acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Favorite Theorems: Connecting in Log Space

We start the favorite theorems with a result that might surprise many is still less than ten years old. Undirected Connectivity in Log-Space by Omer ReingoldPDF...

Big Data as Your Doctor
From The Eponymous Pickle

Big Data as Your Doctor

A very obvious conclusion, it was understood in the AI hype of the late 80's.  But we didn't have all the hardware or software in place to make it happen.  You...

Dispute Resolution Systems for Security Protocols
From Schneier on Security

Dispute Resolution Systems for Security Protocols

Interesting paper by Steven J. Murdoch and Ross Anderson in this year's Financial Cryptography conference: "Security Protocols and Evidence: Where Many Payment."...

Facial Encoding by Millward Brown
From The Eponymous Pickle

Facial Encoding by Millward Brown

I was reminded about Millward Brown by this article in Neurorelay.   I met with a number of their people at a conference in Poland now a number of years ago.  "...

Surveillance Generating Big Data
From The Eponymous Pickle

Surveillance Generating Big Data

 In Computing Now:  More data, now what do we do with it?    " ... Big data continues to grow exponentially, and surveillance video has become the largest source...

Are We Going To Learn How To Do That?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Are We Going To Learn How To Do That?

The other day I was demonstrating some things to my programming students. We’re at the very beginning of a new semester and students are learning the very basics...

Quick links
From Geeking with Greg

Quick links

What caught my attention lately: Colorful description of Google's servers in 1999: "A thin layer of cork to protect the motherboards from the cookie trays on which...

SOMBERKNAVE: NSA Exploit of the Day
From Schneier on Security

SOMBERKNAVE: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SOMBERKNAVE (TS//SI//REL) SOMBERKNAVE is Windows XP wireless software implant...

DARPA announces Open Catalog
From The Computing Community Consortium Blog

DARPA announces Open Catalog

On February 4, 2014, the Defense Advanced Research Projects Agency (DARPA) announced the launch of the DARPA Open Catalog, a website that brings together source...

Remaking the Industrial Economy
From The Eponymous Pickle

Remaking the Industrial Economy

From McKinsey:    Had not heard of the concept defined here.  " ... Remaking the industrial economy ... A regenerative economic model—the circular economy—is starting...

More Privacy Implications of Google Glass
From The Eponymous Pickle

More Privacy Implications of Google Glass

In Forbes. Creepier yet?  Or just a natural extension of technology into many parts of or lives.  The power of a single blink.   " .... Google Glass is on a roll...

Congressional App Challenge 2014
From U.S. Public Policy Committee of the ACM

Congressional App Challenge 2014

The first annual Congressional App Challenge, established by the U.S. House of Representatives, invites high school students to use their programming and other...

Self Washing Dishes
From The Eponymous Pickle

Self Washing Dishes

From Idea Connection. Another example of materials science advances.   Still in early development.  " .... The dishes, created in collaboration with researchers...

Big Money in Open Source
From The Eponymous Pickle

Big Money in Open Source

There is big money in open source.  " ... Data scientists that focus on open source technologies make more money than those dealing in proprietary technologies....

1971 Social Engineering Attack
From Schneier on Security

1971 Social Engineering Attack

From Betty Medsger's book on the 1971 FBI burglary (page 22): As burglars, they used some unusual techniques, ones Davidon enjoyed recalling years later, such...

Reinventing the in Store App
From The Eponymous Pickle

Reinventing the in Store App

Good discussion.  It could use some reinventing. And also some standardizing.  " ... Why exactly does a retail store need a good mobile app? There are two reasons...

Reports On Surveillance Programs Vary In Engagement With Technology
From U.S. Public Policy Committee of the ACM

Reports On Surveillance Programs Vary In Engagement With Technology

In January both the Privacy and Civil Liberties Oversight Board (PCLOB) and the President’s Review Group on Intelligence and Communications Technologies (Review...

Motorola's Research Lab
From The Eponymous Pickle

Motorola's Research Lab

Always interested in the concept of innovation and R&D labs, having been involved in several myself.  Now I see that Google has kept Motorola's labs, why?   Because...

Sandra Hughes Strategies
From The Eponymous Pickle

Sandra Hughes Strategies

Just had an excellent consultation with Sandra Hughes, former P&G colleague and compliance and privacy executive.   She has a strategies group.  See also her Linkedin...

MAESTRO-II: NSA Exploit of the Day
From Schneier on Security

MAESTRO-II: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MAESTRO-II (TS//SI//REL) MAESTRO-II is a miniaturized digital core packaged...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account