Sign In

Communications of the ACM

Blogs


Blogroll


Friday Squid Blogging: Humboldt Squids Attack Submarine
From Schneier on Security

Friday Squid Blogging: Humboldt Squids Attack Submarine

A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news...

From U.S. Public Policy Committee of the ACM

USPTO and NIST To Host Multistakeholder Meeting on Cybersecurity and Patents in Silicon Valley on November 14

The U.S. Patent and Trademark Office (USPTO), in partnership with the National Institute of Standards and Technology (NIST), will host the first multistakeholder...

From The Computing Community Consortium Blog

Monitoring Vital Signs for the Elderly

The National Science Foundation recently featured University of Missouri computer scientist Marjorie Skubic in a Science360 radio episode. Skubic is engineering...

How Watson Works
From The Eponymous Pickle

How Watson Works

A straightforward, non-technical video of how Watson/Cognitive is designed to work,  implemented in the real world.    Worth a look if you are at all interested...

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)
From Schneier on Security

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

Good analysis....

New Realities of Local Retail
From The Eponymous Pickle

New Realities of Local Retail

In ThinkwithGoogle:" ... The relationship between digital and local stores is changing—something we learned from our new Digital Impact on In-Store Shopping study...

P&G to Spin off Duracell
From The Eponymous Pickle

P&G to Spin off Duracell

Not unexpected.  But the form of the move is unusual. Not a profitable enough business.  " .... Though P&G said that the Duracell has 'attractive operating profit...

On the Role of the Chief Data Officer
From The Eponymous Pickle

On the Role of the Chief Data Officer

Excellent piece here. Have worked in the area of regulatory compliance.  Here the idea is to consider the more formal roles involved to address this problem systematically...

Analysis of Printer Watermarking Techniques
From Schneier on Security

Analysis of Printer Watermarking Techniques

Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual...

Former Apple Retail Store Manager Will help You Choose.
From The Eponymous Pickle

Former Apple Retail Store Manager Will help You Choose.

The Apple store is impressive.  An impressive showy blend of service, expertise and demonstration.   With lots of geeky camaraderie.The Genius Behind The AppleFormer...

Google and AI with DeepMind
From The Eponymous Pickle

Google and AI with DeepMind

More examples of Cognitive, here with Google." ... Google, the search company that's investing heavily in robotics, is teaming with Oxford University researchers...

From The Computing Community Consortium Blog

Big Data in the Classroom

Data sets are growing rapidly. Yahoo, Google, and Amazon, work with data sets that consist of billions of items. The size and scale of data, which can be overwhelming...

Available Watson Cognitive Services
From The Eponymous Pickle

Available Watson Cognitive Services

Jim Spohrer points to a more complete list of Watson Bluemix services.  I am in the midst of exploring. Here is one example to give you an idea of the granularity...

From The Computing Community Consortium Blog

Reminder Call for Proposals: Creating Visions for Computing Research

The Computing Community Consortium (CCC) issued a new call for proposals for workshops that will catalyze and enable innovative research at the frontiers of computing...

Asimov on How People Get New Ideas
From The Eponymous Pickle

Asimov on How People Get New Ideas

In Technology Review:  Long ago, unpublished essay by beloved science and science fiction author Issac Asimov.  His writings inspired me starting in Jr High.  ...

From Computational Complexity

Guest Post by Dr. Hajiaghayi: A new way to rank departments

(This is a guest post by MohammadTaghi Hajiaghayi. His name is not a typo- the first name really is MohammadTaghi.) Due to our belief in the lack of transparency...

Testing Machine to Machine Systems
From The Eponymous Pickle

Testing Machine to Machine Systems

Machines are easier to deal with than humans, at least when the machines are not compromised by humans.   This will increase in importance.   But is also implies...

Instructions and Removing Ambiguity
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Instructions and Removing Ambiguity

Recently I found the following image on Facebook. I plan to use it with my students this semester as a starting off point for conversation. This is a perfect...

Protein Imaging Data
From The Eponymous Pickle

Protein Imaging Data

In Nature:  Heard much about this topic in R&D when we were still in health care product development.  " ... Data bank struggles as protein imaging ups its game...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Satya Nadella and Grace Hopper
Satya Nadella and Grace Hopper
10.16.2014

Thoughts about Satya Nadella's comments at the Grace Hopper Conference.

Anyone Can Learn Programming: Teaching > Genetics
Anyone Can Learn Programming: Teaching > Genetics
10.14.2014

Way more important than the question "Is P==NP?" is the question, "Is teaching greater than genetics?"

I Have Seen the Future…
I Have Seen the Future…
10.15.2014

…At the Grace Hopper Celebration of Women in Computing, and the future of computing is women.

View More Blog@CACM