acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

XKCD on the CIA Hack
From Schneier on Security

XKCD on the CIA Hack

So true.

Google Helping to Restore Bletchley Park
From The Eponymous Pickle

Google Helping to Restore Bletchley Park

Google reports that they are contributing to the restoration of Bletchley Park, one of the birthplaces of both computing and code breaking. I am a long time follower...

Zodiac Cipher Cracked
From Schneier on Security

Zodiac Cipher Cracked

I admit I don't pay much attention to pencil-and-paper ciphers, so I knew nothing about the Zodiac cipher. Seems it has finally been broken: The Zodiac Killer...

Our First Ultrasound (Technology is Awesome!)
From The Female Perspective of Computer Science

Our First Ultrasound (Technology is Awesome!)

I got my first ultrasound on Wednesday.  Baby was 20 weeks old.  I think the grandparents-to-be were more excited about the baby itself; we just might have been...

Designing for Social Norms (or How Not to Create Angry Mobs)
From Apophenia

Designing for Social Norms (or How Not to Create Angry Mobs)

In his seminal book “Code”, Larry Lessig argued that social systems are regulated by four forces: 1) the market; 2) the law; 3) social norms; and 4) architecture...

Why Democracy Needs Computer Science Education
From The Computing Community Consortium Blog

Why Democracy Needs Computer Science Education

The following is a special contribution to this blog from Henry Kautz, Chair of the Department of Computer Science at the University of Rochester. His research...

German Police Call Airport Full-Body Scanners Useless
From Schneier on Security

German Police Call Airport Full-Body Scanners Useless

I'm not surprised: The weekly Welt am Sonntag, quoting a police report, said 35 percent of the 730,000 passengers checked by the scanners set off the alarm more...

Feedback Method
From The Eponymous Pickle

Feedback Method

We effectively used this method for personal feedback in the enterprise. Simple, easy to remember.

Education Leadership Day 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Education Leadership Day 2011

Leadership Day is a project started by Scott McLeod and is now in its fourth year. The idea is for people to “blog about whatever you like related to effectivePartners...

Layer Adding Object Recognition
From The Eponymous Pickle

Layer Adding Object Recognition

In Fast Company. QR codes has received lots of positive press recently. But Augmented Reality had the potential of replacing QR codes by providing information...

i.am FIRST
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

i.am FIRST

I

Slogans vs  Logos
From The Eponymous Pickle

Slogans vs Logos

Penn's always interesting language log blog has an interesting post about how while verbal slogans can be resisted as a form of meme, logos and graphical formsThe...

Sock Monkey and Computer Science Advocacy Specialists
From Computer Science Teachers Association

Sock Monkey and Computer Science Advocacy Specialists

The CSTA Computer Science Advocacy Specialists play a huge role in advocating for K-12 computer science education at the state and national level. Here is Sock...

Home-Made Wi-Fi Hacking, Phone Snooping, UAV
From Schneier on Security

Home-Made Wi-Fi Hacking, Phone Snooping, UAV

Impressive.

From Apophenia

Everyone’s abuzz with the “nymwars,” mostly in response to Google Plus’ decision to enforce its “real names” policy. At first, Google Plus went on a deleting spree...

Empower Media Marketing to Acquire MIG
From The Eponymous Pickle

Empower Media Marketing to Acquire MIG

I have mentioned Market Intelligence Group here a number of times. More companies should be using their analytical methods. Now they are being acquired by Empower...

From The Computing Community Consortium Blog

One of mankind’s oldest dreams is to fly like a bird. And now, thanks to a team of German researchers, we’ve moved one step closer with

Hacking Lotteries
From Schneier on Security

Hacking Lotteries

Two items on hacking lotteries. The first is about someone who figured out how to spot winner in a scratch-of tic-tac-toe style game, and a daily draw style game...

Gigabit in the Home
From The Computing Community Consortium Blog

Gigabit in the Home

We’ve covered the US Ignite and Gig.U initiatives on this blog over the course of the past few months, and now we’ve been pointed to a great video that explains...

Becoming Acquainted with Data
From The Eponymous Pickle

Becoming Acquainted with Data

Stephen Few on on becoming acquainted with a dataset for the first time. Nicely done, this was a situation I often encountered and simple visualization was the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account