acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

2013 CSTA Annual Conference Registration Open
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2013 CSTA Annual Conference Registration Open

Just announced via the CSTA member email system – registration is now open for this summer’s Annual CSTA conference. Some great sessions in the line up. Something...

Cheesecake Factory Restaurant Analytics
From The Eponymous Pickle

Cheesecake Factory Restaurant Analytics

The Cheesecake Factory delivers an exceptional brand experience with IBM Big Data analytics http://goo.gl/Mfn5c #IBMPWLCI had yet to see a restaurant application...

Does academic research cause economic growth?
From Daniel Lemire's Blog

Does academic research cause economic growth?

In most developed countries, government massively funds through academic grants, government laboratories, tax credits and research contracts. In Canada, the government...

Partner World
From The Eponymous Pickle

Partner World

IBM colleagues inform me that Partner World has started.The agenda  can be found here.  You can also watch sessions online.  #IBMPWLC Lots of interesting work that...

Upcoming Free Seminars
From The Eponymous Pickle

Upcoming Free Seminars

I intend to attend these: ... University of Cincinnati's research seminars organized by the Operations, Business Analytics, and Information Systems (OBAIS) department...

Unilever Spending, Partnerships Up
From The Eponymous Pickle

Unilever Spending, Partnerships Up

In AdAge:   This looks to be a considerable development:  " ... Unilever has struck global partnerships with Samsung, Sony's Arcade Creative Group and EA Sports...

Coding is cool! Code.org urges students to learn to code with resources + terrific new video
From The Computing Community Consortium Blog

Coding is cool! Code.org urges students to learn to code with resources + terrific new video

Please bring the Code.org website and GREAT new inspirational video to the attention of all students, teachers, and parents you’re able to reach through your organization’s...

Security Lessons from the Battle of Hoth
From Schneier on Security

Security Lessons from the Battle of Hoth

Someone has analyzed the security mistakes in the Battle of Hoth, from the movie The Empire Strikes Back.

How ‘Minority Report’ trapped us in a world of bad interfaces
From Putting People First

How ‘Minority Report’ trapped us in a world of bad interfaces

“There are better ways to handle spatial ideas,” writes commercial artist Christian Brown, “ways which are more in line with the way our bodies are built. Human...

From Computational Complexity

Enos, Oona, sqrt(3), and Aaronson

My darling does crossword puzzles and sometimes asks my help: Darling: Bill, Slaughter in Cooperstown- whats the answer? Bill: Enos. There was a serial murderer...

My So Called Secret Identity
From The Female Perspective of Computer Science

My So Called Secret Identity

Have you heard about the comic My So-Called Secret Identity? It's been making quite the buzz among many of my academic and women-in-tech friends.  I finally had...

What Most Schools Don’t Teach
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What Most Schools Don’t Teach

Code.org has released their highly anticipated video to encourage more people, especially students, to learn how to code for computers. It’s one of the better videos...

The future of lying
From Putting People First

The future of lying

Someone told Intel’s futurist Brian David Johnson that technology could do away with all lying in the future. He was horrified by the idea and wrote this: The Future...

HP Tablets
From The Eponymous Pickle

HP Tablets

In an interesting development HP plans to be planning to deliver a family of tablet style devices.  Recall the fiasco that HP had when they acquired the Palm OS...

House Hearing: How Well Is the TSA Doing?
From Schneier on Security

House Hearing: How Well Is the TSA Doing?

I would have liked to participate in this hearing: Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency: "Assessing DHS 10 Years"...

Attack of the Customers:
From The Eponymous Pickle

Attack of the Customers:

Colleague, correspondent and former co-fellow of mine at  SNCR Paul Gillin has written a book on customer attacks using social media:Attack of the Customers: Why...

Technology: Blessing or Curse? A Case Study from the Magic Kingdom
From Computer Science Teachers Association

Technology: Blessing or Curse? A Case Study from the Magic Kingdom

I just got back from a week's vacation to what is supposed to be the happiest place on earth - Disneyworld. I come from a family that is not very technical or even...

On the Rise of the Swarm
From The Eponymous Pickle

On the Rise of the Swarm

Our enterprise did a number of analytics projects based on swarm technology, also called Agent Based Modeling.  We brainstormed warehouse compliance swarms.  Now...

Data Driven Culture for Analytics
From The Eponymous Pickle

Data Driven Culture for Analytics

Good piece in a new newsletter I get.  Business driven analytics, commentary by three analytics managers.   The federated org structure sounds the most familiar...

New NSF INSPIRE Solicitation Issued
From The Computing Community Consortium Blog

New NSF INSPIRE Solicitation Issued

The National Science Foundation (NSF) has issued a new solicitation – Integrated NSF Support Promoting Interdisciplinary Research and Education (INSPIRE) – that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account