acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Additional Indignity
From Computer Science Teachers Association

Additional Indignity

I often talk with my students about the impact of technology on our lives: the good and the bad, the capabilities and the limitations. A great example of this...

From Computational Complexity

Close to Genius

The MacArthur Foundation announced their 2012 Fellows, also know as the genius awards. Among the list two names of interest to my readers, Maria Chudnovsky and ...

Lifecycle Management and Innovation
From The Eponymous Pickle

Lifecycle Management and Innovation

Good piece in Consumer Goods Technology about the new and growing relationship between PLM (Product Lifecycle Management) and innovation.   How it can help retailers...

L'Oreal on the XBox
From The Eponymous Pickle

L'Oreal on the XBox

We also looked at how to link beauty to digital technology, this is an interesting play. " ...  L'Oréal Seeks Women in Unlikely Place: On Xbox ... Beauty and Style...

NSF Invests Nearly $15 million in Big Data and New Interagency Challenge Announced
From The Computing Community Consortium Blog

NSF Invests Nearly $15 million in Big Data and New Interagency Challenge Announced

Today at a briefing on Capitol Hill titled, “Big Data, Bigger Opportunities“, hosted by Tech America, The National Science Foundation (NSF) and the National Institutes...

Online Price Shopping Survey
From The Eponymous Pickle

Online Price Shopping Survey

An overview of a recent survey on how shoppers use online price comparison before buying in-store.

Authentication Stories
From Schneier on Security

Authentication Stories

Anecdotes from Asia on seals versus signatures on official documents.

Spying Cameras
From The Eponymous Pickle

Spying Cameras

Covered broadly in the news.  Proof of concepts developed to use smartphone cameras for remote spying via malicious Trojans.  Not an unexpected capability. .  And...

Corporate Mobile Strategies
From The Eponymous Pickle

Corporate Mobile Strategies

In Fast Company:   Good overview of the need for mobile strategy.  Also some excellent examples to consider. I have found that a coherent strategy for small companies...

Certified or Qualified
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Certified or Qualified

Certification is a hot topic for K-12 computer science educators. It’s a big issue in public schools but not so much in private schools. The concern in privateAm...

How to create a cutting edge Smart City visitor experience
From Putting People First

How to create a cutting edge Smart City visitor experience

A four step guide from the Milan Expo 2015: Step 1 Ask your main sponsors (in this case Cisco, Enel and Telecom Italia) to indicate the relevant “Smart City” technologies...

Keccak is SHA-3
From Schneier on Security

Keccak is SHA-3

NIST has just announced that Keccak has been selected as SHA-3. It's a fine choice. I'm glad that SHA-3 is nothing like the SHA-2 family; something completely...

Therapy Apps
From The Eponymous Pickle

Therapy Apps

Supplemental therapy Apps.  Which reminds me of the time in the 1990s when AI based psych therapy programs were much discussed, but were soon seen to be less than...

Data Science Central
From The Eponymous Pickle

Data Science Central

Quite a rich resource of data mining ideas and useful articles.  Points to a number of directions that are worth following.

Predicting Behavior
From The Eponymous Pickle

Predicting Behavior

In Mind Hacks:    A telling piece that critiques a study relating the speed of drinking to the shape of a glass being used.  An excellent caution.  Classic example...

Controlling Systems with Data
From The Eponymous Pickle

Controlling Systems with Data

A Conversation.One question that fascinated me in the last two years is, to what extent can we use data to control systems? What elements of a system can be effectively...

On Juggling Priorities
From The Eponymous Pickle

On Juggling Priorities

In the HBR Network:  Great video on the juggling of priorities.  Often a dilemma.  In my experience priorities are always determined by context, which is always...

Anthropological study by Google on our magic relationship with mobile devices
From Putting People First

Anthropological study by Google on our magic relationship with mobile devices

What is the emotional relationship people truly have with the mobile space and how they make meaning there? To answer this, Google conducted an anthropological...

2013 U.S. Homeland Security Budget
From Schneier on Security

2013 U.S. Homeland Security Budget

Among other findings in this CBO report: Funding for homeland security has dropped somewhat from its 2009 peak of $76 billion, in inflation-adjusted terms; funding...

From Computational Complexity

Quantum Workshop

I went to the QIS workshop on quantum computing which was on the College Park Campus. I went Thursday (reception- free food!) and Friday (free lunch!) but had...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account