acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

What Does it Mean to Design Public Services?
From Putting People First

What Does it Mean to Design Public Services?

Design thinking and techniques can help create radical innovations needed to meet the challenges facing local communities and services, says Philip Colligan, executive...

NFTE World Series of Innovation
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

NFTE World Series of Innovation

Innovation! What is is and how can we teach it to children? Big questions today as many of us believe that innovation in many forms is absolutely critical to success...

Boot Camp Digital
From The Eponymous Pickle

Boot Camp Digital

See former colleague Krista Neher's  Boot Camp Digital.    Local Social media tips and tricks. Great stuff.  "Krista really knows her stuff re: social media. She...

ScriptTD: Tower Defense Game Creation Made Easy
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

ScriptTD: Tower Defense Game Creation Made Easy

Coding a game from scratch is hard. Make no mistake about there is a lot to it. OF course many people, especially students, think they are all ready to create the...

Fusion Tables
From The Eponymous Pickle

Fusion Tables

Had completely missed this idea in Google Docs: Fusion Tables. " ... a new option in Google Docs: creating tables. It seems that Google Docs started to integrate...

Open Badges
From The Eponymous Pickle

Open Badges

A clever, simple  idea that also depends much on how it is implemented.   An open infrastructure that is all about delivering badges for acquiring skills.  Much...

New Lows in Secret Questions
From Schneier on Security

New Lows in Secret Questions

I've already written about secret questions, the easier-to-guess low-security backup password that sites want you to have in case you forget your harder-to-remember...

A Single Molecule Motor
From The Eponymous Pickle

A Single Molecule Motor

One of the great accomplishments of the 19th century was the electric motor. Converting electrical energy to controllable mechanical energy.  Now a single molecule...

Junk Charts Again
From The Eponymous Pickle

Junk Charts Again

In Junk Charts they illustrate one of my favorite examples of poor data visualization. It is the use of bar charts without using scales that start at zero.  This...

Attention CMU Students!
From The Noisy Channel

Attention CMU Students!

As many of you know, I’m a proud alumnus of the CMU School of Computer Science

New Blogger Interface
From The Eponymous Pickle

New Blogger Interface

This is now live.  Have not tried it yet, but plan to.   Need a reworking of my blog format and capabilities.

Grow from Within
From The Eponymous Pickle

Grow from Within

Grow from Within: Mastering Corporate Entrepreneurship and Innovation by Robert Wolcott and Michael Lippitz. Now on my stack of things to read.  Recently heard...

Using R for Big Data
From The Eponymous Pickle

Using R for Big Data

Some excellent examples of the use of the Statistical/visualization/data mining language R for a number of real applications.  Have started to use it more myself...

From Computational Complexity

Next in the sequence

When I posted on sequence problems here some people said that they did not have unique answers. Many problems FORMALLY do not have a unique answer, but common sense...

Analytics for Neuromarketing
From The Eponymous Pickle

Analytics for Neuromarketing

In Mediapost: More must be more done to quantify how neuromarketing results are used.  What are useful metrics?

Blending machines and humans to get very high accuracy
From Geeking with Greg

Blending machines and humans to get very high accuracy

A paper by six Googlers from the recent KDD 2011 conference, "Detecting Adversarial Advertisements in the Wild" (PDF) is a broadly useful example of how to succeed...

The Legality of Government Critical Infrastructure Monitoring
From Schneier on Security

The Legality of Government Critical Infrastructure Monitoring

Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...

Game Papers at SIGGRAPH 2011 (Part 1 of 2)
From The Female Perspective of Computer Science

Game Papers at SIGGRAPH 2011 (Part 1 of 2)

Following up on my general impressions of SIGGRAPH I wanted to write about a few of the games paper presentations I enjoyed seeing at the conference.  I paid most...

Outing a CIA Agent
From Schneier on Security

Outing a CIA Agent

Interesting article on how difficult it is to keep an identity secret in the information age.

Windows Phone Mango Jump Start Workshop Now On Video
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows Phone Mango Jump Start Workshop Now On Video

IF you missed it live (like I did) you can now view the recording of the Windows Phone Mango Jump Start training on Channel 9. I borrowed these direct links from...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account