acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Branding the Brain
From The Eponymous Pickle

Branding the Brain

A critical review of consumer neuroscience.  Quite a lot of worthwhile interesting detail in both the scientific and commercial aspects ... "  ... To appreciate...

CRA Issues Consensus Paper on Postdoctoral Fellowships
From The Computing Community Consortium Blog

CRA Issues Consensus Paper on Postdoctoral Fellowships

Last February, the Computing Research Association (CRA) — the umbrella organization of the Computing Community Consortium (CCC) — launched an effort to engage the...

From Computational Complexity

Scott wins the Waterman

The NSF's most prestigious prize, the Alan T. Waterman award, recognizes an outstanding young scientist (35 or under) in any field of science or engineering. Breaking...

? OIN
From Wild WebMink

? OIN

Are you safer from software patents today, or more at risk? The news that the Open Invention Network (OIN) has extended the definition of “Linux” so that more software...

Migrating to the Cloud
From The Eponymous Pickle

Migrating to the Cloud

In Computing Now:   About Testing, quality and security concerns for migration to the Cloud. .  Some useful comments on important considerations.

Bastion: Narrating Your Every Move
From The Female Perspective of Computer Science

Bastion: Narrating Your Every Move

Who knew that having your every move narrated back to you could be so satisfying? Far from annoying, the compelling nature of the voice-overs in Bastion demonstrate...

Two Computer Scientists Receive 2012 Alan Waterman Award
From The Computing Community Consortium Blog

Two Computer Scientists Receive 2012 Alan Waterman Award

For the first time in the 37-year history of the distinguished honor, the National Science Foundation (NSF) today named two individuals — both computer scientists...

Teaching with Lousy Health
From Computer Science Teachers Association

Teaching with Lousy Health

There are about 1800 students at Henry M. Gunn HS (Palo Alto, CA). Enrollment in CS has grown from 90 students three years ago to 110 to 130 last year to 190 this...

Beauty Packaging to Link Real and Virtual Worlds
From The Eponymous Pickle

Beauty Packaging to Link Real and Virtual Worlds

This was an area we explored at length.   During a visit to China in 2003 I saw a remarkable number of examples in retail spaces.   Now QR codes and smartphones...

Cray Takes on  Big Data
From The Eponymous Pickle

Cray Takes on Big Data

Via Mark Montgomery of KYield. ...  Supercomputing and big data appliances.  Venerable Cray take a plunge into the thirst for big data understanding and analytics...

Watson Tries Finances
From The Eponymous Pickle

Watson Tries Finances

In another move forward for AI-style interactions, IBM is working with Citicorp:" ... IBM and Citigroup recently announced plans to explore how America's favorite...

? Lessig! Doctorow! London!
From Wild WebMink

? Lessig! Doctorow! London!

The Open Rights Conference is coming up in London on March 24 and has a glittering array of speakers including Lawrence Lessig and Cory Doctorow. Read all about...

Visualization Technologies for Human-Environment Interactions
From The Computing Community Consortium Blog

Visualization Technologies for Human-Environment Interactions

The National Socio-Environmental Synthesis Center (SESYNC) — the newest of the national synthesis centers funded by the National Science Foundation (NSF) focused...

Cloud Computing As a Man-in-the-Middle Attack
From Schneier on Security

Cloud Computing As a Man-in-the-Middle Attack

This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...

Register for CSTA's 2012 Annual CS&IT Conference
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Register for CSTA's 2012 Annual CS&IT Conference

CSTA's Annual CS&IT Conference This is the big and best professional development event of the year for middle and high school computer science educators. The program...

Making Love with Data: Avinash Kaushik
From The Noisy Channel

Making Love with Data: Avinash Kaushik

Just watch the presentation, which stole the show at Strata 2012. The written word cannot do justice to Avinash’s passion and his extraordinary ability to communicate...

NSA's Secure Android Spec
From Schneier on Security

NSA's Secure Android Spec

The NSA has released its specification for a secure Android. One of the interesting things it's requiring is that all data be tunneled through a secure VPN: Inter...

Free Shopper Centric e-Book
From The Eponymous Pickle

Free Shopper Centric e-Book

From DemandTec.  This was precisely the approach we emphasized for many years within the enterprise.  It is all about how the shopper behaves in their increasingly...

Uplift Modeling
From The Eponymous Pickle

Uplift Modeling

A new term?   The term perhaps, but we have been doing this new thing for years.  It deserves attention, now being lionized as the next big thing in predictive...

Key to Focus
From The Eponymous Pickle

Key to Focus

A good interview by Todd Henry with Peter Bregman.  On focus and priorities.  " ... In this interview, Peter describes how he came to his 18 minute methodology,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account