acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sensor Life Logging with Saga
From The Eponymous Pickle

Sensor Life Logging with Saga

In Technology Review:    Using your smartphone sensors to monitor and record your every move.    Some interesting learnings that could be applied to other sensor...

Detecting  Access Fraud
From The Eponymous Pickle

Detecting Access Fraud

Brought to my attention,   Fraudlogix, a system that detects access fraud, resulting from artificial lead generation.  The included behavior analysis that separates...

Humanoid Robotics
From The Eponymous Pickle

Humanoid Robotics

Kurzweil on Samsung's humanoid robot.  The visual map aspect of the intelligence of the device is intriguing.  Geography and knowledge need maps.   I have often...

The Office of the Director of National Intelligence Defends NSA Surveillance Programs
From Schneier on Security

The Office of the Director of National Intelligence Defends NSA Surveillance Programs

Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...

TouchDevelop–Acceleration and GameLoop
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

TouchDevelop–Acceleration and GameLoop

Happy Fourth of July! If you are on the Internet today it should be for fun. For that reason I recorded a little video of using TouchDevelop to demo the GameLoop...

UX and The Museum: Converging perspectives on experience design
From Putting People First

UX and The Museum: Converging perspectives on experience design

Museums visitors are no longer as satisfied with rows of objects on display. They want the objects to tell a story. They want to understand the main message of...

Intel on wearable tech: we need to focus on how we use it
From Putting People First

Intel on wearable tech: we need to focus on how we use it

Intel and its team of futurologists and anthropologists have a vision of a world where the technology is not an adjunct (as the mobile phone or the tablet is now)...

Apple Hires Luxury Brand CEO
From The Eponymous Pickle

Apple Hires Luxury Brand CEO

What could this mean?     Speculation, but interesting connection: " ..... Apple has hired Paul Deneve, until Tuesday the CEO of French luxury brand Yves Saint...

Thirty years from prototype to product…the mouse
From The Computing Community Consortium Blog

Thirty years from prototype to product…the mouse

Timothy B. Lee of The Washington Post reports on the death of Douglas Engelbart, inventor of the mouse, and why it took 30 years for the public to adopt the technology...

Involve Employees in Strategic Planning
From The Eponymous Pickle

Involve Employees in Strategic Planning

Fairly obvious.    Well worth thinking through.   Involve your employees as early as possible.   Use analytic methods to understand the implications for  decisions...

Search Enigma
From The Eponymous Pickle

Search Enigma

I have noticed that there is lots of hype in search and data mining spaces.    Intellectual property claimed that really adds to nothing at all.  So I am always...

US Rejoins World’s Top 5 Countries for Innovation
From U.S. Public Policy Committee of the ACM

US Rejoins World’s Top 5 Countries for Innovation

The United States is one of the five most innovative countries in the world, according to the Global Innovation Index 2013, a hefty 392-page report published by...

P&G Global Demand Sensing
From The Eponymous Pickle

P&G Global Demand Sensing

More on P&G's activity in the demand forecasting realm.   Note the significant use of the word 'sensing',  as we gain more sensors in the world, this capability...

Douglas Engelbart, Inventor of the Mouse, has Passed Away
From The Eponymous Pickle

Douglas Engelbart, Inventor of the Mouse, has Passed Away

We had the opportunity to meet with Doug Engelbart many times.  He told us of the difficult time he had getting people to appreciate the mouse user interface.  In...

Privacy Protests
From Schneier on Security

Privacy Protests

Interesting law journal article: "Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion," by Elizabeth E. Joh. Abstract: The police tend to think...

CCC and CSTB Welcome New Members
From The Computing Community Consortium Blog

CCC and CSTB Welcome New Members

On July 1, new talents were added to the ranks of both the Computing Community Consortium (CCC) and the Computer Science and Telecommunications Board (CSTB) of...

Dance Your Math Lessons
From The Female Perspective of Computer Science

Dance Your Math Lessons

Smart, funny, and willing to prance on stage.  Karl Schaffer and Erik Stern sure know how to do a TEDx talk right! Watch the video below, and check out their Math...

Data Completeness
From The Eponymous Pickle

Data Completeness

One of a number of short pieces on dimensions of data quality.   Here on one that is often forgotten: data completeness.   Here about what I call historical completeness...

US Department of Defense Censors Snowden Story
From Schneier on Security

US Department of Defense Censors Snowden Story

The US Department of Defense is blocking sites that are reporting about the Snowden documents. I presume they're not censoring sites that are smearing him personally...

CS Educator Interview: Myra Deister
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Myra Deister

Today’s computer science teacher interview is with Myra Deister from Sunny Hills High School  in sunny California! As you will read Myra faces some challenges in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account