acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Local Reductions

With the STOC deadline passing on Monday, now is a good time to look at the arXiv to see what has been posted since then. Hamid Jahanjou, Eric Miles and Emanuele...

A Fraying of the Public/Private Surveillance Partnership
From Schneier on Security

A Fraying of the Public/Private Surveillance Partnership

The public/private surveillance partnership between the NSA and corporate data collectors is starting to fray. The reason is sunlight. The publicity resulting from...

DARPA Learning Machines
From The Eponymous Pickle

DARPA Learning Machines

New kinds of machine learning have been an emphasis of DARPA.  In Wired,   " ... The Pentagon’s blue-sky research agency is readying a nearly four-year projectWhen...

Online Professional Learning Communities for CS Teachers
From Computer Science Teachers Association

Online Professional Learning Communities for CS Teachers

Last week, the NSF brought together leaders of the CS10K effort to discuss potential online supports for teachers and students in computer science. Though the concept...

Storytelling Nodes of New Technologies
From The Eponymous Pickle

Storytelling Nodes of New Technologies

If you have followed this space for a long time, you know I cover many technologies and their implications.  Most of which I started looking at in the enterprise...

Shapeshifting Touch Display
From The Eponymous Pickle

Shapeshifting Touch Display

An example of virtual interaction. " ... The Tangible Media Group at MIT's Media Lab has unveiled a futuristic display made of atoms, not pixels. We live in an...

Microsoft Retiring SHA-1 in 2016
From Schneier on Security

Microsoft Retiring SHA-1 in 2016

I think this is a good move on Microsoft's part: Microsoft is recommending that customers and CA's stop using SHA-1 for cryptographic applications, including use...

Walmart v Amazon
From The Eponymous Pickle

Walmart v Amazon

The last battle?  In Knowledge@Wharton.  For dominance in retail. " ... In the retail realm, it’s a clash of the titans: Walmart, the world’s largest retailer,But...

One Way to Study for Exams
From The Female Perspective of Computer Science

One Way to Study for Exams

For both my classes, I put together a study guide that included some general tips on studying as well as what topics to focus on.  Since the general advice works...

Blending Data is Good
From The Eponymous Pickle

Blending Data is Good

It has been some time since I looked at the vendor Pentaho.  Examined it for use in the enterprise.  I noticed that they have something called the data blend of...

AmStatNews highlights CCC as Influential to the Research Community!
From The Computing Community Consortium Blog

AmStatNews highlights CCC as Influential to the Research Community!

A post this week in AmStatNews, the membership magazine of the American Statistical Association, is a ringing endorsement of CCC’s activities: “On the topic of...

Breaking New Ground: Robot Rings NASDAQ Closing Bell
From The Computing Community Consortium Blog

Breaking New Ground: Robot Rings NASDAQ Closing Bell

On Tuesday, November 12, 2013, the first non-human rang the closing bell on the NASDAQ stock market. A robotic arm was selected to ring the bell to mark the launch...

DB Pedia
From The Eponymous Pickle

DB Pedia

Can a semi-structured text database like the Wikipedia be used to extract structured data?  This is the goal of the DbPedia: " ... DBpedia is a crowd-sourced community...

Georgia Tech on Wearable
From The Eponymous Pickle

Georgia Tech on Wearable

What are the cultural and social aspects of wearable computing?  A Ga Tech researcher addresses.  While I agree this is an issue, you could, and some did make the...

Another QUANTUMINSERT Attack Example
From Schneier on Security

Another QUANTUMINSERT Attack Example

Der Speigel is reporting that the GCHQ used QUANTUMINSERT to direct users to fake LinkedIn and Slashdot pages run by -- this code name is not in the article --reacted...

Google Code-in 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Google Code-in 2013

This went out to the CSTA Member mailing list tonight. Thought it was worth sharing. Beginning Monday, November 18th, 13-17 year old pre-university studentsgoogle...

2013 Business Intelligence Symposium
From The Eponymous Pickle

2013 Business Intelligence Symposium

Register now to attend the 2013 Business Intelligence Symposium offered through the Center for Business Analytics in the Carl H. Lindner College of Business atThe...

Life is short: pick good ideas!
From Daniel Lemire's Blog

Life is short: pick good ideas!

Some of us work hard to generate new ideas. All of us train on how to implement ideas. But our days look like this: I have 100 ideas. I write down 50 of them. The...

Millennials and Shopper Marketing
From The Eponymous Pickle

Millennials and Shopper Marketing

In Smartblogs: The rise of the omni-channel shopper in the millennial.  The link below is also of interest and new to me." ... The Coca-Cola Company sponsors this...

Cryptographic Blunders Revealed by Adobe's Password Leak
From Schneier on Security

Cryptographic Blunders Revealed by Adobe's Password Leak

Adobe lost 150 million customer passwords. Even worse, they had a pretty dumb cryptographic hash system protecting those passwords.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account