acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

SAP and Intelligent Data
From The Eponymous Pickle

SAP and Intelligent Data

SAP makes plans to turn Big data into intelligence.  Something we all hope to do.  Some new releases from the ERP giant:   "  ... Using its BI market share leadership...

Innovation and Research in China
From The Eponymous Pickle

Innovation and Research in China

We were involved in early research done in China with retailers and universities in China. Notably with BJ Hualian, who ultimately used some our methods to develop...

From Computational Complexity

Is the Turing Test Still Interesting?

Besides the Turing machine, Alan Turing also developed what we now call the Turing Test in Turing's seminal 1950 AI paper "Computational Machinery and Intelligenc...

$200 for a Fake Security System
From Schneier on Security

$200 for a Fake Security System

This is pretty funny: Moving red laser beams scare away potential intruders Laser beams move along floor and wall 180 degrees Easy to install, 110v comes on automatically...

“On the Edge — The Future of Computing Research”
From The Computing Community Consortium Blog

“On the Edge — The Future of Computing Research”

“On the Edge — The Future of Computing Research” was the title of a plenary session at the Computing Research Association’s (CRA) biennial Conference at Snowbird...

My Workshop on Programming With Processing is Postponed
From The Female Perspective of Computer Science

My Workshop on Programming With Processing is Postponed

Summer is as summer does.  We didn't get enough registrations for my workshop on learning to program using Processing.  Luckily, this wasn't from lack of interest...

SNCR Publishes the Social Mind
From The Eponymous Pickle

SNCR Publishes the Social Mind

From SNCR, of which I am a senior fellow:Professionals Spend 40% of Time Online Interacting in Peer Communities according to the Society for New Communications report...

Rudyard Kipling on Societal Pressures
From Schneier on Security

Rudyard Kipling on Societal Pressures

In the short story "A Wayside Comedy," published in 1888 in Under the Deodars, Kipling wrote: You must remember, though you will not understand, that all lawsmy...

How Big Data Became so Big
From The Eponymous Pickle

How Big Data Became so Big

In the NYT:  Largely obvious thoughts, but some very good links to a number of sources, including the report called Big Data, Big Impact from the World Economic...

A View of Sector Inventory Performance
From The Eponymous Pickle

A View of Sector Inventory Performance

A very informative piece in SC Digest, that surveys inventory turns by sector.  A must for supply chain data trend understanding.  " ... So, let's take an example...

Important IP Case
From My Biased Coin

Important IP Case

For those of you not following the Apple-Samsung case going on right now, it's fascinating.  Since I do expert witness work, it's interesting to me from that perspective...

Wave and Pay via Cheap Chips
From The Eponymous Pickle

Wave and Pay via Cheap Chips

Cheap printable chips have always been mentioned as solutions for making RFID ubiquitous.  Now a cheap chips example for the 'wave and pay' revolution, that isIn...

The Computing Innovation Fellows Project
From The Computing Community Consortium Blog

The Computing Innovation Fellows Project

In early 2009, the Computing Community Consortium (CCC), with the support of the National Science Foundation (NSF), launched the Computing Innovation Fellows Project...

An Analysis of Apple's FileVault 2
From Schneier on Security

An Analysis of Apple's FileVault 2

This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....

How To Read Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How To Read Code

We don’t teach students how to read code. Actually we don’t event teach them that they should read code for the most part. The closest we get is sample code inprettyprint...

PureFlex Expert System for IT Operations
From The Eponymous Pickle

PureFlex Expert System for IT Operations

I worked on several large scale expert systems applications during the AI drive of the 1990s.  One of the areas we specifically examined was the configuration of...

Retail Mobile Payments Networks
From The Eponymous Pickle

Retail Mobile Payments Networks

In CWorld:   Continued progress in retail payment networks.   " ... More that a dozen retailers including Best Buy, Walmart, Target and 7-Eleven have joined forces...

First Person: Maja Matarić, “the Social Roboticist”
From The Computing Community Consortium Blog

First Person: Maja Matarić, “the Social Roboticist”

University of Southern California computer scientist and neuroscientist Maja Matarić is the subject of an interview appearing in today’s Nature. On the eve of the...

Lousy Password Security on Tesco Website
From Schneier on Security

Lousy Password Security on Tesco Website

Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.

CSTA Cyber Security Poster Under Development
From Computer Science Teachers Association

CSTA Cyber Security Poster Under Development

In recent months the federal government has expressed increasing concern about our cybersecurity, that is, with our ability to protect the complex computing and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account