acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

links for 2009-09-04
From Wild WebMink

links for 2009-09-04

EU fears Oracle will kill MySQL, but is that even possible? So many speculaitive stories out there, all full of half-correct opinions...

links for 2009-09-04
From Wild WebMink

links for 2009-09-04

Gov 2.0: It

Revealing Slant in Mathematica
From The Eponymous Pickle

Revealing Slant in Mathematica

Jilyan Landon of Mathematica points me to a post in the Wolfram Blog. There something as mundane as an error message gives a hint to how well integrated Mathematica...

Advising Government on a New Key Piece of Legislation
From Computer Science Teachers Association

Advising Government on a New Key Piece of Legislation

In early August, the U.S. Department of Education released the proposed structure of the $4.5 billion Race to the Top Fund. In short, this fund will distribute...

Lecture on Human-Computer Interaction and Public Policy
From U.S. Public Policy Committee of the ACM

Lecture on Human-Computer Interaction and Public Policy

Event Date: September 21, 2009 The Washington DC Chapter of the Association for Computing Machinery, with support from the New America Foundation, will hold a...

HCIR: Better Than Magic!
From The Noisy Channel

HCIR: Better Than Magic!


Reaching Out and OutreachAmbassador: Mary Anne Egan, United States
From ACM-W supporting, celebrating and advocating for Women in Computing

Reaching Out and OutreachAmbassador: Mary Anne Egan, United States

There are several projects keeping me busy this year. First, the Student IMPACT alternative programming contest continues (www.cs.siena.edu/~maegan/impact). The...

Internet at 40
From The Eponymous Pickle

Internet at 40

I was pleased to have been involved in some of the early use of the Internet in the testing of remote Darpanet systems. It about to be 40 years old. CW makes some...

Changing your perspective: horizontal, vertical and hybrid data models
From Daniel Lemire's Blog

Changing your perspective: horizontal, vertical and hybrid data models

Data has natural layouts: text is written from the first to the last word, database tables are written one row at a time, Google presents results one document...

Subpoenas as a Security Threat
From Schneier on Security

Subpoenas as a Security Threat

Blog post from Ed Felten: Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...

SODA list up
From My Biased Coin

SODA list up

As announced everywhere, the list of SODA papers is up.

Reboot Partners
From The Eponymous Pickle

Reboot Partners

Dean Debiase, formerly of TNS Media, has an interesting blog at Reboot Partners. ' ... which is a Strategic Execution and Market Expansion Advisory Group Helping...

Cultivate Your Talkers
From The Eponymous Pickle

Cultivate Your Talkers

In Small Business Trends. ' ... People use social media for a lot of things. Personally, I use it to be as loud as I possibly can. I know that probably sounds bad...

Time For Another Paradigm Shift
From Computer Science Teachers Association

Time For Another Paradigm Shift

Unstructured code (BASIC), structured code and procedural programming (Pascal), object-oriented code (C++ or Java). We've all been through one or more of theseComputational...

Another Project to Measure Twitter Influence
From The Noisy Channel

Another Project to Measure Twitter Influence


AnalyticsBridge
From The Eponymous Pickle

AnalyticsBridge

This newsletter and site were just brought to my attention. Created by Vincent Granville, his blog. Very good overview of predictive analytics, data mining, statistics...

"The Cult of Schneier"
From Schneier on Security

"The Cult of Schneier"

If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...

Real-World Access Control
From Schneier on Security

Real-World Access Control

Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...

Collaboration Tools at Procter and Cisco
From The Eponymous Pickle

Collaboration Tools at Procter and Cisco

A good overview of the use of collaboration tools in big enterprises.. Object to combine the intellectual property of the entire enterprise. Mostly about the low...

The History of One-Time Pads and the Origins of SIGABA
From Schneier on Security

The History of One-Time Pads and the Origins of SIGABA

Blog post from Steve Bellovin: It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account