acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Software Developers – Apply to Join the White House “Hackathon” on June 1
From U.S. Public Policy Committee of the ACM

Software Developers – Apply to Join the White House “Hackathon” on June 1

The White House is accepting applications from software developers and hands-on technology experts to participate in a day of national service at the White House...

Mayo Clinic Center for Innovation
From The Eponymous Pickle

Mayo Clinic Center for Innovation

A connection pointed me to the Mayo Clinic Center for Innovation lab.   A very broad mix of capability areas.   Reminding me of similar work at Procter & Gamble...

Friday Squid Blogging: Illegal Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal Squid Fishing

While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...

Tech Talk #3: Stephen Elliot (Summary)
From CERIAS Blog

Tech Talk #3: Stephen Elliot (Summary)

Thursday, April 4th, 2013 Associate Professor Stephen Elliott, Industrial Technology, Purdue University Director, Biometric Standards, Performance and Assurance...

Bar Code Ticker
From The Eponymous Pickle

Bar Code Ticker

A Wired Article reminded me of the nonprofit organization GS1, which I worked with for years.  Among many other things they establish bar code standards.  The work...

Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity
From CERIAS Blog

Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity

Thursday April 4, 2013 Summary by Marquita A. Moreland During the introduction, Professor Spafford discussed Mark Weatherford's experience prior to becoming Deputy...

Panel 3: Security Education and Training (Panel Summary)
From CERIAS Blog

Panel 3: Security Education and Training (Panel Summary)

Thursday, April 4th, 2013 Panel Members: Diana Burley, Associate Professor of Human and Organizational Learning, George Washington University Melissa Dark, Professor...

Writing Apps to Empower Girls and Help the World
From Computer Science Teachers Association

Writing Apps to Empower Girls and Help the World

There has been a lot of discussion lately about the dearth of computer scientists in the workforce, and the corollary, the need to teach computer science to help...

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)
From CERIAS Blog

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Cathy Tilton, VP Standards and Technology, Daon Solutions Elisa Bertino, Professor, Computer Science and CERIAS Fellow...

From Computational Complexity

You should apply for STOC and/or CCC travel money (students)

Once again there is some money from ACM and from NSF for students to goto STOC, and I am the one to send the applications to. The link for info on how to apply...

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)
From CERIAS Blog

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Alok Chaturvedi, Professor, Management, Purdue University Samuel Liles, Associate Professor, Computer and Information...

Informatics Education Report in Europe – they get it!
From The Computing Community Consortium Blog

Informatics Education Report in Europe – they get it!

A joint report of Informatics Europe and the ACM Europe Working Group on Informatics Education was recently released.  The report highlights what is currently being...

Big Data Applications Survey
From The Eponymous Pickle

Big Data Applications Survey

Interesting survey of applications. " ... While most companies intend to invest in big data technologies, a lack of human resources and know-how keeps them from...

When is Augmented Reality the Right Choice?
From The Female Perspective of Computer Science

When is Augmented Reality the Right Choice?

Last fall, we published a paper about augmented reality, cognitive theories, and learning. I previously wrote about the design advantages of AR; these give insight...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...

The Book Reimagined by Video Game Makers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Book Reimagined by Video Game Makers

VIDYA BOOKS: the book, as reimagined by video game makers is a Kickstarter project that is being spearheaded by someone I met while I was at Microsoft. Joe Booth...

IBM and Flash Memory
From The Eponymous Pickle

IBM and Flash Memory

IBM reports that it will invest $1 Billion in Flash memory development.  In particular, this can point to fast analytics solutions for Big Data Applications.  ...

OSI License Clinic
From Wild WebMink

OSI License Clinic

In a new departure, the Open Source Initiative will hold a small open source license clinic oriented towards US Federal agencies. The event will be at the Library...

#wethedata
From Putting People First

#wethedata

Right now, data may be what we intentionally share, or what is gathered about us – the product of surveillance and tracking. We are the customer, but our data are...

Insights from network data analysis that yield field observations
From Putting People First

Insights from network data analysis that yield field observations

As part of Ethnomining, the April 2013 Ethnographymatters edition on combining qualitative and quantitative data, edited by Nicolas Nova, Fabien Girardin describes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account