acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cognitive and Neuromorphic Computing
From The Eponymous Pickle

Cognitive and Neuromorphic Computing

On the reasons for the re-emergence of AI as cognitive computing.    In the Economist:" ... Cognitive computing is AI redux. Researchers took the successful bits...

Abductive Reasoning, Sensemaking and Design
From The Eponymous Pickle

Abductive Reasoning, Sensemaking and Design

Via Brian Moon or Perigean Technologies, who writes on making sense of knowledge via methods like concept mapping.  Good piece at link.Abductive Thinking and Sensemaking...

Cmap Tools now Available for iPad
From The Eponymous Pickle

Cmap Tools now Available for iPad

Cmap is the best known general concept mapping tool, which we tested in the enterprise.  Previously noted about this in test last year.  See previous posts here...

Watson Meets Machine Learning
From The Eponymous Pickle

Watson Meets Machine Learning

In KDNuggets: An overview of the Watson ecosystem from a recent presentation.  Examples in healthcare and education.

Friday Squid Blogging: Dumpling Squid and Sex
From Schneier on Security

Friday Squid Blogging: Dumpling Squid and Sex

This just in: the threat of being eaten doesn't deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories...

Smart Pipe
From Schneier on Security

Smart Pipe

Pretty impressive surveillance-economy satire....

Sports Tactics and Conversion Rates
From The Eponymous Pickle

Sports Tactics and Conversion Rates

In Conversioner:  Nicely done short piece that brings together a number of data and behavioral process  methods to address selling.    " ... Surprisingly, competitive...

Criticizing Neuromarketing
From The Eponymous Pickle

Criticizing Neuromarketing

I have been connected to two startups in the neuromarketing domain.  Is the hype fading for non conscious interaction applications of the neural kind?   Have seen...

Augmented Reality Projector Interfaces
From The Eponymous Pickle

Augmented Reality Projector Interfaces

In Computing Now   An example of new approaches to collaborative interface.  Haptic (touch) included.Spatial User Interfaces for Large-Scale Projector-Based Augmented...

Further Evidence Pointing to North Korea as Sony Hacker
From Schneier on Security

Further Evidence Pointing to North Korea as Sony Hacker

The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has "very high confidence" in the FBI's...

Quali-quantitative experiments in a Big Data world
From Putting People First

Quali-quantitative experiments in a Big Data world

Complementary social science? Quali-quantitative experiments in a Big Data world Anders Blok and Morten Axel Pedersen University of Copenhagen, Copenhagen, Denmark...

From Gödel's Lost Letter and P=NP

There Are Many Primes

Various senses of ‘many’ from proofs of the infinitude of primes 2008 Bowen Lectures source Hillel Furstenberg is entering his 50th years as a professor of mathematics...

How Browsers Store Passwords
From Schneier on Security

How Browsers Store Passwords

Good information on how Internet Explorer, Chrome, and Firefox store user passwords....

Third Party Sellers Set Record
From The Eponymous Pickle

Third Party Sellers Set Record

In Retailwire: Have been involved with a third party seller on Amazon for some time.  The process and dynamics are interesting to watch.   The data use claim is...

Forbes on Watson Analytics
From The Eponymous Pickle

Forbes on Watson Analytics

An overview of the idea.  Continuing to follow.  Have mentioned I think there are some useful integrated visualizations here that are quite good.  Still unclear...

Hacking Attack Causes Physical Damage at German Steel Mill
From Schneier on Security

Hacking Attack Causes Physical Damage at German Steel Mill

This sort of thing is still very rare, but I fear it will become more common: ...hackers had struck an unnamed steel mill in Germany. They did so by manipulating...

Hidden Costs of Manual Data Collection
From The Eponymous Pickle

Hidden Costs of Manual Data Collection

The RFCode site blog was just brought to my attention.  My investigation into data costs and data asset value led me to this. They have an Infographic on the cost...

DEADLINE EXTENDED: Applications to 2015 LiSPI now accepted till January 23rd
From The Computing Community Consortium Blog

DEADLINE EXTENDED: Applications to 2015 LiSPI now accepted till January 23rd

The following is a Computing Research Policy Blog post by Brian Mosley, CRA Policy Analyst.  Just wanted to put up a quick post that due to extra availability we...

Fast unary decoding
From Daniel Lemire's Blog

Fast unary decoding

Computers store numbers in binary form using a fixed number of bits. For example, Java will store integers using 32 bits (when using the int type). This can be...

Classic Computer Chip at age 40: The 8080
From The Eponymous Pickle

Classic Computer Chip at age 40: The 8080

In CWorld: I did some direct programming on this chip, so the milestone is historic for me. Where is the microprocessor going?   Good background and directional...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account