acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Predicting Product Success
From The Eponymous Pickle

Predicting Product Success

Predicting Product Launch success.  We worked on this using a number of simulation based methods.  Interesting case study here:   " ... Back in May, Kaggle ran...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

A T-shirt with a drawing of a squid reading. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

IRATEMONK: NSA Exploit of the Day
From Schneier on Security

IRATEMONK: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: IRATEMONK (TS//SI//REL) IRATEMONK provides software application persistence...

Reinventing Explanation
From Michael Nielsen

Reinventing Explanation

My new essay on the use of digital media to explain scientific ideas is here.

Computer Science Has An Identity Problem
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Has An Identity Problem

Where does computer science fit? At the university level I’ve seen it in Business departments/Schools of Business. I’ve seen it in various science schools – Schools...

What's Watson for Midsize Companies?
From The Eponymous Pickle

What's Watson for Midsize Companies?

Back on January 9th I attended the IBM announcement of its group for Watson applications.  I tweeted the announcement at @FranzD #IBMWatson.  Full announcement....

Attributing Attacks on the Internet of Things
From The Eponymous Pickle

Attributing Attacks on the Internet of Things

A discussion of the implication of security on the Internet of Things.  If everything is connected, the path to us or our households brings insecurity yet closer...

Connecting Cloud and Business
From The Eponymous Pickle

Connecting Cloud and Business

Connecting the cloud and big data for business.  A piece from Pneuron, which I am looking into.   I was struck by this statement: " ... Data is more volatile than...

Systems to Prevent Deception Fail
From The Eponymous Pickle

Systems to Prevent Deception Fail

A discussion of systems that are meant to prevent deception and unethical behavior.  In Knowledge@Wharton.  A topic in any system that is meant to gather human"...

Another Credit-Card-as-Authentication Hack
From Schneier on Security

Another Credit-Card-as-Authentication Hack

This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...

The Facebook ethnography kerfuffle
From Putting People First

The Facebook ethnography kerfuffle

At the center of this kerfuffle is an anthropologist, Daniel Miller, his ethnographic research with teenagers in a small town in the UK, and a press report on a...

HOWLERMONKEY: NSA Exploit of the Day
From Schneier on Security

HOWLERMONKEY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: HOWLERMONKEY (TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...

From Gödel's Lost Letter and P=NP

Global Warming?

It snowed in Atlanta, and we are closed, for the foreseeable future—where is global warming? Atlanta is frozen. Here is what we looked like the other night. Today...

Meaning of Quality Assurance
From The Eponymous Pickle

Meaning of Quality Assurance

This CW article led me to the meaning of QA ... " ... Long undervalued, quality assurance is in the limelight -- and QA pros in demand -- following the disaster...

Motivation via a Connected Cosumer
From The Eponymous Pickle

Motivation via a Connected Cosumer

Quite obvious, people are always looking at the motivation of recommendations.  Can we now get at the motivation more clearly?  (In Supermarket News, requires registration...

Side-Channel Attacks on Frog Calls
From Schneier on Security

Side-Channel Attacks on Frog Calls

The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...

Social Media in the Enterprise
From The Eponymous Pickle

Social Media in the Enterprise

Charlene Li speaks on the topic, relating to a recent study: " .... Overall, we found that investment in headcount and infrastructure have steadily grown, as companies...

To be smarter, try being crazier?
From Daniel Lemire's Blog

To be smarter, try being crazier?

Many of us want to be original in our work. For researchers, it is a job requirement. For software programmers, it makes little sense to redo what others did. Many...

Catalog of Snowden Revelations
From Schneier on Security

Catalog of Snowden Revelations

This looks to be very good. Add that to these three indexes of NSA source material, and these two summaries. This excellent parody website has a good collection...

More on DeepMind and Google
From The Eponymous Pickle

More on DeepMind and Google

In Recode:  Google continues to add AI gems to its capabilities.   Search is a part of learning, and thus enhanced by AI.   We search by pattern visually, as well...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account