acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Rules of Exception:Adapting the Process
From The Eponymous Pickle

Rules of Exception:Adapting the Process

In ReadWriteWeb:   The way to address this is to have the process have the ability to adapt to changes.  That can and has been done.  It does not need AI,  just...

Macy's  and Predictive Analytics
From The Eponymous Pickle

Macy's and Predictive Analytics

How Macy's uses predictive analytics.   Visualization and other techniques.  " ... The machinery of predictive analytics is only as good as the human-engineered...

Fast computation of scalar products, and some lessons in optimization
From Daniel Lemire's Blog

Fast computation of scalar products, and some lessons in optimization

Given two arrays, say (1,2,3,4) and (4,3,1,5), their scalar product is simply the sum of the products: 1

Low Level Programming
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Low Level Programming

A blog post by Andy Firth, an Engineer Architect at Bungie, called The demise of the low level Programmer is getting some attention lately. In the post he lists...

From Computational Complexity

My Cruise Vacation

Last week, my wife and I took a vacation to the Caribbean on the biggest cruise ship there is. I like cruising, just relaxing, swimming, reading, eating, drinking...

links for 2011-08-11
From Wild WebMink

links for 2011-08-11

Apple, publishers conspired against $9.99 Amazon e-books, says lawsuit It's not enough to be the richest company in the world. Everyone else has to fail as well...

Security Flaws in Encrypted Police Radios
From Schneier on Security

Security Flaws in Encrypted Police Radios

"Why (Special Agent) Johnny (Still) Can

WiFi at McDonalds
From The Eponymous Pickle

WiFi at McDonalds

I have now been a long time user of Wifi in the wild and note the many ways that it is applied.  In some cases simply, in other places logging you out periodically...

Mobile Learning Toolkit published
From Putting People First

Mobile Learning Toolkit published

The mobile phone is now a ubiquitous item even among the world

Meeting Wiz Appears in Smart Meeting Mag
From The Eponymous Pickle

Meeting Wiz Appears in Smart Meeting Mag

Russell Brumfield, 'the Wiz',  who we have worked with in the area of smart meeting technology and scent delivery strategies, appears in the August 2011 issue of...

Semantic Webs in the Enterprise
From The Eponymous Pickle

Semantic Webs in the Enterprise

The movement of the semantic web into the enterprise.  One domain area at a time.  I have seen this direction as well.  Creating a completely generic solution,even...

Kindle in the Browser
From The Eponymous Pickle

Kindle in the Browser

Amazon now offers a Kindle application for the Safari and Chrome Browsers (others coming) for access to the book reading cloud.    I use their App on the iPhone...

GPRS Hacked
From Schneier on Security

GPRS Hacked

Just announced: Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...

PCAST Sustainability Report Emphasizes
From The Computing Community Consortium Blog

PCAST Sustainability Report Emphasizes

The President’s Council of Advisors on Science and Technology (PCAST) released a report titled Sustaining Environmental Capital: Protecting Society and Economy,

? Amazon Escapes The App Trap
From Wild WebMink

? Amazon Escapes The App Trap

As I predicted in June, Amazon has quietly launched read.amazon.com, a full-featured HTML 5 version of the Kindle that runs perfectly on the iPad, looks for all...

Collaborative Asynchronous Searching
From The Eponymous Pickle

Collaborative Asynchronous Searching

I recently mentioned SearchTeam.  I see it has now been looked at and reviewed in detail in Information Today,  Note in particular the description of the Semantic...

"Taxonomy of Operational Cyber Security Risks"
From Schneier on Security

"Taxonomy of Operational Cyber Security Risks"

I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one: The taxonomy of operational cyber security risks, summarized in Table...

Computer Science Before Programming
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Before Programming

For most people the first real computer science course is introduction to programming. It may be called something else but effectively what it is is a course that...

New Benchmark for AI
From The Eponymous Pickle

New Benchmark for AI

In CACM:  Top chess players can now be defeated by computer programs.  But this has not been the case for the Japanese game Go.  New methods use Monte Carlo simulation...

OggCamp Approaching
From Wild WebMink

OggCamp Approaching

If you’re in the south of England (or want to travel here) don’t forget that OggCamp is being held this weekend. It’s in Farnham, just off the M3, and you’ll want...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account