acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

LOUDAUTO: NSA Exploit of the Day
From Schneier on Security

LOUDAUTO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: LOUDAUTO (TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...

Twitter and other Social Connections
From The Eponymous Pickle

Twitter and other Social Connections

I actively use Twitter and Google+.   On Twitter I am @FranzD.    Have been on Twitter since almost its conception.   Selectively, some of the posts in this blog...

Aligning Our Program with the CSTA Standards
From Computer Science Teachers Association

Aligning Our Program with the CSTA Standards

Increasing the availability of Computer Science offerings for all students, especially those who are members of underrepresented groups, is going to require anCSTA...

Playing the Varied Games of Life
From The Eponymous Pickle

Playing the Varied Games of Life

I had heard of the startup Knack.  The HBR discusses the process of evaluating the game of life.   And evaluate how you play this game.  Is this useful mostly for...

Are C++ and Java declining?
From Daniel Lemire's Blog

Are C++ and Java declining?

In a recent Dr. Dobb’s article, Binstock announced the decline of Java and C++: By all measures, C++ use declined last year, demonstrating that C++11 was not enough...

Augmented Reality for Wearable Computing
From The Eponymous Pickle

Augmented Reality for Wearable Computing

Integrate your contexts, both on you and around you.   I like the idea of having an all over aumentation as required.  This blog covers related topics. ViaMetaio...

Internet of Industrial Things
From The Eponymous Pickle

Internet of Industrial Things

Have had a number of interesting communications from academics working the industrial edge recently.  Here on the Industrial net of things.   Via GE, includes a...

Using The Technology We Preach
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Using The Technology We Preach

Habits die hard. I printed out some end of year surveys for my students to fill out about me (as teacher) and the courses they were finishing last week. Because...

Adware Vendors Buy and Abuse Chrome Extensions
From Schneier on Security

Adware Vendors Buy and Abuse Chrome Extensions

This is not a good development: To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...

How should we analyse our lives?
From Putting People First

How should we analyse our lives?

Alex “Sandy” Pentland, a professor of computational social sciences at MIT Media Lab and others like him are now convinced that the great academic divide between...

Data Mining Day
From The Eponymous Pickle

Data Mining Day

I am planning to attend:The Center for Business Analytics in the Carl H. Lindner College of Business at the University of Cincinnati is pleased to announceDataWednesday...

View of Gamification Around the World
From The Eponymous Pickle

View of Gamification Around the World

A survey from the gamification summit.  Some interesting, but not detailed examples.  I would not have expected the examples to be very different by region.  I...

Visualizing Growth in Emerging Markets
From The Eponymous Pickle

Visualizing Growth in Emerging Markets

In Tableau Public:   An example of using interactive data visualization to understand expanding markets. Nicely and simply done.  Would be interesting to further...

NantMobile and Macy's
From The Eponymous Pickle

NantMobile and Macy's

A former colleague of mine now runs NantMobile.  In the press it is reported that they are working with Macy's    Its interesting too that the company is owned"...

CTX4000: NSA Exploit of the Day
From Schneier on Security

CTX4000: NSA Exploit of the Day

Today's device -- this one isn't an implant -- from the NSA's Tailored Access Operations (TAO) group implant catalog: CTX4000 (TS//SI//REL TO USA,FVEY) The CTX4000...

Amazon Anticipatory Shipping
From The Eponymous Pickle

Amazon Anticipatory Shipping

In TechCrunch, a quick look at Amazon's patent, and implementation of what is being called 'anticipatory sales'.   Or shipping before you choose to buy.  While...

From Computational Complexity

We don't care about Ballroom Dancing. Should we?

YOU got into your undergrad school because not only were you good at Math but you were on the Fencing Team and in the Latin Club (so you could taunt your opponents...

Experience Design
From The Eponymous Pickle

Experience Design

New book just brought to my attention.   " ... Experience Design also serves as a reference tool for both designers and business leaders to help teams collaborate...

DDOS Attacks Using NTP
From Schneier on Security

DDOS Attacks Using NTP

This is new: The NTP method first began to appear late last year. To bring down a server such as one running "League of Legends," the attackers trick NTP servers...

Interesting Links 20 January 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 20 January 2014

It’s the calm before the storm for me. Tomorrow starts semester exams at my school and I’ll be busy this week grading semester projects. I’m a huge fan of end of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account