The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Research in educational psychology in the last 20 years calls into question our most common teaching methods in introductory courses: Teaching programming by having students program
CONTENTS
[1] Newsletter Highlights [2] ACM Argues for Computer Science Education in Kansas [3] FCC Chairman Plans to Create Net Neutrality Rules [4] House Committee Approves Two Technology Bills [5] Cybersecurity Research Legislation…Fujitsu has announced that it has developed a more rugged RFID chip. Based on some of my own recent discussions there are a number of useful applications, for example in military and firefighting. The ruggedness includes the…
I mentioned this article some time ago, it was orginally in the Communications of the ACM, about one of the most difficult yet practical mathematical problems of the age. Now the NYT Science section has chimed in with their…
In what seems like a small thing, Google now lets you get a quick view of search results, Gmail and Google docs as a PDF. As a result you can preserve more formatting details in many cases. I can recall a number of times when…
I sat this week listening to the new President of the BCS responding to several unemployed Members in the audience of the AGM and telling them why the new CITP…
The ninth Grace Hopper Celebration of Women in Computing took place in Tucson, Arizona from September 30-October 3.
In Consumer Goods Technology: P&G has joined Inno360 to promote worldwide innovation.' ... to unite global pioneers to co-develop the next-generation open innovation platform. P&G has been a part of open innovation since 2001…
Have followed solar power ideas since the late 70s .... I remember this idea being posed back then. Now it has finally come to fruition. Launching in 2010. About 10% efficiency. ROI will be interesting it will be interesting…
This is interesting:
Since then, his scams have tended to take place in luxury hotels around the world. Typically, he would arrive at a hotel, claim to be a guest, and then tell security that he had forgotten the combination…The book Prime Obsessions has the following on Page 159:
You will see it written that Hadamard was the last of the universal mathematicians--- the last, that is, to encompass the whole of the subject, before it became so…
The Myra Sadker Foundation has established teacher and student awards to support the creation of teaching and learning materials that advance educational equity and social justice.
Myra Sadker was one of the early researchers…In Forbes: Cheap Entrepreneurial marketing maneuvers for small business, including Twitter use.
Witnesses are much more accurate at identifying criminals when computers assist in the identification process, not police officers.
A major cause of miscarriages of justice could be avoided if computers, rather than detectives…Thanks to the Harvard Extension School, the lectures for several more Harvard courses have been put online. My understanding is that these are classes taught at Harvard that are also given through the extension school. I suspect…
Another "friend of the court" filing in the US Supreme Court in the reconsideration of the case law that makes software patents viable in the US. In this filing, the Free Software…
Have only looked at a few, but some interesting videos from the summit. Are you ready to be uploaded? The concept of a technological singularity continues to intrigue me. I remain skeptical about its near-term occurrence.
Many of my Ph.D. students have admitted to being motivated by financial gain. Stanford is famous for their graduate-students-turned-entrepreneurs. Sergey Brin and Larry Page of Google fame come to mind. But I cannot yet point…
I enjoyed my proverbial fifteen seconds of fame on CNN yesterday, and I even enjoyed lunch at the New York Times cafeteria today. But for a prime-time media show check out the live blogging of a chat that Google co-founder Sergey…
Richard James sends along a link to a very detailed article about Tesco in the US: RETAIL CASE STUDY: ANATOMY OF A TESCO FRESH AND EASY NEIGHBORHOOD. Much written about but have yet to visit one of these. They conclude: ' ...…
You'd think this would be obvious:
Douglas Havard, 27, serving six years for stealing up to
From The Eponymous PickleIPhone App Interacts with SAS
Correspondent Sy Truong has just had an Iphone App called BI Flash approved. It allows you to deliver SAS reports and data to the IPhone, enter parameters, capture real time data on your Iphone ... and more. Mobile BI, whichMore…
From Computational ComplexityYou are coordially invited... Why?
When you get an invitation via email should you accept? How well targeted is it? Some real examples that I got.
EXAMPLE ONE:
I would like to invite you to participate at the workshop Ramsey Theory in Logic, Combinatorics…
From The Eponymous PickleGoogle Wave Video
Good, short, non-technical video all about Google Wave. Also, Businessweek asks if it will replace E-mail and Facebook. -
From The Eponymous PickleIPhone as a Security Camera
A $1.99 IPhone App called IP Camera can take a picture every 12 to 15 seconds and then posts the picture to a local network via WiFi. Effectively a security camera. Some limitations, but a nice direction. CNet review.
From Schneier on SecurityMalware that Forges Bank Statements
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's browser, to either erase evidence of a money transfer transaction…
From The Noisy ChannelThe Noisy Channel, Live On CNN!
For anyone who