acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Expanding Paths to Online Grocery
From The Eponymous Pickle

Expanding Paths to Online Grocery

Online grocers. An area we watched closely.  It worked then, but selectively.   Has the corner turned? Article contains some good current examples." ... As online...

Rise of Wikidata
From The Eponymous Pickle

Rise of Wikidata

In Computing Now.  Introduced to the idea a year ago.  Worth a further look.  Using Wikipedia data for a centralized source of structured public data makes much...

Real and Virtual Worlds and the Proteus Effect
From The Eponymous Pickle

Real and Virtual Worlds and the Proteus Effect

I covered virtual worlds extensively in this blog in the past.  In particular how they could be used to simulate real work interactions.  See previous posts onon...

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California
From Schneier on Security

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California

Uh oh. And the real story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Self Destructive Electronics
From The Eponymous Pickle

Self Destructive Electronics

IBM win a contract to research the topic.     I recall this idea being discussed before the need became more critical.  " ... The military wants to use self-destructing...

TRINITY: NSA Exploit of the Day
From Schneier on Security

TRINITY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TRINITY (TS//SI//REL) TRINITY is a miniaturized digital core packaged in a...

Another Fake NSA Codename Generator
From Schneier on Security

Another Fake NSA Codename Generator

Generate your own fake TAO implant. This is even more fun than the fake NSA program generator. Sadly, the NSA will probably use these to help develop their R&D...

Natural Language Processing in the Enterprise
From The Eponymous Pickle

Natural Language Processing in the Enterprise

We worked with Stanford on a number of natural language processing oriented problems, including the Talking Mr. Clean effort.    I note that a number of the spin...

Discomfort as Innovation
From The Eponymous Pickle

Discomfort as Innovation

In Innovation Excellence:   I don't see it as the key to innovation.  Yet it is not by itself a bad sign. Some discomfort is always a sign that any change has been...

The rise to power of computer scientists
From Daniel Lemire's Blog

The rise to power of computer scientists

Want to become CEO of a major technology company? Consider the background of the hot CEOs of the hour: Amazon: Jeff Bezos has a degree in electrical engineering...

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation
From The Computing Community Consortium Blog

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation

UPDATE: Due to the potential storm affecting the DC Metro region, this lecture has been postponed. The National Science Foundation (NSF) Directorate for Computer...

Kurzweil Reviews the Movie Her
From The Eponymous Pickle

Kurzweil Reviews the Movie Her

An AI view.  Now beyond Minority Report, and with shades of Siri.   Is this where we are headed?   It does provide an interesting structure to think about how we...

Robotics and The Sochi 2014 Olympic Winter Games
From The Computing Community Consortium Blog

Robotics and The Sochi 2014 Olympic Winter Games

In anticipation of the Sochi 2014 Olympic Winter games, the National Science Foundation (NSF) has partnered with NBC Learn to feature the “Science and Engineering...

Are We Preparing Our Children?
From Computer Science Teachers Association

Are We Preparing Our Children?


SWAP: NSA Exploit of the Day
From Schneier on Security

SWAP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SWAP (TS//SI//REL) SWAP provides software application persistence by exploiting...

Interactive Storytelling in Games: Next Steps
From The Female Perspective of Computer Science

Interactive Storytelling in Games: Next Steps

Last night I gave a lecture for our undergrad society on some of the more interesting recent developments in interactive storytelling, along with a preview of my...

“It’s Complicated” is dedicated to Peter Lyman
From Apophenia

“It’s Complicated” is dedicated to Peter Lyman

As people start to get copies of my book, I want to offer more context to the brief dedication at the front of the book. “It’s Complicated” is dedicated to my beloved...

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund
From The Computing Community Consortium Blog

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund

The Mozilla Gigabit Community Fund was announced on February 6, 2014 as a partnership between the Mozilla Foundation, the National Science Foundation (NSF) and US...

iBeacon and Shopping Behavior
From The Eponymous Pickle

iBeacon and Shopping Behavior

In Mashable: More looks into location based shopping information.   With some obvious comments:  " ... Will consumers embrace Apple and iBeacon's nearly frictionless...

Hangout for the Enterprise
From The Eponymous Pickle

Hangout for the Enterprise

Although I have now tested Google+ Hangouts a number of times, have never tried to work with it under enterprise constraints.   A new service permits greater connectivity...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account