acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Effects of Data Breach Litigation
From Schneier on Security

The Effects of Data Breach Litigation

"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti: Abstract: In recent years, a large number of data breaches...

Why Universities Should Host High School Programming Contests
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why Universities Should Host High School Programming Contests

I finished up last week with a trip to Western New England University where they were running a high school programming contest. I love these events because I think...

Magic Editable PDFs
From Wild WebMink

Magic Editable PDFs

Please stop sending .DOC or .DOCX files as attachments to your e-mails. There is a better way. Send editable PDFs. I explain how in ComputerWorldUK today.

Who, Where, How We Work: The Intersection of Culture, Workplace, and Social Media
From Putting People First

Who, Where, How We Work: The Intersection of Culture, Workplace, and Social Media

What happens when designers & manufacturers discuss the workplace & social media? Dexigner reports that IIDA has published a whitepaper summary of the IIDA Industry...

Technology can push our crazy buttons, rewire brains
From Putting People First

Technology can push our crazy buttons, rewire brains

Our tech saturation has reached such a critical point that some experts say it’s rewiring our brains. Research psychologist and computer educator Larry Rosen of...

I
From Putting People First

I

Who are these companies and what do they want from me? Alexis Madrigal’s voyage into the invisible business that funds the web. “This morning, if you opened your...

Wikipedia Page 1 Rank
From The Eponymous Pickle

Wikipedia Page 1 Rank

For some time now it has been common to see Wikipedia results to come up on page 1 of a Google search. Search Engine Watch looks at a number of studies that...

? Artistic Excellence
From Wild WebMink

? Artistic Excellence

[This post is only useful to people who can buy MP3s from Amazon US - sorry] I have previously recommended samplers from Mishara Music. They specialise in singer...

Congressional Testimony on the TSA
From Schneier on Security

Congressional Testimony on the TSA

I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...

Hill Tech Happenings, Week of March 26
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 26

March 27 Hearing: The Technology and Innovation Subcommittee of the House Science, Space and Technology Committee will hold a hearing on the effect of federal policies...

George Dyson on Advertising
From The Eponymous Pickle

George Dyson on Advertising

In the Edge:  George Dyson on self-replicating codes, the universe .... and strangely,  on advertising.  Or more generally as I see it 'selling' ..." ... What's...

Reflections on Fear in a Networked Society
From Apophenia

Reflections on Fear in a Networked Society

I’ve been trying to work through some ideas on how fear operates in a networked society. At Webstock in New Zealand, I gave a talk called “Culture of Fear + Attention...

Improving Our Ability to Predict Tornadoes
From The Computing Community Consortium Blog

Improving Our Ability to Predict Tornadoes

Today’s

Probabilistic Topic Models
From The Eponymous Pickle

Probabilistic Topic Models

In the CACM:   Somewhat Technical, but some valuable insights:  " ...   Surveying a suite of algorithms that offer a solution to managing large document archives...

Getting Ready for Big Data
From The Eponymous Pickle

Getting Ready for Big Data

Good general piece in CIO about getting ready for Big Data.  Companies will increasingly need to leverage the data within their own domains and lead rather than...

From Computational Complexity

What is an Elegant Proof?

What is an elegant proof? I do not know and I doubt it can be well defined; however, we all know it when we see it. I welcome comments on the topic; however, Ihere...

The Big Idea of Associative Intelligence
From The Eponymous Pickle

The Big Idea of Associative Intelligence

What is the big idea of Associative intelligence?  In a back of the envelope exploration, Saffron Tech presents the idea.  It is an important one.  How do we save...

From The Computing Community Consortium Blog

We’ve previously described in this space

Rare Spanish Enigma Machine
From Schneier on Security

Rare Spanish Enigma Machine

This is a neat story: A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...

26 March 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

26 March 2012

Busy week (as usual) in between meetings and trying to Get ready for Windows 8. I also spent some time at a high school programming contest which I
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account