acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

USACM Offers Comments on Federal Cybersecurity R&D Strategy
From U.S. Public Policy Committee of the ACM

USACM Offers Comments on Federal Cybersecurity R&D Strategy

The National Science Foundation (NSF) sought comments on the Federal Cybersecurity Research and Development Plan. The plan was released in late 2011, and NSF was...

Boosting Productivity with Social Media
From The Eponymous Pickle

Boosting Productivity with Social Media

In the HBR Blogs:  A video interview with Alexandra Samuel. Some interesting points here.   Yes, I believe this can be done, selectively.  I do not yet believeVision...

Seven questions with library anthropologist Nancy Fried Foster
From Putting People First

Seven questions with library anthropologist Nancy Fried Foster

In her work anthropologist Nancy Fried Foster applies anthropological principles to the study of the university’s libraries and their users. By focusing on the...

Dan Saffer on how we *should* interact with the automobiles of the (near) future
From Putting People First

Dan Saffer on how we *should* interact with the automobiles of the (near) future

Smart Design’s Dan Saffer discusses on Fast Company on how we should interact with the automobiles of the (near) future: “What will this feel like, riding in our...

How technology has restored the soul of politics
From Putting People First

How technology has restored the soul of politics

Longtime political operative Joe Trippi advocates a bottom-up, people-centered politics, and cheers the innovations of Obama 2012, saying they restored the primacy...

Desperate Convenience:  Login with Facebook, Google and LinkedIn
From CERIAS Blog

Desperate Convenience:  Login with Facebook, Google and LinkedIn

Is your management thinking about allowing people to login to your precious systems by using their Facebook, Google or LinkedIn accounts? What are the risks?...

Login with Facebook, Google and LinkedIn
From CERIAS Blog

Login with Facebook, Google and LinkedIn

Is your management considering logins using Facebook, Google or LinkedIn accounts? What are the risks? One consideration is password policies. I experimented...

Design in the service of austerity
From Putting People First

Design in the service of austerity

The UK government’s deficit reduction plan may fall short of its targets, prompting speculation that austerity measures will have to continue into the next parliament...

China Now Blocking Encryption
From Schneier on Security

China Now Blocking Encryption

The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in...

How To Become A CS Education Thought Leader
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How To Become A CS Education Thought Leader

I don’t think many people set out to be thought leaders. I sure didn’t but yet I have been called that from time to time. I think that is more flattering than true...

Neelie Kroes Endorses Open Source
From Wild WebMink

Neelie Kroes Endorses Open Source

This video message from EU vice president Neelie Kroes includes a fantastic explanation of the benefits of open source for public administrations.  

Getting Ready for SIGCSE 2013
From Computer Science Teachers Association

Getting Ready for SIGCSE 2013

Somewhere I read that I should buy a plane ticket three months before a trip in order to get the best price. If that's right, then I'm almost two weeks overdue...

Mobile Ads Fail
From The Eponymous Pickle

Mobile Ads Fail

In AdAge:  Why Mobile Ads Still Fail.  Interesting look into the industry and related statistics.   Is it because we just don't want them on our phone?

Research Article About Me: Creating Compelling Computer Games
From The Female Perspective of Computer Science

Research Article About Me: Creating Compelling Computer Games

There's a nice story about my research on the Carleton website.  I'm particularly happy to see it because it hasn't been easy to figure out my exact thesis project...

On Precise Innovation Terminology
From The Eponymous Pickle

On Precise Innovation Terminology

Having better terminology for innovation, like it is for many things, makes lots of sense.  I find myself often getting into debates about analytics based on this...

Looking for fail2ban++
From CERIAS Blog

Looking for fail2ban++

If you're looking for a worthwhile project, here's something that could benefit most security practitioners. The application "fail2ban" has been extremely useful...

From Gödel's Lost Letter and P=NP

Branch And Bound—Why Does It Work?

One of the mysteries of computational theory source—our congratulations George Nemhauser is one of the world experts on all things having to do with large-scale...

Oak Ridge Visualization
From The Eponymous Pickle

Oak Ridge Visualization

A short piece on the use of visualization methods at Oak Ridge Labs.   Using multiple projectors and images for analytics.  Working on a project now that includes...

Information-Age Law Enforcement Techniques
From Schneier on Security

Information-Age Law Enforcement Techniques

This is an interesting blog post: Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...

Looking Back On CSEdWeek 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Looking Back On CSEdWeek 2012

Last week was Computer Science Education week aka CSEdWeek. This was by far the biggest most active CSEdWeek yet. There are over 3,400 pledges to do something...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account