acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Facebook Teaching Machines to Learn
From The Eponymous Pickle

Facebook Teaching Machines to Learn

In Wired: It is interesting how companies are deciding to play in the machine learning Artificial Intelligence space.   On cursory examination Facebook seems to...

A Nine Minute Revolution
From Computer Science Teachers Association

A Nine Minute Revolution

Last year I showed my programming students the nine minute version of the video Code.org created and we talked about what they thought and if anything surprised...

Twitter Recommendations for CS Educators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Twitter Recommendations for CS Educators

Some time ago I wrote a post on top CS education people to follow on Twitter. It was very objective as I took the people on my CS Educator Twitter list and ranked...

New Mobile Apps from Linkedin
From The Eponymous Pickle

New Mobile Apps from Linkedin

Linkedin has done some creative things that leverage their considerable database.  Here are some new Apps.  Back to credibility again.   And emphasizing mobile. ...

Butterflies for IT Management
From The Eponymous Pickle

Butterflies for IT Management

Another old idea come around again.  Can you use it for IT management?  Perhaps in a theoretical sense, but I am skeptical about its predictive power.  " .....

We need more than spam filters: we need bona fide assistants!
From Daniel Lemire's Blog

We need more than spam filters: we need bona fide assistants!

I don’t know how other professionals behave, but if you email a researcher at 11pm or even 2am, there is a good chance he will get back to you within two minutes...

Book Review: <i>Cyber War Will Not Take Place</i>
From Schneier on Security

Book Review: Cyber War Will Not Take Place

Thomas Rid, Cyber War Will Not Take Place, Oxford University Press, 2013. Cyber war is possibly the most dangerous buzzword of the Internet era. The fear-inducing...

Cognitive Biases About Violence as a Negotiating Tactic
From Schneier on Security

Cognitive Biases About Violence as a Negotiating Tactic

Interesting paper: Max Abrahms, "The Credibility Paradox: Violence as a Double-Edged Sword in International Politics," International Studies Quarterly, 2013: ...

Sustainable living and behavioral change
From Putting People First

Sustainable living and behavioral change

Below a selection of pieces from The Guardian’s sustainable living hub: The power of behavioural design: looking beyond nudging Christoph Burmester – 10 September...

Big Data Explored and Vindicated
From The Eponymous Pickle

Big Data Explored and Vindicated

Review of:   Big Data: A Revolution That Will Transform How We Live, Work, and Think by Viktor Mayer-Schonberger, and Kenneth Cukier.   Strongly recommended, for...

Windows 8.1 Installed by an Expert
From The Eponymous Pickle

Windows 8.1 Installed by an Expert

My long time colleague Walter Riker waxes technical about his installation of Windows 8.1  He is also an expert on Office 365 (He teaches it for companies).  and...

From Gödel's Lost Letter and P=NP

A Request That We Passed On

Peto de la Simons Instituto Alistair Sinclair is a “British computer scientist and computational theorist”—to quote our friends at Wikipedia. I know him more as...

University of Arkansas RFID Center
From The Eponymous Pickle

University of Arkansas RFID Center

From the RFID Journal:  A now dated piece, but reminded me of work we did with RFID  technology and the University of Arkansas back in 2003.  And another excellent...

More Competition for Google Glass
From The Eponymous Pickle

More Competition for Google Glass

In Ars Technica:  Which reports that there are now eleven companies selling Glass-like computing headgear.  Samsung has also joined in.  Interesting array of competition...

More Wearables
From The Eponymous Pickle

More Wearables

In the Cisco Blog:  More on wearable computing.   Is Glass only an entry point?  And how personalized will computing technology get?  We have smartphones so close...

Mitzenmacher Drinking Game?
From My Biased Coin

Mitzenmacher Drinking Game?

I've been visiting the Simons Institute for one of their workshops the last few days.  I got my advisor Alistair Sinclair to give me a tour.  I have to say, that's...

New Awards Made by Multiple Agencies for the National Robotics Initiative
From The Computing Community Consortium Blog

New Awards Made by Multiple Agencies for the National Robotics Initiative

In 2011, President Obama announced the National Robotics Initiative (NRI) as part of the broader effort of the Advanced Manufacturing Partnership Initiative in...

From Computational Complexity

Science and Humanities

David Hollinger, a historian, wrote a recent Chronicle Review article The Wedge Driving Academe's Two Families Apart: Can STEM and the human sciences get along?...

Sifting Data Visually for Connections
From The Eponymous Pickle

Sifting Data Visually for Connections

Another example of the use of using visualization to determine non obvious connections: " ... Hypergraph, which is now part of Recommind’s Axcelerate On-Demand...

DARPA Contest for Fully-Automated Network Defense
From Schneier on Security

DARPA Contest for Fully-Automated Network Defense

DARPA is looking for a fully-automated network defense system: What if computers had a "check engine" light that could indicate new, novel security problems? What...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account