acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Bored in Space
From The Eponymous Pickle

Bored in Space

You would not think it was possible.  To be bored while in space, with all the tasks to do and the stars and earth to look at.   But apparently it is, and games...

Hadoop and IBM do Big Data in the Cloud
From The Eponymous Pickle

Hadoop and IBM do Big Data in the Cloud

I have just started to look at Hadoop, which   " ... enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired byGoogle'sIBM...

Kinect-ing at the NJSBA Annual Workshop
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kinect-ing at the NJSBA Annual Workshop

Normally the conferences I attend are about educational technology or computer science education. Events like ISTE, MASSCue, TCEA, SIGCSE or CSTA

Students are Awesome(ly Productive Right Now)
From My Biased Coin

Students are Awesome(ly Productive Right Now)

What's the use of a blog if you can't brag about your students?  And my students have all been doing great stuff, so I'm excited to let others know about theirarxiv...

From The Computing Community Consortium Blog

An interesting story

Launching Ketchup on Facebook
From The Eponymous Pickle

Launching Ketchup on Facebook

For their most avid fans, Heinz is launching some new flavors of Ketchup on Facebook.  An interesting example or relatively low involvement products.  But they...

It Is Not Where You Work, But Who You Work With
From Daniel Lemire's Blog

It Is Not Where You Work, But Who You Work With

It is widely believed that intellectual productivity is tied to location. That is, if you work in a basement at Harvard like Walter Bishop in the TV show Fringe...

Short History of the Web at Work
From The Eponymous Pickle

Short History of the Web at Work

How the web has powered work for 20 years. A brief view of the history and its implications.   It seems like it has been much longer.  What is next?

International S&E Visualization Challenge: Vote Before Friday
From The Computing Community Consortium Blog

International S&E Visualization Challenge: Vote Before Friday

Back in February, we noted that the National Science Foundation and Science

Cracking the Copiale Cipher
From Schneier on Security

Cracking the Copiale Cipher

I don't follow historical cryptography, so all of this comes as a surprise to me. But something called the Copiale Cipher from the 18th Century has been cracked...

Energy consumption in the home
From Putting People First

Energy consumption in the home

The Danish Alexandra Institute (see also previous post) published in 2009 an anthropological user study of needs, motivations and barriers in relation to energy...

Demands from Law Enforcement for Google Data
From Schneier on Security

Demands from Law Enforcement for Google Data

Google releases statistics: Google received more than 15,600 requests in the January-June period, 10 percent more than the final six months of last year. The requests...

The Internet of Things comic book
From Putting People First

The Internet of Things comic book

The Danish Alexandra Institute has just released a comic book called “Inspiring the Internet of Things,” which explains the benefits of networking everyday objects...

Changing How Doctors and Patients Interact
From The Eponymous Pickle

Changing How Doctors and Patients Interact

I have been examining exactly this question recently.  Is it as simple as SMS messages?  My doctor has a problem with the privacy issue.

Procter & Gamble's Pixel Visualization Room
From The Eponymous Pickle

Procter & Gamble's Pixel Visualization Room

From the SAS ComBlog:  A description of an effort at Procter & Gamble to provide data visualization and analytics support: "... P&G colleagues collaborate in what...

Audio of EPIC 2011 presentations
From Putting People First

Audio of EPIC 2011 presentations

The organisers of the Ethnographic Praxis in Industry (EPIC 2011) conference have posted audio of the keynotes and most of the presentations. The conference took...

Twofish Mentioned in Thriller Novel
From Schneier on Security

Twofish Mentioned in Thriller Novel

I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did rhe terrorists use it?...

Want to create a great product? First, forget
From Putting People First

Want to create a great product? First, forget

User-friendliness is the inevitable result of a smart design approach, not the starting point. Robert Hoekman, Jr lists three criteria to help you develop a useful...

Intentional environments: designing a culture of co-creation
From Putting People First

Intentional environments: designing a culture of co-creation

Elements such as social dynamics, communication styles, and creative inspiration deeply affect our experience of work and what we create. While most of us don’t...

Predictive Analytics Resources
From The Eponymous Pickle

Predictive Analytics Resources

I attended an IBM seminar on predictive methods a few weeks ago.  I thought it was well constructed and worth while.  In reviewing some of their material I seePrediction...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account