acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

On Secrecy
From Schneier on Security

On Secrecy

"When everything is classified, then nothing is classified." I should suppose that moral, political, and practical considerations would dictate that a very first...

My TEDx Talk
From Schneier on Security

My TEDx Talk

I spoke at TEDxCambridge last month on security and power. Here's the video.

Unilever New Product Development
From The Eponymous Pickle

Unilever New Product Development

" Unilever announces the launch of a research project with the University of Liverpool to develop the next generation of renewable chemicals from biomass to use...

CS Ed Week and an Hour of Code are coming
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Ed Week and an Hour of Code are coming

An announcement for Hadi Partovi, founder of code.org, about Computer Science Education Week (Dec. 9-15) and the Hour of Code initiative. To celebrate...

Waze and Google, Together
From The Eponymous Pickle

Waze and Google, Together

Was an early user of Waze, which did some very interesting things with social car travel.   Intriqued about how Google bought them for $1 Billion.  Now the US FTC...

Quick links
From Geeking with Greg

Quick links

What I found interesting lately: Xkcd on the halting problem: "Big picture .... all things must someday die" ([1]) "Your fingerprint isn't a secret; you leave...

Curious Voyager
From The Eponymous Pickle

Curious Voyager

My longtime colleague Walter Riker, has a long running blog Curious Voyager.  Follow him.  He does excellent training in the MS Office Space.   He also keeps up...

Random Forests for Classification
From The Eponymous Pickle

Random Forests for Classification

A technical discussion of using Random Forest Algorithms for large database classification problems.    Have not used this myself yet, but I am dealing with classification...

Hill Tech Happenings Week of September 30
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings Week of September 30

Well, it would appear that some things are still happening during the shutdown. I would recommend, however, that you double check before visiting any of these meetings...

Predictive Analytics World
From The Eponymous Pickle

Predictive Analytics World

Some early takeaways from Predictive Analytics World.  Instructive comments that I could agree with in general.

Miriah Meyer, former Computing Innovation Fellow, named a 2013 PopTech Science Fellow
From The Computing Community Consortium Blog

Miriah Meyer, former Computing Innovation Fellow, named a 2013 PopTech Science Fellow

Miriah Meyer was a Computing Community Consortium (CCC) Computing Innovation Fellow (CIFellow) from 2009 – 2011 at Harvard University.  Upon completion of her Fellowship...

4D Printing Adapts
From The Eponymous Pickle

4D Printing Adapts

So what is 4D Printing?  Printing objects that can adapt to their environment.  In GigaOM.  " ... 3D printing promises to give us objects on demand. But 4D printing...

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
From Schneier on Security

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody

Two new stories based on the Snowden documents. This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...

Microsoft's Power BI for Office
From The Eponymous Pickle

Microsoft's Power BI for Office

It has been some time since I looked at any of Microsoft's Business Intelligence offerings.  As MS partners in the enterprise we did see some of their BI acquisitions...

Will Keccak = SHA-3?
From Schneier on Security

Will Keccak = SHA-3?

Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice. ...

Flipping The Computer Science Classroom
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Flipping The Computer Science Classroom

I’m a bit of a “flipped classroom” skeptic. Let’s just get that our of the way up front. But I want to get my thinking out there in hopes that people will educate...

The written word took over the world
From Daniel Lemire's Blog

The written word took over the world

Whereas human beings are geared genetically toward spoken languages, written languages are an acquired ability. In this sense, it is a high-level ability. For centuries...

WhoIs Privacy and Proxy Service Abuse
From Schneier on Security

WhoIs Privacy and Proxy Service Abuse

ICANN has a draft study that looks at abuse of the Whois database. This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...

Entrepreneurship and the Curriculum
From My Biased Coin

Entrepreneurship and the Curriculum

At the Andreessen Horowitz academic round table (see last post), the issue of how to promote student entrepreneurship through the curriculum arose.  The VCs athttp...

Apple and iBeacon Location
From The Eponymous Pickle

Apple and iBeacon Location

We examined location intelligence for a long time as it pertained to retail presence.   Notable now in the US are Apples current trials with Baseball.   " ... Baseball's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account