acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Wolfram Alpha Pro
From The Eponymous Pickle

Wolfram Alpha Pro

The full announcement on Wolfram Alpha Pro.   Quite impressive detail.  A useful front end to business analytics?  Plan to take a much closer look and report back...

Smarter Energy Usage
From The Eponymous Pickle

Smarter Energy Usage

IBM report on smarter energy usage:  " .. . From our prior surveys, we know consumers like the idea of having cleaner power options, and more control and efficiency...

NAE Elects its Class of 2012
From The Computing Community Consortium Blog

NAE Elects its Class of 2012

The National Academy of Engineering (NAE) has just announced the election of 66 new members and 10 foreign associates, including a number of esteemed computing...

Research as Exploration
From The Female Perspective of Computer Science

Research as Exploration

Check out this talk that asks the question 'What would it take to create a moonshot factory?' It's given by Michael Crow of Arizona State University as part ofWe...

Security Implications of "Lower-Risk Aircraft"
From Schneier on Security

Security Implications of "Lower-Risk Aircraft"

Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security. Abstract: Since...

Wolfram Alpha Pro
From The Eponymous Pickle

Wolfram Alpha Pro

Wolfram Alpha Pro is here, and only $4 a month.  In Technology Review.  Democratizing data analaysis in some new ways, both structured and unstructured.  It has...

Finding out Where an Image Originated
From The Eponymous Pickle

Finding out Where an Image Originated

Wired provides a good how-to that details some services that allow you to find out where an image on the web originated.     Useful to have at hand.

Brand Promise Health Check
From The Eponymous Pickle

Brand Promise Health Check

All about brand promise, aka brand equity.  Does it still make sense? " .. Most people want to know how to determine if they have a strong and compelling promise...

Trends shaping Business Intelligence and Analytics
From The Eponymous Pickle

Trends shaping Business Intelligence and Analytics

In TDWI:   5 Macro Trends Shaping next Generation BI and Analytics.    Useful thoughts.  " .. Although the business intelligence (BI) market is growing again at...

House Takes Another Crack at Updating NITRD
From U.S. Public Policy Committee of the ACM

House Takes Another Crack at Updating NITRD

Yesterday the House Science, Space and Technology Committee approved legislation updating the High Performance Computing Act of 1991. That law, among other things...

Thoughts on CS & STEM Higher-ed Enrollments
From Computer Science Teachers Association

Thoughts on CS & STEM Higher-ed Enrollments

I've recently come across two perspectives on undergraduate enrollments, one about STEM disciplines, one specifically about CS. Both warrant comment. First, there's...

Effective compression using frame-of-reference and delta coding
From Daniel Lemire's Blog

Effective compression using frame-of-reference and delta coding

Most generic compression techniques are based on variations on run-length encoding (RLE) and Lempel-Ziv compression. Compared to these techniques and on the right...

Looking at Text
From The Eponymous Pickle

Looking at Text

Bill Inmon takes a general, non technical look at the problem of dealing with textual data.  It remains a more difficult form of data to deal with. He introduces...

From Computational Complexity

The 17x17 problem SOLVED! (also 18x18)

THE 17x17 PROBLEM HAS BEEN SOLVED!!!!! On Nov 30, 2009 I posted here the following challenge: If someone emails me a 4-coloring of 17x17 with no monochromatic...

NIST to Fund Pilot Projects Advancing Trusted Identities
From The Computing Community Consortium Blog

NIST to Fund Pilot Projects Advancing Trusted Identities

The National Institute of Standards and Technology (NIST) announced last week a new competition to fund pilot projects that accelerate progress toward “improved...

Solving the Underlying Economic Problem of Internet Piracy
From Schneier on Security

Solving the Underlying Economic Problem of Internet Piracy

This essay is definitely thinking along the correct directions.

More on Hand Scanning at Fresh & Easy
From The Eponymous Pickle

More on Hand Scanning at Fresh & Easy

From the comments, Clive Black links to a more detailed article on the Fresh & Easy Scanning, including some pictures.  Based on the pictures shown, there were...

Hand Scanning at Fresh & Easy
From The Eponymous Pickle

Hand Scanning at Fresh & Easy

More on another test of shopper barcode hand scanning to improve the checkout process and provide targeted promotions.    Note this uses dedicated devices rather...

The New Science of Teaching and Learning
From The Female Perspective of Computer Science

The New Science of Teaching and Learning

What do you get when you mix psychology, education, and neuroscience? For Tracey Tokuhama-Espinosa, you get MBE (Mind, Brain, and Education) Science.  I recently...

Turning iPhones into Microscopes
From The Eponymous Pickle

Turning iPhones into Microscopes

In GigaOm.   Or at least displays for real microscopes.  Another example of sensors linked to mobile devices.  We will continue to see more of these.  Its adding...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account