acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

House Takes Another Crack at Updating NITRD
From U.S. Public Policy Committee of the ACM

House Takes Another Crack at Updating NITRD

Yesterday the House Science, Space and Technology Committee approved legislation updating the High Performance Computing Act of 1991. That law, among other things...

Thoughts on CS & STEM Higher-ed Enrollments
From Computer Science Teachers Association

Thoughts on CS & STEM Higher-ed Enrollments

I've recently come across two perspectives on undergraduate enrollments, one about STEM disciplines, one specifically about CS. Both warrant comment. First, there's...

Effective compression using frame-of-reference and delta coding
From Daniel Lemire's Blog

Effective compression using frame-of-reference and delta coding

Most generic compression techniques are based on variations on run-length encoding (RLE) and Lempel-Ziv compression. Compared to these techniques and on the right...

Looking at Text
From The Eponymous Pickle

Looking at Text

Bill Inmon takes a general, non technical look at the problem of dealing with textual data.  It remains a more difficult form of data to deal with. He introduces...

From Computational Complexity

The 17x17 problem SOLVED! (also 18x18)

THE 17x17 PROBLEM HAS BEEN SOLVED!!!!! On Nov 30, 2009 I posted here the following challenge: If someone emails me a 4-coloring of 17x17 with no monochromatic...

NIST to Fund Pilot Projects Advancing Trusted Identities
From The Computing Community Consortium Blog

NIST to Fund Pilot Projects Advancing Trusted Identities

The National Institute of Standards and Technology (NIST) announced last week a new competition to fund pilot projects that accelerate progress toward “improved...

Solving the Underlying Economic Problem of Internet Piracy
From Schneier on Security

Solving the Underlying Economic Problem of Internet Piracy

This essay is definitely thinking along the correct directions.

More on Hand Scanning at Fresh & Easy
From The Eponymous Pickle

More on Hand Scanning at Fresh & Easy

From the comments, Clive Black links to a more detailed article on the Fresh & Easy Scanning, including some pictures.  Based on the pictures shown, there were...

Hand Scanning at Fresh & Easy
From The Eponymous Pickle

Hand Scanning at Fresh & Easy

More on another test of shopper barcode hand scanning to improve the checkout process and provide targeted promotions.    Note this uses dedicated devices rather...

The New Science of Teaching and Learning
From The Female Perspective of Computer Science

The New Science of Teaching and Learning

What do you get when you mix psychology, education, and neuroscience? For Tracey Tokuhama-Espinosa, you get MBE (Mind, Brain, and Education) Science.  I recently...

Turning iPhones into Microscopes
From The Eponymous Pickle

Turning iPhones into Microscopes

In GigaOm.   Or at least displays for real microscopes.  Another example of sensors linked to mobile devices.  We will continue to see more of these.  Its adding...

Headline: Value Drives Loyalty
From The Eponymous Pickle

Headline: Value Drives Loyalty

In Mediapost: Surprise, consumer experience, especially 'delight' drives loyalty.  Nothing very new here, but the specifics of the categories and data are interesting...

NSF Releases Report on Cloud Computing
From The Computing Community Consortium Blog

NSF Releases Report on Cloud Computing

The National Science Foundation (NSF) yesterday released a report on its support for cloud computing, describing the outcomes of “investments in cloud computing...

Error Rates of Hand-Counted Voting Systems
From Schneier on Security

Error Rates of Hand-Counted Voting Systems

The error rate for hand-counted ballots is about two percent. All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...

Tools for Teaching Adults to Program
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Tools for Teaching Adults to Program

We seem to be developing tools to teach younger and younger people to program. Kodu in theory is for students 8 and older but I know that some 6 and 7 years olds...

How To Fight ACTA
From Wild WebMink

How To Fight ACTA

Now that the US bills SOPA and PIPA have been put on ice, attention has returned to their parent, an international treaty called ACTA. I’ve written extensively...

Argus Insights : Product Innovation
From The Eponymous Pickle

Argus Insights : Product Innovation

Brought to my attention by a client:  Argus Insights.  " ... Products that exceed user expectations win.  Very simply, delighted customers buy more.Companies that...

Real World Retail Analytics Using Kinect
From The Eponymous Pickle

Real World Retail Analytics Using Kinect

Just brought to my attention.  Shopperception:  "  ... The Kinect sensors allow us to bring new and exciting 3D spatial recognition tools to the market research...

The Failure of Two-Factor Authentication
From Schneier on Security

The Failure of Two-Factor Authentication

In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...

From Computational Complexity

Competition

A few people have asked me my opinions on Oded Goldreich's essay On Struggle and Competition in Scientific Fields. I read through Oded's essay I expected to highly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account