Sign In

Communications of the ACM

Blogs


Blogroll


Code Hunt for Review and Problem Solving
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Code Hunt for Review and Problem Solving

Code Hunt is something I have been experimenting with a bit this year. For those who are not familiar with it, Code Hunt “is an educational, browser-based coding...

From U.S. Public Policy Committee of the ACM

Washington News – Alerts and Updates

General News • The 114th Congress convened last week with Republicans controlling both the U.S. House of Representatives and the Senate. The House has 246 Republicans...

Fusion Charts Blog
From The Eponymous Pickle

Fusion Charts Blog

Brought to my attention with some interesting data visualization posts.  Fusion Charts Blog.

Beyond Customer Recognition for Retailers
From The Eponymous Pickle

Beyond Customer Recognition for Retailers

Not a new thing, casinos have been doing it for years.  The capability has been improving for some time.  Now with cheaper hardware?   What is more interestingWhere...

From The Computing Community Consortium Blog

Highlights from the New Class of TED Fellows

The new class of Fellows for TED2015 has recently been released, and among the 21 “game-changing thinkers” are Laura Boykin, a biologist and Jonathan Home, a physicist...

David Cameron's Plan to Ban Encryption in the UK
From Schneier on Security

David Cameron's Plan to Ban Encryption in the UK

In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here's the quote: "If I am prime minister I will...

Your Cognitive Future
From The Eponymous Pickle

Your Cognitive Future

A cross industry report from IBM.  Detailed look at what to expect and what to prepare for." ... Cognitive-based systems extend the capabilities of humans. They...

Beaconing at Marsh Supermarkets
From The Eponymous Pickle

Beaconing at Marsh Supermarkets

Continued indication that the interconnection of shoppers and physical spaces is progressing, this was reported on previously here in more detail, see tags below...

From The Computing Community Consortium Blog

ACM Names Its 2014 Fellows

The Association for Computing Machinery (ACM) is out with its 2014 Fellows, 47 of its members from universities, corporations, and research labs being recognized...

How Gameplay Affects Stories in Games
From The Female Perspective of Computer Science

How Gameplay Affects Stories in Games

I am very interested in the role of storytelling in videogames.  Although I do like games without stories as well, the story is often the part of a game that engages...

Robots for Retail
From The Eponymous Pickle

Robots for Retail

Discussion in Retailwire: Saw several demonstrations of this idea.   Now there are examples in the hospitality industry that are worth watching.  Consumers still...

Defining Your Business
From The Eponymous Pickle

Defining Your Business

In Innovation Excellence:   by Ty Montague.  " ... Whitespace vs. Rightspace: How Quest-led Innovation Finds Right Space for Breakthrough Innovation   ... " .  ...

Automated Hypothesis Generation
From The Eponymous Pickle

Automated Hypothesis Generation

Took a brief look at this at the request of a client, it is still in evolution.    The Watson Chef is an interesting example, but it is overwhelmed today by dozens...

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

From Computational Complexity

Barrier's for Matrx Mult Lower bound

Matrix Mult: The usual algorithm is O(n^3). Strassen surprised people by showing an O(n^{2.81}) algorithm. (Now its so well known that its not surprising. IFast...

But I Have The Same as Him
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

But I Have The Same as Him

One thing I hear a lot is “I have the exact same code and someone else and theirs work and mine doesn’t.” The obvious wise guy reply is “if yours doesn’t work then...

How To Safeguard Surveillance Laws
From Wild WebMink

How To Safeguard Surveillance Laws

This letter was published in the London Evening Standard on January 12th, 2015: I watch with alarm as, in the wake of the barbaric murders in France, politicians...

Wal-Mart on the Strength of Physical Retail
From The Eponymous Pickle

Wal-Mart on the Strength of Physical Retail

Bill Simon, former president and CEO, Walmart U.S, speaks at the NRF on e-commerce, technology and design that helps physical retail. " ... "It's pretty one dimensional...

Touch Interfaces in Communications
From The Eponymous Pickle

Touch Interfaces in Communications

This is not new, but continues to advance.  " .... The Communication Of The Future Is So Real You Can Touch It. Companies are starting to integrate Haptic Feedback...

Viking Runes as Encryption in the 1500s
From Schneier on Security

Viking Runes as Encryption in the 1500s

This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There's a picture of the Stockholm...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Rising Enrollment Might Capsize Retention and Diversity Efforts
Rising Enrollment Might Capsize Retention and Diversity Efforts
01.19.2015

Rapid increase of enrollment in CS classes in the US might undermine efforts to improve diversity.

The NIPS Experiment
The NIPS Experiment
01.08.2015

In the NIPS experiment, 10% of papers submitted to the Neural Information Processing Systems Foundation went through its review process …

Some Thoughts For Computer Science Teaching Assistants (and Faculty)
Some Thoughts For Computer Science Teaching Assistants (and Faculty)
01.04.2015

Some musings on practices that can help create a positive educational environment for all students in a class.

View More Blog@CACM