acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Happy Birthday, Kurt Gödel

Wang on Gödel, and Gödel on Wang source, with more Wang quotes Hao Wang was a logician who made many important contributions to mathematics and especially logic...

Digital Natives Providing Connections Other Generations
From Computer Science Teachers Association

Digital Natives Providing Connections Other Generations

Once again, my family has come through just in time for another blog posting. This past weekend, we were able to celebrate my grandfather's 97th birthday. It...

USACM Encourages Flexibility In Proposed Cybersecurity Framework
From U.S. Public Policy Committee of the ACM

USACM Encourages Flexibility In Proposed Cybersecurity Framework

As part of the President’s Executive Order on Cybersecurity, the National Institute of Standards and Technology (NIST) is required to develop a Cybersecurity Framework...

Supply Chain and Visualization
From The Eponymous Pickle

Supply Chain and Visualization

I note that a paper I co-authored some time ago has now been re-posted on Linkedin:Blending OR/MS, Judgment, and GIS: Restructuring P&G's Supply ChainINTERFACES...

Best Time to Share Knowledge?
From The Eponymous Pickle

Best Time to Share Knowledge?

At first I thought this was hokum.  A connection to circadian rhythms that make us significantly more receptive to knowledge at some times? But thinking back to...

Sketches Selling Soap
From The Eponymous Pickle

Sketches Selling Soap

A new Dove video called 'Sketches' now gone viral, seems to show how women's beauty view of themselves differs considerably from the view of others.  It is very...

Ivan Sutherland and My History with E&S
From The Eponymous Pickle

Ivan Sutherland and My History with E&S

For a number of years we used Evans & Sutherland interactive graphics displays to develop packaging for new products and to determine their compatibility with manufacturing...

Goodbye Posterous
From The Eponymous Pickle

Goodbye Posterous

I see today that the simple blogging engine Posterous is soon to be deleted.  I set up Posterous blogs for several people.  It was a particularly easy to use method...

On Native Advertising
From The Eponymous Pickle

On Native Advertising

In Techdirt, a good article about native advertising.  Though the definitions vary in detail, it is advertising that is embedded deeply in the content itself.  ...

The Atlantic on research ecology
From The Computing Community Consortium Blog

The Atlantic on research ecology

An interesting article in The Atlantic by computer scientist Ben Schneiderman on “an ecological model of research and development.” Donald Stokes (Pasteur’s Quadrant...

From Gödel's Lost Letter and P=NP

Sex, Lies, And Quantum Computers

Okay, no sex, but a discussion about quantum computers. Steven Soderbergh directed the famous movie: Sex, Lies, and Videotape. This 1989 movie won the Palme d’Or...

Advances in 3D Visualization
From The Eponymous Pickle

Advances in 3D Visualization

A recent conversation about how 3D visualization could improve the effect of shelf virtualization.   An overview of current technology in Computer.org.

Microsoft Firewall
From Wild WebMink

Microsoft Firewall

On its first anniversary, I remain convinced that the motivation for Microsoft’s wholly-owned open source & open standards subsidiary is primarily to isolate Microsoft...

Friday Squid Blogging: Lego Giant Squid Model
From Schneier on Security

Friday Squid Blogging: Lego Giant Squid Model

This is a fantastic Lego model of a space kraken attacking a Star Wars Super Star Destroyer. As usual, you can also use this squid post to talk about the security...

Advanced Analytics from TDWI
From The Eponymous Pickle

Advanced Analytics from TDWI

At the TDWI conference, Fern Halper talks about what they call 'advanced analytics', which appears to include most statistical and numerical models beyond simple...

xkcd on a Bad Threat Model
From Schneier on Security

xkcd on a Bad Threat Model

Funny, and true.

Time For A Security Team For OpenJDK
From Wild WebMink

Time For A Security Team For OpenJDK

In my InfoWorld column today I consider the recent news that Java 8 is going to be substantially delayed because Oracle’s development staff have had to focus on...

MIT Technology Review’s 10 Breakthrough Technologies of 2013
From The Computing Community Consortium Blog

MIT Technology Review’s 10 Breakthrough Technologies of 2013

Each year MIT’s magazine, MIT Technology Review, publishes a list 10 of breakthrough technologies that are most likely to change the world by fixing intractable...

Drones and Now Nano satellites: Phonesats
From The Eponymous Pickle

Drones and Now Nano satellites: Phonesats

Lots of things are getting small and more mobile.   As presented in Computerworld.    What are the implications of smaller and widely ranging sensors? " ......

P equal to NP and all that
From Daniel Lemire's Blog

P equal to NP and all that

One of the better known problems in Computer Science is the P versus NP problem. It is often related to the following question: do all problems for which we can...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account