acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hill Tech Happenings Week of September 30
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings Week of September 30

Well, it would appear that some things are still happening during the shutdown. I would recommend, however, that you double check before visiting any of these meetings...

Predictive Analytics World
From The Eponymous Pickle

Predictive Analytics World

Some early takeaways from Predictive Analytics World.  Instructive comments that I could agree with in general.

Miriah Meyer, former Computing Innovation Fellow, named a 2013 PopTech Science Fellow
From The Computing Community Consortium Blog

Miriah Meyer, former Computing Innovation Fellow, named a 2013 PopTech Science Fellow

Miriah Meyer was a Computing Community Consortium (CCC) Computing Innovation Fellow (CIFellow) from 2009 – 2011 at Harvard University.  Upon completion of her Fellowship...

4D Printing Adapts
From The Eponymous Pickle

4D Printing Adapts

So what is 4D Printing?  Printing objects that can adapt to their environment.  In GigaOM.  " ... 3D printing promises to give us objects on demand. But 4D printing...

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
From Schneier on Security

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody

Two new stories based on the Snowden documents. This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...

Microsoft's Power BI for Office
From The Eponymous Pickle

Microsoft's Power BI for Office

It has been some time since I looked at any of Microsoft's Business Intelligence offerings.  As MS partners in the enterprise we did see some of their BI acquisitions...

Will Keccak = SHA-3?
From Schneier on Security

Will Keccak = SHA-3?

Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice. ...

Flipping The Computer Science Classroom
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Flipping The Computer Science Classroom

I’m a bit of a “flipped classroom” skeptic. Let’s just get that our of the way up front. But I want to get my thinking out there in hopes that people will educate...

The written word took over the world
From Daniel Lemire's Blog

The written word took over the world

Whereas human beings are geared genetically toward spoken languages, written languages are an acquired ability. In this sense, it is a high-level ability. For centuries...

WhoIs Privacy and Proxy Service Abuse
From Schneier on Security

WhoIs Privacy and Proxy Service Abuse

ICANN has a draft study that looks at abuse of the Whois database. This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...

Entrepreneurship and the Curriculum
From My Biased Coin

Entrepreneurship and the Curriculum

At the Andreessen Horowitz academic round table (see last post), the issue of how to promote student entrepreneurship through the curriculum arose.  The VCs athttp...

Apple and iBeacon Location
From The Eponymous Pickle

Apple and iBeacon Location

We examined location intelligence for a long time as it pertained to retail presence.   Notable now in the US are Apples current trials with Baseball.   " ... Baseball's...

Institute for Large Scale Innovation
From The Eponymous Pickle

Institute for Large Scale Innovation

The Institute for Large Scale Innovation, and its founder John Kao was recently brought to mind.  After  our introduction to their work quite a while ago.  ...

Are The Girls in Your Class Being Bullied?
From Computer Science Teachers Association

Are The Girls in Your Class Being Bullied?

Perhaps many of you have read the recent Letter to my daughter's high school programming teacher, a blog post from an impassioned journalist whose daughter was...

From Computational Complexity

Long Tails and Fat Heads

Sometimes words or phrases are used in MATH and then spread to the REAL WORLD. I have blogged about how the terms Prisoner's Dilemma has become a real-world-phrase...

Big Data Myths and Misconceptions
From The Eponymous Pickle

Big Data Myths and Misconceptions

I am in the midst of preparing an executive presentation about the use of analytics for companies in our region.    Our group consists of experienced practitioners...

Service Manual AR from Metaio and VW
From The Eponymous Pickle

Service Manual AR from Metaio and VW

What is growing as an application for Augmented Reality, the delivery of automobile service manuals for a concept car.   Here for technicians.  GigaOM discusses...

Notes from the Andreessen Horowitz Academic Round Table
From My Biased Coin

Notes from the Andreessen Horowitz Academic Round Table

I've spent the last couple of days attending the Andreessen Horowitz Academic Round Table.  

Simpson's Paradox
From The Eponymous Pickle

Simpson's Paradox

I recall this coming up on some testing we did, the danger of a lurking explanatory variables.  Is very easy to have conformation bias here.   A visual of description...

Interesting Links 30 September 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 30 September 2013

If you are a regular (or irregular) reader of my blog here I hope you will do me the honor of taking a few minutes to respond to a short survey I created last week...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account