acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

HEADWATER: NSA Exploit of the Day
From Schneier on Security

HEADWATER: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: HEADWATER (TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...

From Computational Complexity

A short History of Crypto

I taught a 3-week summer course to High School Students called Computer Science: A Hands Off Approach which did some theory. One thing I did was the following...

Andreessen Tweets
From My Biased Coin

Andreessen Tweets

My brother pointed me to this article on a great exchange of tweets about the origins of Netscape. The two highlights, for me at least.  First, Andreessen expressed...

MIT Comp Sci  Prof Explains Quantum Computing
From The Eponymous Pickle

MIT Comp Sci Prof Explains Quantum Computing

A relatively non technical article in the WSJ on the state of Quantum computing, An interview about what it is, what it might be good for, and where it may be going...

Convincing People that Smartphone Shopping is Safe
From The Eponymous Pickle

Convincing People that Smartphone Shopping is Safe

Recent events have made this more difficult, but the solutions and behavior needed are still there.  What is the particular nature of the Smartphone that makesConvincing...

The Growing Scope of the Internet of Things
From The Eponymous Pickle

The Growing Scope of the Internet of Things

Gartner says it will grow 30 time to 26 billion by 2020.   My guess that it will grow even larger, as more devices, some that we were not expecting,  come online...

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth
From Schneier on Security

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth

It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...

Teachers and Role Models in CS Education
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teachers and Role Models in CS Education

There was an interesting bit of chatting going on over Twitter about the importance of teachers as role models over the weekend. A lot of people think that having...

Gardeners vs Architects
From The Eponymous Pickle

Gardeners vs Architects

In Innovation Excellence:  A kind of designer vs analytics argument that is interesting.  We dealt with this when we added a design function.   But like in this...

Teaching Functional Programming With A Chicken That Crosses the Road
From The Female Perspective of Computer Science

Teaching Functional Programming With A Chicken That Crosses the Road

I'm currently teaching a third year course on programming paradigms.  For functional programming we look at Scheme, and for logic programming, Prolog.  I took this...

SOUFFLETROUGH: NSA Exploit of the Day
From Schneier on Security

SOUFFLETROUGH: NSA Exploit of the Day

One of the top secret NSA documents published by Der Spiegel is a 50-page catalog of "implants" from the NSA's Tailored Access Group. Because the individual implants...

So What Now?
From Computer Science Teachers Association

So What Now?

The Hour of Code was a great success and you may have had more interest than ever before in computer science, but what do you do with all that momentum? How do...

Her - The Movie Influences User Interface
From The Eponymous Pickle

Her - The Movie Influences User Interface

Back when I was giving talks at our innovation centers, the most frequently mentioned media was the move 'Minority Report'. Then just out and portraying an advertising...

Visualizing Unstructured Data
From The Eponymous Pickle

Visualizing Unstructured Data

Good overview of the topic.  Examples like 'word clouds' are typical.  And semantic nets that we used to represent the interaction between terms.   Concept maps...

WiFi in the Internet of Things
From The Eponymous Pickle

WiFi in the Internet of Things

In Ara Technica:  Fairly obvious that many things will be connected wirelessly.   A home or business is an aggregation of things that need to be connected to joint...

Hill Tech Happenings, Week of January 13
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of January 13

January 14 Hearing: The Courts, Intellectual Property and the Internet Subcommittee of the House Judiciary Committee will hold a hearing on the scope of copyright...

Virtual Keyboard for Wearable Computing
From The Eponymous Pickle

Virtual Keyboard for Wearable Computing

Just brought to my attention by Lars Asplund: SenseBoard" ... The New Technology that can give you a Virtual keyboard, a mouse, or a gesture sensitive device to...

Power of Networks
From The Eponymous Pickle

Power of Networks

Crucially its about how to set up, evolve and utilize our networks."The Power of NetworksWhat can a network learn that an individual cannot?By MIT Technology Review...

How the NSA Threatens National Security
From Schneier on Security

How the NSA Threatens National Security

Secret NSA eavesdropping is still in the news. Details about once secret programs continue to leak. The Director of National Intelligence has recently declassified...

Interesting Links 13 January 2014
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 13 January 2014

Highlight this week? Free and inexpensive books! And some links to interesting news and discussions about women and others in AP CS classes. And more so read through...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account