acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Brian Krebs Harassed
From Schneier on Security

Brian Krebs Harassed

This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...

Avoid the Soft Yes
From The Eponymous Pickle

Avoid the Soft Yes

In the HBR, Avoiding the soft yes.  Requires free registration to read in full.  Worth doing that.

Something Old, Something New
From Computer Science Teachers Association

Something Old, Something New

I've been programming since 1972 (junior year of high school, long before programming in high school was considered a normal course of events). Over the years,...

From Gödel's Lost Letter and P=NP

Making Choices

The Axiom Of Choice, some history, some ideas Gregory Moore is a historian of mathematical logic. One connection he has to things dear to us is that he edited the...

Neighborhood Security: Feeling vs. Reality
From Schneier on Security

Neighborhood Security: Feeling vs. Reality

Research on why some neighborhoods feel safer: Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...

Kelloggs Loyalty Program
From The Eponymous Pickle

Kelloggs Loyalty Program

In AdAge:  A considerably complete program for tracking loyalty.    " ... Kellogg's loyalty program brings in data on 90% of its products  ... Kellogg's Family...

Microsoft Virtual Academy
From The Eponymous Pickle

Microsoft Virtual Academy

Had not heard of this, but Microsoft Virtual Academy provides free MS package training.   This appears to be mostly advanced technology oriented.

Really Clever Bank Card Fraud
From Schneier on Security

Really Clever Bank Card Fraud

This is a really clever social engineering attack against a bank-card holder: It all started, according to the police, on the Saturday night where one of this...

CS Educator Interview: Peter Beens
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Peter Beens

Back to Canada for our interview today. Peter Beens teaches at Beamsville District Secondary School in a small town in Ontario. Peter is very active online buthere...

Necessity of Encryption
From The Eponymous Pickle

Necessity of Encryption

In CIO Insight: A good overview of the reasons for using encryption with personal data.  The legal risks involved and current status of state laws in this area.

Predicting Hiring Success
From The Eponymous Pickle

Predicting Hiring Success

From Fast Company:   Every company wants to avoid expensive mistakes.  New methods of analytics with more data is leading to making better hiring choices  " ... An...

Robotics and Jobs, mutually beneficial
From The Computing Community Consortium Blog

Robotics and Jobs, mutually beneficial

Chris Isidore of CNN Money, wrote on July 29 about Amazon’s announcement to hire 7,000 new employees, 5,000 of which are for their nationwide distribution centers...

The Week Ahead: Congress to Hold Hearings on Copyright and Patents
From U.S. Public Policy Committee of the ACM

The Week Ahead: Congress to Hold Hearings on Copyright and Patents

Four hearings on Capitol Hill this week will focus on intellectual property issues related to cellphone unlocking, standard essential patents, copyright, and cross...

Hill Tech Happenings, Week of July 29
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 29

July 30 Markup: The Senate Commerce, Science and Transportation Committee will review pending legislation. Scheduled for consideration is a new cybersecurity bill...

Complimentary Webinar on Today's Marketing Strategies
From The Eponymous Pickle

Complimentary Webinar on Today's Marketing Strategies

Of interest.  by the SNCR which I worked with since its founding.  I plan to attend.Complimentary Webinar CMO 2.0: Marketing Strategies for Dealing with Today’s...

From Computational Complexity

Certifying primality in a CONSTANT number of operations

For this post I will only count the operations PLUS, MINUS, MULT. They may be done on rather large numbers. Recall that from the work coming out of Hilberts 10th...

Brenda Romero at G4C13: The Games Need to Change
From The Female Perspective of Computer Science

Brenda Romero at G4C13: The Games Need to Change

In the games for change movement, what needs to change? Brenda Romero, designer in residence at UC Santa Cruz, thinks it's the games.In her Games for Change 2013...

Mobile Devices and Cybercrime
From The Eponymous Pickle

Mobile Devices and Cybercrime

And more In Knowledge@Wharton on Mobile devices and crime.  Here in much more detail about the implications of mobile to cybercrime.   Your phone may be your weakest...

Communications of the ACM
From The Eponymous Pickle

Communications of the ACM

The ACM is the premier computing association in the US.   It's the only major technical group that I have remained a member of for many years.  This blog is mirrored...

Smartphones Attract  Crime
From The Eponymous Pickle

Smartphones Attract Crime

In AdAge:   Always thought that smartphones decreased crime by adding a new element of crowdsourced communications to inform authorities.  But it turns out that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account