Sign In

Communications of the ACM

Blogs


Blogroll


Energy Saving Game
From The Eponymous Pickle

Energy Saving Game

In Fastcodesign: A way to turn household energy saving into what they call an addictive game.    Called Power House, on Facebook. Mentioned by collaborator Byron...

test
From Putting People First

test

fsadff af dafs

The Limits of Police Subterfuge
From Schneier on Security

The Limits of Police Subterfuge

"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...

From Computational Complexity

The NIPS Experiment

The NIPS (machine learning) conference ran an interesting experiment this year. They had two separate and disjoint program committees with the submissions split...

Building a Simple Word Cloud
From The Eponymous Pickle

Building a Simple Word Cloud

A simple word cloud service, data can be retrieved from pasted text, URLs or files.  A number of useful features for quick generation.  Their blog provides some...

SAP IOT Garden
From The Eponymous Pickle

SAP IOT Garden

Work and thoughts by SAP on IoT Innovation, in a Garden:" ... Within SAP, IoT has begun taking shape in the form of grassroots projects and pilot implementations...

Too many Arrows in the Quiver?
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Too many Arrows in the Quiver?

Last week I saw a tweet complaining to Wonder Workshop about them using Blockly to program their robots when (apparently) the Kickstarter proposal said the would...

From The Computing Community Consortium Blog

Call for CCC Council Nominations

The Computing Community Consortium (CCC) issued a call today for nominations for individuals to serve on the CCC Council for the next three years.  The deadline...

Optimizing polymorphic code in Java
From Daniel Lemire's Blog

Optimizing polymorphic code in Java

Oracle’s Java is a fast language… sometimes just as fast as C++. In Java, we commonly use polymorphism through interfaces, inheritance or wrapper classes to make...

Brain Marketing
From The Eponymous Pickle

Brain Marketing

In the HBR:  Using the activity of the brain to understand purchasing and marketing decisions.   We called this neuromarketing, but that term is never used in the...

China Boosting Robotics
From The Eponymous Pickle

China Boosting Robotics

In CWorld: " ... Already a major manufacturer of electronics, China is preparing to bolster its presence in robotics with the help of government support and investments...

From The Computing Community Consortium Blog

New NIH Big Data to Knowledge Funding Opportunities

The National Institutes of Health (NIH) Big Data to Knowledge (BD2K) program has announced two new funding opportunities for FY15 funding. NIH Big Data to Knowledge...

How the FBI Unmasked Tor Users
From Schneier on Security

How the FBI Unmasked Tor Users

Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....

Stanford High Rise Chip
From The Eponymous Pickle

Stanford High Rise Chip

In CWorld: New three dimensional design.  Potential for IoT and Big Data applications." ... Stanford University researchers have built a multi-layered "high-rise"...

From Gödel's Lost Letter and P=NP

Prover’s Block

What to do when afraid to see if what you want is true Cropped from Canadian Bergler Society source Edmund Bergler coined the term in 1947, the great writers Francis...

How to Fly a Horse
From The Eponymous Pickle

How to Fly a Horse

Colleague Kevin Ashton writes:Dear Franz, My new book, "How to Fly a Horse — The Secret History of Invention, Creation, and Discovery," comes out on January 20....

Measuring Content Metrics:  All About the Data
From The Eponymous Pickle

Measuring Content Metrics: All About the Data

In Adage:  On how to measure digital content.  Which relates to the more general aspect of Data Assets.  Which I have repeated here and given a talk about.   It's...

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Where do you Start With the Internet of Things?
From The Eponymous Pickle

Where do you Start With the Internet of Things?

Good piece on the topic. by James MacLennan.   There is lots of talk everywhere of course, but what do you do to fit his into a business?   We spent years thinking...

Video Analytics and Privacy
From The Eponymous Pickle

Video Analytics and Privacy

An area we examined in laboratory conditions. One approach seen was the automated blurring of faces.  In RetailWire:  Discussion:  " ... While privacy remains a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
 Yet Another Major Data Breach, But Will This Time Be Any Different?
Yet Another Major Data Breach, But Will This Time Be Any Different?
12.11.2014

Why is our community having such an anemic response to all of these major data breaches? What can we do …

HPC: Computational Performance vs. Human Productivity
HPC: Computational Performance vs. Human Productivity
12.01.2014

One of the themes at SC14 was the tension between developing programs that run fast vs. the time required by …

Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
12.01.2014

A rethinking of how best to analyze data on women's undergraduate degrees in STEM disciplines. 

View More Blog@CACM