acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Visualization Errors and Design
From The Eponymous Pickle

Visualization Errors and Design

Some common errors in visualization.  Good to think about, but I am not sure these are the most important errors you could make.    But the final section is right...

High Expectations for Health Big Data
From The Eponymous Pickle

High Expectations for Health Big Data

As expected, rich expectations, but also many constraints that are still untested.  And lack of understanding of the possibilities." ... Survey results released...

Roots of Visual Mapping and Analytical Method
From The Eponymous Pickle

Roots of Visual Mapping and Analytical Method

Brought to my attention, a set of interesting historical examples of visual mapping.  It's a very old idea that is still useful to describe a complex system before...

Shopkick to be Re-examined
From The Eponymous Pickle

Shopkick to be Re-examined

Went back to their site,  They have a nice video playing now that shows how it works.  We looked at them early on.  They say:  " .... Over 6 million people love...

Disruptive Pricing in Consumer Products
From The Eponymous Pickle

Disruptive Pricing in Consumer Products

In Progressive Grocer, some thoughts on the complexity of this decision process.  SOunds like better analytics is needed, with lots of leverage available." ......

CSTA Wisconsin Team Takes on Certification
From Computer Science Teachers Association

CSTA Wisconsin Team Takes on Certification

Wisconsin is one of the few states to have a distinct license that is required for teachers of computer science courses in high schools. This license, created in...

Data Driven Marketing to 4.8 Billion People
From The Eponymous Pickle

Data Driven Marketing to 4.8 Billion People

Recently in the Teradata Blog, contains an excellent explanatory video by Tim Butler of P&G.  Another great example of the digitization of marketing in CPG.TheProcter...

Friday Squid Blogging: Squid-Shaped Dog Toy
From Schneier on Security

Friday Squid Blogging: Squid-Shaped Dog Toy

Just the thing.

NSA Documents from the <i>Spiegel</i> Story
From Schneier on Security

NSA Documents from the Spiegel Story

There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list: "Tailored Access Operations...

NSA Exploit of the Day: IRONCHEF
From Schneier on Security

NSA Exploit of the Day: IRONCHEF

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF: IRONCHEF (TS//SI//REL) IRONCHEF provides access persistence to...

IBeacon Tech at CES
From The Eponymous Pickle

IBeacon Tech at CES

Interesting CW report from CES.  Currently looking at iBeacon and similar techniques for data rich opportunities leveraging location.    The presentation there...

Data Mining Techniques that Create Business Value
From The Eponymous Pickle

Data Mining Techniques that Create Business Value

Nice summary of common techniques.  For a good start, review your business and decide which of these discoveries would give the most value.  Their definition: ...

Where is the Internet Going?
From The Eponymous Pickle

Where is the Internet Going?

In the NYT:  So where is all this going?  Thoughtful piece including an interview with Vinton Cerf,  now with Google and DARPA, Internet Pioneer.  We worked with...

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering (Draft)

This may well be of interest to people who like software engineering. A draft of "Software Engineering 2013: Curriculum Guidelines for Undergraduate Degreehttp...

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program
From Schneier on Security

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program

It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...

Choosing Your Regression Variables
From The Eponymous Pickle

Choosing Your Regression Variables

A nice simple topic that often comes up.  How exactly to you choose which variables to use when seeking to find a relationship using regression?  Such models are...

Simple Language for a Creative Culture
From The Eponymous Pickle

Simple Language for a Creative Culture

Three simple words:  "How Might we? "  Positive words for creativity.  Good, very simple thgought,   " ... Use Language to Shape a Creative Culture - Tom Kelley...

Quick links
From Geeking with Greg

Quick links

What caught my attention lately: Windows 8 has caused a big drop in PC sales to businesses, most of which has been picked up by Google Chromebooks (not by Apple)...

NSA Exploit of the Day: DEITYBOUNCE
From Schneier on Security

NSA Exploit of the Day: DEITYBOUNCE

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE: DEITYBOUNCE (TS//SI//REL) DEITYBOUNCE provides software application...

Life is sweeter than you think in 2014…
From Daniel Lemire's Blog

Life is sweeter than you think in 2014…

Jokingly, Rao pointed out that Americans are starting 2014 with an optimistic outlook: (…) it’s tough, but let’s just write off polar bears and groundwater pollution...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account