acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Finding Patterns in Business Data
From The Eponymous Pickle

Finding Patterns in Business Data

Was introduced to and further investigating Verix:  " ... Beyond Traditional BI ... By fully automating the search and analysis of business data, you skip the tedious...

Making Data Meaningful
From The Eponymous Pickle

Making Data Meaningful

From today's Data Visualization Day at UC.  A talk by Jeffrey A Shaffer, VP of Information Technology and  Analytics at Unifund.    He is also an adjunct professor...

New AAAI Conference on Human Computation and Crowdsourcing
From The Computing Community Consortium Blog

New AAAI Conference on Human Computation and Crowdsourcing

In recent years, interest has been growing in the emerging interdisciplinary area of Human Computation, a field that explores principles and applications around...

Identifying People from their Writing Style
From Schneier on Security

Identifying People from their Writing Style

It's called stylometry, and it's based on the analysis of things like word choice, sentence structure, syntax and punctuation. In one experiment, researchers were...

CSTA K-12 Computer Science Standards correlated with the Common Core
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA K-12 Computer Science Standards correlated with the Common Core

This is a big deal. With so much attention being focused on the Common Core for education these days understanding where Computer Science fits takes on some increased...

On My Drive in This Morning...
From My Biased Coin

On My Drive in This Morning...

It would, of course, be completely inappropriate for me to write that if you're interested in illegal prescription drugs, you should go talk to Stefan Savage of...

From Computational Complexity

The End of a Useless Test

First a word from our sponsor: Mihalis Yannakakis is celebrating his 60th birthday this year and you are invited to the party. From the Educational Testing Service...

Identifying People from their DNA
From Schneier on Security

Identifying People from their DNA

Interesting: The genetic data posted online seemed perfectly anonymous ­- strings of billions of DNA letters from more than 1,000 people. But all it took was some...

FOSDEM Picks 2013
From Wild WebMink

FOSDEM Picks 2013

On ComputerWorldUK, I’ve posted my picks for FOSDEM. I didn’t mention that I’ll also be speaking (about OSI) at the end of Saturday afternoon in the Free Java DevRoom...

Zipcar as an Acquired Innovation Idea
From The Eponymous Pickle

Zipcar as an Acquired Innovation Idea

Innovation Excellence writes about the acquisition of Zipcar by Avis.  Zipcar is the urban car sharing service, which we looked at as an example of the innovation...

Training Critical Thinkers and Problem Solvers
From Computer Science Teachers Association

Training Critical Thinkers and Problem Solvers

As a teacher I am always trying to find ways to encourage and interest my students in my class. I try to come up with innovative lesson plans that go accordingExploring...

The Security of the Mega File-Sharing Service
From Schneier on Security

The Security of the Mega File-Sharing Service

Ever since the launch of Kim Dotcom's file-sharing service, I have been asked about the unorthodox encryption and security system. I have not reviewed it, andthis...

Coke is Gamifying the Game
From The Eponymous Pickle

Coke is Gamifying the Game

In Adage:  Coke creates a social media game based on a Superbowl ad.   How well will it work for ongoing engagement beyond the event?   Would it have been better...

Complexity Course from SFI
From The Eponymous Pickle

Complexity Course from SFI

A free eleven week MOOC course on a introduction to the concepts of complexity by the Santa Fe Institute.   To start February 4.  An example of Massive open online...

Early Lessons for Carleton Quest
From The Female Perspective of Computer Science

Early Lessons for Carleton Quest

We've been asking new students to try out our new Carleton Quest app in the last few weeks.  Although I don't have a huge amount of feedback yet, there are a few...

Massive Open Online Courses
From The Eponymous Pickle

Massive Open Online Courses

I have been connected to Massive Open Online Courses (MOOC) for some time now.  The link gives an overview of what they do and cover today.  The topic reminds me...

Kinect Sensors in Everyday Life
From The Eponymous Pickle

Kinect Sensors in Everyday Life

Still looking at the opportunities to connect sensors to gather  to improve analytical decision making.  Here some more learnings out of CES on the topic of using...

Emailed Dashboards
From The Eponymous Pickle

Emailed Dashboards

David Hecht via Teradata's Gib Bassett.  On a school of management based on emailed dashboards.  Lately there has been   This article suggests a simple method of...

Commenting on Aaron Swartz's Death
From Schneier on Security

Commenting on Aaron Swartz's Death

There has been an enormous amount written about the suicide of Aaron Swartz. This is primarily a collection of links, starting with those that use his death to...

From Computational Complexity

A New application of Ramsey Theory to a Geometry problem

All of the material summazized here is in a new paper by Gasarch and Zbarsky. You can find that paper here) Consider the following problem: Let {p1,...,pn}...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account