visual Mapping and Analytical Method

Brought to my attention, a set of interesting historical examples of visual mapping.  It's a very old idea that is still useful to describe a complex system before...

Shopkick to be Re-examined
From The Eponymous Pickle

Shopkick to be Re-examined

Went back to their site,  They have a nice video playing now that shows how it works.  We looked at them early on.  They say:  " .... Over 6 million people love...

Disruptive Pricing in Consumer Products
From The Eponymous Pickle

Disruptive Pricing in Consumer Products

In Progressive Grocer, some thoughts on the complexity of this decision process.  SOunds like better analytics is needed, with lots of leverage available." ......

CSTA Wisconsin Team Takes on Certification
From Computer Science Teachers Association

CSTA Wisconsin Team Takes on Certification

Wisconsin is one of the few states to have a distinct license that is required for teachers of computer science courses in high schools. This license, created in...

Data Driven Marketing to 4.8 Billion People
From The Eponymous Pickle

Data Driven Marketing to 4.8 Billion People

Recently in the Teradata Blog, contains an excellent explanatory video by Tim Butler of P&G.  Another great example of the digitization of marketing in CPG.TheProcter...

Friday Squid Blogging: Squid-Shaped Dog Toy
From Schneier on Security

Friday Squid Blogging: Squid-Shaped Dog Toy

Just the thing.

NSA Documents from the <i>Spiegel</i> Story
From Schneier on Security

NSA Documents from the Spiegel Story

There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list: "Tailored Access Operations...

NSA Exploit of the Day: IRONCHEF
From Schneier on Security

NSA Exploit of the Day: IRONCHEF

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF: IRONCHEF (TS//SI//REL) IRONCHEF provides access persistence to...

IBeacon Tech at CES
From The Eponymous Pickle

IBeacon Tech at CES

Interesting CW report from CES.  Currently looking at iBeacon and similar techniques for data rich opportunities leveraging location.    The presentation there...

Data Mining Techniques that Create Business Value
From The Eponymous Pickle

Data Mining Techniques that Create Business Value

Nice summary of common techniques.  For a good start, review your business and decide which of these discoveries would give the most value.  Their definition: ...

Where is the Internet Going?
From The Eponymous Pickle

Where is the Internet Going?

In the NYT:  So where is all this going?  Thoughtful piece including an interview with Vinton Cerf,  now with Google and DARPA, Internet Pioneer.  We worked with...

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)

This may well be of interest to people who like software engineering. A draft of "Software Engineering 2013: Curriculum Guidelines for Undergraduate Degreehttp...

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program
From Schneier on Security

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program

It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account