acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging:  Squid Ink as a Condiment
From Schneier on Security

Friday Squid Blogging: Squid Ink as a Condiment

Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.

The Myth of The All-nighter
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Myth of The All-nighter

All-nighters, those storied tales of spending all night in the computer lab or the library trying to meet a school deadline, came up in a Facebook conversationlaw...

How To Tell if Your Hotel Guest Is a Terrorist
From Schneier on Security

How To Tell if Your Hotel Guest Is a Terrorist

From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist. I myself have...

Posts from FOCS (Part 3)
From My Biased Coin

Posts from FOCS (Part 3)

Continuing posts from FOCS, with several guest-writers and guest-editor Justin Thaler.[Editor: This is Part 3 in our series of posts covering FOCS 2012. Part 4,...

Seeking Nominations for the 2013 Women of Vision Awards
From The Female Perspective of Computer Science

Seeking Nominations for the 2013 Women of Vision Awards

I serve on the Advisory Board of the Anita Borg Institute, an organization focused on increasing women's participation in the technology workforce --- as technologists...

Finessing Stallman’s Pragmatism
From Wild WebMink

Finessing Stallman’s Pragmatism

Not a title that you might expect to see, but Richard Stallman has indeed posted a pragmatic proposal for dealing with software patents – to limit enforceability...

How Terrorist Groups Disband
From Schneier on Security

How Terrorist Groups Disband

Interesting research from RAND: Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...

Are You Ready for Computer Science Education Week?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Are You Ready for Computer Science Education Week?

I’m a big fan of CSEdWeek (Computer Science Education Week) and in the past I have done school visits and hosted field trips at Microsoft offices during the week...

Does Rooting Void Your Warranty?
From Wild WebMink

Does Rooting Void Your Warranty?

Find out on ComputerWorldUK

Seeking Deaf and Hard of Hearing Students Interested in Computing!
From Computer Science Teachers Association

Seeking Deaf and Hard of Hearing Students Interested in Computing!

Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer...

Seeking Deaf and Hard of Hearing Students Interested in Computing!
From Computer Science Teachers Association

Seeking Deaf and Hard of Hearing Students Interested in Computing!

Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer...

From Gödel's Lost Letter and P=NP

The Power Of Guessing

Some results and ideas on guessing and nondeterminism David Doty and Michael Wehar are theorists who work in different areas of computational complexity, and are...

Gary McGraw on National Cybersecurity
From Schneier on Security

Gary McGraw on National Cybersecurity

Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted. Creating a cyber-rock is cheap. Buying...

Devices and Software
From The Eponymous Pickle

Devices and Software

O'Reilly talks about Square Wallet and a number of other software developments. I have also been introduced recently to some Apps that interact with health data...

From Computational Complexity

Andrew Goldberg guest blog on new max flow result

Guest Blog by Andrew Goldberg on the recent Max Flow in O(nm) time algorithm. Maximum Flow in O(nm) Time Recently, Jim Orlin published an O(nm) maximum flow algorithm...

Micromorts
From Schneier on Security

Micromorts

Here's a great concept: a micromort: Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...

Driving Open Source
From Wild WebMink

Driving Open Source

Here’s my interview with this month’s Oracle Java Magazine about the forces driving open source and the need for open source skills.

Should Computer Science Teachers Be Paid More Than Gym Teachers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Should Computer Science Teachers Be Paid More Than Gym Teachers

I first ran into the question of paying faculty based on the subject they taught some years ago during an industry advisory meeting for a university computer science...

At the VA Center for Applied Engineering
From The Eponymous Pickle

At the VA Center for Applied Engineering

Gave a talk at the VA Center for Applied Engineering today in  Indianapolis on the integration of design and analytically driven innovation.  Also got to see poster...

New Degree of Analytic Learning
From The Eponymous Pickle

New Degree of Analytic Learning

A new degree of analytic learning?    An interesting interview:  " ... Barbara Wixom is an associate professor at University of Virginia’s McIntire School of Commerce...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account