acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

From Computational Complexity

Technology and Jobs

Entertainment Weekly reported last month on the bankruptcy of the special effects company Rhythm and Hues and the troubled industry. I remarked five years ago that...

Computer Science as a Teaching Strategy
From Computer Science Teachers Association

Computer Science as a Teaching Strategy

Recently one of my Facebook friends, Rebecca Dovi, computer science teacher in Virginia, posted an article from Education News, Julia Steiny: Promote Algebra by...

Freeman Hrabowski at TED: 4 pillars of college success in science
From The Computing Community Consortium Blog

Freeman Hrabowski at TED: 4 pillars of college success in science

Freeman Hrabowski, president of the University of Maryland Baltimore County delivered an inspirational TED talk on the importance of STEM education. Click here...

Office on Tablets
From The Eponymous Pickle

Office on Tablets

An Infoworld article about the suggested schedule for MS office on iOS and Android.  I have talked to several clients recently who have been awaiting this.  Will...

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

SIGCT Recommendations for ISTE 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

SIGCT Recommendations for ISTE 2013

The annual ISTE conference is not known as a hot bed of opportunities for computer science teachers. Things look some what better this year though with 13 activities...

Time Series Back Again
From The Eponymous Pickle

Time Series Back Again

An article suggests that Time Series are Back.  Not they have ever been gone.   Used them every day in the enterprise.   Yet as we gather more time stamped data...

Boredom Drives Creativity
From The Eponymous Pickle

Boredom Drives Creativity

In Fastcompany.  Is boredom a key part of creativity?  And do our new devices keep us from getting bored and thus stifle our creativity?  I suggest that boredom...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

House Intelligence Committee Tries Again With CISPA
From U.S. Public Policy Committee of the ACM

House Intelligence Committee Tries Again With CISPA

On April 10 the House Intelligence Committee will review H.R. 624, the Cyber Intelligence Sharing and Protection Act. The Committee approved an almost identical...

Guest Post by Mikkel Thorup : Results vs. Techniques
From My Biased Coin

Guest Post by Mikkel Thorup : Results vs. Techniques

[Mikkel Thorup graciously has offered a guest blog post, discussing what he looks for in conference papers, and possible implications for refereeing.] Results versus...

Design Advantages of Augmented Reality
From The Female Perspective of Computer Science

Design Advantages of Augmented Reality

Last fall, we published a paper about augmented reality, cognitive theories, and learning.  One of the tasks of the work was to specifically define what the design...

Robotics Week: Free Robotics App
From The Eponymous Pickle

Robotics Week: Free Robotics App

IEEE Spectrum tells us that this week is Robotics week.  In honor of that they are offering a free App that covers many aspects of Robotics research and application...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...

How to increase donations to an open source project
From Wild WebMink

How to increase donations to an open source project

Reblogged from Ian Skerrett: Lots of open source projects raise money from their user communities by soliciting donations.  Most open source projects will have...

Data Driven Programming
From The Eponymous Pickle

Data Driven Programming

In Adage:  An emerging era for data driven programming.  Programming media, not programming computers.  Not really new, we explored this for decades, optimizing...

The 2013 Data 2.0 Summit
From Daniel Lemire's Blog

The 2013 Data 2.0 Summit

The Data 2.0 Summit will be held in San Francisco at the end of the month (April 30th 2013). Some of the speakers might interest the readers of this blog. For example...

Symposium on Visions on the Theory of Computing
From The Computing Community Consortium Blog

Symposium on Visions on the Theory of Computing

In conjunction with the Simons Institute for the Theory of Computing, we are pleased to announce that registration is now open for a Symposium on Visions on the...

Lecture, Demo, Project
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Lecture, Demo, Project

Or perhaps hear, see, do? I was asked about my teaching last week. What would my ideal class period look like. It was as they say a thinker. What I have been trying...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account