acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Bitcoin is just the poster currency for a growing movement of alternative tender
From Putting People First

Bitcoin is just the poster currency for a growing movement of alternative tender

Scott Smith of futures research lab Changeist writes in Quartz about the long history of alternative currencies, and criticizes Bitcoin because “they set too high...

Designing better experiences through data
From Putting People First

Designing better experiences through data

Access to big data is growing at an incredible pace. With increased information from various sources available on smartphones and tablets, many companies now realize...

Technologies of Touch
From The Eponymous Pickle

Technologies of Touch

From a recent TED:  A look at the technology of Touch.  We did a number of experiments with touch interaction with products.  The attempt was to include other senses...

Effective Data Visualization
From The Eponymous Pickle

Effective Data Visualization

In Greenplum: Procter's now classic data visualization dashboards compared to other approaches like Infographic style producer Periscopic.  I have problems with...

Data Science
From The Eponymous Pickle

Data Science

In the NYT quoting the HBR:  On the sexiness of data science.  Its still structure, logic and quantitative analytics.  Hardly sexy to most.    Well described "...

From Gödel's Lost Letter and P=NP

Measures Are Better

The Littlewood conjecture—another drive you crazy conjecture John Littlewood is the latter half of famous duo of Hardy-Littlewood. I have discussed him before here...

On Choosing Between Good Schools
From updated sporadically at best

On Choosing Between Good Schools

I have been talking to many people recently about choosing schools, both for undergraduate and graduate education. Here is a compilation and elaboration of what...

Reminder: Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research
From The Computing Community Consortium Blog

Reminder: Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research

As we’ve previously blogged, The Computing Community Consortium (CCC) is turning to the Computing Research community for their input on the needs and potential...

why I’m quitting Mendeley (and why my employer has nothing to do with it)
From Apophenia

why I’m quitting Mendeley (and why my employer has nothing to do with it)

Earlier this week, Mendeley was bought by Elsevier. I posted the announcement on Twitter to state that I would be quitting Mendeley. This tweet sparked a conversation...

CISE AD Issues Letter to the Community on FY14 Budget
From The Computing Community Consortium Blog

CISE AD Issues Letter to the Community on FY14 Budget

Yesterday, the President submitted his FY14 budget request to Congress.  This request included an 8.4% increase over 2012 levels for NSF, with a 9.8% increase in...

Resources For Teaching Binary Numbers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Resources For Teaching Binary Numbers

Several years ago I wrote a post on my old blog with resources for teaching Binary. Since I no longer have access to that site I can’t update it with more links...

P&G and Shopper Marketing
From The Eponymous Pickle

P&G and Shopper Marketing

In Adage:  P&G regains top slot in shopper marketing.  Based on a survey of agencies.  No direct indication of innovation.

Thinking Of Starting A Foundation?
From Wild WebMink

Thinking Of Starting A Foundation?

Reblogged from Meshed Insights & Knowledge: Open source projects are increasingly opting to form an independent entity – a “Foundation” – to form the core of their...

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

From Computational Complexity

Technology and Jobs

Entertainment Weekly reported last month on the bankruptcy of the special effects company Rhythm and Hues and the troubled industry. I remarked five years ago that...

Computer Science as a Teaching Strategy
From Computer Science Teachers Association

Computer Science as a Teaching Strategy

Recently one of my Facebook friends, Rebecca Dovi, computer science teacher in Virginia, posted an article from Education News, Julia Steiny: Promote Algebra by...

Freeman Hrabowski at TED: 4 pillars of college success in science
From The Computing Community Consortium Blog

Freeman Hrabowski at TED: 4 pillars of college success in science

Freeman Hrabowski, president of the University of Maryland Baltimore County delivered an inspirational TED talk on the importance of STEM education. Click here...

Office on Tablets
From The Eponymous Pickle

Office on Tablets

An Infoworld article about the suggested schedule for MS office on iOS and Android.  I have talked to several clients recently who have been awaiting this.  Will...

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

SIGCT Recommendations for ISTE 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

SIGCT Recommendations for ISTE 2013

The annual ISTE conference is not known as a hot bed of opportunities for computer science teachers. Things look some what better this year though with 13 activities...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account