acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Heartwave Biometric
From Schneier on Security

Heartwave Biometric

Here's a new biometric I know nothing about: The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...

Contract Compliance Solutions and  Blog
From The Eponymous Pickle

Contract Compliance Solutions and Blog

As part of my ongoing investigation of compliance solutions I spoke to Contract Guardian yesterday.  Very impressive implementation, especially in the health care...

On Evolution of Global Supply Chains
From The Eponymous Pickle

On Evolution of Global Supply Chains

Focusing on the Customer.    We were quite advanced in our enterprise, so there is nothing very new here.  But it is well stated.  " ... Ask anyone what the “next...

Computer Science Education Week is Next Week
From The Computing Community Consortium Blog

Computer Science Education Week is Next Week

Computer Science Education Week is an annual program designed to show students of all ages the importance of computer science.  It is observed each year, in recognition...

Multitasking Influencing the Brain
From The Eponymous Pickle

Multitasking Influencing the Brain

In Fast Company:  On multitasking.  Our shiny new devices allow us to do this creatively, all the time.  There has been debate about how ultimately this effects...

From Computational Complexity

Bitcoins Revisited

Two years ago I gave a lecture and posted about bitcoin. Of course what I didn't do was buy a bitcoin whose value back then was about $3 and today runs in the $1000...

The Problem with EULAs
From Schneier on Security

The Problem with EULAs

Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course. And to make it legal...

How Do You Know It Works?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How Do You Know It Works?

I have been teaching Visual Basic programming to my freshmen this week. It’s part of a course we call Explorations in Computer Science and its new this year. The...

Mckinsey Quarterly
From The Eponymous Pickle

Mckinsey Quarterly

Always interesting McKinsey quarterly,  PDF Here.  Reading now.For the past month, McKinsey’s clients have been reading McKinsey Quarterly 2013 Number 4, whichIn...

Former CIFellow Sitaram Asur Transitioned to a Career in Industrial Research
From The Computing Community Consortium Blog

Former CIFellow Sitaram Asur Transitioned to a Career in Industrial Research

This blog is a special contribution from Sitaram Asur, a Computing Innovation Fellow from 2009-2010.  When I graduated with my PhD from the Ohio State University...

Soft Biometrics
From The Eponymous Pickle

Soft Biometrics

If face recognition fails, consider behavior biometrics:  " ... The US government is challenging researchers to use cameras to ID people by unique features like...

Algorithmic Growth (Class Size)
From My Biased Coin

Algorithmic Growth (Class Size)

Pre-term planning numbers are in for Harvard, and it looks like the undergrad Algorithms and Data Structures class has about 175 people planning to take the course...

Google Retail Robot Army
From The Eponymous Pickle

Google Retail Robot Army

In Wired:    Not sure what this means, but Google is acquiring an army.   " ... The difference between Amazon’s drone stunt and Google’s retail robot skunkworks...

Looking at the Ink Blot Chart
From The Eponymous Pickle

Looking at the Ink Blot Chart

In  Junk Charts:  Have never heard this term before.  An example of the pretty chart, but with low density of actual information.  Just a stacked bar chart.  Nothing...

Why Innovation Programs Fail
From The Eponymous Pickle

Why Innovation Programs Fail

In Innovation Excellence:  The top reason,  and based on my experience, I agree:"A lack of a feedback loop from decision-makers to participants is the most common...

Ratio of Spend to Sales
From The Eponymous Pickle

Ratio of Spend to Sales

A relatively old story, brought to my attention by a recent startup involvement:" ... Booz & Company recently conducted the bi-annual refresh of its Customer Planning...

PCAST Releases Cybersecurity Report
From U.S. Public Policy Committee of the ACM

PCAST Releases Cybersecurity Report

Following its November meeting, the President’s Council of Advisers on Science and Technology (PCAST) released a letter report on cybersecurity.  The report follows...

If you are serious about climate change… stop attending conferences?
From Daniel Lemire's Blog

If you are serious about climate change… stop attending conferences?

We know that spending energy tends to release carbon in the atmosphere. In turn this warms up the Earth in the long run. This change might be detrimental. Being...

Evading Airport Security
From Schneier on Security

Evading Airport Security

The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff. It's not new, though. Peopleexplained...

TEALS (Technology Education and Literacy in Schools) Looking for Partner Schools
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

TEALS (Technology Education and Literacy in Schools) Looking for Partner Schools

TEALS is an interesting program started by a Microsoft employee some years ago. It taps the enthusiasm and expertise of industry professionals who work with classroom...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account