acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How Big Brother’s going to peek into your connected home
From Putting People First

How Big Brother’s going to peek into your connected home

The tech industry easily convinced the public to accept a myriad of free services for the price of some loss of privacy. But getting them to embrace the smart home...

DARPA Open Catalog of Resources
From The Eponymous Pickle

DARPA Open Catalog of Resources

Brought to my attention, the DARPA open catalog, which links to available computational, analytical and visualization resources.  Note mention of XDATA and Big"...

Grocery and Twitter
From The Eponymous Pickle

Grocery and Twitter

Orlando Publix using Twitter.  Good example of simple social media use in physical retail.  " .... A year ago this month, Publix realized its customers were already...

The Visual Organization
From The Eponymous Pickle

The Visual Organization

Forthcoming book brought to my attention, an idea we have frequently supported here.   For example, see the following post. Look forward to a deeper examination...

Get to the Point and the Focus
From The Eponymous Pickle

Get to the Point and the Focus

A long time enterprise goal was to facilitate focus to tasks.  Projects like P&G's Business Sphere, starting with earlier work in executive information systems,...

From Gödel's Lost Letter and P=NP

Black Versus White Boxes

What is better than how (?) History of filters source. Wilhelm Cauer was a German mathematician and engineer who worked in Göttingen and the US between the two...

You’re invited!
From CERIAS Blog

You’re invited!

Four days -- two major events! The 15th Annual CERIAS Security Symposium Purdue University, March 26-27, 2014 We're living in a time of transition. Cyberthreats...

You’re invited!
From CERIAS Blog

You’re invited!

Four days -- two major events! The 15th Annual CERIAS Security Symposium Purdue University, March 26-27, 2014 We're living in a time of transition. Cyberthreats...

You’re invited!
From CERIAS Blog

You’re invited!

Four days -- two major events! The 15th Annual CERIAS Security Symposium Purdue University, March 26-27, 2014 We're living in a time of transition. Cyberthreats...

You’re invited!
From CERIAS Blog

You’re invited!

Four days -- two major events! The 15th Annual CERIAS Security Symposium Purdue University, March 26-27, 2014 We're living in a time of transition. Cyberthreats...

IrezQ America Smartphone Sensors for Travel Safety
From The Eponymous Pickle

IrezQ America Smartphone Sensors for Travel Safety

I see that my correspondent Art Caisse was the founder of and is now the executive chairman of IrezQ-America.  The smartphone app automatically contacts emergency...

Expanding Paths to Online Grocery
From The Eponymous Pickle

Expanding Paths to Online Grocery

Online grocers. An area we watched closely.  It worked then, but selectively.   Has the corner turned? Article contains some good current examples." ... As online...

Rise of Wikidata
From The Eponymous Pickle

Rise of Wikidata

In Computing Now.  Introduced to the idea a year ago.  Worth a further look.  Using Wikipedia data for a centralized source of structured public data makes much...

Real and Virtual Worlds and the Proteus Effect
From The Eponymous Pickle

Real and Virtual Worlds and the Proteus Effect

I covered virtual worlds extensively in this blog in the past.  In particular how they could be used to simulate real work interactions.  See previous posts onon...

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California
From Schneier on Security

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California

Uh oh. And the real story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Self Destructive Electronics
From The Eponymous Pickle

Self Destructive Electronics

IBM win a contract to research the topic.     I recall this idea being discussed before the need became more critical.  " ... The military wants to use self-destructing...

TRINITY: NSA Exploit of the Day
From Schneier on Security

TRINITY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TRINITY (TS//SI//REL) TRINITY is a miniaturized digital core packaged in a...

Another Fake NSA Codename Generator
From Schneier on Security

Another Fake NSA Codename Generator

Generate your own fake TAO implant. This is even more fun than the fake NSA program generator. Sadly, the NSA will probably use these to help develop their R&D...

Natural Language Processing in the Enterprise
From The Eponymous Pickle

Natural Language Processing in the Enterprise

We worked with Stanford on a number of natural language processing oriented problems, including the Talking Mr. Clean effort.    I note that a number of the spin...

Discomfort as Innovation
From The Eponymous Pickle

Discomfort as Innovation

In Innovation Excellence:   I don't see it as the key to innovation.  Yet it is not by itself a bad sign. Some discomfort is always a sign that any change has been...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account