acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Risk-Based Authentication
From Schneier on Security

Risk-Based Authentication

I like this idea of giving each individual login attempt a risk score, based on the characteristics of the attempt: The risk score estimates the risk associated...

Big Data and Social Science
From The Eponymous Pickle

Big Data and Social Science

A number of interesting items in the Edge about the implications of new models, and most notable to me the implications of Big Data, for social science.   Social...

Wix as Easy Internet Presence
From The Eponymous Pickle

Wix as Easy Internet Presence

After mentioning the startup Waze, recently acquired by Google, I was sent a note to take a look at the startup Wix.  I was intrigued by their description of it...

Technology and Dementia
From The Eponymous Pickle

Technology and Dementia

Technology solutions for dementia care.  Here from the CACM.  An extensive view of technology current and future uses, and the barriers involved.   I am peripherally...

SIGCSE 2014 a Great Opportunity for Professional Development
From Computer Science Teachers Association

SIGCSE 2014 a Great Opportunity for Professional Development

I just got back from Atlanta where, while wearing one of my other hats, I helped to put together the program for the SIGCSE conference to be held March 5-8...

Deception in Fruit Flies
From Schneier on Security

Deception in Fruit Flies

The wings of the Goniurellia tridens fruit fly have images of an ant on them, to deceive predators: "When threatened, the fly flashes its wings to give the appearance...

Experientia taking on the Nordic Built Challenge, Finland
From Putting People First

Experientia taking on the Nordic Built Challenge, Finland

Experientia team in final four, with community-minded concept “The fundamental idea of the entry – the ENGAGE community noticeboard concept – is worth special mention...

Future of Cloud Computing
From The Eponymous Pickle

Future of Cloud Computing

Recorded Future looks at the future of cloud computing.  " ... As businesses continue to modernize, technological innovation accelerates. Cloud computing is a relatively...

Convincing People Mobile Shopping is Safe
From The Eponymous Pickle

Convincing People Mobile Shopping is Safe

In Baseline Mag: Intrigued by the element of persuasion here.  Not an argument about safety itself.

Elliptic Curve Crypto Primer
From Schneier on Security

Elliptic Curve Crypto Primer

This is well-written and very good.

Smartwatch for Corporate Productivity
From The Eponymous Pickle

Smartwatch for Corporate Productivity

Looking at the smartwatch format as improving corporate productivity.  Seems a stretch beyond the mild improvement in convenience in carrying the things around....

Google Helpouts
From The Eponymous Pickle

Google Helpouts

Google now offers a method to seek and potentially sell online assistance via video, called Helpouts.    Google takes a flat 20 percent transaction fee.  More...

Numbers from the History of the World
From The Eponymous Pickle

Numbers from the History of the World

In Tableau Public Gallery.  Nicely done visualization of a large selection of key numbers over history. " ...  Julia Gusman with this viz reminds us the work of...

Certified Analytics Professional
From The Eponymous Pickle

Certified Analytics Professional

Become a Certified Analytics Professional, a service provided by Informs.  Not sure how widely this is accepted by companies.  Checking into it further.  "Next...

Personal URL on Google+
From Wild WebMink

Personal URL on Google+

I’m pleased that Google+ now offers personalised profile URLs – mine is https://plus.google.com/u/0/+SimonPhipps/ All I need now is for them to allow me to have...

Telling Your Story with Twitter
From The Eponymous Pickle

Telling Your Story with Twitter

An approach to tell your life story via only your Twitter stream.  Course that means you have to be using twitter all the time.   Have seen similar approaches with...

Finding Big Data
From The Eponymous Pickle

Finding Big Data

Several recent projects have involved public big data, so have become used to the thought of seeking out such data and mashing it up with internal data.  Geographic...

From Computational Complexity

My Pope Number is 2: The Smaller World Hypothesis

I proofread Piergiogrio Odilfreddi's book (which is on Lance's List of Favorite Complexity Books) for which I got a generous acknowledgment. I have also visited...

The Story of the Bomb Squad at the Boston Marathon
From Schneier on Security

The Story of the Bomb Squad at the Boston Marathon

This is interesting reading, but I'm left wanting more. What are the lessons here? How can we do this better next time? Clearly we won't be able to anticipate...

CSTA Voice November 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Voice November 2013

If you are a member of the CSTA you should have gotten this update in email. If you didn’t you may want to make sure that CSTA has your email address right. Ifmore...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account