acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Crowdsourcing Forest Monitoring
From The Eponymous Pickle

Crowdsourcing Forest Monitoring

In Google Lat Long:  Having been involved in several crowd sourcing efforts, its always good to see further and more complex examples.  Mapping would seem to be...

Colbert Report on the Orangutan Cyberthreat
From Schneier on Security

Colbert Report on the Orangutan Cyberthreat

Very funny video expos

Taking Advantage of the Interest in Games
From Computer Science Teachers Association

Taking Advantage of the Interest in Games

I am writing this at the Games, Learning and Society Conference (http://www.glsconference.org/2012/index.html) in Madison, Wisconsin. This is an interesting and...

Coke's Holistic View
From The Eponymous Pickle

Coke's Holistic View

In Supermarket News:Coca-Cola is about 1

Anthropologist Gabriella Coleman Studying Hacker Culture
From Putting People First

Anthropologist Gabriella Coleman Studying Hacker Culture

As a grad student in anthropology, Gabriella Coleman was warned that studying the culture of computer hackers would make it hard to get a job teaching in a university...

Economic Analysis of Bank Robberies
From Schneier on Security

Economic Analysis of Bank Robberies

Yes, it's clever: The basic problem is the average haul from a bank job: for the three-year period, it was only

From Gödel's Lost Letter and P=NP

Cricket, 400, and Complexity Theory

A random cross-section of our first 400 posts (src) Brian Lara remains the only cricket batsman to score 400 or more runs in one innings of a Test Match. In fact...

My STEMinist Profile
From The Female Perspective of Computer Science

My STEMinist Profile

Back in April, I was featured on STEMinist and forgot to mention it here!Find out what my answers were to such questions as 'What inspired you to pursue a career...

VSN Strategies
From The Eponymous Pickle

VSN Strategies

I have just become involved in a new collaboration with James Tenser of VSN Strategies.    " ... Consultant to the retail consumer products industry and authorSee...

Computer Science in the Common Core
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science in the Common Core

Anyone who reads this blog regularly knows that I really believe that we need more computer science in education long before university. The only national influence...

Far-Fetched Scams Separate the Gullible from Everyone Else
From Schneier on Security

Far-Fetched Scams Separate the Gullible from Everyone Else

Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?" Abstract: False positives cause many promising detection...

CFP: public-facing papers on Youth Movements / Youth Organizations
From Apophenia

CFP: public-facing papers on Youth Movements / Youth Organizations

Scholars, researchers, & academics – we need your help!

The Public Domain: Surveillance in Everyday Life
From Putting People First

The Public Domain: Surveillance in Everyday Life

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper by Alice Marwick argues that closely examining...

Context is key to making computers better conversationalists
From Putting People First

Context is key to making computers better conversationalists

When communicating, context is king. A breakthrough in modelling context in human communication could make computers better conversationalists, according to cognitive...

Postal Strategy
From The Eponymous Pickle

Postal Strategy

It has been obvious that the US Postal Service needs to adapt to change.  Wharton discusses this in some detail.   They have changed considerably, introducing many...

Degrees of Separation
From The Eponymous Pickle

Degrees of Separation

In CACM:  Reexamining the popular meme of tight connectivity of our social network.  The small world.    In 2000 we visited the Santa Fe Institute for a workshop...

NIST
From The Computing Community Consortium Blog

NIST

“How is the general population of researchers and institutions to meet [the needs of] ‘Big Data’?” That was the question posed last week by Ian Foster, director...

From Computational Complexity

The Ketchup Problem

MIT scientists are working on a bottle of ketchup where you CAN get out every last drop.  See here for details and some nice videos of the new bottle in action....

Apple Patents Data-Poisoning
From Schneier on Security

Apple Patents Data-Poisoning

It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling": Abstract: Techniques to pollute electronic profiling...

A Database Ripe For Abuse
From Wild WebMink

A Database Ripe For Abuse

The draft Communications Data Bill is of great concern, not primarily because it lacks controls over who can access private data – these will be added – but because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account