acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Overcoming the Isolation of the Computer Science Teacher
From Computer Science Teachers Association

Overcoming the Isolation of the Computer Science Teacher

This morning I had a conversation with the other computer science teacher at my school. I told him I wasn't sure what to use for an exercise for my students inLocal...

Making a Face Memorable
From The Eponymous Pickle

Making a Face Memorable

In MIT News:   Never forget a face .... New algorithm uses subtle changes to make a face more memorable without changing a person’s overall appearance. .... Two...

Interactive Story Telling and Decision Models
From The Eponymous Pickle

Interactive Story Telling and Decision Models

On interactive story telling:A paper I was pointed to that presents an expertise plus simulation based method for smart energy demand management ... With similarities...

So What is Hadoop?
From The Eponymous Pickle

So What is Hadoop?

Forrester has a short video that explains, at a very general level, the technology behind the idea. Good as a broad description of the idea, but not something I...

Classifying Data Scientists
From The Eponymous Pickle

Classifying Data Scientists

How do you classify data scientists?  A taxonomy of sorts.  Which is usually a good thing to agree on if you can.

Eben Moglen and I Talk about the NSA
From Schneier on Security

Eben Moglen and I Talk about the NSA

Last week, Eben Moglen and I had a conversation about NSA surveillance. Audio and video are online.

Misteaks During Classroom Demos
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Misteaks During Classroom Demos

Most teachers make mistakes in class. I know that I do. Sometimes it is a typo. Or a slip of the tongue. Sometimes it is because we forget something and sometimes...

People powered data
From Putting People First

People powered data

Geoff Mulgan, CEO of Nesta (the UK innovation charity), writes that in 2014 the growing movement to take back control of personal data will reach a tipping point...

Screen Life: The View from the Sofa
From Putting People First

Screen Life: The View from the Sofa

A new study carried out for Thinkbox by COG Research and designed to help the advertising community understand the context of multi-screening (watching TV and simultaneously...

AI as Our Final Invention
From The Eponymous Pickle

AI as Our Final Invention

In the WP:  A perhaps scary look at what AI can ultimately lead to.   This has been discussed for a long time.    I am inclined to be optimistic here.  Sure there...

Computing Innovations Abundant in the CNN 10: Ideas List
From The Computing Community Consortium Blog

Computing Innovations Abundant in the CNN 10: Ideas List

“Bold ideas are the currency of our knowledge economy and the lifeblood of our advancement as a culture.” – CNN 10: Ideas List Recently CNN put together a list...

Leveraging the Supply Chain
From The Eponymous Pickle

Leveraging the Supply Chain

In Logistics Viewpoints:Ways to best leverage supply chain as strategy, cost center When collaborating with shippers, companies should first consider how they view...

Four Words of Persuasion
From The Eponymous Pickle

Four Words of Persuasion

More from Roger Dooley:    " ... Want to double your success in persuading people to do as you ask? Four simple words, and even other phrases with the same meaning...

Final Topics for My Intro to CS Course
From The Female Perspective of Computer Science

Final Topics for My Intro to CS Course

With the final exam over with, it's finally time to reflect on this semester's offering of my version of our 'Introduction to Computer Science I' course for non...

Google and Robotics: iRobots view
From The Eponymous Pickle

Google and Robotics: iRobots view

In Mashable:  Notably Google did not buy probably the best known MIT robotics spin off: iRobot. What is iRobot's take on that?  " ... Why iRobot's CEO WelcomesAngle...

IBM on Big Data
From The Eponymous Pickle

IBM on Big Data

Following is interesting, just starting to ingest:Blueprints for Value:This is Part 1 in a 14 part series that is my attempt to present, in small easily consumable...

From Computational Complexity

Security Changes

A couple of policy changes recently, one that supposedly enhances privacy and another that could reduce it. Google has been implementing perfect forward secrecy...

Acoustic Cryptanalysis
From Schneier on Security

Acoustic Cryptanalysis

This is neat: Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...

An Hour of Code–Now What?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

An Hour of Code–Now What?

By just about any of the usual measures (people involved, media attention, VIP endorsements) this year’s CS Education Week was a huge success. We’ve had a couple...

I'm Using Python Now
From updated sporadically at best

I'm Using Python Now

I have a confession. All these years I've been evangelizing strongly statically typed languages, I've been going home at night and using Python. Not all the time...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account