acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2010


From The Eponymous Pickle

On Linkedin

On Linkedin

Just substantially updated my Linkedin entry. For more about me and what I am up to. -


From My Biased Coin

Guest Post: Giorgos Zervas from WSDM

Guest Post:  Giorgos Zervas from WSDM

Since I couldn't get myself to New York for WSDM, I asked my student Giorgos Zervas to report. This is his report from Thursday.-----------------------Greetings from Brooklyn.I am here attending WSDM 2010 where on Saturday I…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What Are You Learning This Summer

What Are You Learning This Summer

No, really! Are you making your summer plans yet and do they include learning time? I have some ideas for you. First off is CS & IT run by CSTA. This is in my opinion the single best day of professional development of the year…


From Wild WebMink

links for 2010-02-05

links for 2010-02-05

Spun out to its own site, this project (a virtual machine kernel written in Javascript) is absolutely fascinating and deserves wider investigation.
(tags: OpenSource…


From Schneier on Security

World's Largest Data Collector Teams Up With Word's Largest Data Collector

World's Largest Data Collector Teams Up With Word's Largest Data Collector

Does anyone think this is a good idea?

Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted…


From The Noisy Channel

WSDM 2010: Day 1

WSDM 2010: Day 1

Note: this post is cross-posted at BLOG@CACM. Today was the first day of the Third ACM International Conference on Web Search and Data Mining (WSDM 2010), held at the Polytechnic Institute of NYU in Brooklyn, NY. WSDM is a young…


From The Noisy Channel

WSDM 2010: Day 1

WSDM 2010: Day 1

Note: this post is cross-posted at BLOG@CACM. Today was the first day of the Third ACM International Conference on Web Search and Data Mining (WSDM 2010), held at the Polytechnic Institute of NYU in Brooklyn, NY. WSDM is a young…


From The Eponymous Pickle

Biometrics Examined

Biometrics Examined

Very good IEEE Computer Now issue on the general problem of using biometric methods for identification. ' ... This month, Computing Now explores biometrics


From The Eponymous Pickle

Google to Add Store Views

Google to Add Store Views

Google is apparently going to add 'store views' to its valuable 'street views', attached by location to its maps. More here. I am assuming with permission, but no confirmation or details are yet forthcoming. Fascinating next…


From The Computing Community Consortium Blog

Peter Lee on the future of DARPA, and the Transformational Convergence Technology Office

Peter Lee on the future of DARPA, and the Transformational Convergence Technology Office

Five months ago, Peter Lee took a leave of absence as Head of the Computer Science Department at Carnegie Mellon University to begin a stint at DARPA as the Director of the new Transformational Convergence Technology Office (DARPA…


From The Eponymous Pickle

Shopper App Adds Barcode Scanner

Shopper App Adds Barcode Scanner

Another development that brings the smartphone closer to everyday use as a sensor by the consumer. I recently reviewed the updates to the Redlaser scanner and found it had finally become easy enough for use by the typical shopper…


From My Biased Coin

Admissions Handling

Admissions Handling

I've been spending time on both graduate admissions and undergraduate admissions.For graduate admissions, we've moved to an all-electronic system; the applications are all online. The system is actually a complete pain to use…


From Computational Complexity

The more things change the more things change

There have been some articles on how much things have changed because of technology. One from the Washington Post Magazine, titled Going, Going, ..., Gone lists out items that are fading out of our lives Here are a few: Cash…


From Schneier on Security

Security and Function Creep

Security and Function Creep

Security is rarely static. Technology changes both security systems and attackers. But there


From Wild WebMink

links for 2010-02-04

links for 2010-02-04