acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Preparation for Cloudification
From The Eponymous Pickle

Preparation for Cloudification

Good short piece on the topic by Pearl Zhu.Cloudification is a journey to reinvent IT via modernization, classification, integration and optimization. ... More...

Viable Synergy
From The Eponymous Pickle

Viable Synergy

Brought to my attention via Founder and CEO: Sunnie Southern" .. Viable Synergy is a product and services innovation firm. We help individuals, organizations and...

FBI Agents Pose as Repairmen to Bypass Warrant Process
From Schneier on Security

FBI Agents Pose as Repairmen to Bypass Warrant Process

This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...

Unexpected Delight in Service Design
From The Eponymous Pickle

Unexpected Delight in Service Design

Upcoming TalkThe OBAIS Department at the Lindner College of Business, University of Cincinnati, invites you to attend the following research seminar.DATE & TIME...

Smart Door Lock
From The Eponymous Pickle

Smart Door Lock

A capability always mentioned in our brainstorms for considering the Smart Home.  The Smart Door Lock.  The Verge looks at Smart Lock.  Which includes one time...

Wired on the Future of AI
From The Eponymous Pickle

Wired on the Future of AI

The term Artificial Intelligence - AI is not used as much any more, probably to deal with controlling expectations.   The considerable activity today tends to be...

IOT and Disruptive Innovation
From The Eponymous Pickle

IOT and Disruptive Innovation

In the Cisco Blog:   IOT in manufacturing innovation.  We used early forms of IOT as key aspects of retail applications.   Look forward to see the forthcoming survey...

Analysis of Current and Future Computer Science Needs via Advertised Faculty Searches
From The Computing Community Consortium Blog

Analysis of Current and Future Computer Science Needs via Advertised Faculty Searches

The following is a guest blog post from Craig E. Wills,  Professor and Department Head of the Computer Science Department at Worcester Polytechnic Institute.  The...

Regin: Another Military-Grade Malware
From Schneier on Security

Regin: Another Military-Grade Malware

Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...

CSTA Leadership Gets Busy for CS Ed Week!
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Leadership Gets Busy for CS Ed Week!

Did you see this on the CSTA mailing list? When the CSTA Board met recently we started talking about sharing what we were doing in our schools for Computer Science...

Google does Scene Analysis
From The Eponymous Pickle

Google does Scene Analysis

In DigitalStrategy: Don't know where the IP rests today, but here is Google also doing scene analysis on images.  Again I can see some interesting applicationsrelated...

The Security Underpinnnings of Cryptography
From Schneier on Security

The Security Underpinnnings of Cryptography

Nice article on some of the security assumptions we rely on in cryptographic algorithms....

National Robotics Initiative (NRI)
From The Computing Community Consortium Blog

National Robotics Initiative (NRI)

Last week the National Science Foundation (NSF), in partnership with the National Institutes of Health (NIH), U.S. Department of Agriculture and NASA announced...

Live-streamed CCC BRAIN Workshop
From The Computing Community Consortium Blog

Live-streamed CCC BRAIN Workshop

Computer science and brain science share deep intellectual roots. Today, understanding the structure and function of the human brain is one of the greatest scientific...

More Good News, Eddie Kohler Edition
From My Biased Coin

More Good News, Eddie Kohler Edition

Continuing the good news at Harvard, word has been given that Eddie Kohler has officially been offered tenure.  So we hope/expect/are excited about keeping Eddie...

CIO vs an IT Services Supermarket
From The Eponymous Pickle

CIO vs an IT Services Supermarket

Don Tapscott on the continued need for a CIO in industry. Interesting thoughts, but by the same reasoning why do we need any executive leaders?  A CIO should be...

Get Schooled on Science Policy: LiSPI Call for Nominations Now Open!
From The Computing Community Consortium Blog

Get Schooled on Science Policy: LiSPI Call for Nominations Now Open!

The following is a Computing Research Policy Blog post by Peter Harsha, CRA Director of Government Affairs.  As part of its mission to develop a next generation...

How Does Word of Mouth Drive Sales?
From The Eponymous Pickle

How Does Word of Mouth Drive Sales?

In Retailwire:  A favorite concept that we modeled in depth a number of times.  It also merits further direct lab and online testing. Still believe there are opportunities...

Print Thyself
From The Eponymous Pickle

Print Thyself

In the New Yorker.  How 3D Printing is revolutionizing medicine.  Good non-technical article on the topic.   Possibilities and limitations.  Via Walter Riker" ....

New Kryptos Clue
From Schneier on Security

New Kryptos Clue

Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account