acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

CSTA 2014 Day Two
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA 2014 Day Two

CSTA like so many great conferences is as much about learning from face to face informal conversations as it is about formal sessions. I’ve been able to talk with...

Risks of Keyloggers on Public Computers
From Schneier on Security

Risks of Keyloggers on Public Computers

Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...

Thermoelectric Materials
From The Eponymous Pickle

Thermoelectric Materials

In Tech Review: Turning waste heat into energy.  With an abundantly available material.  " ... California-based Alphabet Energy plans to begin selling a new type...

New Compounds from Microbe Interaction
From The Eponymous Pickle

New Compounds from Microbe Interaction

Synthetic biology (WP Overview)  is of interest for product development, some readers of this blog have indicated an interest in how this domain could link to analytic...

My Big Learning at CSTA 2014 Day 1–Not From A Session
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

My Big Learning at CSTA 2014 Day 1–Not From A Session

Usually I’m good about writing up the events of a conference at the end of the day and putting up a blog post. Not this time. I blame it on Peli de Halleux from...

Capabilities Reincarnated: Compatibility and Better Memory Protection
From The Computing Community Consortium Blog

Capabilities Reincarnated: Compatibility and Better Memory Protection

The following is a special contribution to this blog by by CCC Executive Council Member Mark D. Hill of the University of Wisconsin-Madison. Background: Senior...

Major Urban Data Observatory
From The Eponymous Pickle

Major Urban Data Observatory

Interesting concept, in Venturebeat:  A means to observe and compare data about major cities.  And I hope visualizing related analytics.   Sounds akin to work that...

Legal Attacks Against Tor
From Schneier on Security

Legal Attacks Against Tor

Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...

Apple's Swift Langauge
From The Eponymous Pickle

Apple's Swift Langauge

In Wired: Have heard of it, but never even looked at the code. Will it remake computer programming?  I like new ways of thinking about the process of logical control...

Why Hire More People?
From The Eponymous Pickle

Why Hire More People?

How to know if you should hire more people?Organizational psychologist and leadership specialist David Javitch said there are several signs employers should look...

Computing Now:  The Web at 25
From The Eponymous Pickle

Computing Now: The Web at 25

The World Wide Web is now only 25 years old.  It seems much longer.  IEEE Computing Now discusses the birthday, and the future of the Web. It will be here for some...

D-Wave Gets more Funding
From The Eponymous Pickle

D-Wave Gets more Funding

Have followed D-Wave Quantum computing since its inception.   The WSJ reports on new funding it has received.   I talked to them about potential applications in...

Big Data in Sports
From The Eponymous Pickle

Big Data in Sports

In Linkedin: How Germany Beat Brazil. And how Big Data Helped.  Via my colleague : Ali Rebaie: Big Data Analyst and Consultant , Top Big Data Influencer, Public...

GCHQ Catalog of Exploit Tools
From Schneier on Security

GCHQ Catalog of Exploit Tools

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...

Tiny Watson
From The Eponymous Pickle

Tiny Watson

You would not think size would be a big issue, given what can be done in a smartphone.  But the goal is a good one:  In CWorld:" ... The company ... will show a...

WATCH – Reflections on Decades of Defending Imperfect Software
From The Computing Community Consortium Blog

WATCH – Reflections on Decades of Defending Imperfect Software

The next WATCH Talk is scheduled for July 17 at noon EDT. Crispin Cowan will reflect on decades of defending imperfect software. Dr. Cowan works for Microsoft adding...

Minds and Brands, Taking Off.
From The Eponymous Pickle

Minds and Brands, Taking Off.

Piece on how a number of brands are using neuromarketing.  Nontechnical.  Some examples I had not heard of.  Nielson pitches its own acquisitions" ... To be sure...

Hill Tech Happenings, Week of July 14
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 14

July 15 Hearing: The Crime and Terrorism Subcommittee of the Senate Judiciary Committee will hold a hearing on botnets and associated criminal networks. 2:30 p.m...

IKEA and Instagram
From The Eponymous Pickle

IKEA and Instagram

IKEA using Instagram.   " .... IKEA Creates an Entire Website Inside Instagram ... Russian Agency Instinct Uses Tagging Feature in a New Way ... "

Studying Network Incident Response Teams Using Anthropological Methods
From Schneier on Security

Studying Network Incident Response Teams Using Anthropological Methods

This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account