acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

The NIPS Experiment

The NIPS (machine learning) conference ran an interesting experiment this year. They had two separate and disjoint program committees with the submissions split...

Building a Simple Word Cloud
From The Eponymous Pickle

Building a Simple Word Cloud

A simple word cloud service, data can be retrieved from pasted text, URLs or files.  A number of useful features for quick generation.  Their blog provides some...

SAP IOT Garden
From The Eponymous Pickle

SAP IOT Garden

Work and thoughts by SAP on IoT Innovation, in a Garden:" ... Within SAP, IoT has begun taking shape in the form of grassroots projects and pilot implementations...

Too many Arrows in the Quiver?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Too many Arrows in the Quiver?

Last week I saw a tweet complaining to Wonder Workshop about them using Blockly to program their robots when (apparently) the Kickstarter proposal said the would...

Call for CCC Council Nominations
From The Computing Community Consortium Blog

Call for CCC Council Nominations

The Computing Community Consortium (CCC) issued a call today for nominations for individuals to serve on the CCC Council for the next three years.  The deadline...

Optimizing polymorphic code in Java
From Daniel Lemire's Blog

Optimizing polymorphic code in Java

Oracle’s Java is a fast language… sometimes just as fast as C++. In Java, we commonly use polymorphism through interfaces, inheritance or wrapper classes to make...

Brain Marketing
From The Eponymous Pickle

Brain Marketing

In the HBR:  Using the activity of the brain to understand purchasing and marketing decisions.   We called this neuromarketing, but that term is never used in the...

China Boosting Robotics
From The Eponymous Pickle

China Boosting Robotics

In CWorld: " ... Already a major manufacturer of electronics, China is preparing to bolster its presence in robotics with the help of government support and investments...

New NIH Big Data to Knowledge Funding Opportunities
From The Computing Community Consortium Blog

New NIH Big Data to Knowledge Funding Opportunities

The National Institutes of Health (NIH) Big Data to Knowledge (BD2K) program has announced two new funding opportunities for FY15 funding. NIH Big Data to Knowledge...

How the FBI Unmasked Tor Users
From Schneier on Security

How the FBI Unmasked Tor Users

Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....

Stanford High Rise Chip
From The Eponymous Pickle

Stanford High Rise Chip

In CWorld: New three dimensional design.  Potential for IoT and Big Data applications." ... Stanford University researchers have built a multi-layered "high-rise"...

From Gödel's Lost Letter and P=NP

Prover’s Block

What to do when afraid to see if what you want is true Cropped from Canadian Bergler Society source Edmund Bergler coined the term in 1947, the great writers Francis...

How to Fly a Horse
From The Eponymous Pickle

How to Fly a Horse

Colleague Kevin Ashton writes:Dear Franz, My new book, "How to Fly a Horse — The Secret History of Invention, Creation, and Discovery," comes out on January 20....

Measuring Content Metrics:  All About the Data
From The Eponymous Pickle

Measuring Content Metrics: All About the Data

In Adage:  On how to measure digital content.  Which relates to the more general aspect of Data Assets.  Which I have repeated here and given a talk about.   It's...

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Where do you Start With the Internet of Things?
From The Eponymous Pickle

Where do you Start With the Internet of Things?

Good piece on the topic. by James MacLennan.   There is lots of talk everywhere of course, but what do you do to fit his into a business?   We spent years thinking...

Video Analytics and Privacy
From The Eponymous Pickle

Video Analytics and Privacy

An area we examined in laboratory conditions. One approach seen was the automated blurring of faces.  In RetailWire:  Discussion:  " ... While privacy remains a...

The Untold History of Women in Science and Technology
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Untold History of Women in Science and Technology

A friend sent me a link to an interesting looking page that the White House set up to tell stories of the history of women in Science and Technology. It is a collection...

World Development Report 2015 explores “Mind, Society, and Behavior”
From Putting People First

World Development Report 2015 explores “Mind, Society, and Behavior”

WASHINGTON, December 2, 2014 — Development policies based on new insights into how people actually think and make decisions will help governments and civil society...

Cheap Hack-able Roomba
From The Eponymous Pickle

Cheap Hack-able Roomba

In Mashable: " ... iRobot builds a vacuum-free Roomba for students to hack ... "     This is a successor to the iRobot Create, which we used to experiment with...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account