acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

WATCH Talk – Going Spear Phishing: Exploring Embedded Training and Awareness
From The Computing Community Consortium Blog

WATCH Talk – Going Spear Phishing: Exploring Embedded Training and Awareness

On February 20 at 12:00pm EST, the National Science Foundation (NSF) will host it’s next Washington Area Trustworthy Computing Hour (WATCH) talk.  Deanna Caputo...

Location of the Brain's Emotions
From The Eponymous Pickle

Location of the Brain's Emotions

In Neurorelay:   Intriguing visual.   Having looked into this area I would be careful about direct implications.  I have worked with neuroscientists in this area...

Consolidation of App Experience in Enterprise Mobile Strategy
From The Eponymous Pickle

Consolidation of App Experience in Enterprise Mobile Strategy

In the Cisco Blog.  Too many Apps with too little experience?  " ... Apps, apps and more apps, is your company experiencing a proliferation of apps?  Cisco certainly...

What Information Are Stun Guns Recording?
From Schneier on Security

What Information Are Stun Guns Recording?

In a story about a stolen Stradivarius violin, there's this: Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...

Making the most with Open Source
From Wild WebMink

Making the most with Open Source

Originally posted on Meshed Insights & Knowledge:What opportunities does Open Source provide if you’re really looking to go big? Aiming to become “the next Red...

Sorting Isn’t Always Simple
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Sorting Isn’t Always Simple

Like a lot of people I have been following the Olympics lately. For all the talk about sport and individual and team achievement there is always a lot of attention...

From Gödel's Lost Letter and P=NP

Three From CCC

Comments on three papers from the Conference on Computational Complexity Michael Saks is Chair of the Program Committee of this year’s Conference on Computational...

PICASSO: NSA Exploit of the Day
From Schneier on Security

PICASSO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PICASSO (S//SI//REL) Modified GSM (target) handset that collects user data...

STEM, Thinking Logically, Starting at Kahn
From The Eponymous Pickle

STEM, Thinking Logically, Starting at Kahn

Brought to my attention. From the Kahn Academy.   A short tutorial on thinking logically.  A reminder of early training and implementation we did using first order...

Thinking Under Biases. Fast and Slow
From The Eponymous Pickle

Thinking Under Biases. Fast and Slow

A friend sends a  link from the WSJ:  Why the Grass Seem's Greener.  " ... We are of Two Minds - One deliberative and rational, the other quick and intuitive. ...

US Infosec Researchers Against NSA Surveillance
From Schneier on Security

US Infosec Researchers Against NSA Surveillance

I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.

Philips Intelligent Store Lighting
From The Eponymous Pickle

Philips Intelligent Store Lighting

In GigaOM: Remember seeing this at a Philips visit.  A retail approach we looked at.  The integrating into existing retail infrastructure is key. " .... The Dutch...

New Brain Recording Methods
From The Eponymous Pickle

New Brain Recording Methods

In the Algamest:  " .... Method of recording brain activity could lead to mind-reading devices, Stanford scientists say ... "  What do we do with it and what protections...

Computer Science for Non-Majors
From The Computing Community Consortium Blog

Computer Science for Non-Majors

The following is a special contribution to this blog by Ran Libeskind-Hadas, R. Michael Shanahan Professor and Department Chair of Computer Science at Harvey Mudd...

From Computational Complexity

Maryland looking for a Lecturer/Who teachers your intro courses?

My chairman, Samir Khuller, asked me to post our job posting for a lecturer to my blog, so I and doing it right now. I think he overestimates the power of this...

Who Should Store NSA Surveillance Data
From Schneier on Security

Who Should Store NSA Surveillance Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Interesting Links 17 February 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 17 February 2014

We’re having quite the winter here in New England this year. People in warm climates keep telling me about how warm it is there as if that would get me going. But...

Use of Alternative Business Intelligence Solutions
From The Eponymous Pickle

Use of Alternative Business Intelligence Solutions

Correspondent Doug Lautzenheiser looks at alternative solutions for business intelligence and data visualization. The article includes a visualization of how a...

Strategies for Businesses Using Data Visualization
From The Eponymous Pickle

Strategies for Businesses Using Data Visualization

Specifically the article covers Small and Medium Sized Businesses. (SMBs)   But the recommendations are good for any new and emerging technology. And a large business...

On the Re-Dawn of AI
From The Eponymous Pickle

On the Re-Dawn of AI

Atlantic takes a look at a new dawn of AI.   See this blog for lots more on the topic. Always of interest here.  Our enterprise was an early industrial pioneerWalter...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account