acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Quantum Repetition

Aram Harrow and Gil Kalai debate “Conjecture 1″ William Wootters and Wojciech Zurek were office-mates in 1979 as graduate students at U.T. Austin in John Wheeler’s...

Observation
From The Eponymous Pickle

Observation

Ethnographer at PARC speaks:  " ... I spend a lot of time observing ordinary people going about their business — in hospitals, shopping malls, living rooms, even...

Senior Care Robotics
From The Eponymous Pickle

Senior Care Robotics

Eldercare robotics.  A direction pioneered in Japan that that we saw demonstrated at a major manufacturer.  This approach designed for seniors with cognitive impairment...

“Big Data’s Management Revolution”
From The Computing Community Consortium Blog

“Big Data’s Management Revolution”

Erik Brynjolfsson and Andrew McAfee of MIT have posted an interesting entry to the Harvard Business Review Blog about big data and corporate management: Big data...

Making Little Decisions from Big Data
From The Eponymous Pickle

Making Little Decisions from Big Data

An overview of predictive analytics in Information Management.  Reasonably good overview of analytics today.  It is all about utilizing data we are gathering today...

Kalido and Teradata
From The Eponymous Pickle

Kalido and Teradata

Brought to my attention regarding agile data consolidation, late but worth noting:" ... Teradata (NYSE: TDC), the leading analytic data solutions company, and Kalido...

Apple and Connector Standards
From Wild WebMink

Apple and Connector Standards

It seems Apple wasn’t serious when it promised the European commission it would use micro-USB. Read more about it in my article in ComputerWorldUK this week.

Friday Squid Blogging: Giant Squid Museum
From Schneier on Security

Friday Squid Blogging: Giant Squid Museum

In Valdés, Spain. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Social Analytics with Voziq
From The Eponymous Pickle

Social Analytics with Voziq

Correspondent Chris Herbert sends along a link to Voziq. ... Monitor the social web for mentions of your brand, competitors and industry- Benchmark how you compare...

<i>Schneier on Security</i> on <i>Elementary</i>
From Schneier on Security

Schneier on Security on Elementary

Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...

RecSys 2012: Beyond Five Stars
From The Noisy Channel

RecSys 2012: Beyond Five Stars

I spent the past week in Dublin attending the 6th ACM International Conference on Recommender Systems (RecSys 2012). This young conference has become the premier...

Man-in-the-Middle Bank Fraud Attack
From Schneier on Security

Man-in-the-Middle Bank Fraud Attack

This sort of attack will become more common as banks require two-factor authentication: Tatanga checks the user account details including the number of accounts...

Agencies Announcing First Round of NRI Awards
From The Computing Community Consortium Blog

Agencies Announcing First Round of NRI Awards

The first round of awards for next-generation robotics R&D through the National Robotics Initiative (NRI) are being announced today, according to White House Office...

Protest  Monitoring
From The Eponymous Pickle

Protest Monitoring

I mentioned Recorded Future's monitoring analysis of the embassy attacks.  Now they have followed with a thirty minute video that examines the approach.   A good...

Transparent Mobile Computing
From The Eponymous Pickle

Transparent Mobile Computing

From CIO: The ability to have Apps run on multiple mobile platforms.  From Intel:  "...  "With transparent computing, software developers no longer must choose...

UGNazi
From Schneier on Security

UGNazi

Good article on the hacker group UGNazi.

Software Patent Solution Under Our Noses
From Wild WebMink

Software Patent Solution Under Our Noses

I was blown away by a paper by legal scholar Mark Lemley when I read it in full this week. He plausibly claims there’s a very simple and elegant solution to software...

Think Outside The Textbook
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Think Outside The Textbook

I was talking to a teacher, well chatting online via Facebook actually, and I described what he does as “thinking outside the textbook.” Speaking as someone who...

The age of data sharing (report)
From Putting People First

The age of data sharing (report)

We live in an age of sharing. As consumers and online, we regularly share personal information, and generate new data through our browsing or purchasing history...

The Connected Consumer
From The Eponymous Pickle

The Connected Consumer

Correspondent Gib Bassett curates The Connected Consumer. Which contains a number of items about consumer packaged goods that I had missed.   Worth checking out...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account