acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Knowledge Management is Broken
From The Eponymous Pickle

Knowledge Management is Broken

Unfortunately in an information minimizing slide show, but the topic is important.  " ... Five Reasons Knowledge Management is Broken ...  Knowledge management...

Perfect Data and Perfect Predictions
From The Eponymous Pickle

Perfect Data and Perfect Predictions

An obvious conclusion: you never get perfect answers.  Analytics depends upon the correctness if the data in context, AND the power of the model being used.  ...

On the Internet of Cars
From The Eponymous Pickle

On the Internet of Cars

We will see the internet of automobiles before we see the Internet of things.  An overview in ReadwriteWeb.  The future of transportation will take us to the net...

Tor User Identified by FBI
From Schneier on Security

Tor User Identified by FBI

Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...

Smartphone Penetration
From The Eponymous Pickle

Smartphone Penetration

The global smartphone penetration continues to increase.  Up to 60% by 2019 says this report.  

Use Cases for iBeacon and Estimote
From The Eponymous Pickle

Use Cases for iBeacon and Estimote

In Wired:  I continue my look at the use of in store location and communication.  Something we thought a lot about in the innovation lab, but never had the technology...

NIH announces funding opportunities for the BRAIN Initiative
From The Computing Community Consortium Blog

NIH announces funding opportunities for the BRAIN Initiative

On April 2, 2013, President Obama launched the Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative to revolutionize our understanding...

Financial Uses for Quantum Computing
From The Eponymous Pickle

Financial Uses for Quantum Computing

We were asked early on:  What is the value for quantum computing?  Here a look in particular at the financial industry.  With mention of our contact in quantum"...

On the Evolution of ETL
From The Eponymous Pickle

On the Evolution of ETL

In Information Management:  Extract, Transfer and Load (ETL) is a key process  for the use of information to make it ready for analytics.  It's changing to make...

Code Red: Where are the Women in Computing?
From Computer Science Teachers Association

Code Red: Where are the Women in Computing?

Editor's Note: This blog piece from our partners at Change the Equation details their recent report on the continued underrepresentation of women in computing, ...

Videos online of the Service Design Global Conference
From Putting People First

Videos online of the Service Design Global Conference

Nearly all videos of the recent Service Design Global Conference in Cardiff, Wales (19-20 November 2013) are now online: DAY 1 Making Data Useful The Service Design...

The day I subscribed to a dozen porn sites…
From Daniel Lemire's Blog

The day I subscribed to a dozen porn sites…

This morning, I noticed some odd charges on my Royal Bank VISA card. They were attributed to sites such as videosupport1.com, bngvsupport.com, paysupport1.com,...

MOOCs For Teacher Training–Not a Fan
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

MOOCs For Teacher Training–Not a Fan

Mark Guzdial shared some news about Google’s CS4HS program on Facebook today. Google's program to fund high school teacher professional development in CS willhttps...

Big Data: Risks and Implications
From The Eponymous Pickle

Big Data: Risks and Implications

Review of:   Big Data: A Revolution That Will Transform How We Live, Work, and Think by Viktor Mayer-Schonberger, and Kenneth Cukier.   Strongly recommended, for...

Dan Hill: Can public enterprises adopt the popular dynamics of private enterprises?
From Putting People First

Dan Hill: Can public enterprises adopt the popular dynamics of private enterprises?

In his latest Dezeen column, Dan Hill examines what services like the Uber taxi app mean for cities and asks whether the designers of public services can learn...

Security Vulnerabilities of Legacy Code
From Schneier on Security

Security Vulnerabilities of Legacy Code

An interesting research paper documents a "honeymoon effect" when it comes to software and vulnerabilities: attackers are more likely to find vulnerabilities in...

American-centric UI is leveling tech culture — and design diversity
From Putting People First

American-centric UI is leveling tech culture — and design diversity

An article with a title like this cannot but intrigue me (being a non-American leading a non-USA company) – and even more so after I found out that it was written...

Age of Outsourcing
From The Eponymous Pickle

Age of Outsourcing

In CIOInsight:   Good piece on the topic, which I have not covered in a while.  Good approach, done well.   " ... The biggest business driver of outsourcing has...

CCC Council Member Mark Hill to Deliver Distinguished Lecture at NSF
From The Computing Community Consortium Blog

CCC Council Member Mark Hill to Deliver Distinguished Lecture at NSF

On Wednesday, December 18, 2013 at 10 am EST, Computing Community Consortium (CCC) Council Member Mark Hill will be delivering a Distinguished Lecture at the National...

Self Study Machine Learning
From The Eponymous Pickle

Self Study Machine Learning

An interesting guide to self-study machine learning.   This introduced me to a number of resources I had not heard of.    Good to browse.  I still think that there...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account