acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Lessons Learned While Implementing a Dual Credit Course.
From Computer Science Teachers Association

Lessons Learned While Implementing a Dual Credit Course.

I'd like to share with you some of the opportunities and barriers we encountered while implementing a dual credit CS course in high schools across New Mexico....

Why Innovation Programs Fail
From The Eponymous Pickle

Why Innovation Programs Fail

In Innovation Excellence:  Why Innovation programs fail.  Good elements to consider.  " ... Program managers who don’t establish clear goals, identify key stakeholders...

Blue Sky Ideas Track Being Held at AAMAS 2014
From The Computing Community Consortium Blog

Blue Sky Ideas Track Being Held at AAMAS 2014

This year the Computing Community Consortium (CCC) is sponsoring a Blue Sky Ideas Track at AAMAS, the Thirteenth International Conference on Autonomous Agents and...

Hacking Airline Lounges for Free Meals
From Schneier on Security

Hacking Airline Lounges for Free Meals

I think this is a great hack: A man bought a first-class ticket and used it to have free meals and drinks at the airport's VIP lounge almost every day for nearly...

Software Is Empowering
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Software Is Empowering

Microsoft ran their first ever Super Bowl commercial over the weekend. While it is obviously a advertisement for Microsoft and Microsoft products I see it as an...

iTacit Compliance
From The Eponymous Pickle

iTacit Compliance

Also brought to my attention in the area of employee engagement, training and compliance: iTacit."  ... iTacit is a next-generation technology company that builds...

Rethinking Customer Conversion
From The Eponymous Pickle

Rethinking Customer Conversion

A new look at the process of conversion.  Good thoughts.  " ... As Peter Drucker elegantly said, “the purpose of a business is to create and keep a customer”. ....

Compression is never worth slowing down your code?
From Daniel Lemire's Blog

Compression is never worth slowing down your code?

Should you ever compress your data to reduce memory usage? We are in 2050. Nobody uses tapes or disks anymore. The NSA has 1 billion servers. It needs so many to...

More Chromecast Apps
From The Eponymous Pickle

More Chromecast Apps

A systems developer kit for the Chromecast.    Had cause to look at devices like the Google Chromecast recently for potential retail display applications.  This...

IARPA Explores Methods to Build Human Analytical Skills
From The Eponymous Pickle

IARPA Explores Methods to Build Human Analytical Skills

A project to which I am connected started last week.    Will continue to provide updates in this space as I can.Adam Russell: IARPA Explores Methods to Build Human...

NSF awards grants to US-Japan partnership projects for next-generation networking technologies
From The Computing Community Consortium Blog

NSF awards grants to US-Japan partnership projects for next-generation networking technologies

In May of 2013, we reported that the National Science Foundation (NSF) and the National Institute of Information and Communications Technology (NICT) of Japan signed...

JUNIORMINT: NSA Exploit of the Day
From Schneier on Security

JUNIORMINT: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: JUNIORMINT (TS//SI//REL) JUNIORMINT is a digital core packaged in both a mini...

NSF Distinguished Lecture – Embedded Phenomena:Technologies for Making Believe and Building Understanding
From The Computing Community Consortium Blog

NSF Distinguished Lecture – Embedded Phenomena:Technologies for Making Believe and Building Understanding

The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a Distinguished Lecture on...

Beyond Data Science Tookits
From The Eponymous Pickle

Beyond Data Science Tookits

In Data Science Central, a post by Peter Higdon about a number of resources for the beginning data scientist.  Courses, videos, definitions, etc.   Usefully done...

Hill Tech Happenings, Week of February 3
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 3

February 4 Hearing: The Senate Judiciary Committee will hold a hearing on data breaches and cybercrime. 10:15 a.m., 226 Dirksen Building February 5 The Commerce...

Evaluating Product Pricing
From The Eponymous Pickle

Evaluating Product Pricing

On evaluating product pricing, a long time analytics methodology for retail and CPG.    How can pricing be disruptive and what are the long term and short term...

From Gödel's Lost Letter and P=NP

Regression On Arithmetic Progressions

How far can trivial ideas go? Klaus Roth is famous for many results, but two stand out above all others. One sets limits on Diophantine approximations to algebraic...

From Computational Complexity

Contribute to the Martin Gardner Centennial

Dana Richards emailed us about a place to write how Martin Gardner influenced you. You can leave such comments here.  I left a comment there, but I expand it for...

CSEC Surveillance Analysis of IP and User Data
From Schneier on Security

CSEC Surveillance Analysis of IP and User Data

The most recent story from the Snowden documents is from Canada: it claims the CSEC (Communications Security Establishment Canada) used airport Wi-Fi information...

Interesting Links 3 February 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 3 February 2014

Starting the second week of a new semester today. Last week was interesting. It was a major adjustment because with a new group of students I had to reset my expectations...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account