acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Time Series Back Again
From The Eponymous Pickle

Time Series Back Again

An article suggests that Time Series are Back.  Not they have ever been gone.   Used them every day in the enterprise.   Yet as we gather more time stamped data...

Boredom Drives Creativity
From The Eponymous Pickle

Boredom Drives Creativity

In Fastcompany.  Is boredom a key part of creativity?  And do our new devices keep us from getting bored and thus stifle our creativity?  I suggest that boredom...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

House Intelligence Committee Tries Again With CISPA
From U.S. Public Policy Committee of the ACM

House Intelligence Committee Tries Again With CISPA

On April 10 the House Intelligence Committee will review H.R. 624, the Cyber Intelligence Sharing and Protection Act. The Committee approved an almost identical...

Guest Post by Mikkel Thorup : Results vs. Techniques
From My Biased Coin

Guest Post by Mikkel Thorup : Results vs. Techniques

[Mikkel Thorup graciously has offered a guest blog post, discussing what he looks for in conference papers, and possible implications for refereeing.] Results versus...

Design Advantages of Augmented Reality
From The Female Perspective of Computer Science

Design Advantages of Augmented Reality

Last fall, we published a paper about augmented reality, cognitive theories, and learning.  One of the tasks of the work was to specifically define what the design...

Robotics Week: Free Robotics App
From The Eponymous Pickle

Robotics Week: Free Robotics App

IEEE Spectrum tells us that this week is Robotics week.  In honor of that they are offering a free App that covers many aspects of Robotics research and application...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...

How to increase donations to an open source project
From Wild WebMink

How to increase donations to an open source project

Reblogged from Ian Skerrett: Lots of open source projects raise money from their user communities by soliciting donations.  Most open source projects will have...

Data Driven Programming
From The Eponymous Pickle

Data Driven Programming

In Adage:  An emerging era for data driven programming.  Programming media, not programming computers.  Not really new, we explored this for decades, optimizing...

The 2013 Data 2.0 Summit
From Daniel Lemire's Blog

The 2013 Data 2.0 Summit

The Data 2.0 Summit will be held in San Francisco at the end of the month (April 30th 2013). Some of the speakers might interest the readers of this blog. For example...

Symposium on Visions on the Theory of Computing
From The Computing Community Consortium Blog

Symposium on Visions on the Theory of Computing

In conjunction with the Simons Institute for the Theory of Computing, we are pleased to announce that registration is now open for a Symposium on Visions on the...

Lecture, Demo, Project
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Lecture, Demo, Project

Or perhaps hear, see, do? I was asked about my teaching last week. What would my ideal class period look like. It was as they say a thinker. What I have been trying...

Bitcoins in the Mainstream Media
From Schneier on Security

Bitcoins in the Mainstream Media

Interesting article from the New Yorker. I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...

Book: Service Design by Industrial Designers
From Putting People First

Book: Service Design by Industrial Designers

Service Design by Industrial Designers By Froukje Sleeswijk Visser Technical University Delft 2013, 104 pages Design practice is changing. The applications of design...

A Plan for Big Data
From The Eponymous Pickle

A Plan for Big Data

In McKinsey Quarterly:  A good piece about planning for Big Data projects and value.   The detailed article makes a considerable  parallel to strategic planning...

It's a Rosie the Riveter Moment!
From Computer Science Teachers Association

It's a Rosie the Riveter Moment!

Ayna Agarwal and Ellora Israni, Stanford University computer science students who refer to themselves as "good girls gone geek," are the founders of she++. She...

We are  sentenced to permanent cognitive stretching
From Daniel Lemire's Blog

We are sentenced to permanent cognitive stretching

If you want to get better at something, should remain in your comfort zone? Or should you, rather, be exposed to ideas or techniques slightly beyond your reach?...

Elite Panic
From Schneier on Security

Elite Panic

I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...

Best Reviews & Notable Books and Articles of 2012
From The Computing Community Consortium Blog

Best Reviews & Notable Books and Articles of 2012

Computing Reviews (an ACM/ThinkLoud publication) has released the 2012 Best Reviews & Notable Books and Articles in Computer Science. The Best Review of 2012 is...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account