acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Neuromarketing and Consumer Behavior
From The Eponymous Pickle

Neuromarketing and Consumer Behavior

Had not seen this site before.  Here it is looks at a number of neuromarketing tests and associated data.  Useful thoughts, in particular about the limitations"...

Apps as Medical Devices
From The Eponymous Pickle

Apps as Medical Devices

Apps and their regulation:  Agree, this is a big deal.  " ... The potential of medical apps to improve care and lower costs is enormous. But if developers don’t...

CSTA Board of Directors Election
From Computer Science Teachers Association

CSTA Board of Directors Election

The election for six open positions of the CSTA Board of Directors is underway. If you were a CSTA member as of April 1, you should have received an email with...

The financial value of open source software
From Daniel Lemire's Blog

The financial value of open source software

We all rely daily on free and open source software, whether we know it or not. The entire Internet is held together by open source software. The cheap router that...

My FDG 2014 Cruise Ship Conference Experience
From The Female Perspective of Computer Science

My FDG 2014 Cruise Ship Conference Experience

You may recall that I was going to a conference on a cruise ship in April.  Well, I'm back from Foundations of Digital Games 2014 and am happy to report that Iall...

Whether it’s bikes or bytes, teens are teens
From Apophenia

Whether it’s bikes or bytes, teens are teens

(This piece was written for the LA Times, where it was published as an op-ed on April 11, 2014.) If you’re like most middle-class parents, you’ve probably gotten...

GoGo Wireless Adds Surveillance Capabilities for Government
From Schneier on Security

GoGo Wireless Adds Surveillance Capabilities for Government

The important piece of this story is not that GoGo complies with the law, but that it goes above and beyond what is required by law. It has voluntarily decided...

WATCH Talk – Deborah Frincke on “Education and Training ­ NSA/CSS Style”
From The Computing Community Consortium Blog

WATCH Talk – Deborah Frincke on “Education and Training ­ NSA/CSS Style”

The next WATCH Talk is scheduled for April 17 at noon EST. Deborah Frincke will discuss Education and Training within the National Security Agency/Central Security...

AI Coming back.  What Will it look Like Now?
From The Eponymous Pickle

AI Coming back. What Will it look Like Now?

Short piece on a number of examples how what we called AI is coming back.   Multiple and extended projects in the 90's led to real results, but not to extended...

Interesting Links–14 April 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links–14 April 2014

Crazy busy weekend for me. The weather was great and I got a lot done outside. Left me too tired to write this up last night. Sorry for the early birds who usually...

Code: Echo–Programming Challenge
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Code: Echo–Programming Challenge

Using a coding challenge as a promotional event for a movie? This is a new one on me but it looks interesting. What I especially like is that they are sharing resources...

Summer Work for Computer Science and Robotics Instructors
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Summer Work for Computer Science and Robotics Instructors

If you are a member of the CSTA you should have received this announcement via email. BUT if you didn’t or you are not a CSTA member (why not?) I thought this worth...

From Computational Complexity

Factorization in coNP- in other domains?

I had on an exam in my grad complexity course to show that the following set is in coNP FACT = { (n,m) : there is a factor y of n with 2 \le y \le m } The answer...

Diamond Cartel
From The Eponymous Pickle

Diamond Cartel

Mark J Perry on the ultimate market manipulation, the diamond cartel.  Perception, however manipulated, is reality.

Metadata Lifecycle Management Considerations
From The Eponymous Pickle

Metadata Lifecycle Management Considerations

An interesting diagrammatic look at the lifecycle of metadata.  Everything has a lifecycle, but the question is always: To what degree do we have to pay close attention...

Gamification as a Mainstream Approach
From The Eponymous Pickle

Gamification as a Mainstream Approach

Short piece in CIO Insight: Makes the case that gamification is in common internal and external use. And quotes:" ... Accenture points out that gamification isn't...

Magic of Shelf Level Eye Contact
From The Eponymous Pickle

Magic of Shelf Level Eye Contact

In Supermarket News: Shelf level eye contact can make a big difference.  It was one of the first things we attempted to accurately quantify when designing shelf...

Building Loyal Customers
From The Eponymous Pickle

Building Loyal Customers

Knowledge@Wharton:  In an information age.  " .... While the digital age has changed the rules of marketing, a panel of experts at the recent Wharton Marketing...

KDNuggets for Analytics
From The Eponymous Pickle

KDNuggets for Analytics

Long before Big Data there was KDNuggets.  Well worth the follow.   Which is a  " ... Data Mining Community Top Resource for Analytics, Data Mining, and Data Science...

Emergence of Embed-able Tech
From The Eponymous Pickle

Emergence of Embed-able Tech

CNN Tech on the emergence of embed-able  technology.  With some good current examples. Probably not as adaptable as wearable, but more convenient.  So when do we...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account