acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Intelligent questions about the alleged P NE NP proof

People have asked me how much the alleged proof of P NE NP was discussed at Barriers II. Actually, nobody discussed the proof; however, we did discuss the aftermath...

links for 2010-09-01
From Wild WebMink

links for 2010-09-01

The End of OpenSolaris Patrick Finch with an informed view of what happened in the past and informed conjecture about the present and future. (tags: OpenSolaris...

More Skein News
From Schneier on Security

More Skein News

Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...

Dublin, Ireland to host Interaction 12
From Putting People First

Dublin, Ireland to host Interaction 12

The City of Dublin and the Institute of Art, Design & Technology (IADT) will act as co-hosts for Interaction 12, the annual conference of the Interaction Design...

DreamSpark
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

DreamSpark

I

On
From Wild WebMink

On

Contributor agreements that aggregate the copyrights of open source code in favour of a single corporate sponsor are a sure sign of a community where one member...

Eavesdropping on Smart Homes with Distributed Wireless Sensors
From Schneier on Security

Eavesdropping on Smart Homes with Distributed Wireless Sensors

"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse: Abstract: In...

New Developments in the Exploring Computer Science Curriculum
From Computer Science Teachers Association

New Developments in the Exploring Computer Science Curriculum

Many of you are familiar with the Exploring Computer Science (ECS) curriculum, developed in partnership with CSTA as part of an NSF grant. Though initially developed...

Yield Management of Knowledge
From The Eponymous Pickle

Yield Management of Knowledge

Mark Montgomery of KYield posts about Realizing the Theory: Yield Management of Knowledge. He defines it as: " ... Yield Management of Knowledge: The process by...

Managing Social Media Presence
From The Eponymous Pickle

Managing Social Media Presence

A short article on how to manage time for social media presence. Mostly common sense, but also worth a look.

Chief Listener
From The Eponymous Pickle

Chief Listener

A good article in AdAge: My thoughts: Listening, whether it be to consumers, trends, the pulse of technology, is very important. Maybe it should be called observing...

Autocad on the IPhone
From The Eponymous Pickle

Autocad on the IPhone

In a very interesting development a version of the very well known CAD system will become available for the IPhone and IPad, available by this fall.... I used AutoCad...

From Computational Complexity

Report from Barriers II Part 1

On Thursday Aug 26 Lance stated Bill is at Barriers II in Princeton and promises a full report upon his return. Not quite sure I promised that, or what a full report...

Interactive Systems Architectures
From The Computing Community Consortium Blog

Interactive Systems Architectures

Thirty researchers met August 11-13 to discuss the future of interactive systems. This workshop was sponsored by the Computing Community Consortium, ACM/SIGCHI...

Time To Mine the Data
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Time To Mine the Data

Or is it “mind” the data? Last week I read a blog post by Stacey Armstrong (CS News – Video Game Data Mining) that linked to an article about how game companies...

? Two Endings and a Beginning
From Wild WebMink

? Two Endings and a Beginning

Murdoch

Blog Retrospective
From My Biased Coin

Blog Retrospective

I started blogging a little over 3 years ago, as something of an experiment.  Lance had given up blogging, and I had been a reasonably frequent and opinionatedKleinberg's...

High School Teacher Assigns Movie-Plot Threat Contest Problem
From Schneier on Security

High School Teacher Assigns Movie-Plot Threat Contest Problem

In Australia: A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...

When Having a Lot of Facebook Friends is Good
From The Female Perspective of Computer Science

When Having a Lot of Facebook Friends is Good

Some people scoff at those who have too many friends on Facebook. "They probably just friend a bunch of people they don't know to look popular," they say. While...

Causality Essay Published
From Wild WebMink

Causality Essay Published

In response to several comments, I’ve just extracted my discussion of direct and indirect causality from my recent article on why “which licence” is now the wrong...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account