acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Teaching with Lousy Health
From Computer Science Teachers Association

Teaching with Lousy Health

There are about 1800 students at Henry M. Gunn HS (Palo Alto, CA). Enrollment in CS has grown from 90 students three years ago to 110 to 130 last year to 190 this...

Beauty Packaging to Link Real and Virtual Worlds
From The Eponymous Pickle

Beauty Packaging to Link Real and Virtual Worlds

This was an area we explored at length.   During a visit to China in 2003 I saw a remarkable number of examples in retail spaces.   Now QR codes and smartphones...

Cray Takes on  Big Data
From The Eponymous Pickle

Cray Takes on Big Data

Via Mark Montgomery of KYield. ...  Supercomputing and big data appliances.  Venerable Cray take a plunge into the thirst for big data understanding and analytics...

Watson Tries Finances
From The Eponymous Pickle

Watson Tries Finances

In another move forward for AI-style interactions, IBM is working with Citicorp:" ... IBM and Citigroup recently announced plans to explore how America's favorite...

? Lessig! Doctorow! London!
From Wild WebMink

? Lessig! Doctorow! London!

The Open Rights Conference is coming up in London on March 24 and has a glittering array of speakers including Lawrence Lessig and Cory Doctorow. Read all about...

Visualization Technologies for Human-Environment Interactions
From The Computing Community Consortium Blog

Visualization Technologies for Human-Environment Interactions

The National Socio-Environmental Synthesis Center (SESYNC) — the newest of the national synthesis centers funded by the National Science Foundation (NSF) focused...

Cloud Computing As a Man-in-the-Middle Attack
From Schneier on Security

Cloud Computing As a Man-in-the-Middle Attack

This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...

Register for CSTA's 2012 Annual CS&IT Conference
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Register for CSTA's 2012 Annual CS&IT Conference

CSTA's Annual CS&IT Conference This is the big and best professional development event of the year for middle and high school computer science educators. The program...

Making Love with Data: Avinash Kaushik
From The Noisy Channel

Making Love with Data: Avinash Kaushik

Just watch the presentation, which stole the show at Strata 2012. The written word cannot do justice to Avinash’s passion and his extraordinary ability to communicate...

NSA's Secure Android Spec
From Schneier on Security

NSA's Secure Android Spec

The NSA has released its specification for a secure Android. One of the interesting things it's requiring is that all data be tunneled through a secure VPN: Inter...

Free Shopper Centric e-Book
From The Eponymous Pickle

Free Shopper Centric e-Book

From DemandTec.  This was precisely the approach we emphasized for many years within the enterprise.  It is all about how the shopper behaves in their increasingly...

Uplift Modeling
From The Eponymous Pickle

Uplift Modeling

A new term?   The term perhaps, but we have been doing this new thing for years.  It deserves attention, now being lionized as the next big thing in predictive...

Key to Focus
From The Eponymous Pickle

Key to Focus

A good interview by Todd Henry with Peter Bregman.  On focus and priorities.  " ... In this interview, Peter describes how he came to his 18 minute methodology,...

From Computational Complexity

When a+b is harder than b+a

Is 1+4 a harder calculation than 4+1? It may be if you are 2+3 years old. I asked my 7-2 year old great niece Noelle the following sequence of questions. I include...

iRobot Reorganizes
From The Eponymous Pickle

iRobot Reorganizes

iRobot, the company that first brought practical robotics into the home,  is reorganizing.     Based on what they have done well, this makes sense.  " ... iRobot...

NIST Establishes National Cybersecurity Center of Excellence
From The Computing Community Consortium Blog

NIST Establishes National Cybersecurity Center of Excellence

At a press briefing featuring high-ranking Federal, state, and local officials on its Gaithersburg, MD, campus last month,

How Changing Technology Affects Security
From Schneier on Security

How Changing Technology Affects Security

Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...

Using Kinect for Windows with XNA Curriculum
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Using Kinect for Windows with XNA Curriculum

I mentioned Rob Miles new Using Kinect for Windows with XNA curriculum in Monday

How fast is bit packing?
From Daniel Lemire's Blog

How fast is bit packing?

Integers values are typically stored using 32 bits. Yet if you are given an array of integers between 0 and 131 072, you could store these numbers using as little...

Twitter as the Ultimate Business Intelligence Tool?
From The Eponymous Pickle

Twitter as the Ultimate Business Intelligence Tool?

Twitter as a Business Intelligence tool? I can see see the idea of tweets acting as a continuous interaction of interest and attention  that can determine what...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account