acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Project C-43: A Final Piece of Public-Key Cryptography History
From Schneier on Security

Project C-43: A Final Piece of Public-Key Cryptography History

This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...

P&G Takes IT Work from India
From The Eponymous Pickle

P&G Takes IT Work from India

Via my UK consultant, in the India Times.  P&G aims to cut down outsourced IT work in India.  A surprise which is making Indian vendors nervous.

Strategy's Tough Choices
From The Eponymous Pickle

Strategy's Tough Choices

Came late to my inbox.  In the HBR's blog in late May.  Former and current P&G's CEO AG Lafley  on Strategy's Tough Choices.  A video.

Computing Community Consortium Announces New Council Members and Executive Committee
From The Computing Community Consortium Blog

Computing Community Consortium Announces New Council Members and Executive Committee

The Computing Research Association (CRA), in consultation with the National Science Foundation (NSF), has appointed five new members to the Computing Community...

Fracturing of Corporate IT
From The Eponymous Pickle

Fracturing of Corporate IT

In CIO Insight:  Different and becoming more so.  Not going away, as some say, standards and security still need to exist.  But the nature of enterprise IT is changing...

Data Visualization Startup
From The Eponymous Pickle

Data Visualization Startup

First I had heard of this.  A simple to use solution by former Facebook employees.  Probably for everyday visual data solutions.   See Polychart.

Blowback from the NSA Surveillance
From Schneier on Security

Blowback from the NSA Surveillance

There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...

Interesting Links 17 June 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 17 June 2013

First Monday of “summer vacation” and my grading is done and have been submitted. You know what that means! Yep, working on my lesson plans for August. Two brand...

Networked Things
From The Eponymous Pickle

Networked Things

A good overview of the current state of the network of things.  Which points back to our own experiments with networked refrigerators, in that nexus of the modern...

Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)
From CERIAS Blog

Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)

By Mark Rasch† and Sophia Hannah‡ Last post, we wrote about the NSA‟s secret program to obtain and then analyze the telephone metadata relating to foreign espionage...

Failure of Design Thinking
From The Eponymous Pickle

Failure of Design Thinking

In Innovation Excellence:  Interesting thoughts on the failure of design thinking.   A little muddled, but I do think there must be a stronger combination of business...

The Uncomfortable CEO
From The Eponymous Pickle

The Uncomfortable CEO

Former colleague José Ignacio Sordo Galarza  has a new site: The Uncomfortable CEO.   I will follow with more about his new book mentioned: " ... Exceptional CEOs...

From Gödel's Lost Letter and P=NP

Happy Father’s Day

And the mother who gave it to us Sonora Dodd is widely credited with the creation of Father’s Day. The first one was organized by her in Spokane, Washington in...

Deep Learning with Neural Nets
From The Eponymous Pickle

Deep Learning with Neural Nets

In CACM:  Deep learning finally comes of age.  Still a bit skeptical about what deep really means here.  I need it it be useful.   We used neural nets extensively...

Glass to Create Huge Data?
From The Eponymous Pickle

Glass to Create Huge Data?

Via Gib Bassett:  Will Glass make Big Data into Huge Data? Yes, definitely if it becomes popular, and something like it will, we will be collecting increasing amounts...

Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)
From CERIAS Blog

Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)

By Mark Rasch† and Sophia Hannah‡ The NSA programs to retrieve and analyze telephone metadata and internet communications and files (the former we will call the...

Monetizing Mobile
From The Eponymous Pickle

Monetizing Mobile

In the midst if a mobile application.  But the value will be in efficiency, connectivity and supporting decisions from anywhere.  Not advertising dollars from consumers...

From Gödel's Lost Letter and P=NP

The Mathematics Of Dieting

Yes there are math issues in this activity William Banting may have created the first very popular diet. In 1863 he published the Letter on Corpulence, Addressed...

AP CS Principles Course Moves One Step Closer
From Computer Science Teachers Association

AP CS Principles Course Moves One Step Closer

This morning the College Board announced that the National Science Foundation has committed $5.2 million in funding to support the continued development of theBroadening...

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
From Schneier on Security

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid

It's a novel behavior. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account