acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Stealing Data from Phones
From The Eponymous Pickle

Stealing Data from Phones

In Wired:  A disconcerting piece about how law enforcement and governments are gathering data directly from mobile phone.   " ... Newly uncovered components of...

Risks of Not Understanding a One-Way Function
From Schneier on Security

Risks of Not Understanding a One-Way Function

New York City officials anonymized license plate data by hashing the individual plate numbers with MD5. (I know, they shouldn't have used MD5, but ignore that for...

Information and Knowledge
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Information and Knowledge

The cartoon below by Hugh Mac­Leod is one of the most shared of his images on  the Internet. I have to say I see something different in it every time I view it....

Need a HoloDeck?
From The Eponymous Pickle

Need a HoloDeck?

Via Metaio.  " .... Metaio, the world leader in Augmented Reality (AR) software and solutions today revealed its 6D Holodeck technology that places virtual environments...

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?
From Schneier on Security

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

Ex-NSA director Keith Alexander has his own consulting company: IronNet Cybersecurity Inc. His advice does not come cheap: Alexander offered to provide advice to...

Ad Agencies Want Innovations
From The Eponymous Pickle

Ad Agencies Want Innovations

In Adage: Ad agencies are now seeking more than just Ad ideas. For additional revenue streams " ...  Ad Ideas? RFPs Morph Into Requests for Innovation, Products...

Cyber Defense Requires Culture
From The Eponymous Pickle

Cyber Defense Requires Culture

In CACM:  Former NSA chief says culture not technology key to cyber defense.  I really don't see our culture going that way.   If anything a sense of personal responsibility...

Looking for Indoor GPS
From The Eponymous Pickle

Looking for Indoor GPS

A long time goal.  Some of the research generally  described here.  Completely personalized navigation indoors is still not here. Coming to an office this morning...

Downside of Personalization
From The Eponymous Pickle

Downside of Personalization

Interesting view.  Via Linkedin.  To what degree are we benefited versus being exploited?  Most of this is obvious, but the measures of each are not there. I would...

Quadrennial Homeland Security Review
From Schneier on Security

Quadrennial Homeland Security Review

The second Quadrennial Homeland Security Review has been published by the Department of Homeland Security. At 100+ pages, I'm not going to be reading it, but I...

Defending Against Algorithm Substitution Attacks
From Schneier on Security

Defending Against Algorithm Substitution Attacks

Interesting paper: M. Bellare, K. Paterson, and P. Rogaway, "Security of Symmetric Encryption against Mass Surveillance." Abstract: Motivated by revelations concerning...

The More Languages Change The More They Stay The Same
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The More Languages Change The More They Stay The Same

One of the links in yesterday’s interesting links post was to a fun questionnaire for computer science people. Guess the Programming Language asks you to identify...

Wolfram Programming Cloud
From The Eponymous Pickle

Wolfram Programming Cloud

Attended today the announcement of the Wolfram Programming Cloud. This embodies the ability to create public and private clouds using the Wolfram programming language...

Court Limits Software Patents, But Stops Short
From The Eponymous Pickle

Court Limits Software Patents, But Stops Short

Glad at least some progress was made here.  My opinion is it should have gone further to enhance  net creativity.   It may well have some economic repercussions...

Sensors in Lamp Posts
From The Eponymous Pickle

Sensors in Lamp Posts

Have followed the idea of placing sensors in existing infrastructure for some time.  Starting in retail environments.  Here Chicago steps into the approach.   A...

From Gödel's Lost Letter and P=NP

Counting Edge Colorings Is Hard

Another dichotomy theorem Jin-Yi Cai is one of the world’s experts on hardness of counting problems, especially those related to methods based on complex—pun intended—gadgets...

From Gödel's Lost Letter and P=NP

Counting Edge Colorings Is Hard

Another dichotomy theorem Jin-Yi Cai is one of the world’s experts on hardness of counting problems, especially those related to methods based on complex—pun intended—gadgets...

Hill Tech Happenings, Week of June 23
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of June 23

Monday, June 23, 2014 The House Committee on Homeland Security will hold a field hearing on “Mass Gathering Security: A Look at the Coordinated Approach to Super...

Building Retro Reflectors
From Schneier on Security

Building Retro Reflectors

A group of researchers have reverse-engineered the NSA's retro reflectors, and has recreated them using software-defined radio (SDR): An SDR Ossmann designed and...

Business Intelligence and Analytics
From The Eponymous Pickle

Business Intelligence and Analytics

A Complementary Strategy.    My view:   I really see them as the same thing.  You should always consider the simplest methods first.  Starting with just understanding...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account