acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

World War II Anecdote about Trust and Security
From Schneier on Security

World War II Anecdote about Trust and Security

This is an interesting story from World War II about trust: Jones notes that the Germans doubted their system because they knew the British could radio false orders...

Do we need academic copyright? Some historical perspective
From Daniel Lemire's Blog

Do we need academic copyright? Some historical perspective

It is commonly believed that we introduced copyright to entice authors into producing lots of quality work by providing them with increased financial incentives...

Common Cognitive Traps in Innovation
From The Eponymous Pickle

Common Cognitive Traps in Innovation

In the HBR:  (Requires free registration):   Key point being made is that estimation error can be a key skill for building innovation.  Always try to build numerical...

GS1 Consumer Goods Newsletter
From The Eponymous Pickle

GS1 Consumer Goods Newsletter

We were long time participating members of the standards body called GS1.  I now only sometimes read their writings.  Beyond standards they often talk about retail...

Email Sabbatical: December 13-January 10
From Apophenia

Email Sabbatical: December 13-January 10

I call this year my year of triplets. Over the last few months, I had my first child, finished my book, and kickstarted a research institute. In planning this year...

Redefining Supply Chain
From The Eponymous Pickle

Redefining Supply Chain

As part of a century and a half old,  very successful enterprise, we had a supply chain group from well before I arrived there.  It is essential to make the modern...

Faces of Computing Poster Contest Winners
From Computer Science Teachers Association

Faces of Computing Poster Contest Winners

In honor of Computer Science Education Week, CSTA is pleased to announce the winners of the 2nd annual Faces of Computing student poster contest. This year, over...

Flavor Delivery
From The Eponymous Pickle

Flavor Delivery

A classic problem, can flavor be delivered with digital stimulation?   Research has been doing on for a long time.    Getting to the Bottom of a Digital Lollipop...

How the NSA Tracks Mobile Phone Data
From Schneier on Security

How the NSA Tracks Mobile Phone Data

Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail. Barton...

From Computational Complexity

Approximate Computing

Hadi Esmaeilzadeh is the newest professor in the School of Computer Science at Georgia Tech. Hadi works in computer architecture and did some great work on dark...

Sensors are Impacting the Supply Chain
From The Eponymous Pickle

Sensors are Impacting the Supply Chain

Yes, they have for a long time.  My domain for many years.   But many new methods  are now influencing the space. GigaOM explores.   An extensive report I am reading...

Predictive Analytics Evolution in R
From The Eponymous Pickle

Predictive Analytics Evolution in R

Good, general non technical piece from Ventana Research.  It is an evolution, with many people not understanding the issues in its use.   " ... R, the open source...

NSA Tracks People Using Google Cookies
From Schneier on Security

NSA Tracks People Using Google Cookies

The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this. I have been writing and...

Does Computer Science Count in Your State?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Does Computer Science Count in Your State?

Computer science only counts as a graduation credit (usually in either math or science) in 15 states. In most states a computer science class can be an elective...

CSEDWeek Highlights at ASMSA
From Computer Science Teachers Association

CSEDWeek Highlights at ASMSA

Like schools across the country, we are celebrating Computer Science Education week here at the Arkansas School for Mathematics, Sciences and the Arts (ASMSA) in...

Tableau 8.1 and R Introduction
From The Eponymous Pickle

Tableau 8.1 and R Introduction

In exploration for a project that requires the use of some advanced analytical methods developed in R which would then provide access to the results interactively...

Data & Society: Call for Fellows
From Apophenia

Data & Society: Call for Fellows

Over the last six months, I’ve been working to create the Data & Society Research Institute to address the social, technical, ethical, legal, and policy issues...

Simulating for Success
From The Eponymous Pickle

Simulating for Success

In Fortune:  My early work with analytics was building simulations systems at the Pentagon.  This article describes well how this is done in Defense.  And its improved...

Visualizing Cell Phone Signals
From The Eponymous Pickle

Visualizing Cell Phone Signals

Had always wondered what the RF space would look like.  Here an attempt at visualizing how complex the coverage of RF looks like today.    Some of the commenters...

Be Careful With People Anaytics
From The Eponymous Pickle

Be Careful With People Anaytics

HR analytics have been much in the news and in my investigations of late.  Here some cautionary notes.    What parts of HR can be constructed as a science?   It...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account