Sign In

Communications of the ACM

Blogs


Blogroll


Measuring Content Metrics:  All About the Data
From The Eponymous Pickle

Measuring Content Metrics: All About the Data

In Adage:  On how to measure digital content.  Which relates to the more general aspect of Data Assets.  Which I have repeated here and given a talk about.   It's...

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Where do you Start With the Internet of Things?
From The Eponymous Pickle

Where do you Start With the Internet of Things?

Good piece on the topic. by James MacLennan.   There is lots of talk everywhere of course, but what do you do to fit his into a business?   We spent years thinking...

Video Analytics and Privacy
From The Eponymous Pickle

Video Analytics and Privacy

An area we examined in laboratory conditions. One approach seen was the automated blurring of faces.  In RetailWire:  Discussion:  " ... While privacy remains a...

The Untold History of Women in Science and Technology
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

The Untold History of Women in Science and Technology

A friend sent me a link to an interesting looking page that the White House set up to tell stories of the history of women in Science and Technology. It is a collection...

World Development Report 2015 explores “Mind, Society, and Behavior”
From Putting People First

World Development Report 2015 explores “Mind, Society, and Behavior”

WASHINGTON, December 2, 2014 — Development policies based on new insights into how people actually think and make decisions will help governments and civil society...

Cheap Hack-able Roomba
From The Eponymous Pickle

Cheap Hack-able Roomba

In Mashable: " ... iRobot builds a vacuum-free Roomba for students to hack ... "     This is a successor to the iRobot Create, which we used to experiment with...

An Advisory System
From The Eponymous Pickle

An Advisory System

An interesting example."ALEX the virtual benefits counselor is America’s best-selling and most-trusted standalone benefits decision support tool. Used by hundreds...

Stress:  Competition and Ranking
From My Biased Coin

Stress: Competition and Ranking

One issue I keep seeing in comments here and elsewhere on this issue is that academia is very competitive, with everyone worried about their rank.  In my last post...

From The Computing Community Consortium Blog

NSF Announces New Partnerships for Computer Science Education

The following is a letter to the community from National Science Foundation (NSF) Acting Assistant Director for the Directorate for Computer & Information Science...

Understanding Zero-Knowledge Proofs
From Schneier on Security

Understanding Zero-Knowledge Proofs

Matthew Green has a good primer....

From The Computing Community Consortium Blog

Reminder LiSPI Nominations Close in One Week!

In November, the Computing Community Consortium (CCC) announced the third offering of the CCC Leadership in Science Policy Institute (LiSPI), intended to educate...

Open Source Projects for Machine Intelligence
From The Eponymous Pickle

Open Source Projects for Machine Intelligence

In InfoWorld: Four groups have been developing IBM Watson-like systems based on open source work.  ... Watson wannabes: 4 open source projects for machine intelligence...

From Computational Complexity

Joint Center for Quantum Information and Computer Science

(Guest post by Andrew Childs who is now at the Univ of MD at College Park) We have recently launched a new Joint Center for Quantum Information and ComputerScience...

More Advances in Mobile Eye Tracking
From The Eponymous Pickle

More Advances in Mobile Eye Tracking

An area where we did much work, both on the physical implementation aspects, and on the gathering and analytical methods used with the data.  New developments on...

Find Critical Business Data Fast
From The Eponymous Pickle

Find Critical Business Data Fast

In CWorld:  This was part of our mantra in the enterprise with Business Sphere applications.  " ... These CIOs are jumping on a fast-moving trend — mining small...

From The Computing Community Consortium Blog

NSF US Ignite Deadline Fast Approaching

The National Science Foundation (NSF) Directorate for Computer & Information Science & Engineering (CISE) announced in October a new solicitation, entitled US Ignite...

Smarter Algorithms
From The Eponymous Pickle

Smarter Algorithms

In CWorld:  " ... Researchers are working on a new version of an algorithm that will power better search, autonomous cars, smarter smartphones and the Internet  ...

Over 700 Million People Taking Steps to Avoid NSA Surveillance
From Schneier on Security

Over 700 Million People Taking Steps to Avoid NSA Surveillance

There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...

Interesting Links 15 December 2014
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Interesting Links 15 December 2014

This week is the last week of school for my school this calendar year. We start our Christmas break with Saturday the 20th and will be off until January. I’m looking...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
 Yet Another Major Data Breach, But Will This Time Be Any Different?
Yet Another Major Data Breach, But Will This Time Be Any Different?
12.11.2014

Why is our community having such an anemic response to all of these major data breaches? What can we do …

HPC: Computational Performance vs. Human Productivity
HPC: Computational Performance vs. Human Productivity
12.01.2014

One of the themes at SC14 was the tension between developing programs that run fast vs. the time required by …

Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
Women in STEM, Women in Computer Science: We're Looking At It Incorrectly
12.01.2014

A rethinking of how best to analyze data on women's undergraduate degrees in STEM disciplines. 

View More Blog@CACM