acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Individualized Pricing
From The Eponymous Pickle

Individualized Pricing

The NYT discusses how and why people can be given individualized prices for goods.  If course this has been done for a long time.  Through promotions.  Loyalty...

Swarming Drones
From The Eponymous Pickle

Swarming Drones

Boeing demonstrates swarming drones.   Which reminds me of long ago projects that looked at how simple,uni-purpose, cheap and even disposable robotics could be...

Friday Squid Blogging: Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Dumpling Squid

The sex life of the dumpling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Termite Suicide Bombers
From Schneier on Security

Termite Suicide Bombers

Some termites blow themselves up to expel invaders from their nest.

NSF Seeking RAPID Proposals on Tsunami Debris Field Threats
From The Computing Community Consortium Blog

NSF Seeking RAPID Proposals on Tsunami Debris Field Threats

Several directorates within the National Science Foundation (NSF) — including Computer and Information Science and Engineering (CISE) — issued a Dear Colleague...

Deep Natural Language Analysis
From The Eponymous Pickle

Deep Natural Language Analysis

Of Interest:  Another DARPA example I have just examined.  Automated, deep natural-language understanding technology may hold a solution for more efficiently processing...

Influence vs Control
From Wild WebMink

Influence vs Control

My article for InfoWorld this week considers three different projects – OmniOS (derived from Illumos, the new name given to OpenSolaris), GitHub and OpenStack –...

11-Year-Old Bypasses Airport Security
From Schneier on Security

11-Year-Old Bypasses Airport Security

Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...

Public Sector TechBytes Series
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Public Sector TechBytes Series

   http://aka.ms/fzytjrTopicTechBytes Windows 8 Development for Government, Healthcare...

Distracting Videos
From My Biased Coin

Distracting Videos

Jeff Erickson gets the blame for pointing out this amusing/disturbing video on counting.  I feel like I should make it a background video before my undergraduate...

One Best Supply Chain Metric
From The Eponymous Pickle

One Best Supply Chain Metric

In the Supply Chain Digest.  David Schneider suggests that the one best supply chain metric is Operating Cash flow, or OCF.    I admit I had to think about that...

<i>Rolling Stone</i> Magazine Writes About Computer Security
From Schneier on Security

Rolling Stone Magazine Writes About Computer Security

It's a virus that plays AC/DC, so it makes sense. Surreal, though. Another article.

“If Xerox PARC Invented the PC, Google Invented the Internet”
From The Computing Community Consortium Blog

“If Xerox PARC Invented the PC, Google Invented the Internet”

An interesting article on Wired.com today, featuring Google computer scientists Jeff Dean and Sanjay Ghemawat: Time and again, we hear the story of Xerox PARC,...

A New Way To Solve Linear Equations
From Gödel's Lost Letter and P=NP

A New Way To Solve Linear Equations

Impossible but true: a new approach to linear systems Prasad Raghavendra is an expert in many aspects of complexity theory, especially the foundations of approximation...

P&G Alumni Bookstore
From The Eponymous Pickle

P&G Alumni Bookstore

Received:If you haven't already found it, take a look at the P&G Alumni Bookstore. Books published by your fellow alumni. Just go to the Book Directory tab on the...

The Science Behind Curiosity
From The Computing Community Consortium Blog

The Science Behind Curiosity

There’s been a lot written about NASA’s Mars Science Laboratory this week, in light of its successful landing on the surface of Mars early Monday morning — including...

Entity Analytics
From The Eponymous Pickle

Entity Analytics

On entity analytics.  An explanatory video.    "... If you haven’t heard IBM Fellow Jeff Jonas talk about how the right algorithm can help you figure out who’s...

P&G Praises Facebook
From The Eponymous Pickle

P&G Praises Facebook

Marc Pritchard touts the use of Facebook in the Olympics  'Thank You Mom' campaign as a perfect storm ...  Good example of the use of integrated social media. ...

Benefits of Being a GHC Community Volunteer
From The Female Perspective of Computer Science

Benefits of Being a GHC Community Volunteer

This year's Grace Hopper Celebration of Women in Computing is drawing nearer and nearer, and our call for Community Volunteers has gone out! I was a volunteer each...

Detecting Spoofed GPS Signals
From Schneier on Security

Detecting Spoofed GPS Signals

This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals. Unfortunately, the countermeasures all seem to be patent pending...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account