acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

BigDataLens Revisited
From The Eponymous Pickle

BigDataLens Revisited

I revisited the site of BigDataLens.  Most interesting, their blog.  A form of interestingly constructed pattern recognition / predictive analytics.  Worth a look...

Nature of Creativity of the Brain
From The Eponymous Pickle

Nature of Creativity of the Brain

Replay of some recent talks and discussion at the Santa Fe Institute.   " ... Creativity is a key ingredient of both science and art, but how much can scientific...

22 Of The Most Powerful Women Engineers In The World
From The Computing Community Consortium Blog

22 Of The Most Powerful Women Engineers In The World

  We often hear about the dearth of women in computer science and engineering fields. Many organizations are working hard to attract and retain women in these fields...

How Google Glass Snoops Steal Your Passcode
From Schneier on Security

How Google Glass Snoops Steal Your Passcode

Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...

Augmented Pixels Update
From The Eponymous Pickle

Augmented Pixels Update

I am following a number of Augmented Reality companies.  Here are the latest updates from Augmented Pixels. in Odessa. " ... First of all, Large Silicon ValleyFull...

Managing Supply Chain Risk
From The Eponymous Pickle

Managing Supply Chain Risk

In CGMA Mag:   Good ideas here.   You can can manage your risks, often by simulating alternatives.   " ... A global poll of more than 1,000 senior executives by...

Facts about the Internet of Things
From The Eponymous Pickle

Facts about the Internet of Things

Some obvious yes, but useful thoughts about the internet of things." ... If something isn't connected to the Internet—whether human, animal, household appliance...

From Gödel's Lost Letter and P=NP

High School Theorems

Taking a conjecture about identities to college Alex Wilkie is a Fellow of the Royal Society, and holds the Fielden Chair in Mathematics at the University of Manchester...

This Common Home Appliance Can Compromise Your Entire Security
From Schneier on Security

This Common Home Appliance Can Compromise Your Entire Security

LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...

Lovelace Test versus Turing Test
From The Eponymous Pickle

Lovelace Test versus Turing Test

More powerful in testing machine intelligence than the Turing test, it is claimed, from Slashdot.   I had not heard of this particular term.  A generalized nonarticle...

From Computational Complexity

Is there a word for the top part of a binomial coefficient?

Consider the sequence: x/y,  (x+1)/y, (x+2)/y, ..., (x+z)/y one could say  in this sequence of fractions the numerators goes through z-1 consecutive numbers. ...

You Can Be An Advocate!
From Computer Science Teachers Association

You Can Be An Advocate!

Yes, you can! If I can be an advocate you can be one too! It is not difficult to get started. I began by advocating at my school site for computer science with...

Microsoft Research Faculty Summit will be Live Streamed!
From The Computing Community Consortium Blog

Microsoft Research Faculty Summit will be Live Streamed!

The 15th Annual Microsoft Research Faculty Summit is taking place July 14-15, 2014 in Redmond, WA.  There is an exciting program planned with topics including computing...

Google Map Hacking
From The Eponymous Pickle

Google Map Hacking

Had never heard of this, but in Wired.  It is a pretty serious thing if a supposedly perfect map and associated business list is hacked. It is happening.  A Danger...

Update on “Patching is Not Security”
From CERIAS Blog

Update on “Patching is Not Security”

A few weeks ago, I wrote a post entitled “Patching Is Not Security.” Among other elements, I described a bug in some Linksys routers that was not patched and was...

Update on “Patching is Not Security”
From CERIAS Blog

Update on “Patching is Not Security”

A few weeks ago, I wrote a post entitled “Patching Is Not Security.” Among other elements, I described a bug in some Linksys routers that was not patched and was...

The Cost of Contemporary Policing: A Review of Alice Goffman’s ‘On the Run’
From Apophenia

The Cost of Contemporary Policing: A Review of Alice Goffman’s ‘On the Run’

Growing up in Lancaster, Pennsylvania in the 80s and 90s, I had a pretty strong sense of fear and hatred for cops. I got to witness corruption and intimidation...

NSA Spied on Prominent Muslim Americans
From Schneier on Security

NSA Spied on Prominent Muslim Americans

The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...

What is Hadoop?
From The Eponymous Pickle

What is Hadoop?

A non technical introduction by colleague Bernard Marr, nicely done, an intro to some big data concepts  as well.

Barriers to Open Innovation
From The Eponymous Pickle

Barriers to Open Innovation

With a link to a broader article: Interview with Anders Hjalmarsson of Viktoria Swedish ICT, Götegorg, Sweden. Author of “Beyond Innovation contest: a framework...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account