acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSA Collects Hundreds of Millions of Text Messages Daily
From Schneier on Security

NSA Collects Hundreds of Millions of Text Messages Daily

No surprise here. Although we some new codenames: DISHFIRE: The NSA's program to collect text messages and text-message metadata. PREFER: The NSA's program to...

Dangers fom the Internet of Things
From The Eponymous Pickle

Dangers fom the Internet of Things

The Internet of Things will provide new sources of data from a increasing number of devices.  The Smart Home will be a particular source of connectivity for the...

Passing of the Professor
From My Biased Coin

Passing of the Professor

Sadly, "The Professor", Russell Johnson, has passed away.  I enjoyed Gilligan's Island as a kid.  I can't help but think that his portrayal deeply affected people's...

Reverse Bell Curve In Programming Projects
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Reverse Bell Curve In Programming Projects

I have some 60+ students working on end of semester projects these days. I have one section of Honors Programming and two sections of Explorations in Computer Science...

Testing
From ACM-W supporting, celebrating and advocating for Women in Computing

Testing

This is a test

SIERRAMONTANA: NSA Exploit of the Day
From Schneier on Security

SIERRAMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SIERRAMONTANA (TS//SI//REL) SIERRAMONTANA provides persistence for DNThere...

Today I Briefed Congress on the NSA
From Schneier on Security

Today I Briefed Congress on the NSA

This morning I spent an hour in a closed room with six Members of Congress: Rep. Logfren, Rep. Sensenbrenner, Rep. Scott, Rep. Goodlate, Rep Thompson, and Rep....

Edward Elgar's Ciphers
From Schneier on Security

Edward Elgar's Ciphers

Elgar's cryptography puzzles from the late 1890s.

CW Guide to R Resources
From The Eponymous Pickle

CW Guide to R Resources

In ComputerWorld:  What looks to be a very good set of documents and links for using the data analytics language R.  Continuing to establish itself as the language...

Augmented Reality Museum Tour
From The Eponymous Pickle

Augmented Reality Museum Tour

From Metaio.  Here using the example of a  museum tour.  An excellent example of the use of augmented reality.  Combining physical and artificial spaces to provide...

An Electronic Nose to Detect State of Health
From The Eponymous Pickle

An Electronic Nose to Detect State of Health

Looking at the Electronic nose again.  We were primarily interested in detecting engaging aromas in coffee.  Now In Knowledge @ Wharton: " ... Samuel M. Khamis,...

Essentials of Business Analytics
From The Eponymous Pickle

Essentials of Business Analytics

Continue to make my way through this new text.  Which seeks to position the three kinds of analytics: Descriptive, Predictive and Prescriptive.  As I have preached...

From Computational Complexity

Favorite Theorems: Introduction

I was invited to give a talk at the FST&TCS conference held in December 1994 in Madras (now Chennai). As I searched for a topic, I realized I was just finishing...

Cell Phone Tracking by Non-State Actors
From Schneier on Security

Cell Phone Tracking by Non-State Actors

This is interesting: Adding credence to the theory that Brooklyn landlord Menachem Stark was kidnapped and murdered by professionals, a law enforcement source ...

From Gödel's Lost Letter and P=NP

Bounds On Binomial Coefficents

A simple but useful bound on binomial coefficients Andreas von Ettingshausen was a German mathematician and physicist who lived in the early part of the 19 century...

SCHOOLMONTANA: NSA Exploit of the Day
From Schneier on Security

SCHOOLMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SCHOOLMONTANA (TS//SI//REL) SCHOOLMONTANA provides persistence for DNThere...

Behavioral Research in System 1 vs System 2
From The Eponymous Pickle

Behavioral Research in System 1 vs System 2

If you have been following some recent advances in thinking about cognition: " ... Charles Young examines what we can learn about measuring ad effectiveness byvia...

January/February Analytics Magazine
From The Eponymous Pickle

January/February Analytics Magazine

The latest issue of the always useful Analytics Magazine is now available.  Cover articles include analytics careers and consulting.  Good spread of detail and"...

Google Nests in the Smart Home
From The Eponymous Pickle

Google Nests in the Smart Home

We actively experimented with smart home systems, solutions and configuration.  Google's investment in the Nest thermostat indicates a big investment in a key part...

Bias in Strategy Decisions
From The Eponymous Pickle

Bias in Strategy Decisions

Bias, or what we often saw:  'confirmation bias'  is a key danger in any kind of research or decision process.  This is particularly important in less defined strategy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account