acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Would You Like to Pilot a New Game Development Course?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Would You Like to Pilot a New Game Development Course?

Would you like to pilot a new game development course (or two)  in your school? With free curriculum and software? Microsoft is starting a new  XNA online community...

Brilliance by Fulcruum
From The Eponymous Pickle

Brilliance by Fulcruum

Seen at the recent Continuous Web meetings: A new online magazine by Fulcruum Publishing called Brilliance.  The Premiere issue of June 1 is called: Escaping the...

Visirule: Logic Programming
From The Eponymous Pickle

Visirule: Logic Programming

In the heady AI/Knowledge Systems days of the 90s we wrote dozens of rule based systems that contained thousands of rules. These were designed to capture and reproduce...

From The Computing Community Consortium Blog

Today I attended a panel discussion on “The Role of the Cloud in the Smart Grid”, sponsored by Microsoft’s Innovation & Policy Center and the Digital Energy Solutions...

Policy Highlights from Communications of the ACM
From U.S. Public Policy Committee of the ACM

Policy Highlights from Communications of the ACM

Below is a list of items with policy relevance from the March issue of Communications of the ACM. As always, much of the material in CACM is premium content, and...

My Next Book: Title and Cover
From Schneier on Security

My Next Book: Title and Cover

As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...

Clorox Shares Green Data with an App
From The Eponymous Pickle

Clorox Shares Green Data with an App

The increased focus of Apps is revealing.  Note also the integration of UPC code scanning.  Here Clorox shares their green data on a smartphone App. " .... Clorox...

What Were They Thinking? The Important of Feedback
From The Female Perspective of Computer Science

What Were They Thinking? The Important of Feedback

Asking for honest, anonymous feedback can be scary. Really scary. But over the years, I've learned that the benefits of getting real feedback far outweigh the possibility...

DARPA Soliciting Innovative Research Proposals
From The Computing Community Consortium Blog

DARPA Soliciting Innovative Research Proposals

Late last month, DARPA’s Information Innovation Office (I2O) issued a solicitation calling for research proposals that “investigate innovative approaches that enable...

The Wal-Mart Case
From The Eponymous Pickle

The Wal-Mart Case

A reasoned and understandable explanation of the Wal-Mart discrimination case supreme court ruling.  Lots of corporate implications.

Test Drive Your Competitors
From The Eponymous Pickle

Test Drive Your Competitors

A good article in the Harvard Blogs on really knowing you competitors by using, not just casually experiencing their products.   Doing that does not imply disloyalty...

links for 2011-06-21
From Wild WebMink

links for 2011-06-21

Disastrous Implications of New Apple Patent for Blocking Cellphone Video – storify.com What an amazingly dangerous world Apple are exploring here. The scope for...

The Problem with Cyber-crime Surveys
From Schneier on Security

The Problem with Cyber-crime Surveys

Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research. Abstract: Much of the information we have on cyber-crime...

Microsoft at ISTE 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Microsoft at ISTE 2011

As I promised yesterday, here is more information about Microsoft at ISTE 2011 in Philadelphia. First off the good stuff. OK well the stuff that means the most...

Award Winning Keynoters at CSTA's Annual CS&IT Conference 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Award Winning Keynoters at CSTA's Annual CS&IT Conference 2011

This year, CSTA

? Bitly and Spam Links
From Wild WebMink

? Bitly and Spam Links

I was interested last week to discover that, unknown to me, the link shortening service bit.ly was displaying a warning message when anyone clicked on one link...

The Life Cycle of Cryptographic Hash Functions
From Schneier on Security

The Life Cycle of Cryptographic Hash Functions

Nice chart.

From Computational Complexity

I am conducing a NEW POLL on P vs NP

In 2002 I did a poll that appeared as SIGACT News Complexity Theory Column 36 on what people thought of P vs NP. See here. That article is now linked to on...

Beyond the Bounce Rate
From The Eponymous Pickle

Beyond the Bounce Rate

A post in the blog at Catalyst Online.   Brought to my attention this week.  Honestly I have not heard the measure of the 'bounce rate' used very often in the enterprise...

Using Technology to Reinvent Math Education
From The Computing Community Consortium Blog

Using Technology to Reinvent Math Education

What subject do high school students dislike the most? My bet is math — it’s confusing, abstract, and requires meticulous attention to detail. But at it’s heart...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account