acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

End of the Public Phone Network
From The Eponymous Pickle

End of the Public Phone Network

In IEEE Spectrum:   Will this system end by 2018?    The 134 year old public phone network is dying.  What are the implications of changes to the network and how...

Predicting A Supply Chain Network of Fast Data
From The Eponymous Pickle

Predicting A Supply Chain Network of Fast Data

I don't normally like yearly predictions.  But I found these to be thought provoking.  They all deal with the long proposed suggestion that increasingly transparent...

Decepticons
From The Eponymous Pickle

Decepticons

Research at Ga Tech is using 'deception' methods used in nature to enhance behavioral models.  Have always been interested in biological models.  They have often...

The Future Belongs To The Creators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Future Belongs To The Creators

A lot of people are thinking about the future this time of year. I’ve got a few ideas myself. This is the year I’ve done a lot with apps on phones and tablets....

Breaking Hard-Disk Encryption
From Schneier on Security

Breaking Hard-Disk Encryption

The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work? Elcomsoft Forensic Disk...

From Computational Complexity

2012 Complexity Year in Review

As we turn our thoughts from Turing to Erdős, a look back at the complexity year that was. Written with help from co-blogger Bill Gasarch. The complexity result...

Public Shaming as a Security Measure
From Schneier on Security

Public Shaming as a Security Measure

In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...

Changing Perceptions of Big Data
From The Eponymous Pickle

Changing Perceptions of Big Data

From Inside Analysis.  Here I disagree in one sense and agree in another. .  It is true that it has never entirely been about the size of the data.  What we have...

On News Aggregation: Added Value Facts
From The Eponymous Pickle

On News Aggregation: Added Value Facts

In CACM:  News aggregation is a common thing in the internet.  Many sites and blogs find news in their specialty areas, and the results are redistributed to different...

$99 Tablet
From The Eponymous Pickle

$99 Tablet

Akin to the $99 laptop, the $99 tablet, which I wrote about in the enterprise some long time ago with the hope of getting some support to drive it world-wide.  Is...

Reinventing American Manufacturing – The Role of Innovation
From The Computing Community Consortium Blog

Reinventing American Manufacturing – The Role of Innovation

An excellent article by MIT’s Bill Bonvillian, just out in the MIT Press journal Innovations.  Bill’s prescription: The U.S. must develop an integrated strategy...

Reorganizing the Web to Get Stuff Done
From The Eponymous Pickle

Reorganizing the Web to Get Stuff Done

A big part of this is reorganizing search, a big component of our use of the Web.  This article talks about that from the search engine Bing's perspective.   Isee...

The Importance of Mentoring
From Computer Science Teachers Association

The Importance of Mentoring

My school celebrated CS Ed Week with a visit from alumni who are working in CS-related careers. One alumnus spoke to my students over skype about his career in...

War Gaming Innovation Strategy
From The Eponymous Pickle

War Gaming Innovation Strategy

Battle testing an innovation strategy.  In the McKinsey  Quarterly.    This does remind me of defense department approaches, that were reimplemented in big enterprise...

<i>Cryptography Engineering</i> Available as an eBook
From Schneier on Security

Cryptography Engineering Available as an eBook

Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...

A Belated Brief on Barcelona
From updated sporadically at best

A Belated Brief on Barcelona

Notes from a more decadent time...Itinerary: Barcelona with Kate, April 2012.  Photos here.Day 1.  Arrive in Barcelona by plane close to midnight on a Friday evening...

Hackers Use Backdoor to Break System
From Schneier on Security

Hackers Use Backdoor to Break System

Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required...

Holiday Shopping Behavior
From The Eponymous Pickle

Holiday Shopping Behavior

Mintel releases some holiday shopping behavior statistics in Progressive Grocer.

Merry Christmas 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Merry Christmas 2012

Merry Christmas and a Healthy, Happy and Prosperous New Year to all my readers and friends. Maligayang Pasko at Manigong Bagong Taon Boas Festas e Feliz Ano Novo...

Magazine: Driving Innovation in Big Data
From The Eponymous Pickle

Magazine: Driving Innovation in Big Data

New and appears to be quite interesting.  Including: " ... Our interview with Principal Scientist at NASA, Ashok Srivastav ... ".   Registration required.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account