acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Supply and Demand of Data Scientists
From The Eponymous Pickle

Supply and Demand of Data Scientists

Bruce Langos, COO of Teradata gave a spirited talk today in the atrium of Wright State University today on the nature of the data scientist.   The talk was also...

3D Printing Your Big Data for Understanding
From The Eponymous Pickle

3D Printing Your Big Data for Understanding

In Technology Review: Fascinating idea. As 3D printing becomes cheaper, you can quickly create a 3D physical data representation. (You can add more 'Ds' with indicators...

Help Me Win Surface Pro 3s for My School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Help Me Win Surface Pro 3s for My School

OK so the good news is that I am one of 15 finalists to win 15 Surface Pro's for my favorite school. The winners are chosen by community voting, so please votehttps...

Heading Into Midterms, USACM Re-emphasizes Role Of Technology In Elections
From U.S. Public Policy Committee of the ACM

Heading Into Midterms, USACM Re-emphasizes Role Of Technology In Elections

With mid-term Congressional elections fast approaching, USACM released a statement to emphasize the importance of voting technology in elections.  It echoes past...

What human-centered design means for financial inclusion
From Putting People First

What human-centered design means for financial inclusion

What Human-Centered Design Means for Financial Inclusion Yanina Seltzer, Claudia McKay 16 October 2014, 126 pages Interactive publication Download pdf CGAP has...

Push, pull or nudge
From Putting People First

Push, pull or nudge

“Push, pull or nudge” was the title of a 2.5 hour workshop (video here) at the 5th European Conference on Public Communication held today in Brussels. The workshop...

From Computational Complexity

The Curious Case of NP and NEXP

NP (nondeterministic polynomial time) and NEXP (nondeterministic exponential time) are provably different classes by the nondeterministic time hierarchy. No surprise...

Position Open – Experientia Communications Officer: writer, proofreader & editor
From Putting People First

Position Open – Experientia Communications Officer: writer, proofreader & editor

Experientia, the Turin-based User Experience Consultancy, is looking for a native English speaking Communications Officer to work in their Turin, Italy office....

Mobility Foundation of Digital Enterprise
From The Eponymous Pickle

Mobility Foundation of Digital Enterprise

In Baseline:  Becoming more true.  It is now an expectation that we have access anytime and anywhere. With the right data to support our decisions.   " ...It's...

Mashing up Docs and Spreadsheets
From The Eponymous Pickle

Mashing up Docs and Spreadsheets

In CWorld: I thought this was being done generally, but this is a better way it seems." ... Instead of building a suite of separate productivity apps, a la Microsoft...

NSA Classification ECI = Exceptionally Controlled Information
From Schneier on Security

NSA Classification ECI = Exceptionally Controlled Information

ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...

USACM Focuses On Roadmap In Cybersecurity Framework Comments
From U.S. Public Policy Committee of the ACM

USACM Focuses On Roadmap In Cybersecurity Framework Comments

As part of its work on the Cybersecurity Framework (Framework), the National Institute of Standards and Technology (NIST) sought comments from stakeholders on their...

Thinking about SuperIntelligence
From The Eponymous Pickle

Thinking about SuperIntelligence

Brought to my attention, a new book: Superintelligence: Paths, Dangers, Strategies  by Nick BostromWill be reading.  They write:" ... Superintelligence asks the...

Demonstration of AI Using Quantum Computing
From The Eponymous Pickle

Demonstration of AI Using Quantum Computing

When we first visited quantum computing we suggested that some AI applications, like image analysis, would be good candidates for the technique.  Now this has come...

Towards Big Data Computing at Extreme-Scales
From The Computing Community Consortium Blog

Towards Big Data Computing at Extreme-Scales

Periodically the Computing Community Consortium (CCC) will highlight former CI Fellows to showcase their current research. The following was submitted by Dr. Ioan...

Automatic Storytelling
From The Eponymous Pickle

Automatic Storytelling

Storytelling is a recent topic.  Normally a thing that people do.  To what degree can it be automated with a cognitive system?   The idea has been around for aSome...

With Electronic Medical Records, doctors read when they should talk
From Putting People First

With Electronic Medical Records, doctors read when they should talk

And this can have tragic consequences. Like Ebola death tragic. Abigail Zuger, M.D., shares her own experience: “We do not really know whether dysfunctional software...

Idea vs Implementation–Using What We Learn
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Idea vs Implementation–Using What We Learn

You’re at a great conference and you are hearing all sorts of great ideas. It’s exciting! You hear about tools and techniques that are working wonders in the presenter...

DEA Sets Up Fake Facebook Page in Woman's Name
From Schneier on Security

DEA Sets Up Fake Facebook Page in Woman's Name

This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...

FOXACID Operations Manual
From Schneier on Security

FOXACID Operations Manual

A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account