acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Capturing Sentiment from Financial News
From The Eponymous Pickle

Capturing Sentiment from Financial News

From the ACM:   Talk on determining sentiment and prediction from text analysis in financial news.  This requires filling out a registration.  " ... Can the choice...

How  Retail Hacking Works: Danger at Point of Sale
From The Eponymous Pickle

How Retail Hacking Works: Danger at Point of Sale

A very instructive piece in the Cisco Blog about how retail hacking at point of sale works, and how it can be addressed.  Must reading.   " ... With the announcement...

Interview with Jim Goodnight
From The Eponymous Pickle

Interview with Jim Goodnight

An interview in Forbes with SAS data guru and founder Jim Goodnight.  Met him a number of times during their work with our enterprise, always interesting.  Some...

Digital Transforming Retail
From The Eponymous Pickle

Digital Transforming Retail

How digital is transforming retail: The view from eBayDoes mobile commerce spell the end of traditional stores? In this series of short videos, Devin Wenig, the...

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another
From Schneier on Security

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another

Preparing the Ghost: An Essay Concerning the Giant Squid and Its First Photographer, by Matthew Gavin Frank. As usual, you can also use this squid post to talk...

NIST Second Privacy Engineering Workshop on September 15-16 in San Jose
From U.S. Public Policy Committee of the ACM

NIST Second Privacy Engineering Workshop on September 15-16 in San Jose

The National Institute for Standards and Technology (NIST), in coordination with the International Association of Privacy Professionals (IAPP), will host the Second...

Auctioneers Join Forces
From The Eponymous Pickle

Auctioneers Join Forces

More in the auction management space.   Which has many interesting ontological implications.  " ...  Six leading regional auction houses have joined forces to launch...

McKinsey on the Next 50 Years
From The Eponymous Pickle

McKinsey on the Next 50 Years

A new collection of articles from McKinsey.   Just starting to take a look at this.  For example: " ... Management intuition for the next 50 years ... The collision...

Making up Identities
From The Eponymous Pickle

Making up Identities

In Wired: Thoughts on what leads people to change their identity, and the implications. " ... Sockpuppetry—using false identities for deception—is centuries old...

Defining user experience strategy
From Putting People First

Defining user experience strategy

UX strategy isn’t the blueprint, canvas, or definition you use. UX strategy is about the conversations you have and the alignment you achieve, writes Austin Govella...

Human Computer Interaction: Present and Future
From The Eponymous Pickle

Human Computer Interaction: Present and Future

In Computer Now:  Very good,  extensive view of the topic. Increasingly important was we use systems in new ways. Current and future trends." ... Human-computer...

Security of Password Managers
From Schneier on Security

Security of Password Managers

At USENIX Security this year there were two papers studying the security of password managers: David Silver, Suman Jana, and Dan Boneh, "Password Managers: Attacks...

Draft proceedings of EPIC 2014 conference online
From Putting People First

Draft proceedings of EPIC 2014 conference online

The

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
From CERIAS Blog

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security

[This blog post was co-authored by Professor Samuel Liles and Spaf.] Over the last few days we have seen a considerable flow of news and social media coverage of...

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
From CERIAS Blog

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security

[This blog post was co-authored by Professor Samuel Liles and Spaf.] Over the last few days we have seen a considerable flow of news and social media coverage of...

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
From CERIAS Blog

What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security

[This blog post was co-authored by Professor Samuel Liles and Spaf.] Over the last few days we have seen a considerable flow of news and social media coverage of...

A Dictionary for Text Mining
From The Eponymous Pickle

A Dictionary for Text Mining

An interesting article on the topic.  You need some sort of domain area ontology to understand what you are mining.  We built similar dictionaries for parts of...

Thoughts On The Start of School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thoughts On The Start of School

Today is the eight day of classes for me. By and large the school year is off to a good start. The students are great. I told my students this morning that I was...

Accelerating the Big Data Innovation Ecosystem
From The Computing Community Consortium Blog

Accelerating the Big Data Innovation Ecosystem

In March 2012, the Obama Administration announced the “Big Data Research and Development Initiative.” The goal is to help solve some of the Nation’s most pressing...

Intel Unveils Bracelets
From The Eponymous Pickle

Intel Unveils Bracelets

New kind of wearable, the bracelet.  Intel unveils a 3G simple wearable.  Message display with a jewelry look.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account