acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

IBM History
From The Eponymous Pickle

IBM History

Video of 100 years of IBM and related Technology History.

Awesome grants
From Michael Nielsen

Awesome grants

Beginning this month, every month the Toronto Awesome Foundation will give away $1,000 for someone to do something that

Reality is Broken
From The Eponymous Pickle

Reality is Broken

Just brought to my attention: Reality Is Broken: Why Games Make Us Better and How They Can Change the World: by Jane McGonigal.   Saw some interesting things she...

What Sort of Games Are In The Imagine Cup?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What Sort of Games Are In The Imagine Cup?

I get asked about what sort of games people create as part of the Microsoft Imagine Cup Game division. People look for ideas of what students are capable of doing...

Wolfram Alpha API
From The Eponymous Pickle

Wolfram Alpha API

Interesting, technical discussion of Wolfram Alpha's API.  Dealing in particular with its openness.

Data Blogs
From The Eponymous Pickle

Data Blogs

ReadWriteWeb presents some links about blogs that discuss data.   Some I had not seen yet. 

Disconnect Between Intelligence and Analytics
From The Eponymous Pickle

Disconnect Between Intelligence and Analytics

The disconnect between intelligence and analytics? " .... Being analytics savvy is no longer an option for most businesses but a matter of survival. If a company...

Blowfish in <i>Good Time Max</i>
From Schneier on Security

Blowfish in Good Time Max

This screen shot is from the movie "Good Time Max." 17 minutes and 52 seconds into the movie, it shows Blowfish being used as an encryption algorithm.

Procurement and Indemnity
From Wild WebMink

Procurement and Indemnity

Legacy procurement rules that insist on indemnity from open source subscription suppliers are an unnecessary barrier to open source adoption. Read about this on...

? Speaking at Campus Party Brasil on Saturday
From Wild WebMink

? Speaking at Campus Party Brasil on Saturday

I’ve reached S

Cyberwar is Overhyped
From Schneier on Security

Cyberwar is Overhyped

A new report from the OECD says the threat of cyberwar has been grossly exaggerated. (Hey, that's what I said.) There are lots of news articles. Also worth...

Teach Me How to Research
From The Female Perspective of Computer Science

Teach Me How to Research

How many of you were formally taught how to research? I'm guessing that for many of you, like me, there was never a class or workshop available to show you howWho...

R Waldo Roth
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

R Waldo Roth

Computer science education in 1972 was a lot different from what it is today. Back then most computers were huge, expensive, intimidating and kept locked away in...

The Legality of the Certificate Authority Trust Model
From Schneier on Security

The Legality of the Certificate Authority Trust Model

Interesting research: We looked at the standard legal documents issued by the certificate authorities or "CAs," including exemplar Subscriber Agreements (agreements...

Google Launching Groupon Competitor
From The Eponymous Pickle

Google Launching Groupon Competitor

Mashable reports that Google is about to launch a Groupon competitor.  A pretty obvious direction, finally happening. More detail at link.

ACM Tech Packs: Cloud Computing
From The Eponymous Pickle

ACM Tech Packs: Cloud Computing

I see that the Association of Computing Machinery has created a concept they call Tech Packs.  You have to be a member of ACM to get access to these.  Most recently...

B2B vs B2C Marketing
From The Eponymous Pickle

B2B vs B2C Marketing

Paul Gillin posts on how B2B abd B2C Marketing differ.  He also covers this in his new book:  Social Marketing to the Business Customer.  You can download a free...

Cost-Benefit Analysis of Full-Body Scanners
From Schneier on Security

Cost-Benefit Analysis of Full-Body Scanners

Research paper from Mark Stewart and John Mueller: The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...

From Computational Complexity

Does Tiger Woods know what Venn Diagram is?

In prior blogs I noted that the terms Turing Test and Prisoner's Dilemma have been used in articles for non-math people. In the age of Google people can look...

Chance to Provide Feedback on Federal CS Policies for K-12
From Computer Science Teachers Association

Chance to Provide Feedback on Federal CS Policies for K-12

The federal government asks for advice about education fairly regularly. But it isn't often that it asks specifically what is needed to advance K-12 computer science...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account