Sign In

Communications of the ACM

Blogs


Blogroll


From Gödel's Lost Letter and P=NP

Modulating the Permanent

When does it become hard to compute? Thomas Muir coined the term “permanent” as a noun in his treatise on determinants in 1882. He took it from Augustin Cauchy’s...

Autonomy Accounting
From The Eponymous Pickle

Autonomy Accounting

Remember visiting HP Autonomy in the UK in the 90s.  Was impressed what they showed us. Analytics being used with AI and Bayesian methods.  First time I had seen...

Elbit Skylens Heads up Display
From The Eponymous Pickle

Elbit Skylens Heads up Display

In Gizmag:Designed for the commercial aviation market and for the Clearvision EFVS family, Skylens is a lightweight wearable device consisting of a visor large...

Experientia’s Twitter feed live
From Putting People First

Experientia’s Twitter feed live

Experientia has now its own Twitter feed. Four months of Putting People First posts and other links have already been uploaded. If you followed Experientia on Twitter...

Why Americans care more about experiences than possessions
From Putting People First

Why Americans care more about experiences than possessions

Leslie Bradshaw, managing parter of Made by Many, describes Americans’ shifting value systems. “Young people have redefined success, and their new definition values...

Human Agent Collectives
From The Eponymous Pickle

Human Agent Collectives

In the  CACM:  More simply put, it's about people and their tools. Now smart tools that are getting smarter. And unexpectedly, new forms of autonomy are emerging...

Top Clippings For December 18th
From Wild WebMink

Top Clippings For December 18th

Originally posted on Meshed Insights & Knowledge:Samsung shuts down ChatOn – CNet – If only there was a way for their customers to uninstall their impotent self...

On Terrorism
From Wild WebMink

On Terrorism

Some politicians seem to act as if “terrorism” means a terrible crime committed by someone who doesn’t fit the speaker’s own racial & religious profile. Just because...

Hadoop as Enterprise Software
From The Eponymous Pickle

Hadoop as Enterprise Software

In BiCorner: A recent meeting made it clear that enterprises are seeing the Hadoop ecosystem this way. Was surprising to me.  Very good introduction to that ecosystem...

Shelf Edge Displays
From The Eponymous Pickle

Shelf Edge Displays

Experimented with the behavior influence of shelf displays. They can provide information and engage.  Here is a new example:" .. Display Solution, based in Gilching...

Blockchain Studies
From The Eponymous Pickle

Blockchain Studies

Blockchains.  This was new to me, then heard it mentioned several times on one week.  " ... The blockchain is a new organizing paradigm for the discovery, transfer...

Big Data and Manufacturing
From The Eponymous Pickle

Big Data and Manufacturing

In McKinsey. On big data and manufacturing.  Talked that just yesterday with an enterprise.  It is clearly a challenge. Lots of unstructured data is common.   It...

Addressing Consumer Emotions
From The Eponymous Pickle

Addressing Consumer Emotions

In Adage: Study Uses Data to Track Consumer Emotions When They Buy ... But Is Self-Reported Emotional Data Useful for Marketers?

Why Mozilla conducts qualitative user research
From Putting People First

Why Mozilla conducts qualitative user research

“Technology and business organizations often default to a positivist worldview and subsequently believe that quantitative results that provide numeric measures...

Brand Narratives
From The Eponymous Pickle

Brand Narratives

In Fastcocreate.  Coversations come after you established a narrative.Striking up conversations isn't enough for social media marketing, Bob Deutsch writes. Marketers...

With Super Power Comes Super Responsibility
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

With Super Power Comes Super Responsibility

Earlier today several people told me that my name was referenced on SlashDot. Specifically it was in reference to me calling programming a super power in a post...

Friday Squid Blogging: Squid Beard
From Schneier on Security

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Lessons from the Sony Hack
From Schneier on Security

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...

A Look at Computer Science Education Week
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

A Look at Computer Science Education Week

Computer Science Week has been around for about seven years now. In the early years I think most of us didn’t really know how to deal with it. There was talk about...

Best Visualization Projects of 2014
From The Eponymous Pickle

Best Visualization Projects of 2014

Flowingdata picks a number of examples.  Not the most simple, but some of the most pleasing and artistic examples that are worth a look.    As he notes, his examples...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
 Yet Another Major Data Breach, But Will This Time Be Any Different?
Yet Another Major Data Breach, But Will This Time Be Any Different?
12.11.2014

Why is our community having such an anemic response to all of these major data breaches? What can we do …

HPC: Computational Performance vs. Human Productivity
HPC: Computational Performance vs. Human Productivity
12.01.2014

One of the themes at SC14 was the tension between developing programs that run fast vs. the time required by …

Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
12.01.2014

A rethinking of how best to analyze data on women's undergraduate degrees in STEM disciplines. 

View More Blog@CACM