acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Data Mining Techniques that Create Business Value
From The Eponymous Pickle

Data Mining Techniques that Create Business Value

Nice summary of common techniques.  For a good start, review your business and decide which of these discoveries would give the most value.  Their definition: ...

Where is the Internet Going?
From The Eponymous Pickle

Where is the Internet Going?

In the NYT:  So where is all this going?  Thoughtful piece including an interview with Vinton Cerf,  now with Google and DARPA, Internet Pioneer.  We worked with...

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)

This may well be of interest to people who like software engineering. A draft of "Software Engineering 2013: Curriculum Guidelines for Undergraduate Degreehttp...

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program
From Schneier on Security

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program

It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...

Choosing Your Regression Variables
From The Eponymous Pickle

Choosing Your Regression Variables

A nice simple topic that often comes up.  How exactly to you choose which variables to use when seeking to find a relationship using regression?  Such models are...

Simple Language for a Creative Culture
From The Eponymous Pickle

Simple Language for a Creative Culture

Three simple words:  "How Might we? "  Positive words for creativity.  Good, very simple thgought,   " ... Use Language to Shape a Creative Culture - Tom Kelley...

Quick links
From Geeking with Greg

Quick links

What caught my attention lately: Windows 8 has caused a big drop in PC sales to businesses, most of which has been picked up by Google Chromebooks (not by Apple)...

NSA Exploit of the Day: DEITYBOUNCE
From Schneier on Security

NSA Exploit of the Day: DEITYBOUNCE

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE: DEITYBOUNCE (TS//SI//REL) DEITYBOUNCE provides software application...

Life is sweeter than you think in 2014…
From Daniel Lemire's Blog

Life is sweeter than you think in 2014…

Jokingly, Rao pointed out that Americans are starting 2014 with an optimistic outlook: (…) it’s tough, but let’s just write off polar bears and groundwater pollution...

From Computational Complexity

Two cheers for the Pardon ot Turing. But not three.

As I am sure readers of this blog know Alan Turing was prosecuted for homosexuality in 1952, forced into hormone treatment, and committed suicide in 1954 (I had...

Virtual Reality Shopping
From The Eponymous Pickle

Virtual Reality Shopping

A long time experimental area in our enterprise.  Starting with Blackberry phone alerts, then on shelf displays, then cart mounted tablets. The insertion of online...

Adaptive Reasoning and Human Problem Solving
From The Eponymous Pickle

Adaptive Reasoning and Human Problem Solving

Brought to my attention.  Solicitation by IARPA still open.  Below the synopsis.  Agree strongly that this is a big topic.  Its about the data, AND finding new"...

Linking Wearables and Augmented Reality
From The Eponymous Pickle

Linking Wearables and Augmented Reality

The vendor Metaio is speaking and displaying at the upcoming Consumer Electronics show.  The link between wearables and AR is obvious.   Particularly interesting...

Using ethnography to build internet freedom tools for real people
From Putting People First

Using ethnography to build internet freedom tools for real people

In our new dystopian world of pervasive surveillance, most people are at a loss what to do. The tools that allows us to maintain a semblance of privacy are really...

EEG from an iPhone
From The Eponymous Pickle

EEG from an iPhone

Doing an electro encephalogram reading on your smartphone.   The number of mobile smartphone sensor applications is growing.   The picture shown in the article"...

[Book] Hooked
From Putting People First

[Book] Hooked

Hooked: A Guide to Building Habit-Forming Technology By Nir Eyal Publisher: CreateSpace Independent Publishing Platform Released: December 2013 Pages: 154 [Amazon...

Predictions on the Future of Databases
From The Eponymous Pickle

Predictions on the Future of Databases

In GigaOM: Very informative view:Michael Stonebraker has helped create a lot of database systems and has lots of thoughts about where the industry is headed. Oracle...

"Military Style" Raid on California Power Station
From Schneier on Security

"Military Style" Raid on California Power Station

I don't know what to think about this: Around 1:00 AM on April 16, at least one individual (possibly two) entered two different manholes at the PG&E Metcalf power...

Girls Who Code - Expanding in 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Girls Who Code - Expanding in 2014

Girls Who Code is a wonderful summer immersion program for girls interested in computing. In its first year, Girls Who Code worked with young women from New York...

[Book] Design for Behavior Change
From Putting People First

[Book] Design for Behavior Change

Designing for Behavior Change: Applying Psychology and Behavioral Economics By Stephen Wendel Publisher: O’Reilly Media Released: November 2013 Pages: 400 [Amazon...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account