acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Crowd Sourcing Examples
From The Eponymous Pickle

Crowd Sourcing Examples

A group of interesting examples of the use of Crowd Sourcing.  I don't agree that Crowd Sourcing is always a smarter solution, but it should be considered.     ...

David Gelernter on the Internet School
From The Eponymous Pickle

David Gelernter on the Internet School

In the WSJ:  Good thoughts, I still like focusing the human touch, but lets use all the tools available:   The Friendly, Neighborhood Internet School  We have the...

Amazon Lockers
From The Eponymous Pickle

Amazon Lockers

In Innovation Excellence:  In some locations you can have your Amazon shipment delivered to a locker that you can access 24 hours a day.   You are emailed a one...

Strategic Leadership of Portfolio and Project Management
From The Eponymous Pickle

Strategic Leadership of Portfolio and Project Management

Soon to be published by a colleague: : Strategic Leadership of Portfolio and Project Management, byLaurence J. Laning  and, Timothy J. Kloppenborg.  Appears to"...

“How Big Data Became So Big”;New York Times Cites CCC White Papers
From The Computing Community Consortium Blog

“How Big Data Became So Big”;New York Times Cites CCC White Papers

In an article published on The New York Times’ website this afternoon, the newspaper’s technology writer Steve Lohr describes the history and evolution of “Big...

Speed and Innovation
From The Eponymous Pickle

Speed and Innovation

Blocking speed blocks innovation. Often yes, but the the scale-speed of the innovation matters.  Early speed to trim ideas, is usually good ... but once down the...

Freedom To Create
From Wild WebMink

Freedom To Create

Sometimes we think software freedom just applies to programmers, but its creative impact can be much broader. This animated video is pretty clever: While it’s called...

Individualized Pricing
From The Eponymous Pickle

Individualized Pricing

The NYT discusses how and why people can be given individualized prices for goods.  If course this has been done for a long time.  Through promotions.  Loyalty...

Swarming Drones
From The Eponymous Pickle

Swarming Drones

Boeing demonstrates swarming drones.   Which reminds me of long ago projects that looked at how simple,uni-purpose, cheap and even disposable robotics could be...

Friday Squid Blogging: Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Dumpling Squid

The sex life of the dumpling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Termite Suicide Bombers
From Schneier on Security

Termite Suicide Bombers

Some termites blow themselves up to expel invaders from their nest.

NSF Seeking RAPID Proposals on Tsunami Debris Field Threats
From The Computing Community Consortium Blog

NSF Seeking RAPID Proposals on Tsunami Debris Field Threats

Several directorates within the National Science Foundation (NSF) — including Computer and Information Science and Engineering (CISE) — issued a Dear Colleague...

Deep Natural Language Analysis
From The Eponymous Pickle

Deep Natural Language Analysis

Of Interest:  Another DARPA example I have just examined.  Automated, deep natural-language understanding technology may hold a solution for more efficiently processing...

Influence vs Control
From Wild WebMink

Influence vs Control

My article for InfoWorld this week considers three different projects – OmniOS (derived from Illumos, the new name given to OpenSolaris), GitHub and OpenStack –...

11-Year-Old Bypasses Airport Security
From Schneier on Security

11-Year-Old Bypasses Airport Security

Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...

Public Sector TechBytes Series
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Public Sector TechBytes Series

   http://aka.ms/fzytjrTopicTechBytes Windows 8 Development for Government, Healthcare...

Distracting Videos
From My Biased Coin

Distracting Videos

Jeff Erickson gets the blame for pointing out this amusing/disturbing video on counting.  I feel like I should make it a background video before my undergraduate...

One Best Supply Chain Metric
From The Eponymous Pickle

One Best Supply Chain Metric

In the Supply Chain Digest.  David Schneider suggests that the one best supply chain metric is Operating Cash flow, or OCF.    I admit I had to think about that...

<i>Rolling Stone</i> Magazine Writes About Computer Security
From Schneier on Security

Rolling Stone Magazine Writes About Computer Security

It's a virus that plays AC/DC, so it makes sense. Surreal, though. Another article.

“If Xerox PARC Invented the PC, Google Invented the Internet”
From The Computing Community Consortium Blog

“If Xerox PARC Invented the PC, Google Invented the Internet”

An interesting article on Wired.com today, featuring Google computer scientists Jeff Dean and Sanjay Ghemawat: Time and again, we hear the story of Xerox PARC,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account