acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Move the Cheese

Report on the recent Coding, Complexity, and Sparsity Workshop Martin Strauss and Anna Gilbert and Atri Rudra are the organizers of the just-held Coding, Complexity...

Smart Socks Gather Data
From The Eponymous Pickle

Smart Socks Gather Data

Hackaday is an interesting site to follow. New uses of information technology hardware and software.  Which naturally cobble together many well known techniques...

IT in Times of Uncertainty
From The Eponymous Pickle

IT in Times of Uncertainty

In the Future of the CIO Series:  Some very good thoughts here.  I particular: Simplicity.  Not to say that I follow that recommendation well.  As a follower of...

Ants and Networking
From The Eponymous Pickle

Ants and Networking

What ants know.   And what complex networks of things can be made to 'know'.   Known as Agent Based Models.  We studies this a decade ago in the enterprise.  Though...

A Look at Flat Design
From The Eponymous Pickle

A Look at Flat Design

A detailed look.  With a number of recent examples, such as Microsoft.   Starting to see it everywhere. " ... As the name indicates, flat design is defined by flatness...

Friday Squid Blog: Rickshaw Cart Woodblock Print
From Schneier on Security

Friday Squid Blog: Rickshaw Cart Woodblock Print

With a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Female Friendly Narrative Modding in Games
From The Female Perspective of Computer Science

Female Friendly Narrative Modding in Games

Why is it that there are still so few video games stories with awesome female protagonists that don't play into the usual gender stereotypes? What's a gamer toZelda...

The Executive Branch Works On Implementing the Cybersecurity Executive Order
From U.S. Public Policy Committee of the ACM

The Executive Branch Works On Implementing the Cybersecurity Executive Order

Since the President issued an Executive Order on cybersecurity information sharing back in February, several groups have worked on implementing parts of that order...

Privacy and the Internet: Is Facebook evil?
From Daniel Lemire's Blog

Privacy and the Internet: Is Facebook evil?

For several of my classes, I open Facebook groups so that my students can exchange online. In some instances, it has worked great. Facebook tends to do a better...

Lavabit E-Mail Service Shut Down
From Schneier on Security

Lavabit E-Mail Service Shut Down

Lavabit, the more-secure e-mail service that Edward Snowden -- among others -- used, has abruptly shut down. From the message on their homepage: I have been forced...

Bit vs Atoms in the Supply Chain
From The Eponymous Pickle

Bit vs Atoms in the Supply Chain

On Bits vs atoms:  Nothing new here, our enterprise did this for years, and is one of the supporters of this effort, the post below does give a good overview of...

From Computational Complexity

Don't Have an End Game

As a young professor, I wrote a grant proposal and took it to a senior theory professor for comments. He told me to take out the line "The ultimate goal of computational...

Latest Movie-Plot Threat: Explosive-Dipped Clothing
From Schneier on Security

Latest Movie-Plot Threat: Explosive-Dipped Clothing

It's being reported, although there's no indication of where this rumor is coming from or what it's based on. ...the new tactic allows terrorists to dip ordinary...

Prezi: Presentation and Storytelling Tool
From The Eponymous Pickle

Prezi: Presentation and Storytelling Tool

I used the Prezi presentation and storytelling tool for a project some years ago.  Just revisited it.   An introductory video. With many useful examples. It now...

R Resources
From The Eponymous Pickle

R Resources

Useful R Resources.  Books, online, lists, videos, examples.   Will add this to my list.   I find R similar to Mathematica and APL (from long ago).  First language...

Gamification White Paper
From The Eponymous Pickle

Gamification White Paper

I had cause to download Bunchball's whitepaper on gamification (registration required).   Logically done,  as a non technical review of the underlying idea of using...

Cloud, Data, Analytics and Process for SMB
From The Eponymous Pickle

Cloud, Data, Analytics and Process for SMB

Brought to my attention,  In The Financial Express, from Jyothi Satyanathan, director Mid-market & Inside Sales, IBM India/South Asia.  I much agree with his opening...

Twitter's Two-Factor Authentication System
From Schneier on Security

Twitter's Two-Factor Authentication System

Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor: The new two-factor system works like this....

Security Risks and BYOD
From The Eponymous Pickle

Security Risks and BYOD

Cursory look at the implications for security of Bring Your Own Device (BYOD) implementations.  We were early experimenters with the BYOD concept, and security...

Google Showcases in-Depth Articles
From The Eponymous Pickle

Google Showcases in-Depth Articles

In Google Operating System:  An indication that Google is now showcasing long form articles.   We have become very used to small sized nuggets of information on...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account