acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Disjunctive Mapping of Consumers
From The Eponymous Pickle

Disjunctive Mapping of Consumers

From Informs: A presentation on Advances in understanding human behavior: Disjunctive mapping.  Exploring further.

Gap Analysis
From The Eponymous Pickle

Gap Analysis

Good post on the topic by the Burghard Group.  " ... Gap Analysis is an assessment tool to help a place (community, region, state) compare its current economic...

Tor Opsec
From Schneier on Security

Tor Opsec

Good operational security guide to Tor.

Consumers Want More Communications from Retailers
From The Eponymous Pickle

Consumers Want More Communications from Retailers

Not that much of a surprise, providing the communication is truly useful. " ... according to the IBM Institute for Business Value 2011 Retail Industry Study, released...

Marketing via a Virtual Pinboard
From The Eponymous Pickle

Marketing via a Virtual Pinboard

A simple and clever approach.  Using a virtual pinboard metaphor to market and promote a site.   The enabling site is called Pinterest, which I had not heard of...

From Computational Complexity

How important are the Fib numbers in math? in Nature? In History of Math books?

The following quotes is from In the book Algebra in Ancient and Modern Times by V.S. Varadarajan. Fibonacci numbers thus grow very fast with N, indeed in geometric...

We need to talk about piracy (but we must stop SOPA first)
From Apophenia

We need to talk about piracy (but we must stop SOPA first)

Much to my happiness, the internets are in a frenzy about the “Stop Online Piracy Act” (aka SOPA). Congress is currently in recess, but the House announced a hearing...

Software Quality in the Global Supply Chain
From The Eponymous Pickle

Software Quality in the Global Supply Chain

In ECommerce Times:  Part of a conversation I have been having recently on supply chain design.  How is the right data brought together in the quantities required...

Guided Exploration: Faceted Search, Backwards
From The Noisy Channel

Guided Exploration: Faceted Search, Backwards

Information Scent In the early 1990s, PARC researchers Peter Pirolli and Stuart Card developed the theory of information scent (more generally, information foraging)...

The Importance of Good Backups
From Schneier on Security

The Importance of Good Backups

Thankfully, this doesn't happen very often: A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...

Software Engineering High School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Software Engineering High School

It sounds like a movie title doesn

Use Random Hashing if you Care About Security?
From Daniel Lemire's Blog

Use Random Hashing if you Care About Security?

Hashing is a programming technique that maps objects (such as strings) to integers. It is a necessary component of hash tables, one of the most frequently used...

Going Dark to Protest SOPA/PIPA
From Schneier on Security

Going Dark to Protest SOPA/PIPA

Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...

Interesting Links 16 January 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 16 January 2012

Sorry this is late today. Not a good weekend or morning either. Should be close to 100% for the workshops I am presenting in Vermont on Wednesday and Thursday though...

Accurate Robot Essay Graders
From The Eponymous Pickle

Accurate Robot Essay Graders

an interesting effort. . As the article asks, the end of multiple choice questions? This does delve into the nature of semantic meaning. A friend suggests it...

You Will Fail to Have a Great Career
From The Female Perspective of Computer Science

You Will Fail to Have a Great Career

Larry Smith told the TEDxUW (University of Waterloo) audience that they will fail to have a great career.  After all, there are ever so many excuses that crop up...

PCI Lawsuit
From Schneier on Security

PCI Lawsuit

This is a first: ...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...

NIST Seeking Submissions to Text REtrieval Conference
From The Computing Community Consortium Blog

NIST Seeking Submissions to Text REtrieval Conference

The National Institutes of Standards and Technology (NIST) — which recently posted a solicitation containing opportunities for computing researchers — is now out...

Visualization of the History of Personal Computing
From The Eponymous Pickle

Visualization of the History of Personal Computing

A visualization of personal computing via graphs of units shipped,  from 75 to the present.  From lumbering desktops to the very fast emergence of tablets.

From Computational Complexity

The Information Flood

Twitter, Facebook, Google+. Information now comes to us as a faucet. If you don't drink it all it disappears forever. Try to find status updates and tweets from...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account