acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSF and NICT of Japan Announce Partnership in Next-Generation Networking
From The Computing Community Consortium Blog

NSF and NICT of Japan Announce Partnership in Next-Generation Networking

Yesterday the National Science Foundation (NSF) and the National Institute of Information and Communications Technology (NICT) of Japan signed a memorandum of understanding...

Three questions about e-learning in college
From Daniel Lemire's Blog

Three questions about e-learning in college

Timothy Taylor observes that research about online instruction tells us that online teaching is just as effective as classroom teaching. The main drawback of asynchronous...

Why We Lie
From Schneier on Security

Why We Lie

This, by Judge Kozinski, is from a Federal court ruling about false statements and First Amendment protection Saints may always tell the truth, but for mortals...

White House Open Data Executive Order Echoes USACM Recommendations
From U.S. Public Policy Committee of the ACM

White House Open Data Executive Order Echoes USACM Recommendations

In early May the White House issued an Executive Order outlining a policy to make open and machine readable the ‘default’ for new and ‘modernized’ government information...

Nanotechnology Careers
From Computer Science Teachers Association

Nanotechnology Careers

The career prospects look bright for CS graduates and according to the Kiplinger Management Group Letter there is an exciting reason for the news. Amazing new...

Are We Finally Thinking Sensibly About Terrorism?
From Schneier on Security

Are We Finally Thinking Sensibly About Terrorism?

This article wonders if we are: Yet for pretty much the first time there has been a considerable amount of media commentary seeking to put terrorism in context...

You Never Know Who The Computer Science People Are
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

You Never Know Who The Computer Science People Are

Apparently  Justine Bateman, yes Justine Bateman the actress who played superficial Mallory Keaton on Family Ties, has started a new role as a college freshmenGet...

Princesses, Dragons, and Assigning Numbers to Stories
From The Female Perspective of Computer Science

Princesses, Dragons, and Assigning Numbers to Stories

I've been working on a prototype story for my thesis project ("Coherent Emergent Stories").  Although I have a couple of stories on the go (such as the one I made...

Smart Devices Making Us Dumber
From The Eponymous Pickle

Smart Devices Making Us Dumber

In CIOInsight:  Sounds much like the argument being made not so long ago about the use of calculators and before that,  slide rules.   Were we being dumbed down...

Brainwashed, the Overreach of Neuroscience
From The Eponymous Pickle

Brainwashed, the Overreach of Neuroscience

Just received, Brainwashed: The Seductive Appeal of Mindless Neuroscience  by  Sally Satel  and Scott O. Lilienfeld  I was interviewed for this book and read an...

From Gödel's Lost Letter and P=NP

Kenneth and Laurel Appel, In Memoriam

Mapping out the landscape of a proof composite of src1, src2 Kenneth and Laurel Appel, our friend Andrew Appel’s father and sister, passed away in the past two...

Nassim Nicholas Taleb on Risk Perception
From Schneier on Security

Nassim Nicholas Taleb on Risk Perception

From his Facebook page: An illustration of how the news are largely created, bloated and magnified by journalists. I have been in Lebanon for the past 24h, and...

Advice for Returning CEOs
From The Eponymous Pickle

Advice for Returning CEOs

Knowledge @ Wharton provides a history and analysis of returning CEOs,  see my note on P&G's AG Lafley's return.    Asking if the 'Gamble' will pay off.  Instructive...

Challenges for Health in a Networked Society
From Apophenia

Challenges for Health in a Networked Society


Resurgent CDB
From Wild WebMink

Resurgent CDB

Reblogged from Meshed Insights & Knowledge: What does the Woolwich murder teach us about the need for the Communications Data Bill? Nothing at all; the security...

Whats New on Lafely's List
From The Eponymous Pickle

Whats New on Lafely's List

In AdAge:  I liked the fact that his predecessor, Bob McDonald, seemed to be emphasizing the analytical in finding ways to improve business.  Yet soon found that...

Analytics Summit this Friday
From The Eponymous Pickle

Analytics Summit this Friday

Last chance, this Friday .... contact numbers below ... I unfortunately will be out of town, but looks to be good." ... Analytics Summit 2013  will be held on May...

Rise of Mobile Only
From The Eponymous Pickle

Rise of Mobile Only

In a look at potential C suite users for business intelligence applications we quickly discovered a large number of users that are now mobile only.   More thanThe...

From Computational Complexity

Theory Jobs 2013

Time for the annual spring jobs posts. Like last year, I set up a Google Spreadsheet that everyone can edit so we can crowd source who is going where next year....

The Politics of Security in a Democracy
From Schneier on Security

The Politics of Security in a Democracy

Terrorism causes fear, and we overreact to that fear. Our brains aren't very good at probability and risk analysis. We tend to exaggerate spectacular, strange and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account