acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Wanted: RSA Exhibitor for Book Signing
From Schneier on Security

Wanted: RSA Exhibitor for Book Signing

Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...

How teens do research in the digital world
From Putting People First

How teens do research in the digital world

According to Pew Internet research, the teachers who instruct the most advanced American secondary school students render mixed verdicts about students’ research...

New Vulnerability Against Industrial Control Systems
From Schneier on Security

New Vulnerability Against Industrial Control Systems

It doesn't look good. These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...

On Industry Certifications For Students
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

On Industry Certifications For Students

This post all started as a comment on a guest post by Barbara Ericson on Mark Guzdial’s blog - The Need for an Industry-based Java Exam. In that post Barbara makes...

From Gödel's Lost Letter and P=NP

The Election Outcome

We predict that one of three outcomes will happen Nate Silver is arguably the world’s foremost psephologist. This sounds like someone who foretells a person’s future...

Achieving Smarter Commerce:  IBM and DemandTec
From The Eponymous Pickle

Achieving Smarter Commerce: IBM and DemandTec

I have been following DemandTec (Now part of IBM) since they presented at our innovation centers soon after they were formed.  I was impressed by the deep analytics...

I'm Going To Be a TEDx Speaker
From The Female Perspective of Computer Science

I'm Going To Be a TEDx Speaker

I'm happy that I'm starting to get noticed when it comes to my public speaking abilities. My latest speaking request was for a local edition of TED on DecemberTEDxSandyHillWomen...

New Jersey Allows Voting by E-Mail
From Schneier on Security

New Jersey Allows Voting by E-Mail

I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.

New WWII Cryptanalysis
From Schneier on Security

New WWII Cryptanalysis

I'd sure like to know more about this: Government code-breakers are working on deciphering a message that has remained a secret for 70 years. It was found onSome...

Power Retailers
From The Eponymous Pickle

Power Retailers

In Progressive Retailer.  A near time view of who the power retailers of the future.  Those that operate in mutliple channels.  " ... Manufacturers expect Wal-Mart...

Windows 8 Apps for Social Good Contest
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows 8 Apps for Social Good Contest

I don’t work for Microsoft anymore so I don’t get paid to promote things like this. On the other hand I like the idea of a) applications for social good and b)http...

Building software to conduct ethnographic research of online communities
From Putting People First

Building software to conduct ethnographic research of online communities

While digital ethnography is an established field within ethnography, we don’t often hear of ethnographers building digital tools to conduct their fieldwork. Wendy...

From Computational Complexity

Produce or Perish

 Every year or so the National Science Foundation releases a new version of the holy bible of grant submission procedures, the Grant Proposal Guide. Last month's...

On the Ineffectiveness of Airport Security Pat-Downs
From Schneier on Security

On the Ineffectiveness of Airport Security Pat-Downs

I've written about it before, but not half as well as this story: "That search was absolutely useless." I said. "And just shows how much of all of this is security...

Interesting Links 5 November 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 5 November 2012

Super Storm Sandy (for various reasons I believe it was not technically a hurricane when it reached me) came and went last week. I was lucky and we only lost power...

Five perspectives on the future of the human interface
From Putting People First

Five perspectives on the future of the human interface

The next generation of apps will require developers to think more of the human as the user interface. It will become more about the need to know how an app works...

Associative Analytics
From The Eponymous Pickle

Associative Analytics

It has been a while since I took a look at Saffron Technology's blog.      I know several of the people involved, and their tech is solid.  They are now emphasizing...

Analytic Bridge.
From The Eponymous Pickle

Analytic Bridge.

Have mentioned this a few times, Analytic Bridge pulls together a number of useful online resources for data science that are worth subscribing to.    It is tough...

Seven Languages in Seven Weeks: Erlang, Day 2
From Writing

Seven Languages in Seven Weeks: Erlang, Day 2

After learning some basic Erlang syntax on Day 1, I take on the second Erlang chapter, which introduces some more interesting concepts.Erlang, Day 2: ThoughtsI'm...

Seven Languages in Seven Weeks: Erlang, Day 1
From Writing

Seven Languages in Seven Weeks: Erlang, Day 1

After a long hiatus, I'm finally back to working my way through Seven Languages in Seven Weeks. After finishing up Scala, I'm now on the 5th language, Erlang, though...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account