acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Vampire Numbers and other Interesting Things
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Vampire Numbers and other Interesting Things

In a Facebook post recently, Gerald Thurman, a computing/math instructor at Scottsdale Community College located in Scottsdale, Arizona introduced me to Vampire...

Coke Does Social and Photo Sharing
From The Eponymous Pickle

Coke Does Social and Photo Sharing

Coke has launched a photo sharing application about 'happy places'.  Nice idea,  how well it will be picked up will depend on.  I worked on such an app, and depends...

Design plus Analytics
From The Eponymous Pickle

Design plus Analytics

Have been re-reading The Design of Business: Why Design Thinking is the Next Competitive Advantage, by Roger Martin.   For background on a talk on innovation I...

Three-Rotor Enigma Machine Up for Auction
From Schneier on Security

Three-Rotor Enigma Machine Up for Auction

Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...

Why You Can't Vote Online
From The Eponymous Pickle

Why You Can't Vote Online

In a voting line this morning, which was the first time in memory I had waited more than a few minutes,  I noticed the large number of people using smart phones...

Wanted: RSA Exhibitor for Book Signing
From Schneier on Security

Wanted: RSA Exhibitor for Book Signing

Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...

How teens do research in the digital world
From Putting People First

How teens do research in the digital world

According to Pew Internet research, the teachers who instruct the most advanced American secondary school students render mixed verdicts about students’ research...

New Vulnerability Against Industrial Control Systems
From Schneier on Security

New Vulnerability Against Industrial Control Systems

It doesn't look good. These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...

On Industry Certifications For Students
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

On Industry Certifications For Students

This post all started as a comment on a guest post by Barbara Ericson on Mark Guzdial’s blog - The Need for an Industry-based Java Exam. In that post Barbara makes...

From Gödel's Lost Letter and P=NP

The Election Outcome

We predict that one of three outcomes will happen Nate Silver is arguably the world’s foremost psephologist. This sounds like someone who foretells a person’s future...

Achieving Smarter Commerce:  IBM and DemandTec
From The Eponymous Pickle

Achieving Smarter Commerce: IBM and DemandTec

I have been following DemandTec (Now part of IBM) since they presented at our innovation centers soon after they were formed.  I was impressed by the deep analytics...

I'm Going To Be a TEDx Speaker
From The Female Perspective of Computer Science

I'm Going To Be a TEDx Speaker

I'm happy that I'm starting to get noticed when it comes to my public speaking abilities. My latest speaking request was for a local edition of TED on DecemberTEDxSandyHillWomen...

New Jersey Allows Voting by E-Mail
From Schneier on Security

New Jersey Allows Voting by E-Mail

I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.

New WWII Cryptanalysis
From Schneier on Security

New WWII Cryptanalysis

I'd sure like to know more about this: Government code-breakers are working on deciphering a message that has remained a secret for 70 years. It was found onSome...

Power Retailers
From The Eponymous Pickle

Power Retailers

In Progressive Retailer.  A near time view of who the power retailers of the future.  Those that operate in mutliple channels.  " ... Manufacturers expect Wal-Mart...

Windows 8 Apps for Social Good Contest
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows 8 Apps for Social Good Contest

I don’t work for Microsoft anymore so I don’t get paid to promote things like this. On the other hand I like the idea of a) applications for social good and b)http...

Building software to conduct ethnographic research of online communities
From Putting People First

Building software to conduct ethnographic research of online communities

While digital ethnography is an established field within ethnography, we don’t often hear of ethnographers building digital tools to conduct their fieldwork. Wendy...

From Computational Complexity

Produce or Perish

 Every year or so the National Science Foundation releases a new version of the holy bible of grant submission procedures, the Grant Proposal Guide. Last month's...

On the Ineffectiveness of Airport Security Pat-Downs
From Schneier on Security

On the Ineffectiveness of Airport Security Pat-Downs

I've written about it before, but not half as well as this story: "That search was absolutely useless." I said. "And just shows how much of all of this is security...

Interesting Links 5 November 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 5 November 2012

Super Storm Sandy (for various reasons I believe it was not technically a hurricane when it reached me) came and went last week. I was lucky and we only lost power...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account