acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

TRINITY: NSA Exploit of the Day
From Schneier on Security

TRINITY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TRINITY (TS//SI//REL) TRINITY is a miniaturized digital core packaged in a...

Another Fake NSA Codename Generator
From Schneier on Security

Another Fake NSA Codename Generator

Generate your own fake TAO implant. This is even more fun than the fake NSA program generator. Sadly, the NSA will probably use these to help develop their R&D...

Natural Language Processing in the Enterprise
From The Eponymous Pickle

Natural Language Processing in the Enterprise

We worked with Stanford on a number of natural language processing oriented problems, including the Talking Mr. Clean effort.    I note that a number of the spin...

Discomfort as Innovation
From The Eponymous Pickle

Discomfort as Innovation

In Innovation Excellence:   I don't see it as the key to innovation.  Yet it is not by itself a bad sign. Some discomfort is always a sign that any change has been...

The rise to power of computer scientists
From Daniel Lemire's Blog

The rise to power of computer scientists

Want to become CEO of a major technology company? Consider the background of the hot CEOs of the hour: Amazon: Jeff Bezos has a degree in electrical engineering...

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation
From The Computing Community Consortium Blog

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation

UPDATE: Due to the potential storm affecting the DC Metro region, this lecture has been postponed. The National Science Foundation (NSF) Directorate for Computer...

Kurzweil Reviews the Movie Her
From The Eponymous Pickle

Kurzweil Reviews the Movie Her

An AI view.  Now beyond Minority Report, and with shades of Siri.   Is this where we are headed?   It does provide an interesting structure to think about how we...

Robotics and The Sochi 2014 Olympic Winter Games
From The Computing Community Consortium Blog

Robotics and The Sochi 2014 Olympic Winter Games

In anticipation of the Sochi 2014 Olympic Winter games, the National Science Foundation (NSF) has partnered with NBC Learn to feature the “Science and Engineering...

Are We Preparing Our Children?
From Computer Science Teachers Association

Are We Preparing Our Children?


SWAP: NSA Exploit of the Day
From Schneier on Security

SWAP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SWAP (TS//SI//REL) SWAP provides software application persistence by exploiting...

Interactive Storytelling in Games: Next Steps
From The Female Perspective of Computer Science

Interactive Storytelling in Games: Next Steps

Last night I gave a lecture for our undergrad society on some of the more interesting recent developments in interactive storytelling, along with a preview of my...

“It’s Complicated” is dedicated to Peter Lyman
From Apophenia

“It’s Complicated” is dedicated to Peter Lyman

As people start to get copies of my book, I want to offer more context to the brief dedication at the front of the book. “It’s Complicated” is dedicated to my beloved...

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund
From The Computing Community Consortium Blog

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund

The Mozilla Gigabit Community Fund was announced on February 6, 2014 as a partnership between the Mozilla Foundation, the National Science Foundation (NSF) and US...

iBeacon and Shopping Behavior
From The Eponymous Pickle

iBeacon and Shopping Behavior

In Mashable: More looks into location based shopping information.   With some obvious comments:  " ... Will consumers embrace Apple and iBeacon's nearly frictionless...

Hangout for the Enterprise
From The Eponymous Pickle

Hangout for the Enterprise

Although I have now tested Google+ Hangouts a number of times, have never tried to work with it under enterprise constraints.   A new service permits greater connectivity...

From Computational Complexity

Favorite Theorems: Connecting in Log Space

We start the favorite theorems with a result that might surprise many is still less than ten years old. Undirected Connectivity in Log-Space by Omer ReingoldPDF...

Big Data as Your Doctor
From The Eponymous Pickle

Big Data as Your Doctor

A very obvious conclusion, it was understood in the AI hype of the late 80's.  But we didn't have all the hardware or software in place to make it happen.  You...

Dispute Resolution Systems for Security Protocols
From Schneier on Security

Dispute Resolution Systems for Security Protocols

Interesting paper by Steven J. Murdoch and Ross Anderson in this year's Financial Cryptography conference: "Security Protocols and Evidence: Where Many Payment."...

Facial Encoding by Millward Brown
From The Eponymous Pickle

Facial Encoding by Millward Brown

I was reminded about Millward Brown by this article in Neurorelay.   I met with a number of their people at a conference in Poland now a number of years ago.  "...

Surveillance Generating Big Data
From The Eponymous Pickle

Surveillance Generating Big Data

 In Computing Now:  More data, now what do we do with it?    " ... Big data continues to grow exponentially, and surveillance video has become the largest source...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account