acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Top Papers in Data Science Survey
From The Eponymous Pickle

Top Papers in Data Science Survey

In KDNuggets, a summary of trends and interesting papers in data science in 2014, done by a survey of its readers.   Overviews, readily scannable even if you don't...

Finalists in Innovation by Design
From The Eponymous Pickle

Finalists in Innovation by Design

In Fastcodesign: Some interesting examples of using data visualization design.  Certainly eye catching, but more artistic than providing interactive and objective...

Keystroke Logger Disguised as a USB Charger
From Schneier on Security

Keystroke Logger Disguised as a USB Charger

It's called KeySweeper. More articles. Source code....

Code Hunt for Review and Problem Solving
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Code Hunt for Review and Problem Solving

Code Hunt is something I have been experimenting with a bit this year. For those who are not familiar with it, Code Hunt “is an educational, browser-based coding...

Washington News – Alerts and Updates
From U.S. Public Policy Committee of the ACM

Washington News – Alerts and Updates

General News • The 114th Congress convened last week with Republicans controlling both the U.S. House of Representatives and the Senate. The House has 246 Republicans...

Fusion Charts Blog
From The Eponymous Pickle

Fusion Charts Blog

Brought to my attention with some interesting data visualization posts.  Fusion Charts Blog.

Beyond Customer Recognition for Retailers
From The Eponymous Pickle

Beyond Customer Recognition for Retailers

Not a new thing, casinos have been doing it for years.  The capability has been improving for some time.  Now with cheaper hardware?   What is more interestingWhere...

Highlights from the New Class of TED Fellows
From The Computing Community Consortium Blog

Highlights from the New Class of TED Fellows

The new class of Fellows for TED2015 has recently been released, and among the 21 “game-changing thinkers” are Laura Boykin, a biologist and Jonathan Home, a physicist...

David Cameron's Plan to Ban Encryption in the UK
From Schneier on Security

David Cameron's Plan to Ban Encryption in the UK

In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here's the quote: "If I am prime minister I will...

Your Cognitive Future
From The Eponymous Pickle

Your Cognitive Future

A cross industry report from IBM.  Detailed look at what to expect and what to prepare for." ... Cognitive-based systems extend the capabilities of humans. They...

Beaconing at Marsh Supermarkets
From The Eponymous Pickle

Beaconing at Marsh Supermarkets

Continued indication that the interconnection of shoppers and physical spaces is progressing, this was reported on previously here in more detail, see tags below...

ACM Names Its 2014 Fellows
From The Computing Community Consortium Blog

ACM Names Its 2014 Fellows

The Association for Computing Machinery (ACM) is out with its 2014 Fellows, 47 of its members from universities, corporations, and research labs being recognized...

How Gameplay Affects Stories in Games
From The Female Perspective of Computer Science

How Gameplay Affects Stories in Games

I am very interested in the role of storytelling in videogames.  Although I do like games without stories as well, the story is often the part of a game that engages...

Robots for Retail
From The Eponymous Pickle

Robots for Retail

Discussion in Retailwire: Saw several demonstrations of this idea.   Now there are examples in the hospitality industry that are worth watching.  Consumers still...

Defining Your Business
From The Eponymous Pickle

Defining Your Business

In Innovation Excellence:   by Ty Montague.  " ... Whitespace vs. Rightspace: How Quest-led Innovation Finds Right Space for Breakthrough Innovation   ... " .  ...

Automated Hypothesis Generation
From The Eponymous Pickle

Automated Hypothesis Generation

Took a brief look at this at the request of a client, it is still in evolution.    The Watson Chef is an interesting example, but it is overwhelmed today by dozens...

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

From Computational Complexity

Barrier's for Matrx Mult Lower bound

Matrix Mult: The usual algorithm is O(n^3). Strassen surprised people by showing an O(n^{2.81}) algorithm. (Now its so well known that its not surprising. IFast...

But I Have The Same as Him
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

But I Have The Same as Him

One thing I hear a lot is “I have the exact same code and someone else and theirs work and mine doesn’t.” The obvious wise guy reply is “if yours doesn’t work then...

How To Safeguard Surveillance Laws
From Wild WebMink

How To Safeguard Surveillance Laws

This letter was published in the London Evening Standard on January 12th, 2015: I watch with alarm as, in the wake of the barbaric murders in France, politicians...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account