acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Weave Data Visualization into Your Business
From The Eponymous Pickle

Weave Data Visualization into Your Business

Excellent overview piece on the topic, which makes the point that the business process must be woven into the quantifications and visuals,  a favorite topic of...

Communicating Data
From The Eponymous Pickle

Communicating Data

In the HBR: Data needs to be gathered, understood, communicated and embedded in the decision process.  You need quant people to make this happen.  This article"...

Presentations from the Symposium on Visions of the Theory of Computing
From The Computing Community Consortium Blog

Presentations from the Symposium on Visions of the Theory of Computing

The Computing Community Consortium (CCC) sponsored the Simons Institute Symposium on Visions of the Theory of Computing.  The three-day symposium brought together...

Evidence that the NSA Is Storing Voice Content, Not Just Metadata
From Schneier on Security

Evidence that the NSA Is Storing Voice Content, Not Just Metadata

Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading. I expressed skepticism about this just...

Feedly Replaces My Google Reader
From The Eponymous Pickle

Feedly Replaces My Google Reader

In anticipation of Google's Reader RSS shut down in a couple of weeks I have moved to the free  Feedly service.  Both as an App and in Chrome.  Works well, and...

New Code.org Video Released
From Computer Science Teachers Association

New Code.org Video Released

Code.Org has just released a new video promoting computer science that may be especially effective for creating broader public awareness among policy leaders and...

Hashing and the Birthday paradox: a cautionary tale
From Daniel Lemire's Blog

Hashing and the Birthday paradox: a cautionary tale

If you meet a stranger, the probability that he will have the same birth date as yourself is probably less than 1%. It is roughly 1/365 if you make simplifying...

From Computational Complexity

Fraud or not ?

For each of these, are they frauds? The Turk was a chess playing ``computer'' (around 1770) that was later discovered to be cheating--- a human made the moves...

Consequence of EU Tightening  Data Privacy Further
From The Eponymous Pickle

Consequence of EU Tightening Data Privacy Further

A good Adage Article on how the revelations of massive private data leaks could make the EU further tighten data privacy. What does this mean and and what are the...

Hill Tech Happenings, Week of June 17
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of June 17

June 18 Hearing: The Senate Commerce, Science and Transportation Committee will hold a hearing on the nominee to head the Federal Communications Commission, Thomas...

Project C-43: A Final Piece of Public-Key Cryptography History
From Schneier on Security

Project C-43: A Final Piece of Public-Key Cryptography History

This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...

P&G Takes IT Work from India
From The Eponymous Pickle

P&G Takes IT Work from India

Via my UK consultant, in the India Times.  P&G aims to cut down outsourced IT work in India.  A surprise which is making Indian vendors nervous.

Strategy's Tough Choices
From The Eponymous Pickle

Strategy's Tough Choices

Came late to my inbox.  In the HBR's blog in late May.  Former and current P&G's CEO AG Lafley  on Strategy's Tough Choices.  A video.

Computing Community Consortium Announces New Council Members and Executive Committee
From The Computing Community Consortium Blog

Computing Community Consortium Announces New Council Members and Executive Committee

The Computing Research Association (CRA), in consultation with the National Science Foundation (NSF), has appointed five new members to the Computing Community...

Fracturing of Corporate IT
From The Eponymous Pickle

Fracturing of Corporate IT

In CIO Insight:  Different and becoming more so.  Not going away, as some say, standards and security still need to exist.  But the nature of enterprise IT is changing...

Data Visualization Startup
From The Eponymous Pickle

Data Visualization Startup

First I had heard of this.  A simple to use solution by former Facebook employees.  Probably for everyday visual data solutions.   See Polychart.

Blowback from the NSA Surveillance
From Schneier on Security

Blowback from the NSA Surveillance

There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...

Interesting Links 17 June 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 17 June 2013

First Monday of “summer vacation” and my grading is done and have been submitted. You know what that means! Yep, working on my lesson plans for August. Two brand...

Networked Things
From The Eponymous Pickle

Networked Things

A good overview of the current state of the network of things.  Which points back to our own experiments with networked refrigerators, in that nexus of the modern...

Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)
From CERIAS Blog

Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)

By Mark Rasch† and Sophia Hannah‡ Last post, we wrote about the NSA‟s secret program to obtain and then analyze the telephone metadata relating to foreign espionage...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account