acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

CS Educator Interview: Tom Indelicato
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Tom Indelicato

I didn’t go far from home for this one. Tom Indelicato and I teach together at Bishop Guertin High School. Some years ago I hired him to be the fill a need for...

House Committee on Ways and Means Invites Public Submissions on President Obama’s Trade Policy Agenda
From U.S. Public Policy Committee of the ACM

House Committee on Ways and Means Invites Public Submissions on President Obama’s Trade Policy Agenda

The House Committee on Ways and Means is accepting public statements for the record for Thursday’s hearing on President Obama’s trade policy agenda. The deadline...

House Hearing on Mens Rea in Federal Criminal Law on July 19
From U.S. Public Policy Committee of the ACM

House Hearing on Mens Rea in Federal Criminal Law on July 19

Friday, July 19 House Hearing on “Mens Rea: The Need for a Meaningful Intent Requirement in Federal Criminal Law” House Judiciary Committee Friday July 19, 9 a.m...

Highlights from Clayton Lewis on “The Future of Inclusive Design”
From U.S. Public Policy Committee of the ACM

Highlights from Clayton Lewis on “The Future of Inclusive Design”

At the FCC today, Computer Science Professor Clayton Lewis asserted a new paradigm for accessibility is emerging and that this paradigm may require changes to public...

2013 Microsoft Research Faculty Summit – OFF THE CHARTS
From The Computing Community Consortium Blog

2013 Microsoft Research Faculty Summit – OFF THE CHARTS

It’s impossible to convey how great this year’s Microsoft Research Faculty Summit has been:  a “who’s who” of attendees from academia; heavy participation by top...

From Computational Complexity

DUMP YOUR TABLES! (the moral of my story that started with a hat problem)

Recall from my last post: PROBLEM 1: There are n people sitting on chairs in a row. Call them p1,...,pn. They will soon have HATS put on their heads, RED or BLUE...

Data Virtualization
From The Eponymous Pickle

Data Virtualization

A very good overview of what is called data virtualization:" Data virtualization allows an organization to make its enterprise data easily available to business...

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

Cloud Reshaping Software Needs
From The Eponymous Pickle

Cloud Reshaping Software Needs

In Bain & Company:  How the cloud is reshaping the business of software.  Very true.  Some interesting statistics embedded.   In my experience just this week I...

MS Faculty Summit Day One
From My Biased Coin

MS Faculty Summit Day One

Day one of the faculty summit was a great deal of fun.  Primarily, I found I enjoyed catching up with people -- I saw a number of past/current collaborators, as...

Recent NSF Program Solicitations
From The Computing Community Consortium Blog

Recent NSF Program Solicitations

The NSF has recently issued three new program solicitations: Secure and Trustworthy Cyberspace (SaTC), Computer and Network Systems (CNS): Core Programs, and Information...

Challenges and Vision Track at Robotics: Science and Systems (RSS) 2013 Conference
From The Computing Community Consortium Blog

Challenges and Vision Track at Robotics: Science and Systems (RSS) 2013 Conference

The following entry is a special contribution to this blog from Hamidreza Chitsaz, Assistant Professor at Wayne State University. This year Hamidreza and Moslem...

Crafting a Sustainable Career
From The Eponymous Pickle

Crafting a Sustainable Career

In the HBR Blog.  (This apparently now requires a free registration)  Some thoughts about how to establish a long term career.  At first I had a problem with the...

Active Learning in Large Lectures
From The Female Perspective of Computer Science

Active Learning in Large Lectures

One of my (self-assigned) tasks lately has been to go through my teaching notes before I start planning my fall courses.  The latest topic I dug into was teaching...

Saving Money in the Cloud
From The Eponymous Pickle

Saving Money in the Cloud

In Teradata Magazine:  Agility and cost savings in the cloud. " ... Increasing the bottom line is critical for companies, and the cloud can save them money. In...

Mining the Social Web for Recruiting
From The Eponymous Pickle

Mining the Social Web for Recruiting

What recruiters know about you, whether you are looking for another job or not.  And new developments in these areas.   Note the combination of search with knowledge...

Zeebox Can Listen in
From The Eponymous Pickle

Zeebox Can Listen in

In Engadget:  And it can tell what you are listening through analyzing an audio fingerprint. More data and less privacy?

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...

Windows Phone Random Dialer Demo
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows Phone Random Dialer Demo

This is posted on day two of the annual CSTA Conference. This afternoon I am taking part in a mobile developer throw down. Three of us are writing the same program...

Hill Tech Happenings, Week of July 15
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 15

July 17 Hearing: The Senate Finance Committee will hold a hearing on health information technology 10 a.m., 215 Dirksen Building Subcommittees of the House Homeland...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account