acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Unmasking the Puppets
From The Eponymous Pickle

Unmasking the Puppets

From New Scientist and ACM:  An experimental method to unmask sock-puppets (usually phony paid commenters, reviewers or contributors) based on the way they write...

Easy Now
From My Biased Coin

Easy Now

In the past year or so, I've gotten reviews back on multiple papers with the complaint that the result was too simple.  My interpretation of review: sure you might...

Hill Tech Happenings, Week of November 18
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of November 18

November 19 Hearing: The House Science, Space and Technology Committee will hold a hearing on the data security of the Healthcare.gov website. 1o a.m., 2318 Rayburn...

Not all citations are equal: identifying key citations automatically
From Daniel Lemire's Blog

Not all citations are equal: identifying key citations automatically

Suppose that you are researching a given issue. Maybe you have a medical condition or you are looking for the best algorithm to solve your current problem. A good...

GoldieBlox, Rube Goldberg, & Beastie Boys "Princess Machine"
From The Female Perspective of Computer Science

GoldieBlox, Rube Goldberg, & Beastie Boys "Princess Machine"

This video is so beyond awesome that it deserves its own blog post.  I may or may not have shed a few tears watching it.  Keep on kicking butt, GoldieBlox. We need...

Explaining and Speculating About QUANTUM
From Schneier on Security

Explaining and Speculating About QUANTUM

Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...

Interesting Links 18 November 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 18 November 2013

I made a quick trip to Tucson AZ over the weekend for the CSTA Board meeting. Beautiful part of the country and I wish I had more time to explore it. But meeting...

Need Business Analytics Help?
From The Eponymous Pickle

Need Business Analytics Help?

Need help with business analytics?  Big Data visualization, analysis and mining?   Writing, Speaking, Managing.  Strategy and Tactics.  Over thirty years of experience...

CCC Chair Susan Graham is named to the President’s Council of Advisors on Science and Technology Policy
From The Computing Community Consortium Blog

CCC Chair Susan Graham is named to the President’s Council of Advisors on Science and Technology Policy

President Barack Obama has announced his intent to nominate two new members to the President’s Council of Advisors on Science and Technology Policy (PCAST).  The...

Six Degrees of Connection to P&G
From The Eponymous Pickle

Six Degrees of Connection to P&G

After publishing a item about an infographic I liked,  about products we buy, it was pointed out that some of the data was incorrect.  That is true.  But I wasinfographic...

Cognitive AI Apps in the Cloud
From The Eponymous Pickle

Cognitive AI Apps in the Cloud

More on the IBM giving access to Watson technologies to allow the building of cognitive Apps in the cloud.   A good direction.  The App style of infrastructure...

Amazon's Business Models
From The Eponymous Pickle

Amazon's Business Models

In the HBR:  Indicating that they constantly audit their business model.  Which has led to increases in the number of US warehouses, and their recent proposal to...

Mining Health Care Information
From The Eponymous Pickle

Mining Health Care Information

In Freebeacon: How can social media information be mined for indications of health related behavior?  " ... Specifically, NLM will look at the “value of tweets...

CSTA Seeking CS Education Leaders for Board Positions
From Computer Science Teachers Association

CSTA Seeking CS Education Leaders for Board Positions

As we approach the start of the new calendar year, it is time to start the CSTA Board of Directors nominations and elections process once again. CSTA is a member...

Trolling IKEA
From The Eponymous Pickle

Trolling IKEA

In Adage: We have an Ikea store nearby.  The number of items they have is so large that it is hard to believe anyone can recognize one that is out of place.  So...

Defensiveness in Communications
From The Eponymous Pickle

Defensiveness in Communications

In the HBR:  I like this argument about not being defensive in communications.  Found myself in this position.  And has some practical methods to implement it that...

Data is Decentralized
From The Eponymous Pickle

Data is Decentralized

An aspect I had never thought about very much, but very true. " ... Let’s look at IT in a simple way. There are users, there are applications, there is hardware...

From Gödel's Lost Letter and P=NP

The Graph of Math

The last part of our interview with Gödel two years ago src Kurt Gödel is said to have been a latecomer to appreciating the power of Model Theory. He was of course...

Friday Squid Blogging: Squid Fishermen Seen from Space
From Schneier on Security

Friday Squid Blogging: Squid Fishermen Seen from Space

Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Various Schneier Audio and Video Talks and Interviews
From Schneier on Security

Various Schneier Audio and Video Talks and Interviews

News articles about me (or with good quotes by me). My talk at the IETF Vancouver meeting on NSA and surveillance. I'm the first speaker after the administrivia...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account