acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cybersecurity Framework Now At Discussion Draft Stage
From U.S. Public Policy Committee of the ACM

Cybersecurity Framework Now At Discussion Draft Stage

While cybersecurity legislation slowly inches forward in Congress, the National Institute of Standards and Technology (NIST) is moving faster in implementing its...

From Computational Complexity

Did YOU think the NSA could factor fast?

Before the recent revelations about the NSA (see Lances Post and Scott's post )I would tell my class, when teaching P and NP, We have very good reasons to think...

VisiRule:  Sharable Know How
From The Eponymous Pickle

VisiRule: Sharable Know How

I am repeating part of a post from last year below, based on my reexamination of expert systems style applications:" ... expert systems to understand and improve...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.

Tiny Robotic Recon Drones in Industry
From The Eponymous Pickle

Tiny Robotic Recon Drones in Industry

The grist of many a science fiction story, tiny flying robotics that can capture information.  Studied these for information capture tasks in remote plant and warehouse...

Apple Indoor GPS System
From The Eponymous Pickle

Apple Indoor GPS System

A general description, and praise for their indoor location system plan.  I was heavily involved in these kinds of approaches for retail use and tested several"...

When Core Values are Strategic
From The Eponymous Pickle

When Core Values are Strategic

Received via the P&G Alumni Network, to be read, their description below.When Core Values Are Strategic: How the Basic Values of Procter & Gamble Transformed Leadership...

To solve hard problems, you need to use bricolage
From Daniel Lemire's Blog

To solve hard problems, you need to use bricolage

People who think that they can design efficient solutions in the abstract, effectively believe in Oracles. That is, they somehow believe that from their desk, and...

Hill Tech Happenings, Week of September 16
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of September 16

September 18 Markup: The Cybersecurity, Infrastructure Protection and Security Technologies Subcommittee of the House Homeland Security Committee will review two...

Experientia and Intel present at EPIC 2013 in London
From Putting People First

Experientia and Intel present at EPIC 2013 in London

EPIC 2013, the conference on “ethnographic praxis in industry”, kicked off in London today, with experts from around the world gathering for the three-day conference...

Reforming the NSA
From Schneier on Security

Reforming the NSA

Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...

Interesting Links 16 September 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 16 September 2013

Well I was able to blog more often last week. Paying a bit for it as I had a ton of grading to do over the weekend. When inspiration (or something that feels like...

Retailers and Private Label Packaging
From The Eponymous Pickle

Retailers and Private Label Packaging

In Foodprocessing: " ... As retailers put more emphasis on private-label products, they are relying on packaging that sets their merchandise apart, instead of mimicking...

Take Back the Internet
From Schneier on Security

Take Back the Internet

Government and industry have betrayed the Internet, and us. By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...

Food Inflation in US
From The Eponymous Pickle

Food Inflation in US

A piece by MJ Perry on Food Inflation and Prices in the US.  Inflation in food has been down considerably since the 70s.  Further instructive statistics about food...

Women in Computing–An Image To Think About
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Women in Computing–An Image To Think About

Picture from the Facebook page of www.ilovesmartwomen.com

Army Visualization
From The Eponymous Pickle

Army Visualization

The US army / SAIC is using Tableau for Data visualization.   This appears to be a descriptive visualization, as  opposed to an analytic example " ... "We have...

Project10X: Semantic Research
From The Eponymous Pickle

Project10X: Semantic Research

Brought to my attention. Semantic analysis work is always of interest.  " .... Mills Davis is founder and managing director of Project10X — a research consultancy...

How to Remain Secure Against the NSA
From Schneier on Security

How to Remain Secure Against the NSA

Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account