acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Kodu Kamp for Educators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kodu Kamp for Educators

OK so you know I am a big fan of Kodu. Perhaps you read about the Kodu workshop I did for students last weekend. Perhaps you just heard about Kodu from some random...

Who Owns Personal Data?
From The Eponymous Pickle

Who Owns Personal Data?

Thinking about who owns personal data.

Tableau 6 Includes What-If Modeling
From The Eponymous Pickle

Tableau 6 Includes What-If Modeling

The newest verison of Tableau 6, now in beta, has the ability to create variables for use in your analysis. We call these parameters, and they open up new possibilities...

Stealing Your Reality
From The Eponymous Pickle

Stealing Your Reality

Can your behavior on social netowrking sites be stolen and your 'reality' stolen?  I know that reality can be augmented, even replaced by being made virtual, but...

Tragedy of the Commons
From The Eponymous Pickle

Tragedy of the Commons

I looked up the concept of 'Tragedy of the Commons' concept recently to get additional historical information about the topic. .   Found that the Wikipedia has....

Picking a Single Voice out of a Crowd
From Schneier on Security

Picking a Single Voice out of a Crowd

Interesting new technology. Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...

From Computational Complexity

How hard is this problem?- I ask this non-rhetorically

I recently saw the following puzzle: Which two numbers come at the end of this sequence? (That is, what are x and y?) 2,4,5,30,32,34,36,40,42,44,46,50,52,54...

links for 2010-10-14
From Wild WebMink

links for 2010-10-14

FLOSS Weekly 139: Alfresco It was a long session, but the conversation flowed between me, John Newton and Luis Sala of Alfresco and FLOSS Weekly anchor Randal Schwartz...

Pen-and-Paper SQL Injection Attack Against Swedish Election
From Schneier on Security

Pen-and-Paper SQL Injection Attack Against Swedish Election

Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...

What does your school need?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What does your school need?

The What Our School Needs contest is being run by the Bing team at Microsoft. You are using Bing for your Internet search needs right? Well even if not (and you...

Data Sharing Between CPG and Retail
From The Eponymous Pickle

Data Sharing Between CPG and Retail

Data sharing between retailers and manufacturers have been done for a long time.   Here is an example of the process between Food Lion and Kraft.

Inside the Mind of the Shopper
From The Eponymous Pickle

Inside the Mind of the Shopper

I have had a chance to re-examine Herb Sorensen's book from last year, and his supporting site that contains articles about some of the concepts included. Also,...

LinkedIn's New Lab
From The Eponymous Pickle

LinkedIn's New Lab

ReadwriteWeb writes about Linkedn's new lab.  Says it has meager pickings for the average user. LinkedIn  is a resume mill that is no longer possible to ignore. ...

Can you trust fixed-bit computer arithmetic?
From Daniel Lemire's Blog

Can you trust fixed-bit computer arithmetic?

Suppose that you have 10 pictures, and all lined up, they take 100 pixels. Is it safe to say that each picture has a width of x pixels if 10 x = 100? We all know...

Google Creative Labs
From The Eponymous Pickle

Google Creative Labs

A slideshow from Google Creative Labs. " ...   interesting HTML5 apps, iPhone apps, visualization tools, 3D projections, art projects, creative YouTube videos,...

Recruiting: Lessons for a CSTA Chapter
From Computer Science Teachers Association

Recruiting: Lessons for a CSTA Chapter

As we started the new school year, our small group of five (three college and two high school educators) is entering round two of starting a CSTA chapter. We created...

Store Brands Here to Stay
From The Eponymous Pickle

Store Brands Here to Stay

Overview of Deloitte study on store brands in Progressive Grocer:  " ... In a Deloitte study, 80% of consumer respondents said they think most store brands are...

Embedded Phenomena, Augmented Reality, and Education
From The Female Perspective of Computer Science

Embedded Phenomena, Augmented Reality, and Education

I love it when something so simple is so effective. Tom Moher's 2006 paper [ACM, CiteSeer] describing his work on what he calls Embedded Phenomena was a case of...

From Computational Complexity

Two Candidates for an Ig Noble in Mathematics

(This is a sequel to my post on the Ig Nobel Prize.) Two candidates for an Ig Nobel prizes in Mathematics. They deserve it for opposite reasons. (They are old...

Where do Innovations Come From?
From The Eponymous Pickle

Where do Innovations Come From?

The hive mind say Kevin Kelly and Steven Johnson.   Maybe they are nurtured (or not) that way, but all the really good and remarkable ideas I have seen have come...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account