acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The 25 “Coolest” Computer Networking Research Projects
From The Computing Community Consortium Blog

The 25 “Coolest” Computer Networking Research Projects

Network World is out with a list of the 25 “coolest” computer networking research projects: University labs, fueled with millions of dollars in funding and some...

NCWIT Award for Aspirations in Computing!
From Computer Science Teachers Association

NCWIT Award for Aspirations in Computing!

Do you know a digital diva, web chix, or coder girl? Encourage her to apply for the NCWIT Award for Aspirations in Computing! It is time to start those applications...

From Computational Complexity

Poset Games are PSPACE-complete

Consider the following game on a poset, each player takes turns picking an element x of a finite poset and removes all y ≥ x. First one to empty the poset wins....

New Secure and Trustworthy Computing Solicitation Issued
From The Computing Community Consortium Blog

New Secure and Trustworthy Computing Solicitation Issued

The National Science Foundation (NSF) last week issued a new solicitation for its Secure and Trustworthy Computing (SaTC) program: Cyberspace — a global “virtual”...

The NSA and the Risk of Off-the-Shelf Devices
From Schneier on Security

The NSA and the Risk of Off-the-Shelf Devices

Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...

Thinking About Databases
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thinking About Databases

Some years ago I had students write a program that involved managing a checkbook and balancing it. I was so proud of it. Later a student told be she linked the...

How well does peer review work?
From Daniel Lemire's Blog

How well does peer review work?

Since the second world war, science has relied on what I call traditional peer review. In this form of peer review, researchers send their manuscript to journal...

From Computational Complexity

Theory Conferences Galore

Early registration for the FOCS conference in New Jersey is September 27th. There is some travel support available for students and postdocs, deadline is this Friday...

“Big Data Gets Its Own Photo Album”
From The Computing Community Consortium Blog

“Big Data Gets Its Own Photo Album”

From The New York Times‘s Bits Blog: Rick Smolan, the photographer and impresario of media projects, has tackled all sorts of big subjects over the years, from...

Analysis of PIN Data
From Schneier on Security

Analysis of PIN Data

An analysis of 3.4 million four-digit PINs. ("1234" is the most common: 10.7% of all PINs. The top 20 PINs are 26.8% of the total. "8068" is the least common...

Improving the International Focus on STEM
From Computer Science Teachers Association

Improving the International Focus on STEM

I've been doing a lot of research lately for different projects I have at my school. Every time I research something for my unit plans or projects, I keep stumbling...

How to be happier while annoying your wife
From Daniel Lemire's Blog

How to be happier while annoying your wife

About a year ago, I read Made by Hand: Searching for Meaning in a Throwaway World by Mark Frauenfelder. It is a simple book with a simple message. How to be happy...

Advancing Analytics to Machine Learning
From The Eponymous Pickle

Advancing Analytics to Machine Learning

Things are changing in  advanced analytics.   Simple statistics  is not enough anymore.  An example from Orbitz.  Read the whole article:    "... I lead the...

Online Neuro Courses
From The Eponymous Pickle

Online Neuro Courses

Via NeuroRelay:   A number of free online courses from Coursera on topics Neurological from Coursera.  Not too much on the Neuromarketing side, but worth taking...

Recent Developments in Password Cracking
From Schneier on Security

Recent Developments in Password Cracking

A recent Ars Technica article made the point that password crackers are getting better, and therefore passwords are getting weaker. It's not just computing speed...

We Are Making Things Too Hard
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

We Are Making Things Too Hard

I once had a conversation with Bill Gates. Yes, in person, face to face. And while I will not go into the whole meeting he said a couple of things that I continue...

Market Shifts
From The Eponymous Pickle

Market Shifts

In Forbes: Adam Hartung: Growth - Dealing with Market Shifts. Innovation Matters; It’s Why You Care More About Apple than Kraft ...

Selling the Cloud
From The Eponymous Pickle

Selling the Cloud

Nicely done overview, with good graphics, about the cloud and its business implications.     " ... The next stage of cloud computing will require companies to turn...

New Horizons for Erwin Gianchandani
From The Computing Community Consortium Blog

New Horizons for Erwin Gianchandani

Erwin Gianchandani joined the Computing Community Consortium as our inaugural Director in April 2010.  Much of the success that the CCC has achieved is directly...

Price Optimization
From The Eponymous Pickle

Price Optimization

Another example of the use of price optimization in retail.   Many large retailers have tested the idea.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account