acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Littlewood’s Law

Why it may take a ‘miracle’ to catch some cheaters source, where he’s right after Charles Dickens John Littlewood really existed. He appeared as second author on...

Nestle Uses Photo App
From The Eponymous Pickle

Nestle Uses Photo App

In Mobile Marketer: A cute use of photo-taking in a smartphone to build brands.  A simple but a potentially useful idea.  Will it usefully engage?   Who will download...

Hands Free Car Manual on Google Glass
From The Eponymous Pickle

Hands Free Car Manual on Google Glass

Metaio's press release on their prototype augmented reality car manual, mentioned here before.    I note that this was precisely the area we explored, using 3D"...

NSF Announces Two New Expeditions in Computing Awards
From The Computing Community Consortium Blog

NSF Announces Two New Expeditions in Computing Awards

The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) today announced two new Expeditions in Computing...

Thinking About the 2014 Imagine Cup
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thinking About the 2014 Imagine Cup

One of the things I was responsible for while I was working at Microsoft was promoting the Imagine Cup competitions. I did that pretty well. I like the competition...

Your E-ZPasses are Not Just Read At Tollbooths
From The Eponymous Pickle

Your E-ZPasses are Not Just Read At Tollbooths

In Forbes:  Are privacy conditions implied to just occur at locations where we expect a device to read our location?   This is probably disclosed somewhere deep...

What do computer scientists know about performance?
From Daniel Lemire's Blog

What do computer scientists know about performance?

Scientists make predictions and are judged on these predictions. If you study global warming, then your job is to predict the climate for the next few decades....

Why Private Brands Fail
From The Eponymous Pickle

Why Private Brands Fail

In MypBrands: Why private brands fail.  " ... Most brands fail. In fact, some estimate that 70-80% of new brands launched each year flounder and eventually flop...

Value of Your Big Data and Packaging it
From The Eponymous Pickle

Value of Your Big Data and Packaging it

What is the value of your big data?  Have talked to two startups recently that are addressing that. The promise of big data is to be able to leverage your own data...

The Limitations of Intelligence
From Schneier on Security

The Limitations of Intelligence

We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...

Prosperity Institute
From The Eponymous Pickle

Prosperity Institute

The Prosperity Institute, out of the Rottman School at the University of Toronto.  Via  Roger Martin.  I like the interesting geographic focus.  " ... The Lloyd...

Cybersecurity Framework Now At Discussion Draft Stage
From U.S. Public Policy Committee of the ACM

Cybersecurity Framework Now At Discussion Draft Stage

While cybersecurity legislation slowly inches forward in Congress, the National Institute of Standards and Technology (NIST) is moving faster in implementing its...

From Computational Complexity

Did YOU think the NSA could factor fast?

Before the recent revelations about the NSA (see Lances Post and Scott's post )I would tell my class, when teaching P and NP, We have very good reasons to think...

VisiRule:  Sharable Know How
From The Eponymous Pickle

VisiRule: Sharable Know How

I am repeating part of a post from last year below, based on my reexamination of expert systems style applications:" ... expert systems to understand and improve...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.

Tiny Robotic Recon Drones in Industry
From The Eponymous Pickle

Tiny Robotic Recon Drones in Industry

The grist of many a science fiction story, tiny flying robotics that can capture information.  Studied these for information capture tasks in remote plant and warehouse...

Apple Indoor GPS System
From The Eponymous Pickle

Apple Indoor GPS System

A general description, and praise for their indoor location system plan.  I was heavily involved in these kinds of approaches for retail use and tested several"...

When Core Values are Strategic
From The Eponymous Pickle

When Core Values are Strategic

Received via the P&G Alumni Network, to be read, their description below.When Core Values Are Strategic: How the Basic Values of Procter & Gamble Transformed Leadership...

To solve hard problems, you need to use bricolage
From Daniel Lemire's Blog

To solve hard problems, you need to use bricolage

People who think that they can design efficient solutions in the abstract, effectively believe in Oracles. That is, they somehow believe that from their desk, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account