acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

American Computer Science League (ACSL)
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

American Computer Science League (ACSL)

This was posted to the CSTA announcement list. I don’t have first hand experience but I hear good things. Computer contests for high school students are available...

Augmented Pixels Reality Hoops Game
From The Eponymous Pickle

Augmented Pixels Reality Hoops Game

This continues my conversations with developers in the Augmented reality space. Here with the Ukranian firm Augmented Pixels. A new free game developed and then...

Shifting Urban Landscape Report
From The Eponymous Pickle

Shifting Urban Landscape Report

Most interesting and timely report from McKinsey: Urban world: The shifting global business landscape.  With lots of interesting graphics and statistics." ... Emerging...

Data Scientist Code of Professional Conduct
From The Eponymous Pickle

Data Scientist Code of Professional Conduct

I still have my doubts over the longevity of the term 'Data Scientist',  and now they are creating a professional society and a code of conduct." ... Data Scientists...

Silk Road Author Arrested Due to Bad Operational Security
From Schneier on Security

Silk Road Author Arrested Due to Bad Operational Security

Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site. Despite the elaborate technical underpinnings, however, the...

Alex Sopko Now Writing for the Washington Times
From The Eponymous Pickle

Alex Sopko Now Writing for the Washington Times

Have always been a journalist at heart.  There are useful news stories lined up in my head waiting to emerge.  I particularly love to see examples of how young"...

What Are You Doing for Hour of Code?
From Computer Science Teachers Association

What Are You Doing for Hour of Code?

That was the question I was asked in an email from a colleague who teaches in a neighboring district. I had thought about it but not in depth. It had been mentioned...

Health Care Innovation
From The Eponymous Pickle

Health Care Innovation

HBR establishes a health care innovation center site.  " ...  Leading Health Care Innovation, a collaboration of the editors of the Harvard Business Review and...

Computational Art Using Processing for CS0 / GHC13
From The Female Perspective of Computer Science

Computational Art Using Processing for CS0 / GHC13

I love the curriculum that Zoe Wood and Julie Workman created for their school's CS0 course and that they spoke about at GHC13.  It uses Processing, like the CS1...

Review Group on Intelligence and Communications Technologies Hears from USACM
From U.S. Public Policy Committee of the ACM

Review Group on Intelligence and Communications Technologies Hears from USACM

In light of the leaks surrounding U.S. national intelligence surveillance efforts, President Obama appointed a group to review those programs to determine if they...

Effectiveness of Analytics
From The Eponymous Pickle

Effectiveness of Analytics

A good piece on the problem.  But ultimately it is ROI that talks.   And making sure that decision makers get the word of what is happening.    Before, during and...

Consumer Products and Robotics
From The Eponymous Pickle

Consumer Products and Robotics

Consumer products taking cues from robotics. We did this early on.  But the economics ultimately did not make sense.  " ... Smart thermostats, drones and other...

From Computational Complexity

P vs NP is Elementary? No-- P vs NP is ON Elementary

As I am sure you all know, the TV show Elementary  (Premise- Sherlock Homes in Modern Day NY. He emails and Texts!  Watson is a female! and...) had an episode that...

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
From Schneier on Security

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...

Interesting Links 7 October 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 7 October 2013

I’m staring off today with two other sets of links. Some good resource lists created by some friends of mine. Joe Kmoch has a great list of CS and IT educational...

Happy Anniversary—Bang My Head Against A Wall
From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...

Happy Anniversary—Bang My Head Against A Wall
From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...

Happy Anniversary—Bang My Head Against A Wall
From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...

Happy Anniversary—Bang My Head Against A Wall
From CERIAS Blog

Happy Anniversary—Bang My Head Against A Wall

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...

Quoting in My Blog Posts
From The Eponymous Pickle

Quoting in My Blog Posts

I was asked about how I do quotes in blog posts.    Quotes are always placed in italics, and then embedded in quote marks.  Ellipses are usually included to indicate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account