acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security on the Internet of Things
From The Eponymous Pickle

Security on the Internet of Things

In the Cisco Blog:  (Which I have found to be very informative).   Remember the hacked refrigerator." ... The SANS Institute just completed a survey on the security...

NIGHTWATCH: NSA Exploit of the Day
From Schneier on Security

NIGHTWATCH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTWATCH (TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...

Google Adds Sources
From The Eponymous Pickle

Google Adds Sources

Google adds sources to search results, via its Knowledge Graph.   A suggestion in the piece suggests that a better solution would be a reliability score based on...

Accelerate Disruptive Innovation
From The Eponymous Pickle

Accelerate Disruptive Innovation

Innovating faster.  And focusing your innovation to value.   Part of that task  is to be able to evaluate innovations in context, as quickly and accurately as possible...

Google Glass for Firefighters
From The Eponymous Pickle

Google Glass for Firefighters

Several years ago I worked on a project meant to focus key data about operations to firefighters.   A kind of augmented reality for a highly dynamic task.  ...

From Computational Complexity

What will we wrought?

When I went to college in the early 80's, students protested against college endowments invested in companies that had business in apartheid South Africa. My mother...

Consumer Manipulation
From Schneier on Security

Consumer Manipulation

Tim Hartford talks about consumer manipulation: Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...

Role of Branding in the Product Life Cycle
From The Eponymous Pickle

Role of Branding in the Product Life Cycle

Examining the curious role of brand in the product life cycle By James Richardson, Ph.D. on January 22nd, 2014  A new report debunks the notion that brand defines...

Current Trends in Visualization
From The Eponymous Pickle

Current Trends in Visualization

In Computing Now:  A snapshot of current trends in visualization.  " ... For this issue of Computing Now, we gathered a set of articles that exemplifies current...

Want to win $1,000,000,000 (yes, that’s one billion dollars)?
From The Computing Community Consortium Blog

Want to win $1,000,000,000 (yes, that’s one billion dollars)?

All you have to do is create the PERFECT March Madness bracket.  If you manage to do so, Warren Buffett and Berkshire Hathaway will pay you $1,000,000,000, as reported...

NIGHTSTAND: NSA Exploit of the Day
From Schneier on Security

NIGHTSTAND: NSA Exploit of the Day

Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTSTAND (TS//SI//REL) An active 802.11 wireless exploitation and injection...

Refrigerator Sending Spam Messages?
From Schneier on Security

Refrigerator Sending Spam Messages?

Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...

Automobiles and Information Technology
From The Eponymous Pickle

Automobiles and Information Technology

In Knowledge@Wharton:   After the home and office, the automobile is the next place to deal with data and decision.  It will include many challenges ." ... TheIf...

Advanced Cyberinfrastructure Webinar on Solicitations
From The Computing Community Consortium Blog

Advanced Cyberinfrastructure Webinar on Solicitations

On Monday, January 27, 2014, the Division of Advanced Cyberinfrastructure (ACI) in the Computer and Information Science and Engineering (CISE) Directorate at the...

AcuPoll for Tracking Ideas and Decisions
From The Eponymous Pickle

AcuPoll for Tracking Ideas and Decisions

Spoke last week to Jeff Goldstein of AcuPoll.  We had used some of their in-conference technologies to understand how people decide.   The also do online polling...

From Gödel's Lost Letter and P=NP

Anti-Social Networks

Applications of social networks to arbitrary graphs Tim Roughgarden is a faculty member at Stanford, with interests in modern algorithms—my term. So his research...

Following Through
From The Eponymous Pickle

Following Through

I rarely read beginning of the year top ten or efficiency hints, but this is deserves a look.  I am in the midst of several decision processes that need people...

An Anatomist of Crimes, Decisions
From The Eponymous Pickle

An Anatomist of Crimes, Decisions

In the Penn Gazette. About an anatomist of crimes.  Could we do something similar when we look at decisions?  After Action Reviews are one approach we tested, but...

Questioning the Efficacy of NSA's Bulk-Collection Programs
From Schneier on Security

Questioning the Efficacy of NSA's Bulk-Collection Programs

Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...

Home Telepresence Robotics
From The Eponymous Pickle

Home Telepresence Robotics

In IEEE Spectrum.  I recall seeing these proposed for conferences, but never saw one in operation.  We examined something similar for warehouse inventory.  Appears...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account