acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Big Basketball Data
From The Eponymous Pickle

Big Basketball Data

In Wired:  Excellent non technical look at tracking the complexity of sports.  Have followed this technically for a few years, this is a good non-tech view.  Nice...

Watson Determining Personality and Resonance of Message
From The Eponymous Pickle

Watson Determining Personality and Resonance of Message

Today at the Insight meetings we saw a Watson cognitive App being built from a number of Bluemix services and prefabricated Java.  Of particular interest was aGenesys...

Survey on What Americans Fear
From Schneier on Security

Survey on What Americans Fear

Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...

Cyber-Earth project puts climate-change impacts on the map
From The Computing Community Consortium Blog

Cyber-Earth project puts climate-change impacts on the map

The following is a guest blog post by CCC Council Member Shashi Shekhar, McKnight Distinguished University Professor Department of Computer Science College of Science...

Leave School Now While You Still Know It All
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Leave School Now While You Still Know It All

Interesting questions appear on Twitter all the time. Sometimes addressed to individuals and sometimes addressed to the Twitterverse as a whole. One earlier today...

From Computational Complexity

Sipser Symposium

On Sunday we had the Symposium on Theoretical Computer Science on the Occasion of Michael Sipser's 60th birthday to celebrate what Mike has brought to research...

Rankings Everywhere
From My Biased Coin

Rankings Everywhere

Like many (theoretical) computer scientists, I spent far, far too much time this weekend thinking about rankings.  Well, really, it was more that I was being far...

The zombiefication of business travelers
From Putting People First

The zombiefication of business travelers

Tim Askew, CEO of Corporate Rain International, explains how technology is increasingly isolating us from each other and stifling creativity and real experiences...

Two States–the Highs and the Lows
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Two States–the Highs and the Lows

I found this image on Facebook last week and it really rang true for me. I experienced both sides of this recently. On one hand I wrote a program on the spur...

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

Scene Understanding and Labeling Pixels
From The Eponymous Pickle

Scene Understanding and Labeling Pixels

A problem I looked at for a startup a few years ago.  Ultimately it was chosen to address it by using crowdsourcing.  Here a Vimeo interview with Stephen Gould"...

Watson Analytics Seen Today
From The Eponymous Pickle

Watson Analytics Seen Today

Watson Analytics    Have yet to get a beta loaner, but today I did get several more in depth demonstrations of the idea.  In one case I was able to at least suggest...

Whole Foods Digital Signage
From The Eponymous Pickle

Whole Foods Digital Signage

Whole Foods Store of the future utilizes digital signage.  They have been innovators in this space for some time.   " .... Whole Foods has unveiled a new range...

USPS to Test Delivery of Groceries
From The Eponymous Pickle

USPS to Test Delivery of Groceries

The idea has been suggested for years, now finally the Feds have approved a test.  Why not?   " ... Federal authorities have given approval for the U.S. Postal...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Five things marketers can learn from designers
From Putting People First

Five things marketers can learn from designers

Why are highly successfully companies putting top-notch designers in key leadership roles, ask David Weber and Lisa Leslie Henderson. What are designers bringing...

Best practices for medical app development go beyond standard UX
From Putting People First

Best practices for medical app development go beyond standard UX

Mobile healthcare app development poses a set of challenges very different from mainstream apps. Not only is security an area that requires a considerable attention...

From Gödel's Lost Letter and P=NP

Rebooting Computing

How to beat the end of Moore’s Law Elie Track and Tom Conte were co-chairs of the recently-held Third IEEE workshop on Rebooting Computing. Tom is a computer architect...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Welcome, Attorneys!
From My Biased Coin

Welcome, Attorneys!

You might wonder why I am welcoming attorneys to the blog.  Well, I happen to know that some attorneys read my blog.  I know this because recently, as an expert...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account