acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Burglary Detection through Video Analytics
From Schneier on Security

Burglary Detection through Video Analytics

This is interesting: Some of the scenarios where we have installed video analytics for our clients include: to detect someone walking in an area of their yard...

Recorded Future Examined
From The Eponymous Pickle

Recorded Future Examined

I have been asked to take a closer look at the Recorded Future site. A number of posts will follow that will track my interaction with the site and company. The...

Robot Industry
From The Eponymous Pickle

Robot Industry

A good CWorld article on the the bloom of the robotics industry. I like this because it links the challenge to artificial intelligence (AI) which I covered for...

Cooperative Board Games Take Some Getting Used To
From The Female Perspective of Computer Science

Cooperative Board Games Take Some Getting Used To

I'm sure getting together every two weeks to play board games and calling it research isn't anything new, but it's definitely something I need to do. I pride myself...

Old Spice and Social Engagement
From The Eponymous Pickle

Old Spice and Social Engagement

Insider Dave Knox on taking social engagement to a new level at Procter & Gamble's Old Spice brand. Via Walter Riker.

From Computational Complexity

GCT Workshop (Guest Post by Josh Grochow)

Last week, the Center for Computational Intractability hosted a Geometric Complexity Theory Workshop. Geometric complexity theory (GCT) is an approach to P vs...

Open Core Case Study
From Wild WebMink

Open Core Case Study

SugarCRM 6 Debuts with Open Source and Commercial Features While their marketing guy may claim “that overall, Sugar 6 is an open source product from an open source...

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...

Advice For An Imagine Cup Team
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Advice For An Imagine Cup Team

The following is a guest post by Pat Yongpradit. Pat is the computer science teacher at Springbrook High School in Silver Spring, Maryland. His students competed...

Ethnography in industry
From Putting People First

Ethnography in industry

PARC, the legendary California-based research centre owned by the Xerox Corporation, is hosting a series of talks on ethnography in industry. The three talks that...

People-focused innovation in healthcare
From Putting People First

People-focused innovation in healthcare

Philips Design has published a downloadable paper on how it uses qualitative research and design thinking to support development of solutions for the ever-changing...

The War on Attention Poverty: Measuring Twitter Authority
From The Noisy Channel

The War on Attention Poverty: Measuring Twitter Authority

I gave this presentation today at AT&T Labs, hosted by Stephen North of Graphviz fame.

Hemingway Authentication Scheme
From Schneier on Security

Hemingway Authentication Scheme

From 1955, intended as humor: In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...

The Math Book
From The Eponymous Pickle

The Math Book

The Math Book: From Pythagoras to the 57th Dimension, 250 Milestones in the History of Mathematics by Clifford A. Pickover. Just found this recently published...

Field Agent Crowd Sources Retail Discovery
From The Eponymous Pickle

Field Agent Crowd Sources Retail Discovery

I was recently pointed to the Field Agent IPhone App. It implemented an idea which was discussed a number of times in the enterprise before the emergence of Apps...

Dominos Credits Social Media
From The Eponymous Pickle

Dominos Credits Social Media

Dominos is crediting social media for increases in profits. Good case study. Via Paul Gillin. See also his blog.

General Versus Domain Intelligence
From Daniel Lemire's Blog

General Versus Domain Intelligence

Our brains come with hard-wired algorithms. Cats can catch birds or mice without thinking about it. I can grab and eat a strawberry without thinking. The Savanna...

The Chaocipher
From Schneier on Security

The Chaocipher

The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...

Microsoft Research Illuminates Mars in 3-D With WorldWide Telescope
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Microsoft Research Illuminates Mars in 3-D With WorldWide Telescope

Cool stuff for us space nuts. It

Crisis of Choice Online
From The Eponymous Pickle

Crisis of Choice Online

Intriguing project and link to video.In CACM: Solving the Crisis of Choice OnlineThe MyMedia Project Content is everywhere these days, forcing consumers to make...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account