acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Neuromarketing Papers from 2015
From The Eponymous Pickle

Neuromarketing Papers from 2015

From Warc, survey of 'best papers' from 2015 on neuromarketing.  With claims taking neuromarketing mainstream.  I disagree, it is still experimental, worth testing...

International Blog Delurking Week 2016
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

International Blog Delurking Week 2016

OK this is the first I have heard of this but it is a great idea. Comments are a huge thing for bloggers. I get a few comments now and again and they add great...

NSA Spies on Israeli Prime Minister
From Schneier on Security

NSA Spies on Israeli Prime Minister

The Wall Street Journal has a story that the NSA spied on Israeli Prime Minister Benjamin Netanyahu and other Israeli government officials, and incidentally collected...

Consumers are bored with today’s tech and nervous about tomorrow’s
From Putting People First

Consumers are bored with today’s tech and nervous about tomorrow’s

Accenture just launched (press release) the results of its Igniting Growth in Consumer Technology survey where it polled 28,000 consumers in 28 countries on their...

Virtual Realty as Next Frontier of Retail
From The Eponymous Pickle

Virtual Realty as Next Frontier of Retail

Is Virtual Reality really practical in retail?   A next frontier.  For engagement, or for exploring complicated product use  in context?

Gathering in Random Forests
From The Eponymous Pickle

Gathering in Random Forests

Random Forests. A notable ensemble-style method for analytic classification.  Particularly interesting to me because it uses more easily understood decision trees...

Twitter vs Facebook
From The Eponymous Pickle

Twitter vs Facebook

In Knowledge@Wharton:" ... Twitter’s effort to find a new CEO is the latest struggle in a long list of challenges that the micro-blogging site has faced over the...

Windows 10 Whole-Disk Encryption without Key Escrow
From Schneier on Security

Windows 10 Whole-Disk Encryption without Key Escrow

On the Intercept, Micah Lee has a good article that talks about how Microsoft is collecting the hard-drive encryption keys of Windows 10 users, and how to disable...

Great Innovative Idea- Privacy-Preserving Inference of Social Relationships from Location Data
From The Computing Community Consortium Blog

Great Innovative Idea- Privacy-Preserving Inference of Social Relationships from Location Data

The following Great Innovative Idea is from Cyrus Shahabi, Liyue Fan, and Luciano Nocera from theUniversity of Southern California, Li Xiong from Emory University...

How I use CSTA
From Computer Science Teachers Association

How I use CSTA

It is a wonderful time to teach computer science. Almost every day, there is a new tool or website or resource available to teachers for use in the computer science...

Video: How Argonne Simulated the Evolution of the Universe
From insideHPC

Video: How Argonne Simulated the Evolution of the Universe

"What we want to do now with these simulations is exactly create this universe in our lab. So we build this model and we put it on a computer and evolve it forward...

De-Anonymizing Users from their Coding Styles
From Schneier on Security

De-Anonymizing Users from their Coding Styles

Interesting blog post: We are able to de-anonymize executable binaries of 20 programmers with 96% correct classification accuracy. In the de-anonymization process...

Interesting Links 4 January 2016
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 4 January 2016

Happy New Year! Happy 11111100000! Today is forst day back at school. I didn’t get to everything I wanted to do over the break but I did start playing with some...

NCSA Private Sector Program
From insideHPC

NCSA Private Sector Program

National Center for Supercomputing Applications (NCSA) has a private sector program (PSP) which works with the smaller companies to help them adopt HPC technologies...

[Reports] Shaping the Library to the Life of the User
From Putting People First

[Reports] Shaping the Library to the Life of the User

Shaping the Library to the Life of the User: Adapting, Empowering, Partnering, Engaging by Merrilee Proffitt, James Michalko and Melissa Renspie OCLC Online Computer...

How focus on UX helped gov.uk win design of the year
From Putting People First

How focus on UX helped gov.uk win design of the year

The goal of self-service sites is to help users find answers themselves, forestalling the need to contact a real person. When such a site is done right, it leads...

Whirlpool Builds in the Dash Buy Button
From The Eponymous Pickle

Whirlpool Builds in the Dash Buy Button

The general idea has been around for more than a decade .  I have been testing the Amazon Dash button since last year.    Finally it is being integrated for replenishment...

Robotics at Adidas
From The Eponymous Pickle

Robotics at Adidas

Addidas. An example of a company in transition to the use of robots to do manufacturing.  In Reuters: Adidas Robotics

The Value of Getting it Wrong
From The Eponymous Pickle

The Value of Getting it Wrong

Being willing to get it wrong, and doing that a number of times to calibrate the inexactness of our methods and models, can be a useful means of both understanding...

A startup is a company that spends most of its time searching
From Writing

A startup is a company that spends most of its time searching

An interview I did with Hakin9 Magazine on startups, agility, security, and more: A startup is a company that spends most of its time searching
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account