Sign In

Communications of the ACM

Blogs


Blogroll


Leave School Now While You Still Know It All
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Leave School Now While You Still Know It All

Interesting questions appear on Twitter all the time. Sometimes addressed to individuals and sometimes addressed to the Twitterverse as a whole. One earlier today...

From Computational Complexity

Sipser Symposium

On Sunday we had the Symposium on Theoretical Computer Science on the Occasion of Michael Sipser's 60th birthday to celebrate what Mike has brought to research...

Rankings Everywhere
From My Biased Coin

Rankings Everywhere

Like many (theoretical) computer scientists, I spent far, far too much time this weekend thinking about rankings.  Well, really, it was more that I was being far...

The zombiefication of business travelers
From Putting People First

The zombiefication of business travelers

Tim Askew, CEO of Corporate Rain International, explains how technology is increasingly isolating us from each other and stifling creativity and real experiences...

Two States–the Highs and the Lows
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Two States–the Highs and the Lows

I found this image on Facebook last week and it really rang true for me. I experienced both sides of this recently. On one hand I wrote a program on the spur...

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

Scene Understanding and Labeling Pixels
From The Eponymous Pickle

Scene Understanding and Labeling Pixels

A problem I looked at for a startup a few years ago.  Ultimately it was chosen to address it by using crowdsourcing.  Here a Vimeo interview with Stephen Gould"...

Watson Analytics Seen Today
From The Eponymous Pickle

Watson Analytics Seen Today

Watson Analytics    Have yet to get a beta loaner, but today I did get several more in depth demonstrations of the idea.  In one case I was able to at least suggest...

Whole Foods Digital Signage
From The Eponymous Pickle

Whole Foods Digital Signage

Whole Foods Store of the future utilizes digital signage.  They have been innovators in this space for some time.   " .... Whole Foods has unveiled a new range...

USPS to Test Delivery of Groceries
From The Eponymous Pickle

USPS to Test Delivery of Groceries

The idea has been suggested for years, now finally the Feds have approved a test.  Why not?   " ... Federal authorities have given approval for the U.S. Postal...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Five things marketers can learn from designers
From Putting People First

Five things marketers can learn from designers

Why are highly successfully companies putting top-notch designers in key leadership roles, ask David Weber and Lisa Leslie Henderson. What are designers bringing...

Best practices for medical app development go beyond standard UX
From Putting People First

Best practices for medical app development go beyond standard UX

Mobile healthcare app development poses a set of challenges very different from mainstream apps. Not only is security an area that requires a considerable attention...

From Gödel's Lost Letter and P=NP

Rebooting Computing

How to beat the end of Moore’s Law Elie Track and Tom Conte were co-chairs of the recently-held Third IEEE workshop on Rebooting Computing. Tom is a computer architect...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Welcome, Attorneys!
From My Biased Coin

Welcome, Attorneys!

You might wonder why I am welcoming attorneys to the blog.  Well, I happen to know that some attorneys read my blog.  I know this because recently, as an expert...

Spritz: A New RC4-Like Stream Cipher
From Schneier on Security

Spritz: A New RC4-Like Stream Cipher

Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...

Haptic Handles
From The Eponymous Pickle

Haptic Handles

In CWorld:It's not quite the same as thumbing a ride, but a cylindrical gadget that nestles in your palm can get you where you want to go.Japanese mobile giant...

Interesting Links 27 October 2014
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Interesting Links 27 October 2014

What a week. I teach at a private school and one of the things we do is have open houses for prospective students and parents. Last week we had two which meantWhy...

Big Data Retail Program
From The Eponymous Pickle

Big Data Retail Program

IBM Big Data & Analytics: Retail Business and Industry Leadership Program
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Software’s Vital Role @Japan Robot Week 2014
Software’s Vital Role @Japan Robot Week 2014
10.28.2014

Modern robots are no longer just about hardware. Software algorithms play an essential role in bringing life-like movements to industrial robots and …

What Is Your Research Culture? Part 1: The Questionnaire
What Is Your Research Culture? Part 1: The Questionnaire
10.25.2014

What kind of computer science culture reigns in your country and organization: retro, or modern? Take the questionnaire and find out.

Satya Nadella and Grace Hopper
Satya Nadella and Grace Hopper
10.16.2014

Thoughts about Satya Nadella's comments at the Grace Hopper Conference.

View More Blog@CACM