acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2011


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of April 11

Hill Tech Happenings, Week of April 11

May 3

Hearing:

The House Oversight and Government Reform Committee will hold a hearing on updating the Presidential Records Act to better handle electronic records. 9:30 a.m., 2154 Rayburn Building

May 4

Hearing:

The Subcommittee…


From Schneier on Security

LiveBlogging the Bin Ladin Assassination

LiveBlogging the Bin Ladin Assassination

"VirtualReality" tweeted the Bin Ladin assassination without realizing it.


From The Computing Community Consortium Blog

A Summer School on Cyber Security for Smart Energy Systems

A Summer School on Cyber Security for Smart Energy Systems

With support from the U.S. Department of Energy and U.S. Department of Homeland Security, the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Center — a multi-university collaboration addressing the challenge of how…


From Wild WebMink

links for 2011-05-02

links for 2011-05-02

The Parser that Cracked the MediaWiki Code | Software Research and the Industry As many of us have been commenting for many years, the optimum freedom comes from neither open standards nor from open source alone but from the…


From Putting People First

Context aware computing and futurism at Intel

Context aware computing and futurism at Intel

At the Intel Developer Forum in San Francisco in September last year, Justin Rattner, the director of Intel Labs, announced a new research division, called Interaction and Experience Research (IXR) and headed by Genevieve Bell…


From Schneier on Security

Hijacking the Coreflood Botnet

Hijacking the Coreflood Botnet

Earlier this month, the FBI seized control of the Coreflood botnet and shut it down:

According to the filing, ISC, under law enforcement supervision, planned to replace the servers with servers that it controlled, then collect…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 2 May 2011

Interesting Links 2 May 2011

I had an interesting week last week. Took a couple of vacation days


From The Eponymous Pickle

Known Myths about the Origin of the Internet

Known Myths about the Origin of the Internet

An interesting piece on the background of the Internet.  It states that there was a myth that the Internet originated because its many nodes could survive a nuclear attack.   I was involved in the Darpanet at a relatively early…


From The Eponymous Pickle

Neuaer and Smartphone Location

Neuaer and Smartphone Location

In ReadWriteWeb: New potential from Smartphone location sensor ideas: " ... Imagine if your phone could tell you when your friend walked by so you could call them, or when your ex arrived so you could duck beneath the table.NeuAer…


From The Eponymous Pickle

BrandFlick: Finding a Company's Aha Stories

BrandFlick: Finding a Company's Aha Stories

A local company that just appeared in the news, Brandflick.   I have been involved with storytelling projects a number of times.  Very useful for sketching out ideas.  Even for a non artistic amateur.  Once you go to using amentioned…


From The Eponymous Pickle

Data Rights

Data Rights

What kinds of rights should we have when dealing with systems that gather our data?  Does this mean we should not accept agreements that do no make this clear?   Thoughtful piece in ReadWriteWeb  It would be useful to have data…


From The Noisy Channel

CFP: CIKM 2011 Industry Event

CFP: CIKM 2011 Industry Event

As I posted a few months ago, I’m organizing


From The Noisy Channel

CFP: IEEE Internet Computing Special Issue on Context-Aware Computing

CFP: IEEE Internet Computing Special Issue on Context-Aware Computing

Pankaj Mehra and I are guest editors for an upcoming special issue of

« Prev 1 11 12 13 Next »