acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security and Human Behavior (SHB 2014)
From Schneier on Security

Security and Human Behavior (SHB 2014)

I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...

Reliably Teleporting Data
From The Eponymous Pickle

Reliably Teleporting Data

In the NYT:   Considerably commented on. Still a simple example, but an indication that quantum physics can be the basis for action at a distance.Scientists inIn...

Companies with Top Global Supply Chains
From The Eponymous Pickle

Companies with Top Global Supply Chains

By peer review in Gartner.   Having been involved in the design aspects of these for many years, it's good to see the short section on the aspects of the exceptional...

Programmatic Buying at P&G
From The Eponymous Pickle

Programmatic Buying at P&G

Programmatic Ad Buying.  A means of digitizing a key aspect of CPG enterprise operations.  As I have mentioned before we did this kind of thing as early as the...

Sharing City Seoul: a model for the world
From Putting People First

Sharing City Seoul: a model for the world

The Seoul city government has officially embraced the sharing economy by designating Seoul a Sharing City and is working in partnership with NGOs and private companies...

IKEA’s Life At Home report
From Putting People First

IKEA’s Life At Home report

Core77 has drawn my attention to IKEA’s newly launched Life At Home report, which explores the home lives of people all over the globe, with a focus on the morning...

Tour of Machine Learning Methods
From The Eponymous Pickle

Tour of Machine Learning Methods

Very nice overview.  Suitable as a starting point for talking to management.  This includes both a description of the algorithm, and the underlying method for using...

Tetris at 30, Simplicity and Engagement
From The Eponymous Pickle

Tetris at 30, Simplicity and Engagement

The game phenomenon called Tetris is now only 30 years old.  We were shown it as as an example of simplicity combined with engagement.  An interview with the creator...

Comparing Wolfram Alpha and Watson
From The Eponymous Pickle

Comparing Wolfram Alpha and Watson

A conversation recently led to discussion of the differences between IBM Watson and Wolfram Alpha. So what are the differences?   Our own experiences with 'expert...

Google Nearby
From The Eponymous Pickle

Google Nearby

The idea of 'nearby' is a classic locational switch.  Google rumored to integrate it into its abilities.  Similar to iBeacon capabilties? Likely as the need to...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

From Computational Complexity

Do you support CCC's declaration of Ind? If so...

The steering committee for the CCC recently announced its decision to be independent of IEEE. Here is their open letter to that effect. If you agree with thishere...

Robotic Hands that Can See
From The Eponymous Pickle

Robotic Hands that Can See

Had seen this proposed a long time ago.  Now reported in New Scientist.  Not so much hands free as hands augmented.   And with multiple seeing hands we could readily...

Mini-Course 2014: Survey Results
From The Female Perspective of Computer Science

Mini-Course 2014: Survey Results

After a one-year hiatus, I ran my all-girls mini-course on computer science and games again this past May.  Along with a picture of my lovely class, I wanted to...

Big Data and Value for Retail
From The Eponymous Pickle

Big Data and Value for Retail

I have heard relatively few retail examples of big data value.  Here is a take on that." ... According to research by Wipro, 78 percent of retailers are collecting...

Data Science Research Center
From The Eponymous Pickle

Data Science Research Center

Launched this week by Data Science Central.  Of interest.  Examining it now.  " .... Data Science Central launched this week the Data Science Research Center, a...

ACM Fellow Leslie Lamport
From The Eponymous Pickle

ACM Fellow Leslie Lamport

Have followed the ACM for years.  I try to read some of the the work of each Turing Award Recipient.Welcome to the Digital Edition of the June 2014 Communications...

NSF, Intel Labs Partner on Cyber-Physical Systems Security and Privacy
From The Computing Community Consortium Blog

NSF, Intel Labs Partner on Cyber-Physical Systems Security and Privacy

The following is a special contribution to this blog by Keith Marzullo, division director for the National Science Foundation’s (NSF) Division of Computer and Network...

From Gödel's Lost Letter and P=NP

Is This a Proof?

Seeking the limits of mathematical proofs Ivan Vinogradov was a famous mathematician who created a whole method, named after him, that allowed him to make major...

From Gödel's Lost Letter and P=NP

Is This a Proof?

Seeking the limits of mathematical proofs Ivan Vinogradov was a famous mathematician who created a whole method, named after him, that allowed him to make major...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account