acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Office vs Google Docs
From The Eponymous Pickle

Office vs Google Docs

Have been an Office user since the beginning and just in the last year have started to use some of Google Docs. Some new features, like easier sharing have made...

From Computational Complexity

Choosing a Graduate School

Besides being tax day, Thursday is the deadline to decide where to attend graduate school. How should you choose? I've blogged on this topic before but a few recent...

Celebration a Success!
From The Female Perspective of Computer Science

Celebration a Success!

Last week Carleton's Women in Science and Engineering hosted the very first Carleton Celebration of Women in Science and Engineering, and it was a great success...

Terrorist Attacks and Comparable Risks, Part 1
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 1

Nice analysis by John Mueller and Mark G. Stewart: There is a general agreement about risk, then, in the established regulatory practices of several developed...

Visual Studio 2010 Now Available
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Visual Studio 2010 Now Available

Well it is official

? Digital Liberty Missing From UK Election
From Wild WebMink

? Digital Liberty Missing From UK Election

Take action to put digital liberty issues on the British election agenda. #ge10

Twitris at Knoesis
From The Eponymous Pickle

Twitris at Knoesis

Demonstrated at the Kno.e.sis Center at Wright State University today: Twitris, a semantic technology based social signal analysis system, where you can Twitter...

Simulating Evacuation
From The Eponymous Pickle

Simulating Evacuation

In ACM News: simulating the evacuation of 70,000 avatars from an e-stadium. We did a number of projects that deal with the simulation of shoppers in a store, so...

Will Gen Y Lead us into Recovery?
From The Eponymous Pickle

Will Gen Y Lead us into Recovery?

Report Sees Recovery Led by Gen Y: ' ... Members of Generation Y, not baby boomers, have money to spend and will end the recession with their purchases, says a...

More Google Map Maker Locations
From The Eponymous Pickle

More Google Map Maker Locations

I was reminded of Google Map Maker by this post. A means for users to share more about their part of the world. It appears to continue to prosper, with many new...

Putting People First content partner of Appliance Design
From Putting People First

Putting People First content partner of Appliance Design

Putting People First has become a content partner of Appliance Design, the site of the US-based magazine of the same name that caters to designers and engineers...

Man-in-the-Middle Attacks Againt SSL
From Schneier on Security

Man-in-the-Middle Attacks Againt SSL

Says Matt Blaze: A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...

Mobile app developers tackle Africa
From Putting People First

Mobile app developers tackle Africa

Mobile app developers are sprouting in Africa to help tackle that continent’s problems. Many create applications that can be used with phone text messages. The...

From Computational Complexity

Deriving sum of squares: How much to cheat?

In discrete math (or other courses) we teach AND DERIVE the formula for 1+2+3+...+n. We then look at the sum 12+22+...+n2. Here there are some options. State...

Hill Tech Happenings, Week of April 12
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of April 12

April 15 Hearing: The Communications, Technology and the Internet subcommittee of the House Energy and Commerce Committee will hold a hearing on the national...

What I
From Daniel Lemire's Blog

What I

I’m currently a tenured professor with research grants and graduate students.

links for 2010-04-12
From Wild WebMink

links for 2010-04-12

The Wellington Declaration – PublicACTA I signed the Wellington Declaration on the Anti-Counterfeiting Trade Agreement and I think you shoulkd consider doing so...

Makeup to Fool Face Recognition Software
From Schneier on Security

Makeup to Fool Face Recognition Software

An NYU student has been reverse-engineering facial recognition algorithms to devise makeup patterns to confuse face recognition software.

Interesting Links 12 April 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 12 April 2010

What does this say? 01000010 01100001 01110010 01100010 01101001 01100101 It says

? Geeks Vote Too
From Wild WebMink

? Geeks Vote Too

Get the "Geeks Vote Too" logo to use freely and widely.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account