acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Students Need Both Knowledge and Facts
From Computer Science Teachers Association

Students Need Both Knowledge and Facts

As the new school year starts, an old complaint resurfaces. A recent opinion piece has said once again that US higher education is failing US employers. Students...

Character Amnesia in Chinese
From The Eponymous Pickle

Character Amnesia in Chinese

Lots of thoughts out about how technology is altering aspects of literacy. This article from Language Log, about how text messaging is influencing Chinese characters...

Me at the EastWest Institute
From Schneier on Security

Me at the EastWest Institute

Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...

Seaswarm Spill Robotics
From The Eponymous Pickle

Seaswarm Spill Robotics

Report about an MIT project called Seaswarm. Autonomous robotics to address oil spills. Includes an interesting video. I do always wonder about the contextual complexity...

Computing Research in Astronomy
From The Computing Community Consortium Blog

Computing Research in Astronomy

Every 10 years, U.S. astronomers come together to generate what has become a highly influential report recommending which astronomy and astrophysics projects should...

Is the Whole Country an Airport Security Zone?
From Schneier on Security

Is the Whole Country an Airport Security Zone?

Full-body scanners in roving vans: American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...

Learn from Old Spice
From The Eponymous Pickle

Learn from Old Spice

This received considerable publicity. Is it for everyone? Likely not, but it does indicate what can work: What Marketers Can Learn From the Old Spice 'Your Man'...

links for 2010-08-27
From Wild WebMink

links for 2010-08-27

The long, sordid tale of Sun RPC, abbreviated somewhat, to protect the guily and the irresponsible. One of the long-running projects I had at Sun was to get the...

From Computational Complexity

Theory Journals

I got the following request from a reader. I have a question about TCS journals. As I am trying to follow your advice on being more diligent about journalizing...

From Wild WebMink

The debate over the demise of "Open Core" has led to a reprise of "which open source license is best" arguments again. But the real driving force is not the licence...

HCIR 2010: Bigger and Better than Ever!
From The Noisy Channel

HCIR 2010: Bigger and Better than Ever!

Last Sunday was HCIR 2010, the Fourth Annual Workshop on Human-Computer Interaction and Information Retrieval, held at Rutgers University in New Brunswick, collocated...

Regulating the Use of Social Media Data
From Apophenia

Regulating the Use of Social Media Data

If you were to walk into my office, I’d have a pretty descent sense of your gender, your age, your race, and other identity markers. My knowledge wouldn’t be perfect...

Millenials
From The Eponymous Pickle

Millenials

Paul Gillin deftly discusses Millenials Coming soon to a cubical near you. I see the same behavior in my millenial children.

Weak Link between Popularity and Influence
From The Eponymous Pickle

Weak Link between Popularity and Influence

HP Researchers find only weak link between popularity and influence. " ... It is worth emphasizing that HP's studies are designed to the highest scientific standards...

From Computational Complexity

Cryptography if P = NP

Bill is at Barriers II in Princeton and promises a full report upon his return. Ask many computer scientists what happens if P = NP and you'll get the response...

links for 2010-08-26
From Wild WebMink

links for 2010-08-26

Jabber Support at WordPress.com This is outstanding; I can now have WordPress ping me when someone comments on my blog (as well as subscribing to other blogs to...

Detecting Deception in Conference Calls
From Schneier on Security

Detecting Deception in Conference Calls

Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina. Abstract: We estimate classification models...

Making Calls from GMail
From The Eponymous Pickle

Making Calls from GMail

You can now make free calls to within the US and Canada from GMail. And make international calls at a low rate. If you have a Google Voice phone number you can...

From Computational Complexity

***SORELLE*** PHD!!/Workshop on Boolean Threshold Functions/NSF program

Three annoucements (the last two I was asked to post) ANNOUCEMENT 1: Congrads to fellow blogger ***SORELLE*** who got her PhD recently. I was on her committee...

? The Aggregator Is On
From Wild WebMink

? The Aggregator Is On

Just a reminder that, in addition to this blog, I still maintain an aggregator over at webmink.net which collects all the posts I make from various places. If you...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account