acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid Watch
From Schneier on Security

Friday Squid Blogging: Squid Watch

I like watches with no numbers. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Has the Office Started to Look Like the Home?
From The Eponymous Pickle

Has the Office Started to Look Like the Home?

The home office has not killed the office,  But is mobile starting to kill the office?  Further has the office started to look like the home?  This article from...

XKeyscore
From Schneier on Security

XKeyscore

The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...

<i>Cryptography Engineering</i> Book Review
From Schneier on Security

Cryptography Engineering Book Review

Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography. Best -- at least to me -- is the list of things missing, which...

USACM Outlines Limitations Of Computing For Privacy and Civil Liberties Oversight Board
From U.S. Public Policy Committee of the ACM

USACM Outlines Limitations Of Computing For Privacy and Civil Liberties Oversight Board

The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent federal agency established based on recommendations of the 9/11 Commission. It’s responsible...

Computers Really Are Everywhere
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computers Really Are Everywhere

Last week I took a little drive. Something around 10 miles in something under 8 minutes I guess. That’s me behind the wheel of a NASCAR race car. I rode with a...

A Picture of Me Dancing With Graphs
From The Female Perspective of Computer Science

A Picture of Me Dancing With Graphs

On Wednesday, I did my annual mentoring with Girls @ Virtual Ventures, the all-female section of the popular science and engineering camp held at Carleton.  AsCS...

P&G's Changes in Spending
From The Eponymous Pickle

P&G's Changes in Spending

In AdAge:   A good detailed piece on P&G's moves in ad spending. " ... P&G's marketing spend is about one-third digital, CEO says  Procter & Gamble is directing...

Cars Generating Data
From The Eponymous Pickle

Cars Generating Data

It is estimated that the self driving car wll generate a GB of data per second.  More opportunity for a dense and volatile data stream for mining.

Changing the Retail Experience
From The Eponymous Pickle

Changing the Retail Experience

In GigaOM:  " ... Its Thanks to the mass market shift to e-commerce and the rise of maker-oriented sites, the way we shop is changing. Grommet a startup out of...

False Positives and Ubiquitous Surveillance
From Schneier on Security

False Positives and Ubiquitous Surveillance

Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments. This seems not to be the NSA eavesdropping...

Electroceuticals
From The Eponymous Pickle

Electroceuticals

In IEEE Spectrum: And once drugs have been changed to implants, there is no reason we can't also gather data with sensors at the same time.   At first I thought...

RFID Temperature Sensors
From The Eponymous Pickle

RFID Temperature Sensors

A number of interesting developments.  Including a temperature sensor with a probe that could be used for temperature controlled supply chain and on shelf retail...

USACM Statement to the House Ways and Means Committee on Intellectual Property Provisions in Trade Agreements
From U.S. Public Policy Committee of the ACM

USACM Statement to the House Ways and Means Committee on Intellectual Property Provisions in Trade Agreements

The ACM U.S. Public Policy Council today submitted a statement to the House Ways and Means Committee as part of the record for the hearing on “President Obama’s...

<i>Economist</i> Cyberwar Debate
From Schneier on Security

Economist Cyberwar Debate

Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.

From Computational Complexity

Why is Multiplication Hard?

Quick. What is 879544 * 528045? Unless you used a calculator or was some sort of savant you it would take you a couple of minutes to figure out a solution. Of course...

Coming Soon to Your Classroom?
From Computer Science Teachers Association

Coming Soon to Your Classroom?

"Adaptive learning" has been in the edu-buzz lexicon for some time. A new application of the strategy has recently made notable gains at Career Education, Inc.....

Smart Tooth Sensors
From The Eponymous Pickle

Smart Tooth Sensors

Might be interesting to toothpaste manufacturers.  In Mashable:  " ... The system places the mouth sensor inside an artificial tooth. A small accelerometer detects...

Encouraging the Internet of Things
From The Eponymous Pickle

Encouraging the Internet of Things

Gartner Encourages early Adopters. Internet of things has long been developed.  Now it is getting closer.   " ... Gartner claims IT leaders that get to grips with...

Tracking your Cellphone Identity
From The Eponymous Pickle

Tracking your Cellphone Identity

In New Scientist:   Had heard of this, but it's apparently more accurate than I had thought.  Here in some technical detail.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account