acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fate of the PC
From The Eponymous Pickle

Fate of the PC

Scoping the fate of the PC.  They seem to be morphing into the tablet.  What aspects of devices are true requirements?

[Paper] Designing customer-centric branchless banking offerings
From Putting People First

[Paper] Designing customer-centric branchless banking offerings

Designing Customer-Centric Branchless Banking Offerings Claudia McKay, Yanina Seltzer The Consultative Group to Assist the Poor (CGAP) 20 December 2013 pdf, iBook...

The Changing Cost of Surveillance
From Schneier on Security

The Changing Cost of Surveillance

From Ashkan Soltani's blog post: The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...

Nominations for the CSTA Board of Directors 2014 Election
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Nominations for the CSTA Board of Directors 2014 Election

Are you an active member of the Computer Science Teachers Association and looking to get more involved? The CSTA Board is a working board that develops policy for...

Run For the CSTA Board of Directors
From Computer Science Teachers Association

Run For the CSTA Board of Directors

Are you an educator or adminstrator with skills and drive? Have you considered putting those skills and drive to work for your CSTA? There are six vacancies...

Towards Socialogical Systems
From The Eponymous Pickle

Towards Socialogical Systems

In the Future of the CIO: Future From a Mechanical to Sociological System.  Is this a digital shift?  An academic view.

HEADWATER: NSA Exploit of the Day
From Schneier on Security

HEADWATER: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: HEADWATER (TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...

From Computational Complexity

A short History of Crypto

I taught a 3-week summer course to High School Students called Computer Science: A Hands Off Approach which did some theory. One thing I did was the following...

Andreessen Tweets
From My Biased Coin

Andreessen Tweets

My brother pointed me to this article on a great exchange of tweets about the origins of Netscape. The two highlights, for me at least.  First, Andreessen expressed...

MIT Comp Sci  Prof Explains Quantum Computing
From The Eponymous Pickle

MIT Comp Sci Prof Explains Quantum Computing

A relatively non technical article in the WSJ on the state of Quantum computing, An interview about what it is, what it might be good for, and where it may be going...

Convincing People that Smartphone Shopping is Safe
From The Eponymous Pickle

Convincing People that Smartphone Shopping is Safe

Recent events have made this more difficult, but the solutions and behavior needed are still there.  What is the particular nature of the Smartphone that makesConvincing...

The Growing Scope of the Internet of Things
From The Eponymous Pickle

The Growing Scope of the Internet of Things

Gartner says it will grow 30 time to 26 billion by 2020.   My guess that it will grow even larger, as more devices, some that we were not expecting,  come online...

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth
From Schneier on Security

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth

It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...

Teachers and Role Models in CS Education
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teachers and Role Models in CS Education

There was an interesting bit of chatting going on over Twitter about the importance of teachers as role models over the weekend. A lot of people think that having...

Gardeners vs Architects
From The Eponymous Pickle

Gardeners vs Architects

In Innovation Excellence:  A kind of designer vs analytics argument that is interesting.  We dealt with this when we added a design function.   But like in this...

Teaching Functional Programming With A Chicken That Crosses the Road
From The Female Perspective of Computer Science

Teaching Functional Programming With A Chicken That Crosses the Road

I'm currently teaching a third year course on programming paradigms.  For functional programming we look at Scheme, and for logic programming, Prolog.  I took this...

SOUFFLETROUGH: NSA Exploit of the Day
From Schneier on Security

SOUFFLETROUGH: NSA Exploit of the Day

One of the top secret NSA documents published by Der Spiegel is a 50-page catalog of "implants" from the NSA's Tailored Access Group. Because the individual implants...

So What Now?
From Computer Science Teachers Association

So What Now?

The Hour of Code was a great success and you may have had more interest than ever before in computer science, but what do you do with all that momentum? How do...

Her - The Movie Influences User Interface
From The Eponymous Pickle

Her - The Movie Influences User Interface

Back when I was giving talks at our innovation centers, the most frequently mentioned media was the move 'Minority Report'. Then just out and portraying an advertising...

Visualizing Unstructured Data
From The Eponymous Pickle

Visualizing Unstructured Data

Good overview of the topic.  Examples like 'word clouds' are typical.  And semantic nets that we used to represent the interaction between terms.   Concept maps...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account