acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Text Mining Handbook
From The Eponymous Pickle

Text Mining Handbook

Long on my stack, just making my way through: The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data by Ronen Feldman and James Sanger. A...

An Ad-Supported Model With Teeth?
From The Noisy Channel

An Ad-Supported Model With Teeth?

Apple recently filed for technology to deliver a rather compelling ad-supported business model. Or perhaps the better word is compulsory. You can read an analysis...

Bias of Convenient Study Choices
From The Eponymous Pickle

Bias of Convenient Study Choices

Always thought there was something wrong with using US college students for determining universal psychological facts about populations, except when determining...

Computational Complexity and Games
From The Eponymous Pickle

Computational Complexity and Games

From MIT, an interesting piece about representing the real world, always a good thing to think about. I never thought that game theory could accurately represent...

Just What is Computer Science?
From Computer Science Teachers Association

Just What is Computer Science?

Just what is computer science? Is it a science course? Is it a math course? Is it a business course? These questions pop up more frequently now that states...

? Inconvenient Truth
From Wild WebMink

? Inconvenient Truth

Do music artists fare better in a world with illegal file-sharing? Answer: Yes. So why do the labels want to kill it off? Because they don't. Translation...

Call for Speakers: Enterprise Search Summit 2010
From The Noisy Channel

Call for Speakers: Enterprise Search Summit 2010


A Software Freedom Scorecard
From Wild WebMink

A Software Freedom Scorecard

I spoke this morning at the South Tyrol Free Software Conference in Bolzano, Italy. My subject was the idea of a "software freedom scorecard", a list of indicators...

Friday Squid Blogging: Sperm Whale Eating Giant Squid
From Schneier on Security

Friday Squid Blogging: Sperm Whale Eating Giant Squid

Rare photo.

Meet Microsoft
From Putting People First

Meet Microsoft

Microsoft Corp. is counting on Ms. Larson-Green, its head of Windows Experience, to deliver an operating system that delights the world’s PC users as much as its...

Blowfish in Fiction
From Schneier on Security

Blowfish in Fiction

The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor. P. 495: The guy was using a fairly simple buffer overflow attack but withEvery...

Video Interview with Me
From Schneier on Security

Video Interview with Me

Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.

Got a Stain?  There's an IPhone App for That
From The Eponymous Pickle

Got a Stain? There's an IPhone App for That

I see that the Tide Stain Brain is now available as an IPhone App. This work has a long history at P&G and I had several involvements in the knowledge being delivered...

Phone as Chemical Sensor
From The Eponymous Pickle

Phone as Chemical Sensor

And an application proposed by NASA that converts an IPhone into a chemical sensor. Looks like a very rough mashup, but I much like the direction. Could something...

More database compression means more speed? Right?
From Daniel Lemire's Blog

More database compression means more speed? Right?

Current practical database compression techniques stress speed over compression: Vectorwise is using Super-scalar RAM-CPU cache compression which includes a carefully...

What Google Knows About You
From The Eponymous Pickle

What Google Knows About You

This is worthwhile for just general caution if you are into Google applications. ' ... Google may know more about you than your mother does. Got a problem with...

From Computational Complexity

Jobs

As many university's still feel the effect of the financial crises, many have limited or no positions to hire new tenure-track faculty so I expect the academicUniversity...

? Starting November With Some Free Music
From Wild WebMink

? Starting November With Some Free Music

I just posted this week's free music downloads list over on my personal blog.

Surveys
From My Biased Coin

Surveys

This post is about surveys. It's motivated by one of my tasks last night, as I has to spend some time going over the final proofs for the survey Hash-Based Techniques...

Beyond Security Theater
From Schneier on Security

Beyond Security Theater

[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account