acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Interesting Links 19 August 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 19 August 2013

Summer ends for me tomorrow as my school starts with a professional development day for teachers. First full day with students is Friday. I’ve done some preparation...

Enhanced Drivers Licenses for Data Mining
From The Eponymous Pickle

Enhanced Drivers Licenses for Data Mining

Next week California legislators are voting on an enhanced drivers license or EDL.  More here. Such a license contains a RFID tag that points to a personal identification...

The Threat of Medical Device Hacking
From The Eponymous Pickle

The Threat of Medical Device Hacking

In Bloomberg:   A very scary possibility.  Though the article suggests that sufficient precautions are being taken for now.  But the potential exists as new hacks...

Science of Social Blog
From The Eponymous Pickle

Science of Social Blog

The official blog of Dr Michael Wu on the science of social:Insights into social customer behaviors, big data, superfans, gamification, influence, relationships...

Home Control Center
From The Eponymous Pickle

Home Control Center

Smartphone as home control center.  Ultimately linking purchasing decisions made room by room to online and in-store behavior?

Augmenting the Catalog
From The Eponymous Pickle

Augmenting the Catalog

Have been exploring the latest 2014 physical IKEA catalog, with is an already large (320 page plus) slick paper catalog that broadly and artistically explores IKEA's...

Preparing for Screenless Computing
From The Eponymous Pickle

Preparing for Screenless Computing

In Quartz:  " ... The spread of computing to every corner of our physical world doesn’t just mean a proliferation of screens large and small—it also means we’ll...

Counting Deaths
From The Eponymous Pickle

Counting Deaths

In the WSJ Blog:   The consequence of what is commonly call a harvesting effect, in statistical models.   Using the data, often reported in the news, of how many...

What’s lost when everything is recorded
From Putting People First

What’s lost when everything is recorded

Who wouldn’t delight in hearing Lincoln at Gettysburg in the same way we can go back and witness President Obama on the campaign trail? But with so much data capture...

Lessons from monks about designing the technologies of the future
From Putting People First

Lessons from monks about designing the technologies of the future

Our technologies are designed to maximize shareholder profit, and if that means distracting, confusing or aggregating the end-user, then so be it. But another path...

A manifesto to connect experience design with content thinking
From Putting People First

A manifesto to connect experience design with content thinking

Under the title “Content re-framing: A digital disruption survival kit“, Bas Evers and Peter Bogaards have launched a manifesto to connect experience design with...

Seth Godin on Choke Points
From The Eponymous Pickle

Seth Godin on Choke Points

Seth Godin describes the choke point, a clever view of a real challenge:  " ....   Sooner or later, all big public media companies go in search of a choke point...

Simulation Training for Gen Y
From The Eponymous Pickle

Simulation Training for Gen Y

In CLO Mag:   The suggestion that simulation based training works better for generation Y,  This can be described as game-based as well.   Using interaction and...

Samsung Smart Watch
From The Eponymous Pickle

Samsung Smart Watch

I remain skeptical of the small format, but a Samsung Smart phone/watch is reportedly arriving in September. 

Friday Squid Blogging: Squid Ink as Food Coloring
From Schneier on Security

Friday Squid Blogging: Squid Ink as Food Coloring

Alton Brown suggests it for ice cream. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Wired</i> Names "Schneier on Security" to Best Blog List
From Schneier on Security

Wired Names "Schneier on Security" to Best Blog List

I made the list of Wired's best "Government and Security" blogs.

Picking N distinct numbers at random: how to do it fast?
From Daniel Lemire's Blog

Picking N distinct numbers at random: how to do it fast?

To test my algorithms, I like to generate synthetic data. To do so, I often need to generate distinct randomly chosen numbers from a range of values. For example...

Making the Most of Your Messaging in 'Women in Computer Science' Outreach
From The Female Perspective of Computer Science

Making the Most of Your Messaging in 'Women in Computer Science' Outreach

If you've ever done outreach with girls to try to get them into computer science, you may have wondered what the best way to do it is.  After all, we've been at...

Comment Policy Again
From The Eponymous Pickle

Comment Policy Again

A reminder.  Comments are moderated here.  They must be in English.   I will not post anonymous comments unless prearranged.   I will not allow a comment with links...

From Gödel's Lost Letter and P=NP

Euclid Strikes Back

An application of Euclid’s famous proof there are an infinite number of primes Euclid of Alexandria, Euclid for short, composed one of the most influential books...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account