acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Advanced Cyberinfrastructure Webinar on Solicitations
From The Computing Community Consortium Blog

Advanced Cyberinfrastructure Webinar on Solicitations

On Monday, January 27, 2014, the Division of Advanced Cyberinfrastructure (ACI) in the Computer and Information Science and Engineering (CISE) Directorate at the...

AcuPoll for Tracking Ideas and Decisions
From The Eponymous Pickle

AcuPoll for Tracking Ideas and Decisions

Spoke last week to Jeff Goldstein of AcuPoll.  We had used some of their in-conference technologies to understand how people decide.   The also do online polling...

From Gödel's Lost Letter and P=NP

Anti-Social Networks

Applications of social networks to arbitrary graphs Tim Roughgarden is a faculty member at Stanford, with interests in modern algorithms—my term. So his research...

Following Through
From The Eponymous Pickle

Following Through

I rarely read beginning of the year top ten or efficiency hints, but this is deserves a look.  I am in the midst of several decision processes that need people...

An Anatomist of Crimes, Decisions
From The Eponymous Pickle

An Anatomist of Crimes, Decisions

In the Penn Gazette. About an anatomist of crimes.  Could we do something similar when we look at decisions?  After Action Reviews are one approach we tested, but...

Questioning the Efficacy of NSA's Bulk-Collection Programs
From Schneier on Security

Questioning the Efficacy of NSA's Bulk-Collection Programs

Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...

Home Telepresence Robotics
From The Eponymous Pickle

Home Telepresence Robotics

In IEEE Spectrum.  I recall seeing these proposed for conferences, but never saw one in operation.  We examined something similar for warehouse inventory.  Appears...

LOUDAUTO: NSA Exploit of the Day
From Schneier on Security

LOUDAUTO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: LOUDAUTO (TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...

Twitter and other Social Connections
From The Eponymous Pickle

Twitter and other Social Connections

I actively use Twitter and Google+.   On Twitter I am @FranzD.    Have been on Twitter since almost its conception.   Selectively, some of the posts in this blog...

Aligning Our Program with the CSTA Standards
From Computer Science Teachers Association

Aligning Our Program with the CSTA Standards

Increasing the availability of Computer Science offerings for all students, especially those who are members of underrepresented groups, is going to require anCSTA...

Playing the Varied Games of Life
From The Eponymous Pickle

Playing the Varied Games of Life

I had heard of the startup Knack.  The HBR discusses the process of evaluating the game of life.   And evaluate how you play this game.  Is this useful mostly for...

Are C++ and Java declining?
From Daniel Lemire's Blog

Are C++ and Java declining?

In a recent Dr. Dobb’s article, Binstock announced the decline of Java and C++: By all measures, C++ use declined last year, demonstrating that C++11 was not enough...

Augmented Reality for Wearable Computing
From The Eponymous Pickle

Augmented Reality for Wearable Computing

Integrate your contexts, both on you and around you.   I like the idea of having an all over aumentation as required.  This blog covers related topics. ViaMetaio...

Internet of Industrial Things
From The Eponymous Pickle

Internet of Industrial Things

Have had a number of interesting communications from academics working the industrial edge recently.  Here on the Industrial net of things.   Via GE, includes a...

Using The Technology We Preach
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Using The Technology We Preach

Habits die hard. I printed out some end of year surveys for my students to fill out about me (as teacher) and the courses they were finishing last week. Because...

Adware Vendors Buy and Abuse Chrome Extensions
From Schneier on Security

Adware Vendors Buy and Abuse Chrome Extensions

This is not a good development: To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...

How should we analyse our lives?
From Putting People First

How should we analyse our lives?

Alex “Sandy” Pentland, a professor of computational social sciences at MIT Media Lab and others like him are now convinced that the great academic divide between...

Data Mining Day
From The Eponymous Pickle

Data Mining Day

I am planning to attend:The Center for Business Analytics in the Carl H. Lindner College of Business at the University of Cincinnati is pleased to announceDataWednesday...

View of Gamification Around the World
From The Eponymous Pickle

View of Gamification Around the World

A survey from the gamification summit.  Some interesting, but not detailed examples.  I would not have expected the examples to be very different by region.  I...

Visualizing Growth in Emerging Markets
From The Eponymous Pickle

Visualizing Growth in Emerging Markets

In Tableau Public:   An example of using interactive data visualization to understand expanding markets. Nicely and simply done.  Would be interesting to further...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account