acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Why AP
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why AP

Sometimes you miss something by reading a blog post too early. Such is the case with a recent post by Mark Guzdial - Python is the most popular intro language:Laura...

Reaching the Customer in Real Time
From The Eponymous Pickle

Reaching the Customer in Real Time

To reach the right customer, in the right place and time, with the right offer—perhaps a chicken dinner—you need real-time actionable insight ...   From IBM.Watch...

Visual Search in Apps
From The Eponymous Pickle

Visual Search in Apps

Accurate visual search for shopping was a particular are of interest.  An example:" ... Slyce Inc Signs Agreement with Leading Grocery App Network PDN to Provide...

Improving Retail Employee Enthusiasm
From The Eponymous Pickle

Improving Retail Employee Enthusiasm

A long time ago an enterprise I worked in was talking about acquiring a coffee emporium operation what was to become very successful.   But the talk always went...

Rural Telemedicine
From The Eponymous Pickle

Rural Telemedicine

Lots of news out there on using video conferencing systems for Telemedicine.  Some hospital systems are starting to use it broadly to extend their reach, especially...

From Computational Complexity

Complexity versus Algorithms: The FOCS Challenge

In recent years, I've heard complaints from my complexity colleagues that FOCS and STOC are mostly algorithms and from the algorithm buddies that STOC and FOCSFOCS...

US Air Force is Focusing on Cyber Deception
From Schneier on Security

US Air Force is Focusing on Cyber Deception

The US Air Force is focusing on cyber deception next year: Background: Deception is a deliberate act to conceal activity on our networks, create uncertainty and...

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
From Schneier on Security

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers

Last October, I broke the story about the NSA's top secret program to inject packets into the Internet backbone: QUANTUM. Specifically, I wrote about how QUANTUMINSERT...

New Multi-Year Initiative from NSF on the Professional Formation of Engineers is Launched
From The Computing Community Consortium Blog

New Multi-Year Initiative from NSF on the Professional Formation of Engineers is Launched

The Engineering Directorate at the National Science Foundation (NSF) has launched a new multi-year initiative to create and support an “innovative and inclusive”...

Back to Work
From My Biased Coin

Back to Work

Harvard classes start up in a few weeks, and officially, my sabbatical is over.  I'm back in my office, trying to get back into a Harvard routine.I notice thatAnalysis...

Computer Science and "Makered"
From Computer Science Teachers Association

Computer Science and "Makered"

Are you a Maker? Do you even know what that is? And how, exactly, is this related to Computer Science? The exact lineage of the Maker Movement is debatable. The...

How Small Changes in a Game's Story Can Make a Huge Difference
From The Female Perspective of Computer Science

How Small Changes in a Game's Story Can Make a Huge Difference

I recently wrote to the author of a book I love, Think Like a Programmer.  I had wanted to ask some questions related to using the book for one of our first year...

Analytics as Model for Customer Service
From The Eponymous Pickle

Analytics as Model for Customer Service

From the Cisco Blog: A good simplified, decision oriented view of solving data needs to provide personalized customer service. I like the close inclusion of the...

An Introductory Look at Marketing Mix
From The Eponymous Pickle

An Introductory Look at Marketing Mix

A simplified look by a student, at the marketing mix problem using SAS.  Nicely presented.  A classic problem solved by every company that needs to determine advertising...

NSA/GCHQ/CESC Infecting Innocent Computers Worldwide
From Schneier on Security

NSA/GCHQ/CESC Infecting Innocent Computers Worldwide

There's a new story on the c't magazin website about a 5-Eyes program to infect computers around the world for use as launching pads for attacks. These are not...

Interesting Links–18 August 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links–18 August 2014

Seems like I spent all my time last week doing last minute tasks before school starts. Getting cars inspected and reregistered for example. And a haircut that my...

Memorable and Useful Visualizations
From The Eponymous Pickle

Memorable and Useful Visualizations

Should data visualization be memorable?  Or should it be the best starting point for interacting with data using analytics, or decision processes to improve?  That...

Telepresence via Mobile Robotics
From The Eponymous Pickle

Telepresence via Mobile Robotics

Story of the visit of a conference via a mobile robot.  The idea is simple, practical to a certain degree.   Has been mocked in TV ads. Not quite the same experience...

More Humor at Work
From The Eponymous Pickle

More Humor at Work

More from Andrew Tarvin on Humor at work.  Why does humor matter?: The infographic.  Again see his site for much more.   Always liked the idea, but it is harder...

Negroponte on the Future
From The Eponymous Pickle

Negroponte on the Future

Founder of the Media Lab, gives a TED talk on a 30 year History of the Future ...  We were members of the MIT Media Lab for years and enjoyed his thoughts then.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account