acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

What is in-Memory Analytics?
From The Eponymous Pickle

What is in-Memory Analytics?

Bill Franks provides a good overview.    Read the whole piece, well put.  " There

Wal-Mart Localizing Stores
From The Eponymous Pickle

Wal-Mart Localizing Stores

Wal-Mart is Localizing its stores with Facebook.  I recall this general idea proposed during the early days of web sites being commonly available.  Long before...

Tasting Jams and Dating Sites
From The Eponymous Pickle

Tasting Jams and Dating Sites

Match making online. Head versus heart.   A dated WSJ article which led me back to some of our matching work for many other purposes.    But does it work for matching...

Cybersecurity at the Doctor's Office
From Schneier on Security

Cybersecurity at the Doctor's Office

I like this essay because it nicely illustrates the security mindset.

DoD Announces Robotics Grants
From The Computing Community Consortium Blog

DoD Announces Robotics Grants

Last fall, the Department of Defense (DoD) issued a Broad Agency Announcement (BAA) for its Defense University Research Instrumentation Program (DURIP), which “augments...

From Computational Complexity

Meetings/Conferences/Workshops/Seminars- whats in a name?

In June 11-14 will be a new workshop: Algorithmic Frontiers. How many venues do we have for meetings? What the call themselves: Meetings (e.g., MATHFEST), Conferences...

Researchers glean deep UI lessons from a haptic steering wheel
From Putting People First

Researchers glean deep UI lessons from a haptic steering wheel

According to a new driving study, conducted by Professor SeungJun Kim at Carnegie Mellon

Texting Increases Truth
From The Eponymous Pickle

Texting Increases Truth

A study seems to show texting increase truthfulness.  Less shading of the truth.  I wonder if this is caused by the limitation of the size of the message? Less...

<i>Rules for Radicals</i>
From Schneier on Security

Rules for Radicals

It was written in 1971, but this still seems like a cool book: For an elementary illustration of tactics, take parts of your face as the point of reference; your...

KDD Workshop on Sustainability Calling for Papers
From The Computing Community Consortium Blog

KDD Workshop on Sustainability Calling for Papers

The organizers for this year’s second KDD workshop on Data Mining Applications in Sustainability (SustKDD 2012)

What should the High School CS curriculum look like?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What should the High School CS curriculum look like?

I get asked questions like this a lot

Organizing Your Business for Innovation
From The Eponymous Pickle

Organizing Your Business for Innovation

In Innovation Excellence:  A favorite topic, when added to constructing innovation rich contexts.  " ... Innovation is the process of linking an invention to satisfy...

From The Computing Community Consortium Blog

An article published in Nature

USB Drives and Wax Seals
From Schneier on Security

USB Drives and Wax Seals

Need some pre-industrial security for your USB drive? How about a wax seal? Neat, but I recommend combining it with encryption for even more security!

From Computational Complexity

G

The ACM announced the 2012 G

Intel Employee Magazine
From The Eponymous Pickle

Intel Employee Magazine

IQ by Intel is a Flipboard like design, with bright graphics, using social measures to promote the Intel brand to younger demographics.  More in Adage.

Wearing Health Devices
From The Eponymous Pickle

Wearing Health Devices

In Technology Review:  On wearing small health devices.  Small monitors have been around for a long time.  The challenge may be how to deal with the data and the...

Byron Sharp and the Ehrenberg-Bass Institute
From The Eponymous Pickle

Byron Sharp and the Ehrenberg-Bass Institute

Byron Sharp, professor at the Ehrenberg-Bass Institute, University of South Australia, has been a long term correspondent.  My former enterprise is a major sponsor...

Recapping Last Week
From The Computing Community Consortium Blog

Recapping Last Week

The following is a special contribution to this blog from Mario Berg

Security Vulnerabilities in Airport Full-Body Scanners
From Schneier on Security

Security Vulnerabilities in Airport Full-Body Scanners

According to a report from the DHS Office of Inspector General: Federal investigators "identified vulnerabilities in the screening process" at domestic airports...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account