Sign In

Communications of the ACM

Blogs


Blogroll


Simplification of NoSQL Databases
From The Eponymous Pickle

Simplification of NoSQL Databases

Nice simple introduction with examples.  The WP defines " ... A NoSQL (often interpreted as Not Only SQL  database provides a mechanism for storage and retrieval...

A Virtual Agent Who Thinks Like Me
From The Eponymous Pickle

A Virtual Agent Who Thinks Like Me

Recently have seen the emergence of mirror style systems, where a system can look like me and I can use that idea to market and advertise.  But suppose I had aNot...

Morphology and Emergence
From The Eponymous Pickle

Morphology and Emergence

An area we examined. Has potential application to non quantified but constraint specified problems. problems. For those who are interested in the principle of “emergence”...

From Gödel's Lost Letter and P=NP

Chats

Error correction for chatting Bernhard Haeupler is an Assistant Professor in Computer Science at CMU. He previously spent a year as a postdoc at Microsoft Research...

Grocery Delivery Options
From The Eponymous Pickle

Grocery Delivery Options

Have recently been asked to look at grocery delivery capabilities.   We saw these as common components of the future home, but they have not developed as quickly...

What CIO's Need to know about Prediction
From The Eponymous Pickle

What CIO's Need to know about Prediction

Good thoughts about the topic.  Not much difference between classic forecasting, analytics, or the use of Big Data. Caution and careful testing in comparison to...

Linking Multiple Services to Advice
From The Eponymous Pickle

Linking Multiple Services to Advice

via Jim Spohrer" ... Probably the most interesting related business idea is Adam Cheyer's (co-creator of SIRI)  (http://viv.ai) which is trying to what you are...

New Gamification Blog
From The Eponymous Pickle

New Gamification Blog

In IEEE Computing Now, a new effort of very broad application.  Look forward to following this.Gamification:  Inspired by Games Blogby Joann Hoffman and Wanda Meloni...

Storyboard Approach to Big Data Insights
From The Eponymous Pickle

Storyboard Approach to Big Data Insights

Plan to take a further look at the idea.  " ... Big data by itself is just a worthless collection of numbers and characters. To make big data work, you need to...

Drone Code Project
From The Eponymous Pickle

Drone Code Project

aaIn CWorldThe Dronecode Project will unite thousands of coders to build an aerial operating system for drones ... Drones have just found their new best friends:...

Friday Squid Blogging: Recreational Squid Fishing in Washington State
From Schneier on Security

Friday Squid Blogging: Recreational Squid Fishing in Washington State

There is year-round recreational squid fishing from the Strait of Juan de Fuca to south Puget Sound. A nighttime sport that requires simple, inexpensive fishing...

From The Computing Community Consortium Blog

NSF/Intel Partnership on Visual and Experiential Computing (VEC) Program Webinar

The National Science Foundation (NSF) Directorate for Computer Science and Engineering (CISE) in partnership with Intel announced a joint funding opportunity called...

Incident Response Webinar on Thursday
From Schneier on Security

Incident Response Webinar on Thursday

On 12/18 I'll be part of a Co3 webinar where we examine incident-response trends of 2014 and look ahead to 2015. I tend not to do these, but this is an exception...

From The Computing Community Consortium Blog

NSF Algorithms in the Field Webinar

Recently, the Computing Community Consortium (CCC) posted an article about Algorithms in the Field (AitF) a new program in the Directorate for Computer Science...

Google Lets Devices Commune
From The Eponymous Pickle

Google Lets Devices Commune

In NetworkWorld:" ... A new Google project aims to create nothing less than an open standard for the entire “Internet of Things,” which the company’s Chrome team...

Who Might Control Your Telephone Metadata
From Schneier on Security

Who Might Control Your Telephone Metadata

Remember last winter when President Obama called for an end to the NSA's telephone metadata collection program? He didn't actually call for an end to it; he just...

International 3D Game Creation Activity for CSEdWeek
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

International 3D Game Creation Activity for CSEdWeek

I saw this on the CSTA mailing list this morning. Looks like fun. A collaboration between the University of Colorado, USA, Tecnológico de Monterrey, Mexico, and...

Cognitive Advising Veterans
From The Eponymous Pickle

Cognitive Advising Veterans

Finally got a bit closer look at this effort.  A good example of an advisory system.    Announced this past July.  " ... IBM and USAA announced Wednesday that IBM...

Infrastructure for Data Driven Science
From The Eponymous Pickle

Infrastructure for Data Driven Science

A very good direction,  working with infrastructure is often more complex than it should be.Laying the groundwork for data-driven scienceNSF announces $31 million...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
 Yet Another Major Data Breach, But Will This Time Be Any Different?
Yet Another Major Data Breach, But Will This Time Be Any Different?
12.11.2014

Why is our community having such an anemic response to all of these major data breaches? What can we do …

HPC: Computational Performance vs. Human Productivity
HPC: Computational Performance vs. Human Productivity
12.01.2014

One of the themes at SC14 was the tension between developing programs that run fast vs. the time required by …

Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
12.01.2014

A rethinking of how best to analyze data on women's undergraduate degrees in STEM disciplines. 

View More Blog@CACM