Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

October 2014


From Schneier on Security

William Binney Explains NSA Surveillance Using Snowden's Documents

William Binney Explains NSA Surveillance Using Snowden's Documents

Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting....


From The Eponymous Pickle

Lotus 1-2-3 Support Ended

Lotus 1-2-3 Support Ended

Historical note. We used Lotus extensively in the enterprise in the late 80s.  It was the second major electronic spreadsheet offering, after Visicalc.  We also used it to integrate certain kinds of corporate data.  IBM has


From The Eponymous Pickle

Artificial Intelligence in the World University

Artificial Intelligence in the World University

It has been a while since I have looked at Wikis outside of Wikipedia.  We developed intra-Wikis experimentally, but not with great success.  Check some of my other links for the 'why'.   Here is an example brought to my attention


From The Computing Community Consortium Blog

Beth Mynatt Honored with 2014 Mobility Star Award

The Computing Community Consortium (CCC) Vice Chair Beth Mynatt has received a 2014 Mobility Star Award, which salutes excellence and advancements in mobility. The award recognizes five mobile technology leaders who have made…


From The Eponymous Pickle

Collaboration Environment Requirements

Collaboration Environment Requirements

In Cisco Blog:  A topic often covered here.  What really makes it work?   Strongly leveraged Data, Analytics, context, focus and culture are my answers.  Technology is just the essential part you need, but it won't make it successful


From The Eponymous Pickle

Supply Chain Collaboration

Supply Chain Collaboration

Supply chain collaboration.  Ultimately essential to scale to the solution for the right context.   It is about visibility, but what does that term mean?  Agree it is often tailored to the agendas of the players involved.


From The Eponymous Pickle

Amazon Crowdsourcing Publishing

Amazon Crowdsourcing Publishing

 Amazon's outsourced publishing platform called WriteOn.  As launched, aimed at publishing fiction.  But could the same thing be done with other kinds of publishing, say storytelling based on business intelligence results?  


From BLOG@CACM

The State of Computing Education in the World: Report on the 2014 ACM Education Council Meeting

The State of Computing Education in the World: Report on the 2014 ACM Education Council Meeting

The ACM Education Council gets together once a year to share initiatives and results, and promote computing education.


From Schneier on Security

The NSA's Private Cloud

The NSA's Private Cloud

The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in some cases a single word or name in a file. This includes when


From Computational Complexity

Favorite Theorems: Multilinear Circuits

In the past decade we have seen a strong program in algebraic circuit complexity. If you just define circuits using multiplication and addition gates, sometimes you can use the algebraic structure to get lower bounds that prove


From Putting People First

Five tips for experience designers working on healthcare innovation

Five tips for experience designers working on healthcare innovation

Earlier this year Tracy Brown, a London-based UX designer, had the opportunity to work within an innovation lab called The Digital Innovation group (DIG), created as a collaboration between DigitasLBi and Astrazeneca to allow


From The Eponymous Pickle

Digital NYC Launched

Digital NYC Launched

To my startup friends in NYC, Digital NYC has launched.   Congratulatons!  Got a great impression of their work during my last visit.    It is also well supported: IBM Sweetens pie for Big Apple Entrepreneurs.  " ... a web site


From Schneier on Security

Firechat

Firechat

Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as well as western states, especially the US and the UK) is infamous


From The Computing Community Consortium Blog

NSF announces opportunities with the BRAIN Initiative

The National Science Foundation (NSF) has three new announcements today related to the BRAIN Initiative and NSF’s Understanding the Brain activities:   NSF 14-611  Integrative Strategies for Understanding Neural and Cognitive…


From Gödel's Lost Letter and P=NP

The Busy Beaver Problem

Can the impossible become practical? Complex analysts gallery source Tibor Radó was a mathematician who was the PhD advisor to a number of computer scientists. They include Shen Lin, Paul Young, and several others. All were his


From The Eponymous Pickle

Internet of Things in China

Internet of Things in China

First I had seen of reports on the IOT in China.  In GigaOM:" ... In conversations with companies doing business in China on the IoT front, the picture that emerged was clear. China is adapting to the internet of things like


From The Eponymous Pickle

Skin Patch Monitors Health

Skin Patch Monitors Health

From IdeaConnection:A discrete new 'skin-like' health monitor could be used to monitor a range of conditions from dry skin to cardiovascular disease.Created by a team from Northwestern University and the University of Illinois


From The Computing Community Consortium Blog

Complexity Explorer

The following is a special contribution to this blog by Melanie Mitchell, Professor of Computer Science at Portland State University, and External Professor and Member of the Science Board at the Santa Fe Institute. Melanie is…


From The Eponymous Pickle

Open Source Dominates Big Data

Open Source Dominates Big Data

Interesting to see this historical view of a very recent development.  The story of Hadoop.  Also adds to the increasing interest and investment in open source.  " ... The software’s “refreshingly unique approach to data management


From The Eponymous Pickle

Teams and Risks

Teams and Risks

Recent interactions with the compliance community have tuned me into how risks need to be managed.  In the HBR:" ... Many companies pay lip service to the value of taking risks without actually empowering employees to do so,


From The Eponymous Pickle

3D Food Printer Approaches Ship Date

3D Food Printer Approaches Ship Date

In GigaOM:   A look at the concept of a 3D food printer.  A whimsical idea we toyed with.  Having a hard time understanding it useful application." ... Structur3D’s paste extruder is looking more and more polished as the startup


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Do It Without Code

Do It Without Code

One of the projects I like to assign involves counting the letters in a set of text. In other words, how many times does each unique letter appear in a string. How many “a”s, “b’”s, etc. I usually want some thing that looks like


From Schneier on Security

Security Theater in China

Security Theater in China

The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....

« Prev 1 7 8 9 Next »