acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Text Message Retention Policies
From Schneier on Security

Text Message Retention Policies

The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...

Managing Supply Chain Risks
From The Eponymous Pickle

Managing Supply Chain Risks

And the dangers of an opaque supply chain.  And how this increases in a complicated world.  And how this relates to the recent horsemeat scandal.   " ... Two...

Nielsen Tracking
From The Eponymous Pickle

Nielsen Tracking

In Adage:  How Nielsen tracks almost everything, with some mini case studies of how it works. Instructive.

Story Graph Example Inspired by The Paper Bag Princess
From The Female Perspective of Computer Science

Story Graph Example Inspired by The Paper Bag Princess

Without giving too much away, I wanted to share an early example of the types of story graphs I'm working on for my thesis.  This was my first example, and it's...

NSF Launches Search Committee for Advanced Cyberinfrastructure Division Director
From The Computing Community Consortium Blog

NSF Launches Search Committee for Advanced Cyberinfrastructure Division Director

The following was submitted by Farnam Jahanian, NSF Assistant Director for CISE. Dear Colleagues, The National Science Foundation CISE Directorate is pleased to...

From Computational Complexity

The Slot Machine Theory of Paper Submissions

Why do scientists publish so much? There is the whole "publish or perish" thing but that doesn't explain the large increase in quantity of publications. With a...

Cheap Data Visualization
From The Eponymous Pickle

Cheap Data Visualization

There are lot of possibilities here.  This slideshow outlines them.  I also see  that Tableau 8 is out today, plan to look at that excellent package for interactive...

Leveson Collateral Damage
From Wild WebMink

Leveson Collateral Damage

I just sent this to my MP.  Feel free to borrow from it. Dear $MP, I’m one of your constituents ($postcode), as well as being a pro bono director of Open Rights...

When Technology Overtakes Security
From Schneier on Security

When Technology Overtakes Security

A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...

Math, Physics, Art and the Spirograph
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Math, Physics, Art and the Spirograph

When I was a kid there were a number of spirograph toys available. Some, like the ones available today, had gears and circles with sprockets. One very old toy that...

The Future of MOOC U
From The Eponymous Pickle

The Future of MOOC U

In the Pennsylvania Gazette, an excellent and detailed article on Massively Open Online Courses (MOOCs).  My undergraduate alma mater, The University of Pennsylvania...

Consumer Cloud for Mobile Health Data
From The Eponymous Pickle

Consumer Cloud for Mobile Health Data

A not unexpected development.  Standards will lead to the application of analytics:WebMD, Qualcomm build consumer cloud for mobile health dataWebMD is also building...

Urban Mobility Innovation
From The Eponymous Pickle

Urban Mobility Innovation

A topic of particular interest, special report:Next Stop, Innovation: What’s Ahead for Urban Mobility? Transportation in the 21st century is entering a robust phase...

Upcoming Event – ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet”
From U.S. Public Policy Committee of the ACM

Upcoming Event – ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet”

ACM Turing Award Recipient Dr. Vint Cerf on “Reinventing the Internet” Monday, May 13, 2013, 6:30 pm Google DC 1101 New York Avenue, N.W. Washington, D.C. 20005...

Robotics Roadmap 2.0 on the Hill
From The Computing Community Consortium Blog

Robotics Roadmap 2.0 on the Hill

The Congressional Robotics Caucus held a briefing this morning on the Robotics Roadmap 2.0(PDF), a follow up report to the CCC-led Robotics Roadmap(PDF) published...

Revenue Management with Negotiation
From The Eponymous Pickle

Revenue Management with Negotiation

University of Cincinnati's research seminars organized by the  Operations, Business Analytics, and Information Systems (OBAIS) department at the Carl H. Lindner...

Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research
From The Computing Community Consortium Blog

Call for White Papers on Mid-Scale Infrastructure Investments for Computing Research

The Computing Community Consortium is seeking community input to better understand the potential needs and payoff for additional investments in mid-scale infrastructure...

Using the Code.org Video for Grassroots Advocacy
From Computer Science Teachers Association

Using the Code.org Video for Grassroots Advocacy

The code.org video has started a lot of conversations, but it takes you to bring that conversation home to your school district. Here is a 5-minute advocacy idea...

From Gödel's Lost Letter and P=NP

The Thousand Percent Solution

Boeing Dreamliner’s battery of problems Ray LaHood was until recently the top FAA administrator, the head of the U.S. agency that oversees air safety for the United...

Book: A History of Future Cities
From Putting People First

Book: A History of Future Cities

A History of Future Cities by Daniel Brook W. W. Norton & Company 2013 – 480 pages [Amazon link] The new book A History of Future Cities looks at the attempts of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account