acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Tree Yarn-Bombed
From Schneier on Security

Friday Squid Blogging: Tree Yarn-Bombed

This tree in San Mateo, CA, has been turned into a giant blue squid. As usual, you can also use this squid post to talk about the security stories in the news...

Why Arts and Social Science Needs Code: Testimonials
From The Female Perspective of Computer Science

Why Arts and Social Science Needs Code: Testimonials

Part 2 of my "Why are we learning this?" guide for arts and social science students is a set of testimonials from people in the field that learned to code.  I'd...

Procter & Gamble and Unilever Honored
From The Eponymous Pickle

Procter & Gamble and Unilever Honored

In Mediapost:" ... Procter & Gamble and Unilever are in the top spots among marketers of consumer packaged goods, and Wal-Mart Stores and Target are the most effective...

Another Snowden Lesson: People Are the Weak Security Link
From Schneier on Security

Another Snowden Lesson: People Are the Weak Security Link

There's a story that Edward Snowden successfully socially engineered other NSA employees into giving him their passwords.

Creativity Challenges from IDEO
From The Eponymous Pickle

Creativity Challenges from IDEO

In the HBR:   From a group we used a number of times.   For more on that click on the IDEO tag below. We practiced by setting up context creating locations.  For...

Army Powerpoint vs Tableau
From The Eponymous Pickle

Army Powerpoint vs Tableau

When I first read this I thought this it gave the impression that Tableau and Powerpoint were competing for the same purpose.  I see them having the same operational...

Getting Ready for Big Data
From Computer Science Teachers Association

Getting Ready for Big Data

Whether you are or will be teaching Exploring Computer Science (ECS) or Computer Science Principles (CSP), the topic of data will begin to permeate your course....

CS Teachers–Please help evaluate HoC Tutorials
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Teachers–Please help evaluate HoC Tutorials

I'm passing this along for Code.org who I am helping organize tutorials for an Hour of Code during CS education week. We need help evaluating the tutorials we have...

Why the Government Should Help Leakers
From Schneier on Security

Why the Government Should Help Leakers

In the Information Age, it's easier than ever to steal and publish data. Corporations and governments have to adjust to their secrets being exposed, regularly. ...

Medical advice just a touch away with smartphone apps
From Putting People First

Medical advice just a touch away with smartphone apps

Devices once only in the hands of doctors, such as heart or blood pressure monitors, are now in the pockets of consumers, putting them in charge of their health...

‘Why newsrooms need anthropologists’
From Putting People First

‘Why newsrooms need anthropologists’

Journalism and anthropology both purport to observe and analyse human behaviour and experience, albeit in different ways and over extremely divergent timescales...

Hour of Code tutorials are ready to try
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Hour of Code tutorials are ready to try

Received this update email from Code.org last night. Looks like an Hour of Code for CS Education week is getting real! And of course it is getting close. Now though...

Mistakes Made in Machine Learning
From The Eponymous Pickle

Mistakes Made in Machine Learning

These are some of the best known examples of mistakes often made in machine learning i.e. predictive analytics projects.    Well stated, the examples are good,...

November Analytics Magazine: Text Analytics
From The Eponymous Pickle

November Analytics Magazine: Text Analytics

The Informs Outreach magazine this month has as its emphasis text analytics.  Always interesting, business solution oriented,  not heavily technical.  I read every...

Making Magic With Software
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Making Magic With Software

My friend and fellow teacher Tom Indelicato and I are teaching a new course this year. We are calling to Explorations in Computer Science and it is patterned somewhat...

Views from Our Top Shopper Scientist
From The Eponymous Pickle

Views from Our Top Shopper Scientist

 Colleague and correspondent Herb Sorensen writes about the shopper from the view of a scientist.  He helped us formulate some of the key concepts we used in the...

Machines Taking Over
From The Eponymous Pickle

Machines Taking Over

Are we making it too easy for machines to take over?  In ReadwriteWeb.  Do we see early symptoms when we listen for every smartphone ring?   I have been reading...

Who plays nice? Who plays rough?
From Daniel Lemire's Blog

Who plays nice? Who plays rough?

I have a confession to make. I am one of these people who can’t watch a TV show like Games of throne because there is too much evil. In fact, I generally cringe...

From Gödel's Lost Letter and P=NP

In Praise Of Chalk Talks

Chalking up a terrific talk on bit compression Winsor McCay was a cartoonist and animator in the early part of the twentieth century, and authored the comic strip...

From Computational Complexity

A Theorist Goes to SOSP

Monday I attended the 24th Symposium on Operating Systems Principles, the lead conference for computer systems research. Why would a nice theorist go to SOSP? Trying...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account