acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The rise to power of computer scientists
From Daniel Lemire's Blog

The rise to power of computer scientists

Want to become CEO of a major technology company? Consider the background of the hot CEOs of the hour: Amazon: Jeff Bezos has a degree in electrical engineering...

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation
From The Computing Community Consortium Blog

NSF CISE Distinguished Lecture: The Future of Computing-Mediated Research and Innovation

UPDATE: Due to the potential storm affecting the DC Metro region, this lecture has been postponed. The National Science Foundation (NSF) Directorate for Computer...

Kurzweil Reviews the Movie Her
From The Eponymous Pickle

Kurzweil Reviews the Movie Her

An AI view.  Now beyond Minority Report, and with shades of Siri.   Is this where we are headed?   It does provide an interesting structure to think about how we...

Robotics and The Sochi 2014 Olympic Winter Games
From The Computing Community Consortium Blog

Robotics and The Sochi 2014 Olympic Winter Games

In anticipation of the Sochi 2014 Olympic Winter games, the National Science Foundation (NSF) has partnered with NBC Learn to feature the “Science and Engineering...

Are We Preparing Our Children?
From Computer Science Teachers Association

Are We Preparing Our Children?


SWAP: NSA Exploit of the Day
From Schneier on Security

SWAP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SWAP (TS//SI//REL) SWAP provides software application persistence by exploiting...

Interactive Storytelling in Games: Next Steps
From The Female Perspective of Computer Science

Interactive Storytelling in Games: Next Steps

Last night I gave a lecture for our undergrad society on some of the more interesting recent developments in interactive storytelling, along with a preview of my...

“It’s Complicated” is dedicated to Peter Lyman
From Apophenia

“It’s Complicated” is dedicated to Peter Lyman

As people start to get copies of my book, I want to offer more context to the brief dedication at the front of the book. “It’s Complicated” is dedicated to my beloved...

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund
From The Computing Community Consortium Blog

Mozilla Foundation, National Science Foundation and US Ignite announce Partnership for Gigabit Community Fund

The Mozilla Gigabit Community Fund was announced on February 6, 2014 as a partnership between the Mozilla Foundation, the National Science Foundation (NSF) and US...

iBeacon and Shopping Behavior
From The Eponymous Pickle

iBeacon and Shopping Behavior

In Mashable: More looks into location based shopping information.   With some obvious comments:  " ... Will consumers embrace Apple and iBeacon's nearly frictionless...

Hangout for the Enterprise
From The Eponymous Pickle

Hangout for the Enterprise

Although I have now tested Google+ Hangouts a number of times, have never tried to work with it under enterprise constraints.   A new service permits greater connectivity...

From Computational Complexity

Favorite Theorems: Connecting in Log Space

We start the favorite theorems with a result that might surprise many is still less than ten years old. Undirected Connectivity in Log-Space by Omer ReingoldPDF...

Big Data as Your Doctor
From The Eponymous Pickle

Big Data as Your Doctor

A very obvious conclusion, it was understood in the AI hype of the late 80's.  But we didn't have all the hardware or software in place to make it happen.  You...

Dispute Resolution Systems for Security Protocols
From Schneier on Security

Dispute Resolution Systems for Security Protocols

Interesting paper by Steven J. Murdoch and Ross Anderson in this year's Financial Cryptography conference: "Security Protocols and Evidence: Where Many Payment."...

Facial Encoding by Millward Brown
From The Eponymous Pickle

Facial Encoding by Millward Brown

I was reminded about Millward Brown by this article in Neurorelay.   I met with a number of their people at a conference in Poland now a number of years ago.  "...

Surveillance Generating Big Data
From The Eponymous Pickle

Surveillance Generating Big Data

 In Computing Now:  More data, now what do we do with it?    " ... Big data continues to grow exponentially, and surveillance video has become the largest source...

Are We Going To Learn How To Do That?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Are We Going To Learn How To Do That?

The other day I was demonstrating some things to my programming students. We’re at the very beginning of a new semester and students are learning the very basics...

Quick links
From Geeking with Greg

Quick links

What caught my attention lately: Colorful description of Google's servers in 1999: "A thin layer of cork to protect the motherboards from the cookie trays on which...

SOMBERKNAVE: NSA Exploit of the Day
From Schneier on Security

SOMBERKNAVE: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SOMBERKNAVE (TS//SI//REL) SOMBERKNAVE is Windows XP wireless software implant...

DARPA announces Open Catalog
From The Computing Community Consortium Blog

DARPA announces Open Catalog

On February 4, 2014, the Defense Advanced Research Projects Agency (DARPA) announced the launch of the DARPA Open Catalog, a website that brings together source...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account