acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hot Innovation Tools
From The Eponymous Pickle

Hot Innovation Tools

Innovation Excellence on hot innovation tools.  This is more about innovation processes rather than specific tools.  Worth a look.

Grocery Attracting Millennials
From The Eponymous Pickle

Grocery Attracting Millennials

In MediaPost: Creativity, engagement will help retailers attract millennials " ... Retailers should tap creativity and engagement to attract millennial shoppers...

Exploiting Parallelism and Scalability Deadline Approaching
From The Computing Community Consortium Blog

Exploiting Parallelism and Scalability Deadline Approaching

The National Science Foundation (NSF) issued a new solicitation for the Exploiting Parallelism and Scalability (XPS) program.  The Computing Community Consortium...

Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences
From The Computing Community Consortium Blog

Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences

The Council on Library and Information Resources (CLIR) is seeking applicants for Postdoctoral Fellowships in Data Curation for the Sciences and Social Sciences...

DLC 1: Hotel arrogance, the no-win laptop and more
From Wild WebMink

DLC 1: Hotel arrogance, the no-win laptop and more

Originally posted on Meshed Insights & Knowledge:Digital Life Clippings from week 1 Marriott will ban shareable WiFi if the FCC don’t let them block it – NYT –...

Innovation Capacity and Smart Service Systems
From The Eponymous Pickle

Innovation Capacity and Smart Service Systems

Building Innovation Capacity Using Smart Service SystemsNSF proposalsSmart Service Systems—Unrestricted as to domain knowledge and application areas. This topic...

Attributing Cyberattacks
From Schneier on Security

Attributing Cyberattacks

New paper: "Attributing Cyber Attacks," by Thomas Rid and Ben Buchanan: Abstract: Who did it? Attribution is fundamental. Human lives and the security of the state...

From Computational Complexity

Why do students do this?

Before my midterm in ugrad  Theory of Computation  I gave the students a sheet of practice problems to do that I would go over before the midterm. One of them...

A manifesto for qualitative research (and more)
From Putting People First

A manifesto for qualitative research (and more)

TNS, a global company specialised in market research, global market information and business analysis, has published some papers that are quite aligned with what...

Samsung and the Smart Home
From The Eponymous Pickle

Samsung and the Smart Home

Continue to follow Smart Home directions.  At CES Samsung promotes its Tizen OS. I have said before I am unimpressed with Samsung software in the Smart TV realm...

FCC Invites Nominations for the 4th Annual Chairman’s Awards for Advancement in Accessibility
From U.S. Public Policy Committee of the ACM

FCC Invites Nominations for the 4th Annual Chairman’s Awards for Advancement in Accessibility

The FCC invites nominations for the 4th Annual FCC Chairman’s Awards for Advancement in Accessibility. The Chairman’s Awards aim to highlight and encourage innovation...

FCC Invites Nominations for Disability Advisory Committee
From U.S. Public Policy Committee of the ACM

FCC Invites Nominations for Disability Advisory Committee

The Federal Communications Commission (FCC) invites nominations for a new Disability Advisory Committee. Appointees will serve a two-year term and will be compensated...

Digital Shopper Marketing Magazine
From The Eponymous Pickle

Digital Shopper Marketing Magazine

From the Path to Purchase Institute.  Contains the 2015 trends report for Shopper Marketing.  Good resource.   See also their Linkedin Group.

Couponing and Retailing
From The Eponymous Pickle

Couponing and Retailing

Some of the earliest data analyses I did in CPG were evaluating the efficacy of coupons.  The debate continues about their value, now in many different media.  ...

Young Scientists Invited to Apply for Third Heidelberg Laureate Forum
From The Computing Community Consortium Blog

Young Scientists Invited to Apply for Third Heidelberg Laureate Forum

Preparations for the third Heidelberg Laureate Forum (HLF) are in full swing, and applications from young researchers to attend are now being accepted. HLF will...

Protective Swarmware
From The Eponymous Pickle

Protective Swarmware

As expected we are seeing the application of swarms for military and defense applications.  We saw the application suggested a long time ago.  Expect there to be...

President Signs Cybersecurity Legislation
From U.S. Public Policy Committee of the ACM

President Signs Cybersecurity Legislation

The President signed several cybersecurity bills toward the end of 2014.  Much of the legislation signed by President Obama affects various cybersecurity functions...

Loitering as a Security System
From Schneier on Security

Loitering as a Security System

In Kyoto, taxi drivers are encouraged to loiter around convenience stores late at night. Their presence reduces crime. In Kyoto about half of the convenience stores...

Interesting Links 5 January 2015
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 5 January 2015

First interesting links post of the new year! I hope your year is off to a good start. Classes started back up for me today. I think I’m ready even though I didn...

Data Architecture and Big Data
From The Eponymous Pickle

Data Architecture and Big Data

An overview of the challenges." ... The big data onslaught will continue for the foreseeable future, and is only going to grow more intense from exponential data...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account