acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Leveson Collateral Damage
From Wild WebMink

Leveson Collateral Damage

I just sent this to my MP.  Feel free to borrow from it. Dear $MP, I’m one of your constituents ($postcode), as well as being a pro bono director of Open Rights...

When Technology Overtakes Security
From Schneier on Security

When Technology Overtakes Security

A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...

Math, Physics, Art and the Spirograph
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Math, Physics, Art and the Spirograph

When I was a kid there were a number of spirograph toys available. Some, like the ones available today, had gears and circles with sprockets. One very old toy that...

The Future of MOOC U
From The Eponymous Pickle

The Future of MOOC U

In the Pennsylvania Gazette, an excellent and detailed article on Massively Open Online Courses (MOOCs).  My undergraduate alma mater, The University of Pennsylvania...

Consumer Cloud for Mobile Health Data
From The Eponymous Pickle

Consumer Cloud for Mobile Health Data

A not unexpected development.  Standards will lead to the application of analytics:WebMD, Qualcomm build consumer cloud for mobile health dataWebMD is also building...

Urban Mobility Innovation
From The Eponymous Pickle

Urban Mobility Innovation

A topic of particular interest, special report:Next Stop, Innovation: What’s Ahead for Urban Mobility? Transportation in the 21st century is entering a robust phase...

Upcoming Event – ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet”
From U.S. Public Policy Committee of the ACM

Upcoming Event – ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet”

ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet” Monday, May 13, 2013, 6:30 pm Google DC 1101 New York Avenue, N.W. Washington, D.C. 20005...

Robotics Roadmap 2.0 on the Hill
From The Computing Community Consortium Blog

Robotics Roadmap 2.0 on the Hill

The Congressional Robotics Caucus held a briefing this morning on the Robotics Roadmap 2.0(PDF), a follow up report to the CCC-led Robotics Roadmap(PDF) published...

Revenue Management with Negotiation
From The Eponymous Pickle

Revenue Management with Negotiation

University of Cincinnati's research seminars organized by the  Operations, Business Analytics, and Information Systems (OBAIS) department at the Carl H. Lindner...

Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research
From The Computing Community Consortium Blog

Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research

The Computing Community Consortium is seeking community input to better understand the potential needs and payoff for additional investments in mid-scale infrastructure...

Using the Code.org Video for Grassroots Advocacy
From Computer Science Teachers Association

Using the Code.org Video for Grassroots Advocacy

The code.org video has started a lot of conversations, but it takes you to bring that conversation home to your school district. Here is a 5-minute advocacy idea...

From Gödel's Lost Letter and P=NP

The Thousand Percent Solution

Boeing Dreamliner’s battery of problems Ray LaHood was until recently the top FAA administrator, the head of the U.S. agency that oversees air safety for the United...

Book: A History of Future Cities
From Putting People First

Book: A History of Future Cities

A History of Future Cities by Daniel Brook W. W. Norton & Company 2013 – 480 pages [Amazon link] The new book A History of Future Cities looks at the attempts of...

Collaborative Next Gen Analytics
From The Eponymous Pickle

Collaborative Next Gen Analytics

A Webex recorded seminar by Robin Bloor in the Briefing Room.  Good overview of the topic.  Requires some registration.  " ... Experienced analysts know there is...

Lessons From the FBI's Insider Threat Program
From Schneier on Security

Lessons From the FBI's Insider Threat Program

This article is worth reading. One bit: For a time the FBI put its back into coming up with predictive analytics to help predict insider behavior prior to malicious...

Imagine Cup Kodu Challenge 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Imagine Cup Kodu Challenge 2013

I wasn’t sure if this sort of event would happen again but it has. I saw the announcement yesterday. If you have students looking for a challenge and they are...

Demand A Proper Consultation
From Wild WebMink

Demand A Proper Consultation

The UK’s Home Office continues to push for maximum surveillance powers with minimum accountability in the latest adjustments to the Communications Data Bill. I...

Ethnography: Ellen Isaacs at TEDxBroadway
From Putting People First

Ethnography: Ellen Isaacs at TEDxBroadway

Ellen Isaacs (personal site), a user experience designer and ethnographer at PARC, spoke on January 28 at TEDx Broadway about the power of ethnography and how it...

Smart homes: our next digital privacy nightmare
From Putting People First

Smart homes: our next digital privacy nightmare

The hyper-connected smart home of the future promises to change the way we live. More efficient energy usage, Internet-connected appliances that communicate with...

Buzz and Lift
From The Eponymous Pickle

Buzz and Lift

In AdAge:   Buzz online creates little or any product lift in the short term for Coke.  Article provides some interesting statistics, with uncertainties.  The comments...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account