acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Beacons in Retail
From The Eponymous Pickle

Beacons in Retail

More on Beacons in retail.   " ... Beacons are showing up everywhere. It's open season for retailers as more apps are developed to take advantage of beacon technology...

NSF CISE Core Program Solicitations Posted
From The Computing Community Consortium Blog

NSF CISE Core Program Solicitations Posted

The National Science Foundation, Directorate for Computer & Information Science & Engineering (CISE) Core Program solicitations have been posted. There are no major...

Origami-Inspired Robots Spring to Life
From The Computing Community Consortium Blog

Origami-Inspired Robots Spring to Life

Inspired by the traditional Japanese art form of origami, researchers from Harvard University and Massachusetts Institute of Technology (MIT) have figured out how...

E-Commerce and Physical Retail
From The Eponymous Pickle

E-Commerce and Physical Retail

In the HBR Blogs:  Suggesting that e-commerce is not as divisive to physical as is assumed.  May require some registration.  The statistics are interesting" ......

New Snowden Interview in Wired
From Schneier on Security

New Snowden Interview in Wired

There's a new article on Edward Snowden in Wired. It's written by longtime NSA watcher James Bamford, who interviewed Snowden is Moscow. There's lots of interesting...

Stress Scanning Camera
From The Eponymous Pickle

Stress Scanning Camera

In the South China Morning Post: Another example of emotion detection by imaging and analysis:" ... Chinese scientists develop mini-camera to scan crowds for potential...

Security as Interface Guarantees
From Schneier on Security

Security as Interface Guarantees

This is a smart and interesting blog post: I prefer to think of security as a class of interface guarantee. In particular, security guarantees are a kind of correctness...

From Gödel's Lost Letter and P=NP

Our Three Body Problem

The three body problem, computer theory style Ellis Horowitz is one of the founders of the theory of algorithms. His thesis with George Collins in 1969 had the...

Connection Analytics from Teradata
From The Eponymous Pickle

Connection Analytics from Teradata

Been some time since I have worked with Teradata, but I see they are supporting an Ovum white paper on connection analytics.  Understand it as described, though...

Humor at Work
From The Eponymous Pickle

Humor at Work

My former colleague Andrew Tarvin does a TED talk on Humor at work.  Also on Facebook.  He is now a Humor Engineer at Humor that Works.  Nice idea for the enterprise...

Glasses Get More Augmentation Software
From The Eponymous Pickle

Glasses Get More Augmentation Software

Have always made a point that applications for wearable glasses, like Google Glass, are most valuably applied to augmented reality applications.  Mentioned this...

3D Printing Moves into Production
From The Eponymous Pickle

3D Printing Moves into Production

Good view of examples of how realistic commercial 3D printing is being used in manufacturing and how it may realign supply chain systems.  Still narrow domains...

Automatic Scanning for Highly Stressed Individuals
From Schneier on Security

Automatic Scanning for Highly Stressed Individuals

This borders on ridiculous: Chinese scientists are developing a mini-camera to scan crowds for highly stressed individuals, offering law-enforcement officers a...

Hospitals Mining Your Credit Card Behavior
From The Eponymous Pickle

Hospitals Mining Your Credit Card Behavior

In Businessweek.  This scenario has been much in the news. It is starting to happen:" ... Imagine getting a call from your doctor if you let your gym membership...

Hospitality Robotics Experiment at Starwood
From The Eponymous Pickle

Hospitality Robotics Experiment at Starwood

Robots in Hotels.  Perhaps not really as multi-functional as what we could call butlers. But you can see how they can be applied. Now how will this influence employment...

From Computational Complexity

Subhash Khot wins Nevanlinna

At the opening ceremonies of the International Congress of Mathematicians in 2014, Subhash Khot was awarded the Rolf Nevanlinna Prize, given every four years to...

Report on the CSTA Annual Conference
From Computer Science Teachers Association

Report on the CSTA Annual Conference

This past July 14-15, 326 attendees converged on St. Charles, Illinois, for the 2014 CSTA Annual Conference. This number continues the impressive growth of the...

Expanding cybersecurity and privacy research
From The Computing Community Consortium Blog

Expanding cybersecurity and privacy research

The National Science Foundation (NSF)‘s Secure and Trustworthy Cyberspace (SaTC) program has announced two Frontier-scale projects, part of a $74.5 million investment...

Challenges for Google Glass
From The Eponymous Pickle

Challenges for Google Glass

Good Wired piece on the challenges for the success of Google Glass.  In our own enterprise experiment we also met some of these same issues.  Still have not seen...

Forgetting Leads to Memory Holes in the Web
From The Eponymous Pickle

Forgetting Leads to Memory Holes in the Web

The EU rulings that you could ask for posts to be removed from Google web searches have led to more unusual and unexpected results.  Not that there are not already...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account