acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Finessing Stallman’s Pragmatism
From Wild WebMink

Finessing Stallman’s Pragmatism

Not a title that you might expect to see, but Richard Stallman has indeed posted a pragmatic proposal for dealing with software patents – to limit enforceability...

How Terrorist Groups Disband
From Schneier on Security

How Terrorist Groups Disband

Interesting research from RAND: Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...

Are You Ready for Computer Science Education Week?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Are You Ready for Computer Science Education Week?

I’m a big fan of CSEdWeek (Computer Science Education Week) and in the past I have done school visits and hosted field trips at Microsoft offices during the week...

Does Rooting Void Your Warranty?
From Wild WebMink

Does Rooting Void Your Warranty?

Find out on ComputerWorldUK

Seeking Deaf and Hard of Hearing Students Interested in Computing!
From Computer Science Teachers Association

Seeking Deaf and Hard of Hearing Students Interested in Computing!

Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer...

Seeking Deaf and Hard of Hearing Students Interested in Computing!
From Computer Science Teachers Association

Seeking Deaf and Hard of Hearing Students Interested in Computing!

Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer...

From Gödel's Lost Letter and P=NP

The Power Of Guessing

Some results and ideas on guessing and nondeterminism David Doty and Michael Wehar are theorists who work in different areas of computational complexity, and are...

Gary McGraw on National Cybersecurity
From Schneier on Security

Gary McGraw on National Cybersecurity

Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted. Creating a cyber-rock is cheap. Buying...

Devices and Software
From The Eponymous Pickle

Devices and Software

O'Reilly talks about Square Wallet and a number of other software developments. I have also been introduced recently to some Apps that interact with health data...

From Computational Complexity

Andrew Goldberg guest blog on new max flow result

Guest Blog by Andrew Goldberg on the recent Max Flow in O(nm) time algorithm. Maximum Flow in O(nm) Time Recently, Jim Orlin published an O(nm) maximum flow algorithm...

Micromorts
From Schneier on Security

Micromorts

Here's a great concept: a micromort: Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...

Driving Open Source
From Wild WebMink

Driving Open Source

Here’s my interview with this month’s Oracle Java Magazine about the forces driving open source and the need for open source skills.

Should Computer Science Teachers Be Paid More Than Gym Teachers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Should Computer Science Teachers Be Paid More Than Gym Teachers

I first ran into the question of paying faculty based on the subject they taught some years ago during an industry advisory meeting for a university computer science...

At the VA Center for Applied Engineering
From The Eponymous Pickle

At the VA Center for Applied Engineering

Gave a talk at the VA Center for Applied Engineering today in  Indianapolis on the integration of design and analytically driven innovation.  Also got to see poster...

New Degree of Analytic Learning
From The Eponymous Pickle

New Degree of Analytic Learning

A new degree of analytic learning?    An interesting interview:  " ... Barbara Wixom is an associate professor at University of Virginia’s McIntire School of Commerce...

Failure of Social Strategies
From The Eponymous Pickle

Failure of Social Strategies

Charlene Li on the failure of social strategies.  Why most fail.  Agree with many of the points made here.  It can be hard to make them work disconnected from specific...

New SSL Vulnerability
From Schneier on Security

New SSL Vulnerability

It's hard for me to get too worked up about this vulnerability: Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...

NYCE (New York Computer Science and Economics Day) Announcement
From My Biased Coin

NYCE (New York Computer Science and Economics Day) Announcement

I was asked to post the following:We are pleased to announce that NYCE 2012, the fifth annual New YorkComputer Science and Economics Day, will be held in New York...

Developing a user-centered methodology for emerging markets and the BoP
From Putting People First

Developing a user-centered methodology for emerging markets and the BoP

In a long post, emerging markets strategist Niti Bhan [with whom Experientia collaborates] discusses her approach to strategic design planning and concept development...

Regulation as a Prisoner's Dilemma
From Schneier on Security

Regulation as a Prisoner's Dilemma

This is the sort of thing I wrote about in my latest book. The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account