acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Opportunities not to miss
From Apophenia

Opportunities not to miss

Over the last six weeks, I’ve posted various opportunities for students, academics, and other scholars that I’m co-directing/hosting, many of which have deadlines...

Lockable USB Hard Drive
From Schneier on Security

Lockable USB Hard Drive

Just in time for Christmas, a USB drive housed in a physical combination lock.

Why I’m Still Excited about Computer Science
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why I’m Still Excited about Computer Science

It’s computer science education week and that has me thinking about what I’d like to tell students about computer science. So I decided to record something on the...

It Is All About the Celebration
From Computer Science Teachers Association

It Is All About the Celebration

CSEdWeek is all about the celebration. We celebrate the teachers who share the challenge and the excitement of the discipline with their students, we celebrateDecember...

NY Times Keeps Talking Computing
From The Computing Community Consortium Blog

NY Times Keeps Talking Computing

In addition to Tuesday’s special Science Times describing the future of computing, The New York Times

DARPA Unshredding Contest
From Schneier on Security

DARPA Unshredding Contest

DARPA held an unshredding contest, and there's a winner: "Lots of experts were skeptical that a solution could be produced at all let alone within the short time...

Why service design is the next big thing in cultural innovation
From Putting People First

Why service design is the next big thing in cultural innovation

Rohan Gunatillake, the lead producer of festivalslab (the Edinburgh Festival Innovations Lab) gives four reasons why new thinking and tools can produce better experiences...

Computer Science Education Blog Roll
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Education Blog Roll

I’m a firm believer that blogs are a great way for teachers to share ideas and builds community. Supporting that sort of community is why I have many blogs listed...

Higher Education Bubble
From The Eponymous Pickle

Higher Education Bubble

I have been hearing this term used more and more.  It has a Wikipedia entry.  I am still old school on this, but can see some of the symptoms.   It is likely better...

Siri Changing Education
From The Eponymous Pickle

Siri Changing Education

Received, interesting thoughts. " ... We at Onlinecollege.org recently came across your blog and were excited to share with you an article

Rethinking the Funnel
From The Eponymous Pickle

Rethinking the Funnel

A very good article on the innovation funnel.  We actively used the concept in new business development efforts to think about work planned and underway.  I like...

About to Get Nutty Around Here
From The Female Perspective of Computer Science

About to Get Nutty Around Here

Things are about to get really nutty, and I expect I won't be able to post to the blog too much in the next 6-8 weeks (though I will still try to get some content...

Skype Security Flaw
From Schneier on Security

Skype Security Flaw

Just announced: The researchers found several properties of Skype that can track not only users' locations over time, but also their peer-to-peer (P2P) file-sharing...

Getting Students to Think Beyond the Classroom in CS Ed Week
From Computer Science Teachers Association

Getting Students to Think Beyond the Classroom in CS Ed Week

During CS Ed Week I thought I would find some things that may not be what I normally "teach" in CS. I thought I would find things that would make my students think...

From Computational Complexity

What is a Breakthrough?

The recent discussion on Matrix Mult inspires the general question of WHAT IS A BREAKTHROUGH? Last year I tried to get an intelligent discussion on this topic but...

Global Supply Chain Visibility
From The Eponymous Pickle

Global Supply Chain Visibility

Video in CGT:  How Amway achieved global supply chain visibility. 

Data Temperature
From The Eponymous Pickle

Data Temperature

So what does the concept of 'data temperature' mean?   Summarized here, with links to more detail:- Hot = accessed all the time, or extremely important data requiring...

What is the Role of Technology in Human Trafficking?
From Apophenia

What is the Role of Technology in Human Trafficking?

Networked technologies

NY Times
From The Computing Community Consortium Blog

NY Times

If you haven’t already, be sure to check out the Science Times in yesterday’s

Tagging People with Invisible Ink
From Schneier on Security

Tagging People with Invisible Ink

In Montreal, police marked protesters with invisible ink to be able to identify them later. The next step is going to be a spray that marks people surreptitiously...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account