acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)
From CERIAS Blog

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Cathy Tilton, VP Standards and Technology, Daon Solutions Elisa Bertino, Professor, Computer Science and CERIAS Fellow...

From Computational Complexity

You should apply for STOC and/or CCC travel money (students)

Once again there is some money from ACM and from NSF for students to goto STOC, and I am the one to send the applications to. The link for info on how to apply...

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)
From CERIAS Blog

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Alok Chaturvedi, Professor, Management, Purdue University Samuel Liles, Associate Professor, Computer and Information...

Informatics Education Report in Europe – they get it!
From The Computing Community Consortium Blog

Informatics Education Report in Europe – they get it!

A joint report of Informatics Europe and the ACM Europe Working Group on Informatics Education was recently released.  The report highlights what is currently being...

Big Data Applications Survey
From The Eponymous Pickle

Big Data Applications Survey

Interesting survey of applications. " ... While most companies intend to invest in big data technologies, a lack of human resources and know-how keeps them from...

When is Augmented Reality the Right Choice?
From The Female Perspective of Computer Science

When is Augmented Reality the Right Choice?

Last fall, we published a paper about augmented reality, cognitive theories, and learning. I previously wrote about the design advantages of AR; these give insight...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...

The Book Reimagined by Video Game Makers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Book Reimagined by Video Game Makers

VIDYA BOOKS: the book, as reimagined by video game makers is a Kickstarter project that is being spearheaded by someone I met while I was at Microsoft. Joe Booth...

IBM and Flash Memory
From The Eponymous Pickle

IBM and Flash Memory

IBM reports that it will invest $1 Billion in Flash memory development.  In particular, this can point to fast analytics solutions for Big Data Applications.  ...

OSI License Clinic
From Wild WebMink

OSI License Clinic

In a new departure, the Open Source Initiative will hold a small open source license clinic oriented towards US Federal agencies. The event will be at the Library...

#wethedata
From Putting People First

#wethedata

Right now, data may be what we intentionally share, or what is gathered about us – the product of surveillance and tracking. We are the customer, but our data are...

Insights from network data analysis that yield field observations
From Putting People First

Insights from network data analysis that yield field observations

As part of Ethnomining, the April 2013 Ethnographymatters edition on combining qualitative and quantitative data, edited by Nicolas Nova, Fabien Girardin describes...

Bitcoin is just the poster currency for a growing movement of alternative tender
From Putting People First

Bitcoin is just the poster currency for a growing movement of alternative tender

Scott Smith of futures research lab Changeist writes in Quartz about the long history of alternative currencies, and criticizes Bitcoin because “they set too high...

Designing better experiences through data
From Putting People First

Designing better experiences through data

Access to big data is growing at an incredible pace. With increased information from various sources available on smartphones and tablets, many companies now realize...

Technologies of Touch
From The Eponymous Pickle

Technologies of Touch

From a recent TED:  A look at the technology of Touch.  We did a number of experiments with touch interaction with products.  The attempt was to include other senses...

Effective Data Visualization
From The Eponymous Pickle

Effective Data Visualization

In Greenplum: Procter's now classic data visualization dashboards compared to other approaches like Infographic style producer Periscopic.  I have problems with...

Data Science
From The Eponymous Pickle

Data Science

In the NYT quoting the HBR:  On the sexiness of data science.  Its still structure, logic and quantitative analytics.  Hardly sexy to most.    Well described "...

From Gödel's Lost Letter and P=NP

Measures Are Better

The Littlewood conjecture—another drive you crazy conjecture John Littlewood is the latter half of famous duo of Hardy-Littlewood. I have discussed him before here...

On Choosing Between Good Schools
From updated sporadically at best

On Choosing Between Good Schools

I have been talking to many people recently about choosing schools, both for undergraduate and graduate education. Here is a compilation and elaboration of what...

Reminder: Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research
From The Computing Community Consortium Blog

Reminder: Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research

As we’ve previously blogged, The Computing Community Consortium (CCC) is turning to the Computing Research community for their input on the needs and potential...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account