acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Conspiracy Theories and the NSA
From Schneier on Security

Conspiracy Theories and the NSA

I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is...

Calling for Proposals: Creating Visions for Computing Research
From The Computing Community Consortium Blog

Calling for Proposals: Creating Visions for Computing Research

The mission of Computing Research Association’s (CRA) Computing Community Consortium (CCC) is to catalyze the computing research community and enable the pursuit...

From Computational Complexity

Myhill Nerode versus Pumping Lemma

I have seen some recent backlash against the pumping lemma for showing that languages are not regular and as I am now teaching regular languages I had to choose...

Scoping the Digital Divide
From The Eponymous Pickle

Scoping the Digital Divide

Pew Statistics on US access to the Internet.  20% of US adults have no access. But is that fair since most US libraries do have public connections to the net?  Plus...

The NSA's Cryptographic Capabilities
From Schneier on Security

The NSA's Cryptographic Capabilities

The latest Snowden document is the US intelligence "black budget." There's a lot of information in the few pages the Washington Post decided to publish, including...

Experience design is now part of business logic
From Putting People First

Experience design is now part of business logic

Om Malik of GigaOm argues that the cambrian explosion of mobile apps and cloud-based services as well as the exponential growth of data has led him to a very simple...

Selected videos from “The Conference” in Sweden
From Putting People First

Selected videos from “The Conference” in Sweden

Media Evolution The Conference is an international conference organized annually in Malmö, Sweden. The event focuses on factors that are affecting our society,...

Thoughts on clever cities
From Putting People First

Thoughts on clever cities

The multiplexed metropolis Enthusiasts think that data services can change cities in this century as much as electricity did in the last one. The Economist – in...

Rebecca Solnit on the downside of social and mobile technology
From Putting People First

Rebecca Solnit on the downside of social and mobile technology

Rebecca Solnit writes – in an excellent piece – that she feels as though she is in a bad science fiction movie where everyone takes orders from tiny boxes that...

The Book on Intelligent Data Analysis
From The Eponymous Pickle

The Book on Intelligent Data Analysis

This book was brought to my attention during our artificial intelligence days.   It has gone through another edition since I taught from it.   Profited from its...

Pictures of My New Office
From The Female Perspective of Computer Science

Pictures of My New Office

I moved into my new office on Tuesday, and finally decorated a little bit.  Here are some photos of my new home!My teaching and office hours are now posted on the...

The NSA is Breaking Most Encryption on the Internet
From Schneier on Security

The NSA is Breaking Most Encryption on the Internet

The new Snoden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics...

The Effect of Money on Trust
From Schneier on Security

The Effect of Money on Trust

Money reduces trust in small groups, but increases it in larger groups. Basically, the introduction of money allows society to scale. The team devised an experiment...

U.S. Access Board Public Meeting on September 11
From U.S. Public Policy Committee of the ACM

U.S. Access Board Public Meeting on September 11

The U.S. Access Board, an independent federal agency, will hold its regular public Board Meeting on Wednesday, September 11, 2013, in Washington, D.C. The meeting...

State Assessment Requirements and the CSTA Resources
From Computer Science Teachers Association

State Assessment Requirements and the CSTA Resources

How have you used the resources on the CSTA website? Have you read the new reports? Are you familiar with the CSTA K-12 Computer Science Standards? The crosswalks...

<i>Journal of Homeland Security and Emergency Management</i>
From Schneier on Security

Journal of Homeland Security and Emergency Management

I keep getting alerts of new issues, but there are rarely articles I find interesting.

Games Engaging Customers
From The Eponymous Pickle

Games Engaging Customers

In Innovation Excellence:  About game dynamics engaging your customers.   Includes a number of examples I had not heard of.   Also makes an often forgotten point...

Gamification and Sales
From The Eponymous Pickle

Gamification and Sales

An example of using Gamification for sales support.    " .... created a remote online customer sales chat platform that implements gamification to encourage remote...

Human/Machine Trust Failures
From Schneier on Security

Human/Machine Trust Failures

I jacked a visitor's badge from the Eisenhower Executive Office Building in Washington, DC, last month. The badges are electronic; they're enabled when you check...

Pew: 86% of USA adults make efforts to hide digital footprints online
From Putting People First

Pew: 86% of USA adults make efforts to hide digital footprints online

Pew Research Center found that 86 percent of surveyed adult Internet users in the U.S. have made efforts to obscure their “digital footprints” — which could include...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account