Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Giant Squid Caught by Japanese Fisherman
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught by Japanese Fisherman

It's big: 13 feet long. The fisherman was stunned to discover the giant squid trapped in his net, having been caught at a depth of around 70m, about two-thirds...

Sir John Daniel on Open and Distance Education
From The Female Perspective of Computer Science

Sir John Daniel on Open and Distance Education

Sir John Daniel, world authority on open, distance and online learning, came to Carleton for a special briefing on the future of online learning, covering topics...

PHOTOANGLO: NSA Exploit of the Day
From Schneier on Security

PHOTOANGLO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PHOTOANGLO (TS//SI//REL TO USA,FVEY) PHOTOANGLO is a joint NSA/GCHQ project...

<i>Applied Cryptography</i> Available Online
From Schneier on Security

Applied Cryptography Available Online

I'm sure this is a pirated copy. Looking at it, it's amazing how long ago twenty years was.

Participate in an IdeasLab on Undergraduate Education
From The Computing Community Consortium Blog

Participate in an IdeasLab on Undergraduate Education

The National Science Foundation (NSF) has released a Dear Colleague Letter (DCL) on “Preparing Applications to Participate in Phase I Ideas Labs on Undergraduate...

Complexity Science Examined
From The Eponymous Pickle

Complexity Science Examined

So what is complexity science and how can it be useful?  From the Santa Fe Institute.  A long time partner of ours in this space, that helped us navigate its usefulness...

A Case for Business Intelligence and Big Data
From The Eponymous Pickle

A Case for Business Intelligence and Big Data

From TDWI:    I like looking at this as a business case.   " ... What do companies do when they need the power of analytics to be increased with decision support...

Increasing Smartphone Mobile Commerce in China
From The Eponymous Pickle

Increasing Smartphone Mobile Commerce in China

Related to my recent post on NantMobile.  Adage Global talks about the Chinese the move forward.  Yes, I am seeing it." ... Mobile Advertising Lags China's Smartphone...

Income Inequality as a Security Issue
From Schneier on Security

Income Inequality as a Security Issue

This is an interesting way to characterizing income inequality as a security issue: …growing inequality menaces vigorous societies. It is a proxy for how effectively...

Blueprint for Building a Quantum Computer
From The Eponymous Pickle

Blueprint for Building a Quantum Computer

In CACM:  More on this interesting topic.  " ... In this article, we review the progress that has been made in developing architectures for full-scale quantum computers...

Security on the Internet of Things
From The Eponymous Pickle

Security on the Internet of Things

In the Cisco Blog:  (Which I have found to be very informative).   Remember the hacked refrigerator." ... The SANS Institute just completed a survey on the security...

NIGHTWATCH: NSA Exploit of the Day
From Schneier on Security

NIGHTWATCH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTWATCH (TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...

Google Adds Sources
From The Eponymous Pickle

Google Adds Sources

Google adds sources to search results, via its Knowledge Graph.   A suggestion in the piece suggests that a better solution would be a reliability score based on...

Accelerate Disruptive Innovation
From The Eponymous Pickle

Accelerate Disruptive Innovation

Innovating faster.  And focusing your innovation to value.   Part of that task  is to be able to evaluate innovations in context, as quickly and accurately as possible...

Google Glass for Firefighters
From The Eponymous Pickle

Google Glass for Firefighters

Several years ago I worked on a project meant to focus key data about operations to firefighters.   A kind of augmented reality for a highly dynamic task.  ...

From Computational Complexity

What will we wrought?

When I went to college in the early 80's, students protested against college endowments invested in companies that had business in apartheid South Africa. My mother...

Consumer Manipulation
From Schneier on Security

Consumer Manipulation

Tim Hartford talks about consumer manipulation: Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...

Role of Branding in the Product Life Cycle
From The Eponymous Pickle

Role of Branding in the Product Life Cycle

Examining the curious role of brand in the product life cycle By James Richardson, Ph.D. on January 22nd, 2014  A new report debunks the notion that brand defines...

Current Trends in Visualization
From The Eponymous Pickle

Current Trends in Visualization

In Computing Now:  A snapshot of current trends in visualization.  " ... For this issue of Computing Now, we gathered a set of articles that exemplifies current...

Want to win $1,000,000,000 (yes, that’s one billion dollars)?
From The Computing Community Consortium Blog

Want to win $1,000,000,000 (yes, that’s one billion dollars)?

All you have to do is create the PERFECT March Madness bracket.  If you manage to do so, Warren Buffett and Berkshire Hathaway will pay you $1,000,000,000, as reported...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account