acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Shaping the Future of Manufacturing
From The Eponymous Pickle

Shaping the Future of Manufacturing

In McKinsey:  Some interesting views on manufacturing. " ...  A Video: Shaping the future of manufacturing  ... Advances in technology are allowing companies to...

Duke Coursera Course on Data Analysis
From The Eponymous Pickle

Duke Coursera Course on Data Analysis

Pointed out to me, this course on data analytics, from Duke, which includes a free PDF text.  Examining.  " ... Data Analysis and Statistical Inference.  Part of...

Hidden Markov and More
From The Eponymous Pickle

Hidden Markov and More

A non technical description of a very technical set of methods for forecasting. Baum-Welch and Hidden Markov.  Don't know much about this direction but looks to...

$30 Billion Market for Wearable Computing Devices Projected by 2018
From The Computing Community Consortium Blog

$30 Billion Market for Wearable Computing Devices Projected by 2018

Computing is at the heart of one up-and-coming cultural trend – wearable technology. This emerging market is enabled by advances in computing, and it’s positioned...

From Gödel's Lost Letter and P=NP

Practically P=NP?

Solving is believing Cropped from source. Boris Konev and Alexei Lisitsa are both researchers at the University of Liverpool, who work in Logic and Computation....

Probabilities in computing: they may not mean what you think they mean
From Daniel Lemire's Blog

Probabilities in computing: they may not mean what you think they mean

I like to throw off my academic colleagues outside of computer science by pointing out that much of our software relies on probabilities… down to the ubiquitous...

OSI, FSF and the end of software patents
From Wild WebMink

OSI, FSF and the end of software patents

Just as we did in the case of CPTN’s threatened acquisition of Novell’s patent portfolio in 2011, the OSI and FSF have once again collaborated to file a briefing...

Decoding the Voynich Manuscript
From Schneier on Security

Decoding the Voynich Manuscript

The Voynich Manuscript has been partially decoded. This seems not to be a hoax. And the manuscript seems not to be a hoax, either. Here's the paper.

P&G, Target and the Future of Retailing
From The Eponymous Pickle

P&G, Target and the Future of Retailing

In Retailwire:  Another indication of how the world of retail is changing.  And in particular the relationship between manufacturers and retailers.  Do also read...

Wikipedia Editing Bots
From The Eponymous Pickle

Wikipedia Editing Bots

Editing Bots: Did not realize that so much WP editing was done with bots.  Implications and dangers are still unclear. How does it influence confidence in the knowledge...

Cross Targeting Multiple Devices
From The Eponymous Pickle

Cross Targeting Multiple Devices

In CLickZ:  What it is and why the hype?   Most of us today use multiple devices.  " ... Cross-device targeting, the ability to serve targeted advertising to consumers...

GENESIS: NSA Exploit of the Day
From Schneier on Security

GENESIS: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GENESIS (S//SI//REL) Commercial GSM handset that has been modified to include...

A Look at R Histograms
From The Eponymous Pickle

A Look at R Histograms

A look at the humble histogram. In Flowingdata. There would not seem to be much to say about this, but the details are interesting.  Comparing them to the similar...

Swallowing Microchips for ID
From The Eponymous Pickle

Swallowing Microchips for ID

Another sensor development.    In this case for identification.  But also for reading the brain?   Overstatement I think.  " ... “This pill has a small chip inside...

From Computational Complexity

Why Become a Professor

Someone took me to task because in November I posted that the CRA News had 50 pages of job ads but didn't note that very few of those ads specifically were searching...

Input To UK Government
From Wild WebMink

Input To UK Government

My input to the UK Government consultation on document formats: I believe it is imperative to have a single document format standard used as the benchmark for corresponding...

Was the iOS SSL Flaw Deliberate?
From Schneier on Security

Was the iOS SSL Flaw Deliberate?

Last October, I speculated on the best ways to go about designing and implementing a software backdoor. I suggested three characteristics of a good backdoor: low...

Surveillance Impact Not Just Personal
From Wild WebMink

Surveillance Impact Not Just Personal

Originally posted on Meshed Insights & Knowledge:In her post on ComputerWorld, Alexandra makes the excellent observation that the impact of surveillance is not...

It’s OK To Make Mistakes
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

It’s OK To Make Mistakes

Me to a student the other day“Several other people made the same mistake. That is why I was able to spot it so quickly.” Invariably that statement gets a look of...

Facebook’s Global Telco Dream
From Wild WebMink

Facebook’s Global Telco Dream

Originally posted on Meshed Insights & Knowledge:Maybe there’s more to the Facebook acquisition of WhatsApp than just the centralised consolidation of users and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account