acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Multi National Supply Chains in China
From The Eponymous Pickle

Multi National Supply Chains in China

In Knowledge@Wharton:  (In English and Chinese).  " ... Chinese Supply Chains Reach an ‘Inflection Point’ – and Multinationals Recast Strategies ... "   Precisely...

Cities in a Complex World
From The Eponymous Pickle

Cities in a Complex World

From the Santa Fe Institute:  I used to be our representative to SFI in the 90s and we got quite a few inspirations from them, and we provided them with problems...

Flexible Workplaces and the New Mobile World
From The Eponymous Pickle

Flexible Workplaces and the New Mobile World

In SMB Resource:  This article was brought to my attention recently.  It struck home because I have been working with companies that are increasingly specifying...

FCC Open Commission Meeting on July 19
From U.S. Public Policy Committee of the ACM

FCC Open Commission Meeting on July 19

The FCC will discuss the IP Speech-to-Speech Relay program and a report on the implementation of Twenty-First Century Communications and Video Accessibility Act...

Thoughts On Mobile Phone Development
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thoughts On Mobile Phone Development

For the second year the annual CSTA Conference has had a mobile phone development “throwdown.” In this session each participant has 15 minutes to create a mobile...

Snowden's Dead Man's Switch
From Schneier on Security

Snowden's Dead Man's Switch

Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...

On Predictive Analytics
From The Eponymous Pickle

On Predictive Analytics

This piece makes the point that I often do ... that all analytics, all business decisions, are predictive. The word 'predictive'  includes the implication that...

Technology Autonomy
From The Eponymous Pickle

Technology Autonomy

Had not heard the term before, but it relates to how strongly an IT department can act as a gatekeeper to software, in this new era of 'Bring Your Own' tools.  ...

An Hour of Code–Something for CS Ed Week 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

An Hour of Code–Something for CS Ed Week 2013

At the CSTA Conference earlier this week Hadi Partovi from Code.Org announced some plans for this year’s Computer Science Education Week. Specifically providing...

Knowledge @ Wharton for High School
From The Eponymous Pickle

Knowledge @ Wharton for High School

I have always enjoyed the Wharton series of papers and videos. I just noticed that they had a series of posts especially designed for High School Students.  ...

MS Faculty Summit Day Two
From My Biased Coin

MS Faculty Summit Day Two

Day Two of the summit started with a keynote shared between Peter Lee and Jeannette Wing, who now seem to be sharing heading up Microsoft research.  (Rick Rashid...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Library of Congress Legislative Data Challenge: Markup of U.S. Legislation in Akoma Ntoso
From U.S. Public Policy Committee of the ACM

Library of Congress Legislative Data Challenge: Markup of U.S. Legislation in Akoma Ntoso

The Library of Congress invites the public to participate in its first Legislative Data Challenge. The winning solution will provide the most effective representation...

Computing and Communication Foundations Program Solicitation
From The Computing Community Consortium Blog

Computing and Communication Foundations Program Solicitation

The NSF has recently issued a new program solicitation – Computing and Communication Foundations (CCF): Core Programs.  According to the solicitation, “The Division...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

CPG Use of Big Data
From The Eponymous Pickle

CPG Use of Big Data

In Progressive Grocer:  A good piece on how the CPG is using Big Data.    " ... Retailers and consumer packaged goods companies that are applying big data analytics...

Virtual Sandbox
From The Eponymous Pickle

Virtual Sandbox

Brought to my attention for a project that will require more than the usual amount of malicious software security.  A virtual sandbox called Sandboxie that prevents...

Competing Rapidly With Web Intelligence
From The Eponymous Pickle

Competing Rapidly With Web Intelligence

Last month I gave a talk to a large company that is actively looking for new ways to compete. They have long been seen as a lower cost, but less innovative service...

Emergence of the Smartwatch
From The Eponymous Pickle

Emergence of the Smartwatch

In GigaOM:  A not unexpected development.  2014 seems to be the year for broad delivery.  How will this influence the more personal uses of the smartphone?  Will...

ROI of Gamification
From The Eponymous Pickle

ROI of Gamification

A simple but still  incomplete view of the ROI of gamification.  The same approach can be seen for many kinds of applications.      " ... Measuring ROI is an elusive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account