acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Estimating the Probability of Another 9/11
From Schneier on Security

Estimating the Probability of Another 9/11

This statistical research says once per decade: Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...

From Computational Complexity

Max Flow

A couple of weeks ago Suresh tweeted the following result of James Orlin Max flows in O(nm) time or better. jorlin.scripts.mit.edu/Max_flows_in_O… — Suresh Venkat...

Will tablets replace PCs?
From Geeking with Greg

Will tablets replace PCs?

I just bet Professor Daniel Lemire $100 that they won't. At least, any time soon. The specific terms of the bet are, "In some quarter of 2015, the unit salesWho...

“Socially Mediated Publicness”: an open-access issue of JOBEM
From Apophenia

“Socially Mediated Publicness”: an open-access issue of JOBEM

I love being a scholar, but one thing that really depresses me about research is that so much of what scholars produce is rendered inaccessible to so many people...

Winning the Show Rooming War
From The Eponymous Pickle

Winning the Show Rooming War

Good post on the growing behavior of shoppers using the retail environment to see and touch products, but then buying them elsewhere or online.   Good examplesGino...

Future Intelligence with Recorded Future
From The Eponymous Pickle

Future Intelligence with Recorded Future

An excellent case study of the use of Recorded Future for understanding the recent Middle East unrest and embassy attacks.    A use of semantic analysis of multiple...

Launching a New Feature: Show Us Your “Research in Motion”!
From The Computing Community Consortium Blog

Launching a New Feature: Show Us Your “Research in Motion”!

Every week for the last several years, the Computing Community Consortium (CCC) has showcased an interesting computing (or related) research project as a “Highlight...

A Look at Educational Technology
From The Eponymous Pickle

A Look at Educational Technology

An opinionated view.  " ... Education is in some respects one of the most stagnant of all major industries. A farmer from 150 years ago would not comprehend a modern...

Steganography in the Wild
From Schneier on Security

Steganography in the Wild

Steganographic information is embedded in World of Warcraft screen shots.

To App Or Not To App
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

To App Or Not To App

I was at the industry advisory board meeting for one of the career/vocational schools I am involved with earlier this week and the topic of apps came up. Apps for...

Designing API's for Mobile Performance Best Practice
From The Eponymous Pickle

Designing API's for Mobile Performance Best Practice

In CACM by Kate MatsudairaWhile there are lots of informative articles on mobile performance, and just as many on general API design, you’ll find few discussing...

Risk Bias
From The Eponymous Pickle

Risk Bias

In Mckinsey Quarterly:   Overcoming a bias against risk.  " .... Risk-averse midlevel managers making routine investment decisions can shift an entire company’s...

From Gödel's Lost Letter and P=NP

The ABC Conjecture And Cryptography

A missed point in the history of cryptography Shinichi Mochizuki recently released a series of four papers (I, II, III, IV) totaling 512 pages that claim to contain...

Brands Pushing to Shoppers
From The Eponymous Pickle

Brands Pushing to Shoppers

Brands increasing push notification to mobile shoppers on the move.  In BrandWeek.  " .... The notifications can be triggered by contextual factors such as location...

Ditching Powerpoint Bullets for Pictures
From The Eponymous Pickle

Ditching Powerpoint Bullets for Pictures

Picture superiority, which means using very few written words in presentations, is evoked in Forbes.  Made me think of an important proposal I was part of crafting...

By the Numbers
From My Biased Coin

By the Numbers

Pretty much matching my predictions....My graduate course has 50 enrolled right now, fairly close to 50-50 between undergrads and grads.Salil's introductory complexity...

Stopping Terrorism
From Schneier on Security

Stopping Terrorism

Nice essay on the futility of trying to prevent another 9/11: "Never again." It is as simplistic as it is absurd. It is as vague as it is damaging. No two words...

Fast integer compression: decoding billions of integers per second
From Daniel Lemire's Blog

Fast integer compression: decoding billions of integers per second

Databases and search engines often store arrays of integers. In search engines, we have inverted indexes that map a query term to a list of document identifiers...

New National Robotics Initiative Solicitation Issued
From The Computing Community Consortium Blog

New National Robotics Initiative Solicitation Issued

The National Science Foundation (NSF), together with the National Institutes of Health (NIH), NASA, and U.S. Department of Agriculture (USDA), yesterday issued...

Mobile as a Bridge to In-Store
From The Eponymous Pickle

Mobile as a Bridge to In-Store

In AdAge:    Writing about a recent Google study.  Obvious at one level, but also an increasingly important concept as mobile becomes our ever available information...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account