acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

HTC Android Vulnerability
From Schneier on Security

HTC Android Vulnerability

Custom HTC firmware breaks standard permissions and allows rogue apps to access location, address book, and account info without authorization.

Interesting Links 3 October 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 3 October 2011

What a week. Not as much blogging from me because this were a little crazy. I try not to post just for the sake of posting so without the time to do it right I...

Bagging Self Checkouts
From The Eponymous Pickle

Bagging Self Checkouts

This is a surprising article.  My own examination of this area seems to show that self-checkout installations of several kinds is increasing.   Examining further...

Georgia Tech, Duke University, and University of North Carolina
From Michael Nielsen

Georgia Tech, Duke University, and University of North Carolina

I

Kickstarter
From The Eponymous Pickle

Kickstarter

A means of getting funding for independent creators:  " ... The economics of Kickstarter, if you

Personal Annunciation Device
From The Eponymous Pickle

Personal Annunciation Device

A Personal annuniciation device.  " ...  The PAD may very well be the world

Qreo Scanning the Cookie
From The Eponymous Pickle

Qreo Scanning the Cookie

Can you scan an array of cookies laid out in the form of a QR Code?   Yes, here is proof of it.  Shows the robustness of the code form.   I tried it with my phone...

Solar Decathlon Winner Relies Upon Computing Advances
From The Computing Community Consortium Blog

Solar Decathlon Winner Relies Upon Computing Advances

For the past two weeks, the National Mall in Washington, DC, has been transformed into a neighborhood of futuristic homes, with 20 teams from five countries spanning...

New York Times
From My Biased Coin

New York Times

Our work on daily deals is mentioned and linked to in Sunday's New York Times business section.  (John Byers even got a quote in!)  It was also mentioned in this...

Ad Technology Rivals Plan to Merge
From The Eponymous Pickle

Ad Technology Rivals Plan to Merge

I recently took a look at how companies were using technology to manage portfolios of advertisements and discovered the pending merger of two of the biggest  players...

Securing Executive Support for Analytics
From The Eponymous Pickle

Securing Executive Support for Analytics

On the face of it this question seemed inconceivable.   I worked for an organization that supported analytics fundamentally.  They even made the topic one of their...

Will Amazon Eat the World?
From The Eponymous Pickle

Will Amazon Eat the World?

Just read The Omnivore in the latest Bloomberg BusinessWeek.  About Jeff Bezos of Amazon and his new tablet device.  They position it: " ...  Jeff Bezos' new tablet...

Keeping It Professional: Relevance, Recommendations, and Reputation at LinkedIn
From The Noisy Channel

Keeping It Professional: Relevance, Recommendations, and Reputation at LinkedIn

Last week, I delivered the following presentation at the CMU Intelligence Seminar:   I had a great audience, including the department head! Of course that meant...

Friday Squid Blogging: Interesting Squid Recipes
From Schneier on Security

Friday Squid Blogging: Interesting Squid Recipes

Plus a slide show of pretty dishes.

Business Rules Engines
From The Eponymous Pickle

Business Rules Engines

I have been asked about the use ot business rules to drive specifics of process.   This came up:Welcome to Business Rule Engine. This site is a companion to the...

You Need a Data Scientist
From The Eponymous Pickle

You Need a Data Scientist

Good piece on the reasons why you need a data scientist to address how to use analytics for your business.   In my own consulting business I get similar questions...

Vulnerability in Teaching
From The Female Perspective of Computer Science

Vulnerability in Teaching

The status quo in university lecturing is comfortable.  You capture what you know on a set of slides (often using many words - kind of a brain dump, really), and...

Watson and Wellpoint
From The Eponymous Pickle

Watson and Wellpoint

Another good article, this in Analytics Magazine on the application of the IBM Watson AI technology and Wellpoint Inc.  " ... WellPoint, Inc. and IBM announcedQuite...

PressPausePlay, a film about hope, fear and digital culture
From Putting People First

PressPausePlay, a film about hope, fear and digital culture

The digital revolution of the last decade has unleashed creativity and talent of people in an unprecedented way, unleashing unlimited creative opportunities. But...

From Computational Complexity

Bibliographies

Lots of buzz about Princeton's new policy that prevents faculty from giving away the right to publish papers on their own web pages. Never seen faculty so happy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account