Sign In

Communications of the ACM

Blogs


Blogroll


From Gödel's Lost Letter and P=NP

Three In The Room

A puzzle and a conference Zohar Manna is an expert on the mathematical concepts behind all types of programming. For example, his 1974 book the Mathematical Theory...

US Data Privacy Confidence at New Low
From The Eponymous Pickle

US Data Privacy Confidence at New Low

In the BBC:  Telling look at how US consumers are thinking about data privacy.  " ... The vast majority - 91% - of Americans believe that consumers have lost control...

From The Computing Community Consortium Blog

Privacy and Security Briefing on Capitol Hill

In honor of National Cybersecurity Awareness Month, the National Science Foundation (NSF) and the Institute of Electrical and Electronics Engineers (IEEE-USA) sponsored...

Checking out in the Aisle at Sainsbury
From The Eponymous Pickle

Checking out in the Aisle at Sainsbury

An approach we examined over the years in many forms.  In aisle checkout.  Recently took a close-up look at how Kroger was testing this idea with a handheld device...

Google's Culture of Innovation
From The Eponymous Pickle

Google's Culture of Innovation

In FastCompany: Very different from our approach.  Driven by the culture. The culture supported innovation, but did not itself create innovation.  You had to go...

Narrowly Constructing National Surveillance Law
From Schneier on Security

Narrowly Constructing National Surveillance Law

Orin Kerr has a new article that argues for narrowly constructing national security law: This Essay argues that Congress should adopt a rule of narrow construction...

The hubris of teachers
From Daniel Lemire's Blog

The hubris of teachers

Today, kids left and right carry the label of some learning disability. Instead of telling kids that they are dumb or lazy, we narrow it down to some problem. It...

Oracle on Modern HR in the Cloud
From The Eponymous Pickle

Oracle on Modern HR in the Cloud

We actively used analytics in HR since the 80s.  From Oracle: Analytics and faster onboarding will transform HRCompanies looking to differentiate themselves are...

Micro Robots Magnetically Driven
From The Eponymous Pickle

Micro Robots Magnetically Driven

Continuing to follow the use of very small or very many simple robotics solutions. In IEEE Spectrum:" ... An engineered scallop that is only a fraction of a millimeter...

From Computational Complexity

Non controversial thoughts on rankings

US News has a ranking of CS depts and various subcategories. Recently MohammadTaghi Hajiaghay and Luca Trevisan have suggested alternative rankings here (Moh) and...

Building User Models with Twitter
From The Eponymous Pickle

Building User Models with Twitter

An outline about how Bluemix Watson services can be used with Twitter data to do User Modeling.   With a fairly simple process.  This is ultimately quite a powerful...

Are Fingerprints Pins?
From The Eponymous Pickle

Are Fingerprints Pins?

Good piece by Evan Schuman on the physical elements of security.  " ... A judge’s ruling that a person can be forced to open his phone with his fingerprint ignores...

Datawatch Wins Hackathon
From The Eponymous Pickle

Datawatch Wins Hackathon

I happened to be at a small portion of this Hackathon last week.  Was an interesting experience. In CNN: " ... Datawatch .... a leading global provider of visual...

Stressed Out by Work
From The Eponymous Pickle

Stressed Out by Work

In Knowledge@Wharton: " ... If you had asked any worker since the Industrial Revolution whether he or she was experiencing stress on the job, the answer would likely...

Veterans Day
From My Biased Coin

Veterans Day

Veterans Day is a federal holiday, but, at Harvard classes go on.  This year, the holiday is observed for staff, but we'll be teaching.I can't easily find out when...

Sophisticated Targeted Attack Via Hotel Networks
From Schneier on Security

Sophisticated Targeted Attack Via Hotel Networks

Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world...

Amazon Echo and Shopping
From The Eponymous Pickle

Amazon Echo and Shopping

In Retailwire:  A look at how the Echo assistant and speaker and its implications for a new mode of shopping.  Think of the potential cognitive interactions with...

Hacking Internet Voting from Wireless Routers
From Schneier on Security

Hacking Internet Voting from Wireless Routers

Good paper, and layman's explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes....

From The Computing Community Consortium Blog

Robotics for Ebola Response

The following is a special contribution to this blog from Computing Community Consortium (CCC) Chair Gregory Hager (Johns Hopkins University). Imagine you have...

me + National Museum of the American Indian
From Apophenia

me + National Museum of the American Indian

I’m pleased to share that I’m joining the Board of Trustees of Smithsonian’s National Museum of the American Indian (NMAI) in 2015.  I am honored and humbled by...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Doing our part to show why HPC Matters
Doing our part to show why HPC Matters
11.21.2014

As managers and practitioners in the HPC community part of our responsibility is to make sure that everyone we come …

Locality, Locality, Locality: A Note from SC14
Locality, Locality, Locality: A Note from SC14
11.20.2014

Steadily growing chips, systems, and application parallelism are driving the movement of data across larger distances in systems, and data …

HPC for Undergraduates
HPC for Undergraduates
11.20.2014

At SC14, graduate students mentor undergraduates interested in pursuing advanced degrees in fields related to high performance computing.

View More Blog@CACM