acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Networking is Key
From The Female Perspective of Computer Science

Networking is Key

Time and time again I find that networking truly is the key to a successful career. It's amazing what kind of opportunities arise because of who you know.During...

Trading latency for quality in research
From Daniel Lemire's Blog

Trading latency for quality in research

I am not opposed to the Publish or Perish mantra. I am an academic writer. I am what I publish. We all think of researchers as people wearing laboratory coats,...

Intel Monitors Social Networks
From The Eponymous Pickle

Intel Monitors Social Networks

Several reports are out about how Intel is monitoring the buzz in social networks regarding their Superbowl ads. This is hardly news, since if I had spent four...

Hill Tech Happenings, Week of February 8
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 8

February 10 Hearing: The Senate Judiciary Committee will hold a hearing on cybercrime and identity theft. 10 a.m., 226 Dirksen Building The House Science and...

links for 2010-02-08
From Wild WebMink

links for 2010-02-08

SourceForge turns off "blanket blocking" Good to see SourceForge being responsive here and deciding to take this risk. The draconian...

More Details on the Chinese Attack Against Google
From Schneier on Security

More Details on the Chinese Attack Against Google

Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...

Interesting Links 8 February 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 8 February 2010

Well did you watch the Super Bowl? I confess that I did not. I

Microsoft Research Social Computing Symposium 2010
From Putting People First

Microsoft Research Social Computing Symposium 2010

For the past four years, Microsoft Research (MSR) has sponsored a symposium on social computing that “brings together academic and industry researchers, developers...

Where Does this Blog Come From?
From The Eponymous Pickle

Where Does this Blog Come From?

This blog was originally established to communicate to visitors at Procter & Gamble's Innovation Centers. I was asked during many visits that major retailers and...

Video Ubiquity
From The Eponymous Pickle

Video Ubiquity

I had thought that video had become as prevasive as it could be. Good GigaOm article on how falling prices are driving it much further. Will introduce new challenges...

Report on Spam Content of the Web
From The Eponymous Pickle

Report on Spam Content of the Web

An analysis of some recent Websense stats point to the finding that " ... 95% of User Generated Content is either malicious in nature or spam ... " . Not sureFull...

Bliink Web Design Competition for Texas High School Students
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Bliink Web Design Competition for Texas High School Students

The Microsoft Corporation, NASA, the Texas Business & Education Coalition, and the State of Texas would like to invite you and your students to participate in the...

Better Ways to Manage Knowledge
From The Eponymous Pickle

Better Ways to Manage Knowledge

Good piece on the subject, they relate some of the same problems we saw in the enterprise regarding institutionalizing knowledge ... and implementing a solution...

K-12 Events at SIGCSE
From Computer Science Teachers Association

K-12 Events at SIGCSE

I'd like to let everyone know that the early registration deadline for SIGCSE 2010 is coming up at the end of January. While SIGCSE runs from March 11-13, there...

Live at Interaction
From Putting People First

Live at Interaction

Niklas Wolkert & Brad Nunnally provide their second report on Johnnyy Holland on the Interaction10 conference in Savannah, Georgia – this time focused on the second...

Beginning to Rethink CS Education at NSF
From U.S. Public Policy Committee of the ACM

Beginning to Rethink CS Education at NSF

The President released his $3.8 trillion budget on Monday setting off a flurry of activity in the Nation's Capital. The budget sets the Administration's priorities...

New Attack on Threefish
From Schneier on Security

New Attack on Threefish

At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...

links for 2010-02-07
From Wild WebMink

links for 2010-02-07

Tinkerer

Vacation
From The Noisy Channel

Vacation

Just letting readers know that I’ll be on vacation for the next week. If you are starved for reading materials, check out some of the blogs I read.

Nominations Sought for Extraordinary Student Stories Award
From The Computing Community Consortium Blog

Nominations Sought for Extraordinary Student Stories Award

The Ewing Marion Kauffman Foundation is sponsoring an award for K-12, undergraduate,
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account