acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Obama's Continuing War Against Leakers
From Schneier on Security

Obama's Continuing War Against Leakers

The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...

Interesting Links 29 July 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 29 July 2013

Short week last week as my wife and I headed down to Walt Disney World for a bit of actual real vacation. That doesn’t mean I didn’t collect a good batch of links...

Blended Realities: Glass and Printers
From The Eponymous Pickle

Blended Realities: Glass and Printers

I like the idea of blending emergent technologies.   Here the sensory absorption of Google Glass and the realization capability of 3D Printing.  " .... It was great...

In Sickness...
From My Biased Coin

In Sickness...

One of the more amusing conversations at the social part of the Microsoft faculty summit (initiated by the humorous commentary of Kevin Leyton-Brown) started with...

Sales Force Motivation
From The Eponymous Pickle

Sales Force Motivation

Using Gamification dynamics at Ford Canada.  Sales teams, which by their nature are already competitive, are a natural place to insert gaming methods that enhance...

Augmented Reality as Maintenance Tool
From The Eponymous Pickle

Augmented Reality as Maintenance Tool

Via Junaio.  Work on using augmented reality as an after service maintenance delivery tool for Bosch.   Maintenance enhancement in manufacturing was also an area...

Secure Stealth Clouds
From The Eponymous Pickle

Secure Stealth Clouds

In GigaOM:  Amazon battles IBM to build a stealth cloud for the CIA.  Is this, as the article suggests,  a battle for the soul of the future Information Technology...

Baby Ziv
From Apophenia

Baby Ziv

Ziv Lotan Boyd was born into this world shortly after midnight on Sunday, July 28 after a movie-esque labor (complete with a NYC cabbie running honking like mad...

R Video
From The Eponymous Pickle

R Video

So just what just is the open source statistical, data science and visualization language R?  A short video that describes the history, community and applications...

Mathematics of Poker
From The Eponymous Pickle

Mathematics of Poker

Some recent exposure to card game theory led me to this WSJ article.  " ... This growth over the past decade has been accompanied by a profound change in how the...

Sharing Location Data
From The Eponymous Pickle

Sharing Location Data

A Secure Location Data Locker: " ... OpenPaths is a secure data locker for personal location information .... Using our mobile apps you can track your location,...

From Gödel's Lost Letter and P=NP

Thirteen Sigma

Monitoring fabrication in industry and chess “Hall of Fame” source. Bill Smith joined Motorola as a quality control engineer in 1986. He coined the term Six Sigma...

Government Controlling Your Car
From The Eponymous Pickle

Government Controlling Your Car

In Forbes:  A demonstration about how you can hack into an automobile via a government mandated port and perform some very worrisome actions.   Hackers and the...

Die Empty
From The Eponymous Pickle

Die Empty

Todd Henry of Accidential Creative's curiously named new book: Die Empty: Unleash Your Best Work Every Day is available for pre-order.  Link to read chapter 1 free...

Big Data Theory and Analytics
From The Eponymous Pickle

Big Data Theory and Analytics

Big Data Analytics at Microsoft Research.   From a recent workshop there. " ... “The top-level takeaway for attendees was that big-data analytics is an area where...

Google's IT Mission Statement
From The Eponymous Pickle

Google's IT Mission Statement

In Forbes:   A view of where they are going and the kinds of empowerment being developed.   Google CIO Ben Fried speaks: " ... Fried and his leadership team defined...

Friday Squid Blogging: Squid Song
From Schneier on Security

Friday Squid Blogging: Squid Song

It's "Sparky the Giant Squid." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NIH Big Data to Knowledge (BD2K) Initiative
From The Computing Community Consortium Blog

NIH Big Data to Knowledge (BD2K) Initiative

The National Institutes of Health (NIH) has announced the Centers of Excellence for Big Data Computing in the Biomedical Sciences (U54) funding opportunity announcement...

NSA Cracked the Kryptos Sculpture Years Before the CIA Did
From Schneier on Security

NSA Cracked the Kryptos Sculpture Years Before the CIA Did

We interrupt this blog for some important inter-agency rivalry. The fourth part is still uncracked, though. Older links.

Data Mining for the Midsize Business
From The Eponymous Pickle

Data Mining for the Midsize Business

In the large enterprise we constructed a number of datamining efforts that looked to classify solutions based on measurements we had gathered.   One popular technique...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account