acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Book: The App Generation
From Putting People First

Book: The App Generation

The App Generation How Today’s Youth Navigate Identity, Intimacy, and Imagination in a Digital World Howard Gardner and Katie Davis Yale University Press October...

Transferring online Book Notes to Twitter
From The Eponymous Pickle

Transferring online Book Notes to Twitter

Here experimenting with taking a highlighted portion of a book in kindle and transferring the highlights and  notes to a twitter stream, sharing my comments and...

Strategy Arts
From The Eponymous Pickle

Strategy Arts

A couple of other pieces from Mckinsey on Strategy:  On mastering its building blocks, an the art of strategy.  In the enterprise strategic planning always seemed...

Google Launching a Data MOOC
From The Eponymous Pickle

Google Launching a Data MOOC

Google on Launching an Analytics MOOC and Taking Data-Driven Actions " ... Analytics. It could be the deepest, darkest mystery in your organization, served up by...

On Data Science Workflow
From The Eponymous Pickle

On Data Science Workflow

Phillip Guo on Data Science Workflow: Well worth examining: " ... Engineering the Success of Software Development    I now realize that data scientists are oneThis...

Quick links
From Geeking with Greg

Quick links

What caught my attention lately: Jeff Bezos on what innovators need: "A willingness to fail. A willingness to be misunderstood. And maintaining a childlike wonder...

Friday Squid Blogging: 8-Foot Giant Squid Pillow
From Schneier on Security

Friday Squid Blogging: 8-Foot Giant Squid Pillow

Make your own 8-foot giant squid pillow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

A Template for Reporting Government Surveillance News Stories
From Schneier on Security

A Template for Reporting Government Surveillance News Stories

This is from 2006 -- I blogged it here -- but it's even more true today. Under a top secret program initiated by the Bush Administration after the Sept. 11 attacks...

Reading Group at Harvard Law School
From Schneier on Security

Reading Group at Harvard Law School

In Spring Semester, I'm running a reading group -- which seems to be a formal variant of a study group -- at Harvard Law School on "Security, Power, and the Internet...

Internet Policy Task Force Seeks Public Comments on “Copyright Policy, Creativity, and Innovation in the Digital Economy” Report
From U.S. Public Policy Committee of the ACM

Internet Policy Task Force Seeks Public Comments on “Copyright Policy, Creativity, and Innovation in the Digital Economy” Report

The U.S. Department of Commerce’s Internet Policy Task Force invites public comments on its report, “Copyright Policy, Creativity, and Innovation in the Digital...

Debugging Student Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Debugging Student Code

I confess that I love to debug code. I think I’d rather fix broken code and remove bugs than write original code from scratch. All that set up and stuff is tedious...

USPTO Software Partnership Meeting on Prior Art Searching Techniques and Tools on December 5, 2013
From U.S. Public Policy Committee of the ACM

USPTO Software Partnership Meeting on Prior Art Searching Techniques and Tools on December 5, 2013

The U.S. Patent and Trademark Office (USPTO) will hold the next Software Partnership meting on December 5, 2013, from 1-4:30 pm ET at its headquarters in Alexandria...

Infinite storage: we are almost there…
From Daniel Lemire's Blog

Infinite storage: we are almost there…

Two years ago, I wrote a blog post called What is infinite storage? The blog post was a response to a Physics professor and colleague of mine who objected to my...

From Computational Complexity

Andrzej Mostowski (1913-1975)

Andrzej Mostowski was born 100 years ago today. While Mostowski worked in many areas of logic, including early fundamental work on model theory, for our readers...

Close-In Surveillance Using Your Phone's Wi-Fi
From Schneier on Security

Close-In Surveillance Using Your Phone's Wi-Fi

This article talks about applications in retail, but the possibilities are endless. Every smartphone these days comes equipped with a WiFi card. When the cardpick...

Google Plus
From The Eponymous Pickle

Google Plus

For the purposes of an experiment, some posts of my blog are now being echoed into Google+ here: http://www.google.com/+FranzDill    Feel free to link with me there...

NSA Eavesdropping on Google and Yahoo Networks
From Schneier on Security

NSA Eavesdropping on Google and Yahoo Networks

The Washington Post reported that the NSA is eavesdropping on the Google and Yahoo private networks -- the code name for the program is MUSCULAR. I may write more...

Get Involved in Hour of Code 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Get Involved in Hour of Code 2013

Last week, Code.Org and others announced the Hour of Code to the world. Now backed by Microsoft, Google, Apple, Amazon, LinkedIn, Mark Zuckerberg, CSTA, the College...

App Stores for the Defense Enterprise
From The Eponymous Pickle

App Stores for the Defense Enterprise

Enterprises are looking for ways to ride the ease of use and simplicity of task partitioning and integration in App stores.   Even the US Department of Defense. ...

Samsung Design America
From The Eponymous Pickle

Samsung Design America

Samsung Putting Design First.  A new era of design connectivity.  " ... Dennis Miloseski, head of the design studio for Samsung Design America, said that Samsung...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account