Sign In

Communications of the ACM

Blogs


Blogroll


Friday Squid Blogging: Squid Beard
From Schneier on Security

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Lessons from the Sony Hack
From Schneier on Security

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...

A Look at Computer Science Education Week
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

A Look at Computer Science Education Week

Computer Science Week has been around for about seven years now. In the early years I think most of us didn’t really know how to deal with it. There was talk about...

Best Visualization Projects of 2014
From The Eponymous Pickle

Best Visualization Projects of 2014

Flowingdata picks a number of examples.  Not the most simple, but some of the most pleasing and artistic examples that are worth a look.    As he notes, his examples...

IBM Rival Sentient
From The Eponymous Pickle

IBM Rival Sentient

An AI rival to understand: Sentient: With some emphasis on big data and genetic methods.  And the direct use of biomimicry through the use of genetic algorithms...

Thinking Futures
From The Eponymous Pickle

Thinking Futures

Newly discovered, note mention of organizational futuresThinking in new ways about the futureUnderstanding change implications, exploring possible organisational...

SS7 Vulnerabilities
From Schneier on Security

SS7 Vulnerabilities

There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...

Beautiful users: book and exhibition
From Putting People First

Beautiful users: book and exhibition

BOOK Beautiful Users: Designing for People Edited and designed by Ellen Lupton Princeton Architectural Press, 2014, 144 pages In the mid-twentieth century, Henry...

Putting People First blog redesigned
From Putting People First

Putting People First blog redesigned

Experientia’s Putting People First blog has been redesigned. It is now entirely responsive, allows for easier browsing, searching, and filtering, and features larger...

3D Printed Chocolate
From The Eponymous Pickle

3D Printed Chocolate

Printing chocolate.   " ... Out of all the companies out there, one instantly pops into most individual’s heads when they think of creamy, rich chocolate, and that...

Amazon Delivers in one Hour in NYC
From The Eponymous Pickle

Amazon Delivers in one Hour in NYC

In the WSJ: Amazon Unveils One-Hour Delivery Service.  Program Is for Prime Customers in New York, Includes Over 25,000 Products.  ... " .  Additional charge.  Expanding...

Watson Almost Lost
From The Eponymous Pickle

Watson Almost Lost

In today's Cognitive Systems Institute talk, Jim Hendler of RPI mentions how close Ken Jennings came to winning the fabled Jeopardy competition ... check out his...

Reproducing Scent
From The Eponymous Pickle

Reproducing Scent

In Fastcoexist: A kind of biomimicry.   We worked on related ideas when in the food business.   " ... Scent Of A Rose, With Designer Microbes .... Stop and smell...

Watson and Academia
From The Eponymous Pickle

Watson and Academia

In today's Cognitive Systems Institute presentation, Jim Hendler from RPI presented "An Academic Perspective on Watson.".  Nicely done, in particular a comparison...

From The Computing Community Consortium Blog

35 Innovators Under the Age of 35

Each year MIT Technology Review publishes a list of 35 innovators under the age of 35. Recently, they published the list for 2014. All 35 of these people are doing...

ISIS Cyberattacks
From Schneier on Security

ISIS Cyberattacks

Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...

University Mobile App Strategy
From The Eponymous Pickle

University Mobile App Strategy

Not sure if this is rare.  Have been part of related work for enterprises.  In particular this could be best seen as a broader strategy about getting focused data...

Sony Competes with Google Glass
From The Eponymous Pickle

Sony Competes with Google Glass

In CWorld: Early this year was involved with a proposed project with Google Glass that regrettably did not happen, read more about that here.  Now Sony is competing...

Energy Saving Game
From The Eponymous Pickle

Energy Saving Game

In Fastcodesign: A way to turn household energy saving into what they call an addictive game.    Called Power House, on Facebook. Mentioned by collaborator Byron...

test
From Putting People First

test

fsadff af dafs
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Why the “Data Lake” is Really a “Data Swamp”
Why the “Data Lake” is Really a “Data Swamp”
12.22.2014

The notion of putting all one's data into a "data lake" to encourage employees to run analytics has a serious …

The Role of Tech Firms in Computing Education
The Role of Tech Firms in Computing Education
12.20.2014

Computing education can't be about jobs. It has to be about schools to reach everyone.

 Yet Another Major Data Breach, But Will This Time Be Any Different?
Yet Another Major Data Breach, But Will This Time Be Any Different?
12.11.2014

Why is our community having such an anemic response to all of these major data breaches? What can we do …

View More Blog@CACM