acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Salman Kahn on Education
From The Eponymous Pickle

Salman Kahn on Education

An interview in HBR with Salman Kahn, founder of the Kahn Academy.   Just have started to dive in.   " ... Salman Khan was working as a hedge fund analyst when...

Friday Squid Blogging: Camouflage in Squid Eyes
From Schneier on Security

Friday Squid Blogging: Camouflage in Squid Eyes

Interesting research: Cephalopods possess a sophisticated array of mechanisms to achieve camouflage in dynamic underwater environments. While active mechanisms...

Online Grocery Emerging
From The Eponymous Pickle

Online Grocery Emerging

Will 2014 be the Year that online grocery will Leap forward?  Are Amazon Fresh and Pantry be our future?   Is it scale able and cost efficient?  Bloomberg Business...

High Stakes Decision Making
From The Eponymous Pickle

High Stakes Decision Making

On decision making in the HBR:   Is about risk and behavior.  " ... The next time you are thinking through a big-stakes decision ask yourself: “What happens first...

Smart Contact Lenses
From The Eponymous Pickle

Smart Contact Lenses

And in Mashable:  Why deal with glasses when you can build the information right onto the eye?  " ... Google's new smart contact lens project that acts as a non...

PowerLocker uses Blowfish
From Schneier on Security

PowerLocker uses Blowfish

There's a new piece of ransomware out there, PowerLocker (also called PrisonLocker), that uses Blowfish: PowerLocker could prove an even more potent threat because...

STUCCOMONTANA: NSA Exploit of the Day
From Schneier on Security

STUCCOMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: STUCCOMONTANA (TS//SI//REL) STUCCOMONTANA provides persistence for DNThere...

Micro Windmills
From The Eponymous Pickle

Micro Windmills

I like the idea of small.  Nanotechnology is a good example.  How about using small models for gathering energy?  Here proposed for charging smartphones.  Not sure...

NSA-O-Matic
From Schneier on Security

NSA-O-Matic

Generate your own fake NSA programs.

Learning Form a Former Student
From Computer Science Teachers Association

Learning Form a Former Student

Each year during CS Ed Week I invite alumni to return to my school to talk about their education and careers with the junior class. I open it up to any alumni who...

Cruise Ship Conference
From The Female Perspective of Computer Science

Cruise Ship Conference

I've never been on a cruise before. Who would have thought that my first opportunity to sail would be for an academic conference on videogames? Come on, admit it...

[Book] Smart Cities: Big Data, Civic Hackers and the Quest for a New Utopia
From Putting People First

[Book] Smart Cities: Big Data, Civic Hackers and the Quest for a New Utopia

Smart Cities: Big Data, Civic Hackers and the Quest for a New Utopia by Anthony M. Townsend W. W. Norton & Company October 2013. 400 pages [Amazon link] Abstract...

Why wearable tech is unwearable
From Putting People First

Why wearable tech is unwearable

Belindar Parmar, CEO of Lady Geek and founder of Little Miss Geek thinks that current wearable devices are “emblematic of a lack of empathy that pervades the technology...

Linkedin Growth and Use
From The Eponymous Pickle

Linkedin Growth and Use

Been fascinated by the growth of serious professional networks.  They continue to grow.  Even though my perceptions are that they are getting too complicated for...

NSA Collects Hundreds of Millions of Text Messages Daily
From Schneier on Security

NSA Collects Hundreds of Millions of Text Messages Daily

No surprise here. Although we some new codenames: DISHFIRE: The NSA's program to collect text messages and text-message metadata. PREFER: The NSA's program to...

Dangers fom the Internet of Things
From The Eponymous Pickle

Dangers fom the Internet of Things

The Internet of Things will provide new sources of data from a increasing number of devices.  The Smart Home will be a particular source of connectivity for the...

Passing of the Professor
From My Biased Coin

Passing of the Professor

Sadly, "The Professor", Russell Johnson, has passed away.  I enjoyed Gilligan's Island as a kid.  I can't help but think that his portrayal deeply affected people's...

Reverse Bell Curve In Programming Projects
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Reverse Bell Curve In Programming Projects

I have some 60+ students working on end of semester projects these days. I have one section of Honors Programming and two sections of Explorations in Computer Science...

Testing
From ACM-W supporting, celebrating and advocating for Women in Computing

Testing

This is a test

SIERRAMONTANA: NSA Exploit of the Day
From Schneier on Security

SIERRAMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SIERRAMONTANA (TS//SI//REL) SIERRAMONTANA provides persistence for DNThere...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account