acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2011


From The Eponymous Pickle

First Commercial Quantum Computer

First Commercial Quantum Computer

A claim for the first commercial quantum computer.  From D-Wave.  I spoke to this Canadian company some time ago suggesting applications, such as in supply chain simulation, where such computers might be useful.  Some controversy…


From The Computing Community Consortium Blog

Call for Visionary Papers to MIX-HS

Call for Visionary Papers to MIX-HS

The Computing Community Consortium is announcing today a Challenges and Visions Track at the First International Workshop on Managing Interoperability and compleXity in Health Systems (MIX-HS’11), to be held in Glasgow, Scotland…


From Computer Science Teachers Association

Did You Know?

Did You Know?

I've viewed several versions of "Did You Know" videos in the past few years and the newer, somewhat different takes on this video never bore me. They all stress one basic theme: "We are currently preparing students for jobs …


From The Eponymous Pickle

Intel Shifts to Mobile

Intel Shifts to Mobile

A very good sign for mobile devices:CEO Paul Otellini said today that Intel is embarking on a big shift in focus, moving its center of gravity to the most power-efficient devices.  Otellini said that Intel, long the heavyweight…


From The Female Perspective of Computer Science

Programming Concepts in Scratch

Programming Concepts in Scratch

On Monday I started my lessons on Scratch for my Introduction to Computers for Arts and Social Sciences class.  My goal is for students to understand boolean values and if statements, loops, variables, and the broadcast mechanism…


From The Eponymous Pickle

Khan Academy

Khan Academy

I was reminded recently of the The Kahn Academy,  which is an excellent example what can be done with good enough technology and the perseverance to teach knowledge.   Exemplary. 

Watch. Practice. Learn almost anything


From Schneier on Security

Bin Laden Maintained Computer Security with an Air Gap

Bin Laden Maintained Computer Security with an Air Gap

From the Associated Ptress:

Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the U.S. to scour. The trove of electronic records pulled out of his compound…


From Putting People First

The grand delusion: Why nothing is as it seems

The grand delusion: Why nothing is as it seems

This might come as a shock, but everything you think is wrong. Much of what you take for granted about day-to-day existence is largely a figment of your imagination. From your senses to your memory, your opinions and beliefs,…


From Putting People First

Mobiles for Women. Part 2: The Darker Side.

Mobiles for Women. Part 2: The Darker Side.

Targeting women with mobile phones and mobile-based projects can bring great benefits and opportunities, as MobileActive outlined in Part 1 of its series on women and mobiles [see also this blog post]. But, there is a


From Putting People First

Seven technologies to disrupt the next decade

Seven technologies to disrupt the next decade

What technologies will have the biggest impact on the next decade? New Scientist peers into the crystal ball and picks the ideas, concepts and gadgets that are set to shake things up. Be nice to the telepresence robot If you’re…


From Putting People First

Socially responsible design

Socially responsible design

Jan-Christoph Zoels, Experientia’s design director, took part in an interesting discussion on socially responsible design for the


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Programming Competition as Learning

Programming Competition as Learning

As I write this I am at St Joseph


From BLOG@CACM

If You Want High School CS, Require ­Undergraduate CS

If You Want High School CS, Require ­Undergraduate CS

Pushing computer science classes into the high schools is a top-down approach.  If there was required computer science in undergraduate education, the high schools would be seeking us out. That's the way it worked with calculus…


From The Eponymous Pickle

The Story of Alan Turing

The Story of Alan Turing

An interesting multi part history history post on Alan Turing.  His work in cryptology and artificial intelligence were inspirational to me when I worked on AI in the enterprise.


From The Eponymous Pickle

Simple Games for E-Learning

Simple Games for E-Learning

I have been looking at the process of adding simple games to E-learning to promote engagement.  At the recent Lectora conference I saw a presentation by Benjamin Pitman on adding visual interaction to Lectora.  These are only…


From Daniel Lemire's Blog

You cannot refuse to publish our paper because

You cannot refuse to publish our paper because

I feel strongly that the convention peer review process needs to evolve to a publish-then-filter model. That is, I do not believe that a few select individuals should decide what is worth publishing. But


From Schneier on Security

Mobile Phone Privacy App Contest

Mobile Phone Privacy App Contest

Entries due by the end of the month.


From The Computing Community Consortium Blog

Reminder: Deadline for 2011-12 CIFellows Now 2 Weeks Away

Reminder:  Deadline for 2011-12 CIFellows Now 2 Weeks Away

A reminder that the deadline for applications to the 2011-12 Computing Innovation Fellows (CIFellows) Project is 5pm EDT on Tuesday, May 31. Graduates awarded the Ph.D.


From Putting People First

Why a hyper-personalized Web is bad for you

Why a hyper-personalized Web is bad for you

Eli Pariser, executive director of the progressive political action committee MoveOn.org, explains in a CNET interview why he thinks we should beware of the substantial risks inherent in the increasing personalization of the…


From Michael Nielsen

Notes on expander graphs now on GitHub

Notes on expander graphs now on GitHub

Several years ago I wrote a set of introductory notes (pdf) about expander graphs, an exceptionally useful concept from computer science. I’m a long way from being an expert on expanders, but the notes were more popular than…


From Putting People First

Tapping into smart health

Tapping into smart health

Growing numbers of mobile applications are aimed at keeping patients engaged in their treatment. The Boston Globe reports. “Patient engagement, doctors say, is a crucial factor in health outcomes. Office visits are brief; once…


From The Eponymous Pickle

Cray and Sandia Institute for Knowledge Systems

Cray and Sandia Institute for Knowledge Systems

Cray and Sandia have established a Supercomputing Institute for Learning and Knowledge Systems .  Press Release.  From Mark Montgomery of KYield.  " ... Located at Sandia National Laboratories in Albuquerque, SILKS will leverage…


From Wild WebMink

? Software freedom and the cloud

? Software freedom and the cloud

Cloud computing is not just disruptive to the software market; it’s also disruptive to software freedom advocacy. Software freedom has been defined as being present when any recipient of a software binary has the freedom to also…


From Computational Complexity

H

The 2011 G


From The Eponymous Pickle

Design Lessons from the Bottom of the Pyramid

Design Lessons from the Bottom of the Pyramid

From the Harvard Blogs: Design Lessons from the Bottom of the Consumer Pyramid. " ... At the BOP, affordability is necessary but not sufficient. Tastes and aspirations change rapidly. This is precisely what can make the BOP such…


From The Eponymous Pickle

Stop Typing, Start Shouting

Stop Typing, Start Shouting

ShoutOMatic.  A kind of audio twitter.  " ... Think of each shout as an audible status update.  In between some of your regular 'text'  tweets and status updates, use ShoutOMatic to allow your followers to hear your actual voice…


From The Eponymous Pickle

Open Source Tag Generation

Open Source Tag Generation

A number of solutions to the problem, imperfect, but useful.  The methods I have tried in the past have not worked well.


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Always Mount A Scratch Monkey

Always Mount A Scratch Monkey

Do today


From Schneier on Security

Fingerprint Scanner that Works at a Distance

Fingerprint Scanner that Works at a Distance

Scanning fingerprints from six feet away.

Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light. One camera receives horizontally polarized light, while the other…


From My Biased Coin

Daily Updates

Daily Updates

Getting slowly back into blogging, some happenings from the day.I've gotten a couple of nice notes from students saying they learned a lot from my class this semester.  To any students reading the blog, I encourage you to send…

« Prev 1 4 5 6 7 8 13 Next »