acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cloaking Lenses
From The Eponymous Pickle

Cloaking Lenses

Ordinary lenses produce cloaking.  Fascinating application that at one level is very easy to understand. Everyday applications?

Friday Squid Blogging: Squid Fishing Moves North in California
From Schneier on Security

Friday Squid Blogging: Squid Fishing Moves North in California

Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...

Learning or Cloning
From The Eponymous Pickle

Learning or Cloning

Cognitive requires learning. At very least an intelligent system needs to be updated as its context changes. There are many kinds of learning.  Passive, active,...

Evolution of Computer Languages
From The Eponymous Pickle

Evolution of Computer Languages

In the CACM:  A view of common computing languages.  Interesting, but most likely for those that have used several.  Non technical in that it deals with a view...

Medical Records Theft and Fraud
From Schneier on Security

Medical Records Theft and Fraud

There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...

An Online Right to be Forgotten
From The Eponymous Pickle

An Online Right to be Forgotten

In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe.   Examples...

Seeking Assumption Free Data Science
From The Eponymous Pickle

Seeking Assumption Free Data Science

Steve Miller on 'Freak Data Science', where freak means roughly assumption-free, understandable and useful.  Always like that approach, and he has much to say on...

Teacher Collaboration
From Computer Science Teachers Association

Teacher Collaboration

What do two college professors, two high school teachers and a pre-service teacher have in common? CSTA membership! I spent several enjoyable weeks this summer...

James F. Kurose to head Computer & Information Science & Engineering Directorate
From The Computing Community Consortium Blog

James F. Kurose to head Computer & Information Science & Engineering Directorate

Dr. James F. Kurose, Distinguished University Professor in the Department of Computer Science at the University of Massachusetts (UMass), was named the next Assistant...

An Online Right to be Forgotten
From The Eponymous Pickle

An Online Right to be Forgotten

In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe.   Examples...

UXMag and Psychology
From The Eponymous Pickle

UXMag and Psychology

Of interest, on psych and design, in user experience:" ... UX Magazine is a central, one-stop resource for everything related to user experience. We provide a steady...

Tracking Data Use Online
From The Eponymous Pickle

Tracking Data Use Online

From MIT, with possible use to understand data use and valuation.   " ... Researchers in the Decentralized Information Group (DIG) at MIT’s Computer Science and...

Computer Learning Neighborhoods from Images
From The Eponymous Pickle

Computer Learning Neighborhoods from Images

An example of the ability to make a classification of an image by subtle attributes.  Images are a form of unstructured data increasingly being found in large databases...

Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) Partnership
From The Computing Community Consortium Blog

Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) Partnership

The National Science Foundation (NSF) and Semiconductor Research Corporation (SRC) announced nine research awards to 10 universities totaling nearly $4 million...

Security Trade-offs of Cloud Backup
From Schneier on Security

Security Trade-offs of Cloud Backup

This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...

Cyber Security Lab Game
From The Eponymous Pickle

Cyber Security Lab Game

A laboratory for teaching online security concepts in the form of a simulation game.  We created similar simulation games for teaching and option evaluation for...

C++ and Java Together in CS2: Will it Be Great or a Disaster?
From The Female Perspective of Computer Science

C++ and Java Together in CS2: Will it Be Great or a Disaster?

I've been trying something a little bit different for our CS2 class this semester.  The course typically covers object-oriented programming in Java along with topics...

Nasty Vulnerability found in Bash
From Schneier on Security

Nasty Vulnerability found in Bash

It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...

Company Gets Rid of Email
From The Eponymous Pickle

Company Gets Rid of Email

In FastCompany.  I saw this direction proposed some time ago.  At that time it was suggested that a wiki like structure would be set up, and any communication would...

Service Design and Journey Mapping
From The Eponymous Pickle

Service Design and Journey Mapping

Via the Service Innovation group, a video on Service design and journey mapping. Mulling how such systems differ from advisory applications.   Is it a matter of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account