acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

IBM on Big Data
From The Eponymous Pickle

IBM on Big Data

Following is interesting, just starting to ingest:Blueprints for Value:This is Part 1 in a 14 part series that is my attempt to present, in small easily consumable...

From Computational Complexity

Security Changes

A couple of policy changes recently, one that supposedly enhances privacy and another that could reduce it. Google has been implementing perfect forward secrecy...

Acoustic Cryptanalysis
From Schneier on Security

Acoustic Cryptanalysis

This is neat: Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...

An Hour of Code–Now What?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

An Hour of Code–Now What?

By just about any of the usual measures (people involved, media attention, VIP endorsements) this year’s CS Education Week was a huge success. We’ve had a couple...

I'm Using Python Now
From updated sporadically at best

I'm Using Python Now

I have a confession. All these years I've been evangelizing strongly statically typed languages, I've been going home at night and using Python. Not all the time...

Tracking down the Harvard Non-Bomber
From My Biased Coin

Tracking down the Harvard Non-Bomber

This year, (allegedly) a Harvard student performed the modern equivalent of pulling a fire alarm in order to avoid a final exam, in this case by sending an e-mail...

Wiley Big Data and Analytics Title Sampler
From The Eponymous Pickle

Wiley Big Data and Analytics Title Sampler

Brought to my attention, you can get this for the usual registration information, usually the first several chapters of each book, which can be helpful:Data Mining...

Young Scientists Invited to Apply for Second Heidelberg Laureate Forum
From The Computing Community Consortium Blog

Young Scientists Invited to Apply for Second Heidelberg Laureate Forum

Preparations for the second Heidelberg Laureate Forum (HLF) are in full swing, and applications from young researchers to attend the second Forum are being accepted...

Neural Nets Maturing
From The Eponymous Pickle

Neural Nets Maturing

In ComputerWorld: Very broadly biologically inspired, yes.   Often replacing analogous statistcal methods.  We used them in a number of useful applications in the...

Amazon Does Screenplays
From The Eponymous Pickle

Amazon Does Screenplays

Storytelling has a thread in this blog, from an investigation for a startup. Now Amazon has put up a Beta for doing screenplays.  It is called Storybuilder.  Not...

Knowledge Management is Broken
From The Eponymous Pickle

Knowledge Management is Broken

Unfortunately in an information minimizing slide show, but the topic is important.  " ... Five Reasons Knowledge Management is Broken ...  Knowledge management...

Perfect Data and Perfect Predictions
From The Eponymous Pickle

Perfect Data and Perfect Predictions

An obvious conclusion: you never get perfect answers.  Analytics depends upon the correctness if the data in context, AND the power of the model being used.  ...

On the Internet of Cars
From The Eponymous Pickle

On the Internet of Cars

We will see the internet of automobiles before we see the Internet of things.  An overview in ReadwriteWeb.  The future of transportation will take us to the net...

Tor User Identified by FBI
From Schneier on Security

Tor User Identified by FBI

Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...

Smartphone Penetration
From The Eponymous Pickle

Smartphone Penetration

The global smartphone penetration continues to increase.  Up to 60% by 2019 says this report.  

Use Cases for iBeacon and Estimote
From The Eponymous Pickle

Use Cases for iBeacon and Estimote

In Wired:  I continue my look at the use of in store location and communication.  Something we thought a lot about in the innovation lab, but never had the technology...

NIH announces funding opportunities for the BRAIN Initiative
From The Computing Community Consortium Blog

NIH announces funding opportunities for the BRAIN Initiative

On April 2, 2013, President Obama launched the Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative to revolutionize our understanding...

Financial Uses for Quantum Computing
From The Eponymous Pickle

Financial Uses for Quantum Computing

We were asked early on:  What is the value for quantum computing?  Here a look in particular at the financial industry.  With mention of our contact in quantum"...

On the Evolution of ETL
From The Eponymous Pickle

On the Evolution of ETL

In Information Management:  Extract, Transfer and Load (ETL) is a key process  for the use of information to make it ready for analytics.  It's changing to make...

Code Red: Where are the Women in Computing?
From Computer Science Teachers Association

Code Red: Where are the Women in Computing?

Editor's Note: This blog piece from our partners at Change the Equation details their recent report on the continued underrepresentation of women in computing, ...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account