acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

HOWLERMONKEY: NSA Exploit of the Day
From Schneier on Security

HOWLERMONKEY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: HOWLERMONKEY (TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...

From Gödel's Lost Letter and P=NP

Global Warming?

It snowed in Atlanta, and we are closed, for the foreseeable future—where is global warming? Atlanta is frozen. Here is what we looked like the other night. Today...

Meaning of Quality Assurance
From The Eponymous Pickle

Meaning of Quality Assurance

This CW article led me to the meaning of QA ... " ... Long undervalued, quality assurance is in the limelight -- and QA pros in demand -- following the disaster...

Motivation via a Connected Cosumer
From The Eponymous Pickle

Motivation via a Connected Cosumer

Quite obvious, people are always looking at the motivation of recommendations.  Can we now get at the motivation more clearly?  (In Supermarket News, requires registration...

Side-Channel Attacks on Frog Calls
From Schneier on Security

Side-Channel Attacks on Frog Calls

The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...

Social Media in the Enterprise
From The Eponymous Pickle

Social Media in the Enterprise

Charlene Li speaks on the topic, relating to a recent study: " .... Overall, we found that investment in headcount and infrastructure have steadily grown, as companies...

To be smarter, try being crazier?
From Daniel Lemire's Blog

To be smarter, try being crazier?

Many of us want to be original in our work. For researchers, it is a job requirement. For software programmers, it makes little sense to redo what others did. Many...

Catalog of Snowden Revelations
From Schneier on Security

Catalog of Snowden Revelations

This looks to be very good. Add that to these three indexes of NSA source material, and these two summaries. This excellent parody website has a good collection...

More on DeepMind and Google
From The Eponymous Pickle

More on DeepMind and Google

In Recode:  Google continues to add AI gems to its capabilities.   Search is a part of learning, and thus enhanced by AI.   We search by pattern visually, as well...

CSTA 2014 Administration Impact Award Nominations Open
From Computer Science Teachers Association

CSTA 2014 Administration Impact Award Nominations Open

The Computer Science Teachers' Association, in partnership with Code.org, has established an award to recognize an administrator who has made an outstanding contribution...

From Computational Complexity

Snow Days

An unexpected snowstorm hits the city in the middle of a workday. The roads get hopelessly clogged and I'm lucky to get home--many others just abandoned theirguarantees...

Market Research in a Big Data World
From The Eponymous Pickle

Market Research in a Big Data World

In Knowledge@Wharton.  An extensive and interesting pieceFinding a Place for Market Research in a Big Data, Tech-enabled WorldThanks to social media and other technology...

GINSU: NSA Exploit of the Day
From Schneier on Security

GINSU: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GINSU (TS//SI//REL) GINSU provides software application persistence for the...

Presidential Commission Issues Recommendations on Improving Voting Experience
From U.S. Public Policy Committee of the ACM

Presidential Commission Issues Recommendations on Improving Voting Experience

On January 22, the Presidential Commission on Election Administration issued the report requested of it by President Obama.  Formed after reports of long lines...

Trying to Value Online Privacy
From Schneier on Security

Trying to Value Online Privacy

Interesting paper: "The value of Online Privacy," by Scott Savage and Donald M. Waldman. Abstract: We estimate the value of online privacy with a differentiated...

From Gödel's Lost Letter and P=NP

Progress On The Jacobian Conjecture

More on the crypto approach to the Jacobian Conjecture Arno van Essen is one of the world experts on the Jacobian conjecture (JC)—we have discussed his work before...

Another Loss in the Community
From CERIAS Blog

Another Loss in the Community

I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...

Another Loss in the Community
From CERIAS Blog

Another Loss in the Community

I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...

Another Loss in the Community
From CERIAS Blog

Another Loss in the Community

I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...

Smart Grid Needs an App Store
From The Eponymous Pickle

Smart Grid Needs an App Store

In IEEE Spectrum:  The electric grid is already an internet of things.   " ... Yet writing applications for these programmable machines is too hard, which blocks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account