acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

R Video
From The Eponymous Pickle

R Video

So just what just is the open source statistical, data science and visualization language R?  A short video that describes the history, community and applications...

Mathematics of Poker
From The Eponymous Pickle

Mathematics of Poker

Some recent exposure to card game theory led me to this WSJ article.  " ... This growth over the past decade has been accompanied by a profound change in how the...

Sharing Location Data
From The Eponymous Pickle

Sharing Location Data

A Secure Location Data Locker: " ... OpenPaths is a secure data locker for personal location information .... Using our mobile apps you can track your location,...

From Gödel's Lost Letter and P=NP

Thirteen Sigma

Monitoring fabrication in industry and chess “Hall of Fame” source. Bill Smith joined Motorola as a quality control engineer in 1986. He coined the term Six Sigma...

Government Controlling Your Car
From The Eponymous Pickle

Government Controlling Your Car

In Forbes:  A demonstration about how you can hack into an automobile via a government mandated port and perform some very worrisome actions.   Hackers and the...

Die Empty
From The Eponymous Pickle

Die Empty

Todd Henry of Accidential Creative's curiously named new book: Die Empty: Unleash Your Best Work Every Day is available for pre-order.  Link to read chapter 1 free...

Big Data Theory and Analytics
From The Eponymous Pickle

Big Data Theory and Analytics

Big Data Analytics at Microsoft Research.   From a recent workshop there. " ... “The top-level takeaway for attendees was that big-data analytics is an area where...

Google's IT Mission Statement
From The Eponymous Pickle

Google's IT Mission Statement

In Forbes:   A view of where they are going and the kinds of empowerment being developed.   Google CIO Ben Fried speaks: " ... Fried and his leadership team defined...

Friday Squid Blogging: Squid Song
From Schneier on Security

Friday Squid Blogging: Squid Song

It's "Sparky the Giant Squid." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NIH Big Data to Knowledge (BD2K) Initiative
From The Computing Community Consortium Blog

NIH Big Data to Knowledge (BD2K) Initiative

The National Institutes of Health (NIH) has announced the Centers of Excellence for Big Data Computing in the Biomedical Sciences (U54) funding opportunity announcement...

NSA Cracked the Kryptos Sculpture Years Before the CIA Did
From Schneier on Security

NSA Cracked the Kryptos Sculpture Years Before the CIA Did

We interrupt this blog for some important inter-agency rivalry. The fourth part is still uncracked, though. Older links.

Data Mining for the Midsize Business
From The Eponymous Pickle

Data Mining for the Midsize Business

In the large enterprise we constructed a number of datamining efforts that looked to classify solutions based on measurements we had gathered.   One popular technique...

Confronting Neuroscam
From The Eponymous Pickle

Confronting Neuroscam

Roger Dooley author of Brainfluence, seeks to answer a number of the criticisms that have emerged recently about neuromarketing methods in the nontechnical press...

Honey bees are not going extinct
From Daniel Lemire's Blog

Honey bees are not going extinct

There is much argument about what science is. To some people, it appears to be mostly the belief that information should be derived reputed sources. That is, if...

George Dyson on the Decision Problem
From The Eponymous Pickle

George Dyson on the Decision Problem

Historian of science George Dyson in The Edge.  " ... The ultimate goal of signals intelligence and analysis is to learn not only what is being said, and what is...

On Innovation Performance
From The Eponymous Pickle

On Innovation Performance

Bain & Company on the topic.  Very well done.  Taking measure is very important.    " ... Innovation is one of the most popular acts in business, but one of the...

Secret Information Is More Trusted
From Schneier on Security

Secret Information Is More Trusted

This is an interesting, if slightly disturbing, result: In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...

CS Educator Interview: Louis Zulli Jr
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Louis Zulli Jr

Lou Zulli Jr is a quiet unassuming man. What he does with his students is anything but minor though. The projects his students have done with smartphones, SharePoint...

Robots as Army Squad Members
From The Eponymous Pickle

Robots as Army Squad Members

Not unexpected.  A play on the drone idea, but with a higher element of cooperation.  Which should require a higher level of autonomy and AI. " .... The U.S. Army...

From Computational Complexity

Ph.D. Attrition

Leonard Cassuto writes in the Chronicle an article Ph.D. Attrition: How Much Is Too Much? He presupposes the answer with the subtitle "A disturbing 50 percent of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account