acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Why do students pay for the research professors do?
From Daniel Lemire's Blog

Why do students pay for the research professors do?

Universities require their professors to publish research papers. Yet publishing your research has little to do with most of the teaching that goes on in universities...

Friday Squid Blogging: William Gilly, Squid Researcher
From Schneier on Security

Friday Squid Blogging: William Gilly, Squid Researcher

Good article. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

PBX Project
From Wild WebMink

PBX Project

I’ve written a bit about my holiday project to try the Raspberry Pi as a PBX over on InfoWorld today.

I Seem to Be a Verb
From Schneier on Security

I Seem to Be a Verb

From "The Insider's TSA Dictionary": Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...

Becoming a Police Informant in Exchange for a Lighter Sentence
From Schneier on Security

Becoming a Police Informant in Exchange for a Lighter Sentence

Fascinating article. Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison...

Who Uses Neuromarketing?
From The Eponymous Pickle

Who Uses Neuromarketing?

During the early days of our cognitive science work we often asked this question. Who among Fortune 500 companies have used techniques to measure and understand...

End of the Public Phone Network
From The Eponymous Pickle

End of the Public Phone Network

In IEEE Spectrum:   Will this system end by 2018?    The 134 year old public phone network is dying.  What are the implications of changes to the network and how...

Predicting A Supply Chain Network of Fast Data
From The Eponymous Pickle

Predicting A Supply Chain Network of Fast Data

I don't normally like yearly predictions.  But I found these to be thought provoking.  They all deal with the long proposed suggestion that increasingly transparent...

Decepticons
From The Eponymous Pickle

Decepticons

Research at Ga Tech is using 'deception' methods used in nature to enhance behavioral models.  Have always been interested in biological models.  They have often...

The Future Belongs To The Creators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Future Belongs To The Creators

A lot of people are thinking about the future this time of year. I’ve got a few ideas myself. This is the year I’ve done a lot with apps on phones and tablets....

Breaking Hard-Disk Encryption
From Schneier on Security

Breaking Hard-Disk Encryption

The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work? Elcomsoft Forensic Disk...

From Computational Complexity

2012 Complexity Year in Review

As we turn our thoughts from Turing to Erdős, a look back at the complexity year that was. Written with help from co-blogger Bill Gasarch. The complexity result...

Public Shaming as a Security Measure
From Schneier on Security

Public Shaming as a Security Measure

In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...

Changing Perceptions of Big Data
From The Eponymous Pickle

Changing Perceptions of Big Data

From Inside Analysis.  Here I disagree in one sense and agree in another. .  It is true that it has never entirely been about the size of the data.  What we have...

On News Aggregation: Added Value Facts
From The Eponymous Pickle

On News Aggregation: Added Value Facts

In CACM:  News aggregation is a common thing in the internet.  Many sites and blogs find news in their specialty areas, and the results are redistributed to different...

$99 Tablet
From The Eponymous Pickle

$99 Tablet

Akin to the $99 laptop, the $99 tablet, which I wrote about in the enterprise some long time ago with the hope of getting some support to drive it world-wide.  Is...

Reinventing American Manufacturing – The Role of Innovation
From The Computing Community Consortium Blog

Reinventing American Manufacturing – The Role of Innovation

An excellent article by MIT’s Bill Bonvillian, just out in the MIT Press journal Innovations.  Bill’s prescription: The U.S. must develop an integrated strategy...

Reorganizing the Web to Get Stuff Done
From The Eponymous Pickle

Reorganizing the Web to Get Stuff Done

A big part of this is reorganizing search, a big component of our use of the Web.  This article talks about that from the search engine Bing's perspective.   Isee...

The Importance of Mentoring
From Computer Science Teachers Association

The Importance of Mentoring

My school celebrated CS Ed Week with a visit from alumni who are working in CS-related careers. One alumnus spoke to my students over skype about his career in...

War Gaming Innovation Strategy
From The Eponymous Pickle

War Gaming Innovation Strategy

Battle testing an innovation strategy.  In the McKinsey  Quarterly.    This does remind me of defense department approaches, that were reimplemented in big enterprise...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account