Sign In

Communications of the ACM

Blogs


Blogroll


Two States–the Highs and the Lows
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Two States–the Highs and the Lows

I found this image on Facebook last week and it really rang true for me. I experienced both sides of this recently. On one hand I wrote a program on the spur...

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

Scene Understanding and Labeling Pixels
From The Eponymous Pickle

Scene Understanding and Labeling Pixels

A problem I looked at for a startup a few years ago.  Ultimately it was chosen to address it by using crowdsourcing.  Here a Vimeo interview with Stephen Gould"...

Watson Analytics Seen Today
From The Eponymous Pickle

Watson Analytics Seen Today

Watson Analytics    Have yet to get a beta loaner, but today I did get several more in depth demonstrations of the idea.  In one case I was able to at least suggest...

Whole Foods Digital Signage
From The Eponymous Pickle

Whole Foods Digital Signage

Whole Foods Store of the future utilizes digital signage.  They have been innovators in this space for some time.   " .... Whole Foods has unveiled a new range...

USPS to Test Delivery of Groceries
From The Eponymous Pickle

USPS to Test Delivery of Groceries

The idea has been suggested for years, now finally the Feds have approved a test.  Why not?   " ... Federal authorities have given approval for the U.S. Postal...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Five things marketers can learn from designers
From Putting People First

Five things marketers can learn from designers

Why are highly successfully companies putting top-notch designers in key leadership roles, ask David Weber and Lisa Leslie Henderson. What are designers bringing...

Best practices for medical app development go beyond standard UX
From Putting People First

Best practices for medical app development go beyond standard UX

Mobile healthcare app development poses a set of challenges very different from mainstream apps. Not only is security an area that requires a considerable attention...

From Gödel's Lost Letter and P=NP

Rebooting Computing

How to beat the end of Moore’s Law Elie Track and Tom Conte were co-chairs of the recently-held Third IEEE workshop on Rebooting Computing. Tom is a computer architect...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Welcome, Attorneys!
From My Biased Coin

Welcome, Attorneys!

You might wonder why I am welcoming attorneys to the blog.  Well, I happen to know that some attorneys read my blog.  I know this because recently, as an expert...

Spritz: A New RC4-Like Stream Cipher
From Schneier on Security

Spritz: A New RC4-Like Stream Cipher

Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...

Haptic Handles
From The Eponymous Pickle

Haptic Handles

In CWorld:It's not quite the same as thumbing a ride, but a cylindrical gadget that nestles in your palm can get you where you want to go.Japanese mobile giant...

Interesting Links 27 October 2014
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Interesting Links 27 October 2014

What a week. I teach at a private school and one of the things we do is have open houses for prospective students and parents. Last week we had two which meantWhy...

Big Data Retail Program
From The Eponymous Pickle

Big Data Retail Program

IBM Big Data & Analytics: Retail Business and Industry Leadership Program

Gartner Identifies Key Technology Trends
From The Eponymous Pickle

Gartner Identifies Key Technology Trends

 I don't usually like top ten lists.  But in this list I do like the general descriptions.  Top strategic technology trends. No big surprises, and the order is...

Tracking the Value of Corporate Get-togethers
From The Eponymous Pickle

Tracking the Value of Corporate Get-togethers

This week attending IBM's big conference on Big Data and Analytics called Insight2014.  In progress all this week.  A huge affair with thousands of participants...

Steganographic Malware
From The Eponymous Pickle

Steganographic Malware

Network threats based on hidden malware.   " .... Researchers at the Hungary-based Laboratory of Cryptography and System Security have uncovered Duqu, an unusual...

Galactic Shadows
From The Eponymous Pickle

Galactic Shadows

My colleague Keith J Caserta has come out with a second book in his Kindle series called: Galactic Shadows. Science fiction about AI and how aliens are likely to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Software’s Vital Role @Japan Robot Week 2014
Software’s Vital Role @Japan Robot Week 2014
10.28.2014

Modern robots are no longer just about hardware. Software algorithms play an essential role in bringing life-like movements to industrial robots and …

What Is Your Research Culture? Part 1: The Questionnaire
What Is Your Research Culture? Part 1: The Questionnaire
10.25.2014

What kind of computer science culture reigns in your country and organization: retro, or modern? Take the questionnaire and find out.

Satya Nadella and Grace Hopper
Satya Nadella and Grace Hopper
10.16.2014

Thoughts about Satya Nadella's comments at the Grace Hopper Conference.

View More Blog@CACM