acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Year's Thanks
From My Biased Coin

New Year's Thanks

There are many things I'm thankful for this year.  Perhaps most notably, the new year marks the halfway point of my 3-year stint as "Area Dean for Computer Science"...

Let
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Let

I was watching an episode of Mythbusters the other day. I always enjoy that show and while most of the attention goes to the two main stars my favorite is Grant...

Leveraging Semantics in 2012
From The Eponymous Pickle

Leveraging Semantics in 2012

Excellent post by Mark Montgomery: Strategic IT Alignment in 2012: Leverage Semantics ... read it here

Explaining Why Computing is Important
From The Computing Community Consortium Blog

Explaining Why Computing is Important

IBM Fellow Grady Booch, co-creator of UML and object-oriented programming, has launched “a transmedia project” seeking to engage “audiences of all ages in the story...

Studying Airport Security
From Schneier on Security

Studying Airport Security

Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...

Technology Evolution
From The Eponymous Pickle

Technology Evolution

In ReadWriteWeb. A look at Kevin Kelly's new book on technology evolution. Makes me want to read it. "... It's a highly ambitious and expansive book, which looks...

From Computational Complexity

Complexity Year in Review 2011

Result of the Year goes to the new bounds on Matrix Multiplication by Andrew Stothers and Virginia Vassilevska Williams. It's not every year that we see progress...

Tying Up Phone Lines as a Cyberattack Tactic
From Schneier on Security

Tying Up Phone Lines as a Cyberattack Tactic

There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...

Top Ten CSTA Blog Posts of 2011
From Computer Science Teachers Association

Top Ten CSTA Blog Posts of 2011

10. January 12, 2011- A Joint Call for Research Why Computer Science Education is Important for K-12. This post is well worth a second look to provide a good reminder...

Grace Hopper Interview
From The Eponymous Pickle

Grace Hopper Interview

An interview with computer pioneer Grace Hopper, who I met while working at the Pentagon. A reminder of how far we have come.

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A great story: Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...

WiFi Vending Machines
From The Eponymous Pickle

WiFi Vending Machines

In Japan, the home of universal vending, machines that will provide free registration-less WiFi and product. Assuming they will sell advertising for companies that...

Cross-Cultural Learning Curve: Sending a Paper to Science
From My Biased Coin

Cross-Cultural Learning Curve: Sending a Paper to Science

We decided to submit our paper on MIC and MINE to Science it's a venue that my co-authors were familiar with and very interested in applying to.  I was happy to...

2011:
From The Computing Community Consortium Blog

2011:

…became “the center of your world.” So says technology writer/editor

Sands Research Nails VW Ad
From The Eponymous Pickle

Sands Research Nails VW Ad

An interesting result that starts to connect new ad analysis methods with classic methods:------Wall St. Journal and AdWeek Agree with

Telling a Business Story with Slideshare
From The Eponymous Pickle

Telling a Business Story with Slideshare

Telling a business story. Simple advice overall. " ... Because presentations are generally about very specific topics, companies use SlideShare for inbound marketing...

Butt Identification
From Schneier on Security

Butt Identification

Here's a new biometric: how you sit: ...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...

My favorite posts from 2011
From Daniel Lemire's Blog

My favorite posts from 2011

January: Innovating without permission Not even eventually consistent February: Taking scientific publishing to the next level Ten things Computer Science tells...

From The Computing Community Consortium Blog

msnbc.com’s Cosmic Log is out with its list of the top 11 scientific twists from 2011 this morning: The past year brought us the supercomputer that trounced

Quick links
From Geeking with Greg

Quick links

Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account