acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tracking Things
From The Eponymous Pickle

Tracking Things

Received several offers about the Tile App.  A little tag you can put on things and then track and locate with your smart phone.   About $20 each.  Available by...

Sensors as Teenagers
From The Eponymous Pickle

Sensors as Teenagers

In the Cisco Blog:  An excellent piece by Bill Franks of Teradata.  About the Internet of the things and how it will operate, and about the information it will ...

Yochai Benkler on the NSA
From Schneier on Security

Yochai Benkler on the NSA

Excellent essay: We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...

Monitoring the Future of Cloud Computing
From The Eponymous Pickle

Monitoring the Future of Cloud Computing

Recorded Future uses their novel Web semantic analysis methods to look at the future of Cloud computing.  Visually answering questions like: " ... As businesses...

From Gödel's Lost Letter and P=NP

Littlewood’s Law

Why it may take a ‘miracle’ to catch some cheaters source, where he’s right after Charles Dickens John Littlewood really existed. He appeared as second author on...

Nestle Uses Photo App
From The Eponymous Pickle

Nestle Uses Photo App

In Mobile Marketer: A cute use of photo-taking in a smartphone to build brands.  A simple but a potentially useful idea.  Will it usefully engage?   Who will download...

Hands Free Car Manual on Google Glass
From The Eponymous Pickle

Hands Free Car Manual on Google Glass

Metaio's press release on their prototype augmented reality car manual, mentioned here before.    I note that this was precisely the area we explored, using 3D"...

NSF Announces Two New Expeditions in Computing Awards
From The Computing Community Consortium Blog

NSF Announces Two New Expeditions in Computing Awards

The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) today announced two new Expeditions in Computing...

Thinking About the 2014 Imagine Cup
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thinking About the 2014 Imagine Cup

One of the things I was responsible for while I was working at Microsoft was promoting the Imagine Cup competitions. I did that pretty well. I like the competition...

Your E-ZPasses are Not Just Read At Tollbooths
From The Eponymous Pickle

Your E-ZPasses are Not Just Read At Tollbooths

In Forbes:  Are privacy conditions implied to just occur at locations where we expect a device to read our location?   This is probably disclosed somewhere deep...

What do computer scientists know about performance?
From Daniel Lemire's Blog

What do computer scientists know about performance?

Scientists make predictions and are judged on these predictions. If you study global warming, then your job is to predict the climate for the next few decades....

Why Private Brands Fail
From The Eponymous Pickle

Why Private Brands Fail

In MypBrands: Why private brands fail.  " ... Most brands fail. In fact, some estimate that 70-80% of new brands launched each year flounder and eventually flop...

Value of Your Big Data and Packaging it
From The Eponymous Pickle

Value of Your Big Data and Packaging it

What is the value of your big data?  Have talked to two startups recently that are addressing that. The promise of big data is to be able to leverage your own data...

The Limitations of Intelligence
From Schneier on Security

The Limitations of Intelligence

We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...

Prosperity Institute
From The Eponymous Pickle

Prosperity Institute

The Prosperity Institute, out of the Rottman School at the University of Toronto.  Via  Roger Martin.  I like the interesting geographic focus.  " ... The Lloyd...

Cybersecurity Framework Now At Discussion Draft Stage
From U.S. Public Policy Committee of the ACM

Cybersecurity Framework Now At Discussion Draft Stage

While cybersecurity legislation slowly inches forward in Congress, the National Institute of Standards and Technology (NIST) is moving faster in implementing its...

From Computational Complexity

Did YOU think the NSA could factor fast?

Before the recent revelations about the NSA (see Lances Post and Scott's post )I would tell my class, when teaching P and NP, We have very good reasons to think...

VisiRule:  Sharable Know How
From The Eponymous Pickle

VisiRule: Sharable Know How

I am repeating part of a post from last year below, based on my reexamination of expert systems style applications:" ... expert systems to understand and improve...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account