acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Russian Intelligence Gets Source Code to Windows 7
From Schneier on Security

Russian Intelligence Gets Source Code to Windows 7

I don't think this is a good idea.

From Computational Complexity

Sparse problems in NP thought to not be in P

(This post is similar to this old post. I am posting this anyway since when I first posted I made fundamental mistake. I fixed it the point I was trying to make...

Peter Lee Joins Microsoft Research
From The Computing Community Consortium Blog

Peter Lee Joins Microsoft Research

Peter Lee, a past member of the CCC Council and the PI of the first CIFellows Project, today was named the Managing Director of Microsoft Research Redmond, effective...

Paro:  Helping dementia patients
From The Computing Community Consortium Blog

Paro: Helping dementia patients

Last week Amy Harmon wrote the third installment of the awesome New York Times Magazine series

Random Numbers from Quantum Noise
From Schneier on Security

Random Numbers from Quantum Noise

Not that we need more ways to get random numbers, but the research is interesting.

University and Cyberspace conference videos online
From Putting People First

University and Cyberspace conference videos online

A few weeks ago the Communia conference University and Cyberspace took place here in Torino, Italy, with a focus on “reshaping knowledge institutions for the networked...

Arxiv Paper:  Heapable Sequences and Subsequences
From My Biased Coin

Arxiv Paper: Heapable Sequences and Subsequences

I haven't been blogging much;  consider me on extended vacation.  It's helping me prepare for giving up the blog soonish. But I thought I'd mention our newly posted...

Microsoft's Virtual Human
From The Eponymous Pickle

Microsoft's Virtual Human

In the BBC: All sorts of interesting implications in cinema, storytelling, marketing and games. We will soon be at a place where the real and artificial are no...

Internet
From Putting People First

Internet

“The internet has not become the great leveller that it was once thought it could be,” according to Harvard academic Ethan Zuckerman at the TED Global (Technology...

Tibco Announces Free BI Tool
From The Eponymous Pickle

Tibco Announces Free BI Tool

Clever marketing approach from Tibco, maker of Spotfire. Have not taken a look yet at exactly what it is yet. In ReadwriteWeb: " ... Tibco has launched a business...

2010 CSIT Symposium
From Computer Science Teachers Association

2010 CSIT Symposium

This is a reposting of a blog piece written by Doug Peterson on his blog http://dougpete.wordpress.com/. Yesterday, I had the honour of attending the 2010 CSIT...

Smartphones as Checkouts
From The Eponymous Pickle

Smartphones as Checkouts

Very likely I think, it simplifies a number of things, and creates a new channel to the shopper. What are the implications for manufacturer and retailer?Smartphones...

Burglary Detection through Video Analytics
From Schneier on Security

Burglary Detection through Video Analytics

This is interesting: Some of the scenarios where we have installed video analytics for our clients include: to detect someone walking in an area of their yard...

Recorded Future Examined
From The Eponymous Pickle

Recorded Future Examined

I have been asked to take a closer look at the Recorded Future site. A number of posts will follow that will track my interaction with the site and company. The...

Robot Industry
From The Eponymous Pickle

Robot Industry

A good CWorld article on the the bloom of the robotics industry. I like this because it links the challenge to artificial intelligence (AI) which I covered for...

Cooperative Board Games Take Some Getting Used To
From The Female Perspective of Computer Science

Cooperative Board Games Take Some Getting Used To

I'm sure getting together every two weeks to play board games and calling it research isn't anything new, but it's definitely something I need to do. I pride myself...

Old Spice and Social Engagement
From The Eponymous Pickle

Old Spice and Social Engagement

Insider Dave Knox on taking social engagement to a new level at Procter & Gamble's Old Spice brand. Via Walter Riker.

From Computational Complexity

GCT Workshop (Guest Post by Josh Grochow)

Last week, the Center for Computational Intractability hosted a Geometric Complexity Theory Workshop. Geometric complexity theory (GCT) is an approach to P vs...

Open Core Case Study
From Wild WebMink

Open Core Case Study

SugarCRM 6 Debuts with Open Source and Commercial Features While their marketing guy may claim “that overall, Sugar 6 is an open source product from an open source...

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account