acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

why I’m quitting Mendeley (and why my employer has nothing to do with it)
From Apophenia

why I’m quitting Mendeley (and why my employer has nothing to do with it)

Earlier this week, Mendeley was bought by Elsevier. I posted the announcement on Twitter to state that I would be quitting Mendeley. This tweet sparked a conversation...

CISE AD Issues Letter to the Community on FY14 Budget
From The Computing Community Consortium Blog

CISE AD Issues Letter to the Community on FY14 Budget

Yesterday, the President submitted his FY14 budget request to Congress.  This request included an 8.4% increase over 2012 levels for NSF, with a 9.8% increase in...

Resources For Teaching Binary Numbers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Resources For Teaching Binary Numbers

Several years ago I wrote a post on my old blog with resources for teaching Binary. Since I no longer have access to that site I can’t update it with more links...

P&G and Shopper Marketing
From The Eponymous Pickle

P&G and Shopper Marketing

In Adage:  P&G regains top slot in shopper marketing.  Based on a survey of agencies.  No direct indication of innovation.

Thinking Of Starting A Foundation?
From Wild WebMink

Thinking Of Starting A Foundation?

Reblogged from Meshed Insights & Knowledge: Open source projects are increasingly opting to form an independent entity – a “Foundation” – to form the core of their...

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

From Computational Complexity

Technology and Jobs

Entertainment Weekly reported last month on the bankruptcy of the special effects company Rhythm and Hues and the troubled industry. I remarked five years ago that...

Computer Science as a Teaching Strategy
From Computer Science Teachers Association

Computer Science as a Teaching Strategy

Recently one of my Facebook friends, Rebecca Dovi, computer science teacher in Virginia, posted an article from Education News, Julia Steiny: Promote Algebra by...

Freeman Hrabowski at TED: 4 pillars of college success in science
From The Computing Community Consortium Blog

Freeman Hrabowski at TED: 4 pillars of college success in science

Freeman Hrabowski, president of the University of Maryland Baltimore County delivered an inspirational TED talk on the importance of STEM education. Click here...

Office on Tablets
From The Eponymous Pickle

Office on Tablets

An Infoworld article about the suggested schedule for MS office on iOS and Android.  I have talked to several clients recently who have been awaiting this.  Will...

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

SIGCT Recommendations for ISTE 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

SIGCT Recommendations for ISTE 2013

The annual ISTE conference is not known as a hot bed of opportunities for computer science teachers. Things look some what better this year though with 13 activities...

Time Series Back Again
From The Eponymous Pickle

Time Series Back Again

An article suggests that Time Series are Back.  Not they have ever been gone.   Used them every day in the enterprise.   Yet as we gather more time stamped data...

Boredom Drives Creativity
From The Eponymous Pickle

Boredom Drives Creativity

In Fastcompany.  Is boredom a key part of creativity?  And do our new devices keep us from getting bored and thus stifle our creativity?  I suggest that boredom...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

House Intelligence Committee Tries Again With CISPA
From U.S. Public Policy Committee of the ACM

House Intelligence Committee Tries Again With CISPA

On April 10 the House Intelligence Committee will review H.R. 624, the Cyber Intelligence Sharing and Protection Act. The Committee approved an almost identical...

Guest Post by Mikkel Thorup : Results vs. Techniques
From My Biased Coin

Guest Post by Mikkel Thorup : Results vs. Techniques

[Mikkel Thorup graciously has offered a guest blog post, discussing what he looks for in conference papers, and possible implications for refereeing.] Results versus...

Design Advantages of Augmented Reality
From The Female Perspective of Computer Science

Design Advantages of Augmented Reality

Last fall, we published a paper about augmented reality, cognitive theories, and learning.  One of the tasks of the work was to specifically define what the design...

Robotics Week: Free Robotics App
From The Eponymous Pickle

Robotics Week: Free Robotics App

IEEE Spectrum tells us that this week is Robotics week.  In honor of that they are offering a free App that covers many aspects of Robotics research and application...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account