acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

<i>Applied Cryptography</i> Available Online
From Schneier on Security

Applied Cryptography Available Online

I'm sure this is a pirated copy. Looking at it, it's amazing how long ago twenty years was.

Participate in an IdeasLab on Undergraduate Education
From The Computing Community Consortium Blog

Participate in an IdeasLab on Undergraduate Education

The National Science Foundation (NSF) has released a Dear Colleague Letter (DCL) on “Preparing Applications to Participate in Phase I Ideas Labs on Undergraduate...

Complexity Science Examined
From The Eponymous Pickle

Complexity Science Examined

So what is complexity science and how can it be useful?  From the Santa Fe Institute.  A long time partner of ours in this space, that helped us navigate its usefulness...

A Case for Business Intelligence and Big Data
From The Eponymous Pickle

A Case for Business Intelligence and Big Data

From TDWI:    I like looking at this as a business case.   " ... What do companies do when they need the power of analytics to be increased with decision support...

Increasing Smartphone Mobile Commerce in China
From The Eponymous Pickle

Increasing Smartphone Mobile Commerce in China

Related to my recent post on NantMobile.  Adage Global talks about the Chinese the move forward.  Yes, I am seeing it." ... Mobile Advertising Lags China's Smartphone...

Income Inequality as a Security Issue
From Schneier on Security

Income Inequality as a Security Issue

This is an interesting way to characterizing income inequality as a security issue: …growing inequality menaces vigorous societies. It is a proxy for how effectively...

Blueprint for Building a Quantum Computer
From The Eponymous Pickle

Blueprint for Building a Quantum Computer

In CACM:  More on this interesting topic.  " ... In this article, we review the progress that has been made in developing architectures for full-scale quantum computers...

Security on the Internet of Things
From The Eponymous Pickle

Security on the Internet of Things

In the Cisco Blog:  (Which I have found to be very informative).   Remember the hacked refrigerator." ... The SANS Institute just completed a survey on the security...

NIGHTWATCH: NSA Exploit of the Day
From Schneier on Security

NIGHTWATCH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTWATCH (TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...

Google Adds Sources
From The Eponymous Pickle

Google Adds Sources

Google adds sources to search results, via its Knowledge Graph.   A suggestion in the piece suggests that a better solution would be a reliability score based on...

Accelerate Disruptive Innovation
From The Eponymous Pickle

Accelerate Disruptive Innovation

Innovating faster.  And focusing your innovation to value.   Part of that task  is to be able to evaluate innovations in context, as quickly and accurately as possible...

Google Glass for Firefighters
From The Eponymous Pickle

Google Glass for Firefighters

Several years ago I worked on a project meant to focus key data about operations to firefighters.   A kind of augmented reality for a highly dynamic task.  ...

From Computational Complexity

What will we wrought?

When I went to college in the early 80's, students protested against college endowments invested in companies that had business in apartheid South Africa. My mother...

Consumer Manipulation
From Schneier on Security

Consumer Manipulation

Tim Hartford talks about consumer manipulation: Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...

Role of Branding in the Product Life Cycle
From The Eponymous Pickle

Role of Branding in the Product Life Cycle

Examining the curious role of brand in the product life cycle By James Richardson, Ph.D. on January 22nd, 2014  A new report debunks the notion that brand defines...

Current Trends in Visualization
From The Eponymous Pickle

Current Trends in Visualization

In Computing Now:  A snapshot of current trends in visualization.  " ... For this issue of Computing Now, we gathered a set of articles that exemplifies current...

Want to win $1,000,000,000 (yes, that’s one billion dollars)?
From The Computing Community Consortium Blog

Want to win $1,000,000,000 (yes, that’s one billion dollars)?

All you have to do is create the PERFECT March Madness bracket.  If you manage to do so, Warren Buffett and Berkshire Hathaway will pay you $1,000,000,000, as reported...

NIGHTSTAND: NSA Exploit of the Day
From Schneier on Security

NIGHTSTAND: NSA Exploit of the Day

Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTSTAND (TS//SI//REL) An active 802.11 wireless exploitation and injection...

Refrigerator Sending Spam Messages?
From Schneier on Security

Refrigerator Sending Spam Messages?

Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...

Automobiles and Information Technology
From The Eponymous Pickle

Automobiles and Information Technology

In Knowledge@Wharton:   After the home and office, the automobile is the next place to deal with data and decision.  It will include many challenges ." ... TheIf...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account