acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Technology Autonomy
From The Eponymous Pickle

Technology Autonomy

Had not heard the term before, but it relates to how strongly an IT department can act as a gatekeeper to software, in this new era of 'Bring Your Own' tools.  ...

An Hour of Code–Something for CS Ed Week 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

An Hour of Code–Something for CS Ed Week 2013

At the CSTA Conference earlier this week Hadi Partovi from Code.Org announced some plans for this year’s Computer Science Education Week. Specifically providing...

Knowledge @ Wharton for High School
From The Eponymous Pickle

Knowledge @ Wharton for High School

I have always enjoyed the Wharton series of papers and videos. I just noticed that they had a series of posts especially designed for High School Students.  ...

MS Faculty Summit Day Two
From My Biased Coin

MS Faculty Summit Day Two

Day Two of the summit started with a keynote shared between Peter Lee and Jeannette Wing, who now seem to be sharing heading up Microsoft research.  (Rick Rashid...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Library of Congress Legislative Data Challenge: Markup of U.S. Legislation in Akoma Ntoso
From U.S. Public Policy Committee of the ACM

Library of Congress Legislative Data Challenge: Markup of U.S. Legislation in Akoma Ntoso

The Library of Congress invites the public to participate in its first Legislative Data Challenge. The winning solution will provide the most effective representation...

Computing and Communication Foundations Program Solicitation
From The Computing Community Consortium Blog

Computing and Communication Foundations Program Solicitation

The NSF has recently issued a new program solicitation – Computing and Communication Foundations (CCF): Core Programs.  According to the solicitation, “The Division...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

CPG Use of Big Data
From The Eponymous Pickle

CPG Use of Big Data

In Progressive Grocer:  A good piece on how the CPG is using Big Data.    " ... Retailers and consumer packaged goods companies that are applying big data analytics...

Virtual Sandbox
From The Eponymous Pickle

Virtual Sandbox

Brought to my attention for a project that will require more than the usual amount of malicious software security.  A virtual sandbox called Sandboxie that prevents...

Competing Rapidly With Web Intelligence
From The Eponymous Pickle

Competing Rapidly With Web Intelligence

Last month I gave a talk to a large company that is actively looking for new ways to compete. They have long been seen as a lower cost, but less innovative service...

Emergence of the Smartwatch
From The Eponymous Pickle

Emergence of the Smartwatch

In GigaOM:  A not unexpected development.  2014 seems to be the year for broad delivery.  How will this influence the more personal uses of the smartphone?  Will...

ROI of Gamification
From The Eponymous Pickle

ROI of Gamification

A simple but still  incomplete view of the ROI of gamification.  The same approach can be seen for many kinds of applications.      " ... Measuring ROI is an elusive...

CS Educator Interview: Tom Indelicato
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Tom Indelicato

I didn’t go far from home for this one. Tom Indelicato and I teach together at Bishop Guertin High School. Some years ago I hired him to be the fill a need for...

House Committee on Ways and Means Invites Public Submissions on President Obama’s Trade Policy Agenda
From U.S. Public Policy Committee of the ACM

House Committee on Ways and Means Invites Public Submissions on President Obama’s Trade Policy Agenda

The House Committee on Ways and Means is accepting public statements for the record for Thursday’s hearing on President Obama’s trade policy agenda. The deadline...

House Hearing on Mens Rea in Federal Criminal Law on July 19
From U.S. Public Policy Committee of the ACM

House Hearing on Mens Rea in Federal Criminal Law on July 19

Friday, July 19 House Hearing on “Mens Rea: The Need for a Meaningful Intent Requirement in Federal Criminal Law” House Judiciary Committee Friday July 19, 9 a.m...

Highlights from Clayton Lewis on “The Future of Inclusive Design”
From U.S. Public Policy Committee of the ACM

Highlights from Clayton Lewis on “The Future of Inclusive Design”

At the FCC today, Computer Science Professor Clayton Lewis asserted a new paradigm for accessibility is emerging and that this paradigm may require changes to public...

2013 Microsoft Research Faculty Summit – OFF THE CHARTS
From The Computing Community Consortium Blog

2013 Microsoft Research Faculty Summit – OFF THE CHARTS

It’s impossible to convey how great this year’s Microsoft Research Faculty Summit has been:  a “who’s who” of attendees from academia; heavy participation by top...

From Computational Complexity

DUMP YOUR TABLES! (the moral of my story that started with a hat problem)

Recall from my last post: PROBLEM 1: There are n people sitting on chairs in a row. Call them p1,...,pn. They will soon have HATS put on their heads, RED or BLUE...

Data Virtualization
From The Eponymous Pickle

Data Virtualization

A very good overview of what is called data virtualization:" Data virtualization allows an organization to make its enterprise data easily available to business...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account