acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How a deeper customer understanding can energize innovation
From Putting People First

How a deeper customer understanding can energize innovation

In today’s crowded and competitive energy markets, many product manufacturers fall short in their marketing, writes Andy Beck, Executive Vice President of Makovsky...

Ubiquitous across globe, cellphones have become tool for doing good
From Putting People First

Ubiquitous across globe, cellphones have become tool for doing good

With 96 percent of the world connected, organizations are using mobile phones to deliver, via texts, water, energy, financial services, health care, even education...

How do you build an electricity bill for the 21st century?
From Putting People First

How do you build an electricity bill for the 21st century?

The more confusing the bill, the more likely it is to be disputed, the less likely it is to be paid. So, from not only an image perspective, but a practical, financial...

The rise of the mobile-born
From Putting People First

The rise of the mobile-born

The mobile-born generation will drive a radical rethinking of office productivity, writes Paul Holland, a general partner at Foundation Capital, “Fast-forward a...

High Fidelity Fast Smart Scanning
From The Eponymous Pickle

High Fidelity Fast Smart Scanning

In Engadget:  We have many new opportunities for scanning these days.  And more our smart phones have become scanners.   But the nature of the context can makeBlinkscan...

Fading Interest in the Humanities
From The Eponymous Pickle

Fading Interest in the Humanities

In the NYT:  Creating a worry in colleges.  I further observe that Its harder to justify the costs, and as most everything has an important part of underlying technology...

Friday Squid Blogging: Tree Yarn-Bombed
From Schneier on Security

Friday Squid Blogging: Tree Yarn-Bombed

This tree in San Mateo, CA, has been turned into a giant blue squid. As usual, you can also use this squid post to talk about the security stories in the news...

Why Arts and Social Science Needs Code: Testimonials
From The Female Perspective of Computer Science

Why Arts and Social Science Needs Code: Testimonials

Part 2 of my "Why are we learning this?" guide for arts and social science students is a set of testimonials from people in the field that learned to code.  I'd...

Procter & Gamble and Unilever Honored
From The Eponymous Pickle

Procter & Gamble and Unilever Honored

In Mediapost:" ... Procter & Gamble and Unilever are in the top spots among marketers of consumer packaged goods, and Wal-Mart Stores and Target are the most effective...

Another Snowden Lesson: People Are the Weak Security Link
From Schneier on Security

Another Snowden Lesson: People Are the Weak Security Link

There's a story that Edward Snowden successfully socially engineered other NSA employees into giving him their passwords.

Creativity Challenges from IDEO
From The Eponymous Pickle

Creativity Challenges from IDEO

In the HBR:   From a group we used a number of times.   For more on that click on the IDEO tag below. We practiced by setting up context creating locations.  For...

Army Powerpoint vs Tableau
From The Eponymous Pickle

Army Powerpoint vs Tableau

When I first read this I thought this it gave the impression that Tableau and Powerpoint were competing for the same purpose.  I see them having the same operational...

Getting Ready for Big Data
From Computer Science Teachers Association

Getting Ready for Big Data

Whether you are or will be teaching Exploring Computer Science (ECS) or Computer Science Principles (CSP), the topic of data will begin to permeate your course....

CS Teachers–Please help evaluate HoC Tutorials
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Teachers–Please help evaluate HoC Tutorials

I'm passing this along for Code.org who I am helping organize tutorials for an Hour of Code during CS education week. We need help evaluating the tutorials we have...

Why the Government Should Help Leakers
From Schneier on Security

Why the Government Should Help Leakers

In the Information Age, it's easier than ever to steal and publish data. Corporations and governments have to adjust to their secrets being exposed, regularly. ...

Medical advice just a touch away with smartphone apps
From Putting People First

Medical advice just a touch away with smartphone apps

Devices once only in the hands of doctors, such as heart or blood pressure monitors, are now in the pockets of consumers, putting them in charge of their health...

‘Why newsrooms need anthropologists’
From Putting People First

‘Why newsrooms need anthropologists’

Journalism and anthropology both purport to observe and analyse human behaviour and experience, albeit in different ways and over extremely divergent timescales...

Hour of Code tutorials are ready to try
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Hour of Code tutorials are ready to try

Received this update email from Code.org last night. Looks like an Hour of Code for CS Education week is getting real! And of course it is getting close. Now though...

Mistakes Made in Machine Learning
From The Eponymous Pickle

Mistakes Made in Machine Learning

These are some of the best known examples of mistakes often made in machine learning i.e. predictive analytics projects.    Well stated, the examples are good,...

November Analytics Magazine: Text Analytics
From The Eponymous Pickle

November Analytics Magazine: Text Analytics

The Informs Outreach magazine this month has as its emphasis text analytics.  Always interesting, business solution oriented,  not heavily technical.  I read every...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account