acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

Cloud Reshaping Software Needs
From The Eponymous Pickle

Cloud Reshaping Software Needs

In Bain & Company:  How the cloud is reshaping the business of software.  Very true.  Some interesting statistics embedded.   In my experience just this week I...

MS Faculty Summit Day One
From My Biased Coin

MS Faculty Summit Day One

Day one of the faculty summit was a great deal of fun.  Primarily, I found I enjoyed catching up with people -- I saw a number of past/current collaborators, as...

Recent NSF Program Solicitations
From The Computing Community Consortium Blog

Recent NSF Program Solicitations

The NSF has recently issued three new program solicitations: Secure and Trustworthy Cyberspace (SaTC), Computer and Network Systems (CNS): Core Programs, and Information...

Challenges and Vision Track at Robotics: Science and Systems (RSS) 2013 Conference
From The Computing Community Consortium Blog

Challenges and Vision Track at Robotics: Science and Systems (RSS) 2013 Conference

The following entry is a special contribution to this blog from Hamidreza Chitsaz, Assistant Professor at Wayne State University. This year Hamidreza and Moslem...

Crafting a Sustainable Career
From The Eponymous Pickle

Crafting a Sustainable Career

In the HBR Blog.  (This apparently now requires a free registration)  Some thoughts about how to establish a long term career.  At first I had a problem with the...

Active Learning in Large Lectures
From The Female Perspective of Computer Science

Active Learning in Large Lectures

One of my (self-assigned) tasks lately has been to go through my teaching notes before I start planning my fall courses.  The latest topic I dug into was teaching...

Saving Money in the Cloud
From The Eponymous Pickle

Saving Money in the Cloud

In Teradata Magazine:  Agility and cost savings in the cloud. " ... Increasing the bottom line is critical for companies, and the cloud can save them money. In...

Mining the Social Web for Recruiting
From The Eponymous Pickle

Mining the Social Web for Recruiting

What recruiters know about you, whether you are looking for another job or not.  And new developments in these areas.   Note the combination of search with knowledge...

Zeebox Can Listen in
From The Eponymous Pickle

Zeebox Can Listen in

In Engadget:  And it can tell what you are listening through analyzing an audio fingerprint. More data and less privacy?

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...

Windows Phone Random Dialer Demo
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows Phone Random Dialer Demo

This is posted on day two of the annual CSTA Conference. This afternoon I am taking part in a mobile developer throw down. Three of us are writing the same program...

Hill Tech Happenings, Week of July 15
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 15

July 17 Hearing: The Senate Finance Committee will hold a hearing on health information technology 10 a.m., 215 Dirksen Building Subcommittees of the House Homeland...

From Computational Complexity

A problem and later a story and a point.

I have (1) a math problem to tell you about (though I suspect many readers already know it), (2) a story about it, and (3) a point to make. TODAY I'll just do the...

Customers Provide Marketing Value
From The Eponymous Pickle

Customers Provide Marketing Value

I always thought this approach was obvious, but it is nice to have it restated here.    Get your best marketing materials directly from your customers.  Now there...

Predicting Earthquakes with Smartphones
From The Eponymous Pickle

Predicting Earthquakes with Smartphones

An interesting example of using a network of smartphones as sensors, and converting that data into a form that can detect earthquakes and then communicate them"...

NSF Expeditions in Computing PI Meeting Synopsis
From The Computing Community Consortium Blog

NSF Expeditions in Computing PI Meeting Synopsis

The following is a special contribution to this blog from our Vice Chair Gregory Hager (Johns Hopkins University). In the following entry Greg reflects on the first...

Stanford's Startup Garage
From The Eponymous Pickle

Stanford's Startup Garage

An Overview of Stanford's Startup Garage Course.  From the perspective of innovation vs Invention.  Have heard of this course, but this is the first detailed view...

Boosting in-store Sales
From The Eponymous Pickle

Boosting in-store Sales

In Journal Gazette: On boosting in-store sales:" More food retailers are getting in on the technology game, offering multiple options to boost convenience and compete...

Walls Around Nations
From Schneier on Security

Walls Around Nations

A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account