acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hill Tech Happenings, Week of September 16
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of September 16

September 18 Markup: The Cybersecurity, Infrastructure Protection and Security Technologies Subcommittee of the House Homeland Security Committee will review two...

Experientia and Intel present at EPIC 2013 in London
From Putting People First

Experientia and Intel present at EPIC 2013 in London

EPIC 2013, the conference on “ethnographic praxis in industry”, kicked off in London today, with experts from around the world gathering for the three-day conference...

Reforming the NSA
From Schneier on Security

Reforming the NSA

Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...

Interesting Links 16 September 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 16 September 2013

Well I was able to blog more often last week. Paying a bit for it as I had a ton of grading to do over the weekend. When inspiration (or something that feels like...

Retailers and Private Label Packaging
From The Eponymous Pickle

Retailers and Private Label Packaging

In Foodprocessing: " ... As retailers put more emphasis on private-label products, they are relying on packaging that sets their merchandise apart, instead of mimicking...

Take Back the Internet
From Schneier on Security

Take Back the Internet

Government and industry have betrayed the Internet, and us. By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...

Food Inflation in US
From The Eponymous Pickle

Food Inflation in US

A piece by MJ Perry on Food Inflation and Prices in the US.  Inflation in food has been down considerably since the 70s.  Further instructive statistics about food...

Women in Computing–An Image To Think About
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Women in Computing–An Image To Think About

Picture from the Facebook page of www.ilovesmartwomen.com

Army Visualization
From The Eponymous Pickle

Army Visualization

The US army / SAIC is using Tableau for Data visualization.   This appears to be a descriptive visualization, as  opposed to an analytic example " ... "We have...

Project10X: Semantic Research
From The Eponymous Pickle

Project10X: Semantic Research

Brought to my attention. Semantic analysis work is always of interest.  " .... Mills Davis is founder and managing director of Project10X — a research consultancy...

How to Remain Secure Against the NSA
From Schneier on Security

How to Remain Secure Against the NSA

Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...

GEPhi Graph Visualization for Exploratory Data Analysis
From The Eponymous Pickle

GEPhi Graph Visualization for Exploratory Data Analysis

This method was brought to my attention my a colleague.  We had looked at it some time ago and it has come back as a possible exploratory solution.The Open Graph...

On the Movement of Queues
From The Eponymous Pickle

On the Movement of Queues

In Mind Hacks:  Why the other line in a queueing situation always moves faster than yours.  A good example of how perception beats out rational thought.  In mywith...

Portfolio as Innovation Dashboard
From The Eponymous Pickle

Portfolio as Innovation Dashboard

In Innovation Excellence:  We used exactly this approach in the enterprise new product development world.  Its very useful if you have many competing efforts" ....

Smarter Cashless Vending Machines
From The Eponymous Pickle

Smarter Cashless Vending Machines

Cashless Vending machines are now smarter. We examined machines like this in Japan that could adapt to supply chain and demand problems.

Are 8-bit or 16-bit counters faster than 32-bit counters?
From Daniel Lemire's Blog

Are 8-bit or 16-bit counters faster than 32-bit counters?

Programmers often want to count things. They typically use 32-bit counters (e.g., the int type in Java). But what if you are counting small numbers? Maybe a 16-bit...

Friday Squid Blogging: Squid Fishing in the Cook Islands
From Schneier on Security

Friday Squid Blogging: Squid Fishing in the Cook Islands

Diamondback squid could be a source of food. No word on taste. As usual, you can also use this squid post to talk about the security stories in the news that...

Early Experiences with Poll Everywhere and Peer Instruction
From The Female Perspective of Computer Science

Early Experiences with Poll Everywhere and Peer Instruction

I've now survived the first three lectures in both my classes.  Both are introductory computing classes for non-majors: one is heavier on concepts but includeseven...

Engaging Social and Mobile Consumers
From The Eponymous Pickle

Engaging Social and Mobile Consumers

In the coming weeks I will be passing along some of the excellent work by correspondent Phil Hendrix.  Three-part Series on Engaging Social and Mobile Consumers...

Radio Interviews with Me
From Schneier on Security

Radio Interviews with Me

Four interviews with me on the NSA.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account