acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Glass to Create Huge Data?
From The Eponymous Pickle

Glass to Create Huge Data?

Via Gib Bassett:  Will Glass make Big Data into Huge Data? Yes, definitely if it becomes popular, and something like it will, we will be collecting increasing amounts...

Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)
From CERIAS Blog

Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)

By Mark Rasch† and Sophia Hannah‡ The NSA programs to retrieve and analyze telephone metadata and internet communications and files (the former we will call the...

Monetizing Mobile
From The Eponymous Pickle

Monetizing Mobile

In the midst if a mobile application.  But the value will be in efficiency, connectivity and supporting decisions from anywhere.  Not advertising dollars from consumers...

From Gödel's Lost Letter and P=NP

The Mathematics Of Dieting

Yes there are math issues in this activity William Banting may have created the first very popular diet. In 1863 he published the Letter on Corpulence, Addressed...

AP CS Principles Course Moves One Step Closer
From Computer Science Teachers Association

AP CS Principles Course Moves One Step Closer

This morning the College Board announced that the National Science Foundation has committed $5.2 million in funding to support the continued development of theBroadening...

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
From Schneier on Security

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid

It's a novel behavior. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Brainwashed Review
From The Eponymous Pickle

Brainwashed Review

In the WSJ: A balanced review of correspondent Sally Satel and Scott Lilienfeld's  book:  Brainwashed: The Seductive Appeal of Mindless Neuroscience.

Neuroscience and Marketing
From The Eponymous Pickle

Neuroscience and Marketing

In Mediapost, Elissa Moses posts a good introduction about a number of non conscious methods and their use in marketing analysis. For a largely contrary critical...

Technical + Creative
From The Female Perspective of Computer Science

Technical + Creative

It's amazing how many people fail to realize that computing can be a creative field.  In fact, in many cases, it has to be! For example, it makes no sense for me...

Sixth Annual Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Sixth Annual Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Sixth Annual Movie Plot Threat Contest: I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...

Free Computers For ISTE Attendees
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Free Computers For ISTE Attendees

Wow! Free computers. Hard to ignore that one. If you are heading out to San Antonia for ISTE 2013 Microsoft has a deal for you. They are giving away free Microsoft...

Mini Windows Stores at Best Buy
From The Eponymous Pickle

Mini Windows Stores at Best Buy

I mentioned some time ago visiting a new Microsoft Store in the local mall.  Located very close to the Apple store, which had been around for a couple of years....

Retail Data Synchronization
From The Eponymous Pickle

Retail Data Synchronization

Kroger and GS1 are beginning a three year Project Mercury effort to synchronize data.  A key element of running any large, complex retail operation.  " ... Under...

Moving to the Cloud Saves Energy
From The Computing Community Consortium Blog

Moving to the Cloud Saves Energy

Researchers at Lawrence Berkeley National Laboratory and Northwestern University have conducted a study and found that moving common applications to the cloud can...

Unemployed Geniuses
From The Eponymous Pickle

Unemployed Geniuses

An intriguing article on the employment of genius.  By their carefully limiting definition.  Seen this effect relatively often.  Genius does not always combine...

Telepresence Robotics in the Office
From The Eponymous Pickle

Telepresence Robotics in the Office

In IEEE Spectrum:  Cisco and iRobot working to produce a telepresence robot.  Conceptually an appealing idea, but I wonder about the practicality before robotic...

Ricin as a Terrorist Tool
From Schneier on Security

Ricin as a Terrorist Tool

This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction: Abstract: In recent yearsThis...

Mitigating Risk in the Supply Chain
From The Eponymous Pickle

Mitigating Risk in the Supply Chain

In Industry Week:" ... Supply chain managers adopt new strategies to mitigate risks Research has shown that major interruptions in the supply chain can sap a company's...

Tesco Supply Chain Big Data
From The Eponymous Pickle

Tesco Supply Chain Big Data

From Tableau Software:   Major global retailer on the use of visualization:  " ... Tesco uses Teradata to warehouse their supply and inventory data. They've got...

Trading Privacy for Convenience
From Schneier on Security

Trading Privacy for Convenience

Ray Wang makes an important point about trust and our data: This is the paradox. The companies contending to win our trust to manage our digital identities all...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account