acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Optical Stun Ray
From Schneier on Security

Optical Stun Ray

It's been patented; no idea if it actually works. ...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...

Imagine Cup Stories
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Imagine Cup Stories

Today I am on my way out to Redmond WA for the US Final of the Imagine Cup. Here I will see 22 teams who have advanced over hundreds of other teams to win the invitation...

Data Integrity Cornerstone of BI
From The Eponymous Pickle

Data Integrity Cornerstone of BI

Mark Montgomery of KYield writes in the Enterprise CIO Forum: Data Integrity: The Cornerstone for BI in the Decision Process When studying methods of decision making...

Semantic Search
From The Eponymous Pickle

Semantic Search

Lexis/Nexis introduces semantic search.

Message from Dave Burkhart
From Computer Science Teachers Association

Message from Dave Burkhart

Hello Everyone As one of the candidates for the CSTA Board of Directors, I am writing to ask for your support in this election. When someone is first elected...

From Computational Complexity

Kanellakis and Grace Murray Hopper Prizes

The ACM announced several award winners today. Two of particular interest to the theory community. Craig Gentry, recipient of the Grace Murray Hopper Award for...

Harry Lewis Asking Tough Questions (Again)
From My Biased Coin

Harry Lewis Asking Tough Questions (Again)

Harry Lewis is asking Harvard to confront the issue of some of Harvard's professors being involved in money-making opportunities, like working for Libyan dictators...

NFC Payment System Test
From The Eponymous Pickle

NFC Payment System Test

Engadget outlines the test of an NFC phone payment system in Salt Lake in 2012.  Another step towards phone-as-wallet.  The big rollers are now involved. " ... ...

Counterterrorism Security Cost-Benefit Analysis
From Schneier on Security

Counterterrorism Security Cost-Benefit Analysis

"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart: Abstract:The cumulative increase...

Interview with Stefana Broadbent on our increasingly mixed personal and work lives (in French)
From Putting People First

Interview with Stefana Broadbent on our increasingly mixed personal and work lives (in French)

Hubert Guillaud of the French online magazine InternetActu interviewed Stefana Broadbent, anthropologist and digital ethnographer, who in the last 20 years has...

Africa to be first post-PC continent
From Putting People First

Africa to be first post-PC continent

A convergence of historical circumstance and an increase in innovative mobile applications may make Africa the first post-PC continent. Low investment in wired...

Cryptography is Hard
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Cryptography is Hard

I love stories like this - http://www.theregister.co.uk/2011/03/22/ba_jihadist_trial_sentencing/ Briefly stated a group of would be terrorists rejected all suggestions...

About unnatural user research and limits to usability
From Putting People First

About unnatural user research and limits to usability

Two new articles on UX Matters: User research Is unnatural (but that

? The Sentinel Principle
From Wild WebMink

? The Sentinel Principle

If we try to define what an “open standard” is, we’ll probably find the definition being gamed by well-funded corporate interests within a short time. But what...

The problem with design education
From Putting People First

The problem with design education

University industrial design programs are usually cloistered in schools of art or architecture, and students in such programs are rarely required to study science...

? Google Cuts Off Travellers
From Wild WebMink

? Google Cuts Off Travellers

Usually when I want to illustrate the capricious and arbitrary nature of cloud-provided services, I use other examples. But today Google has shown me that they...

Leading the Learning Function
From The Eponymous Pickle

Leading the Learning Function

Have started reading in the Chief Learning Officer (CLO) Blog. The post   How do you lead the learning function is a good start.  Largely agree, as long as it is...

Social Media Relationship to Mass Media
From The Eponymous Pickle

Social Media Relationship to Mass Media

Intriguing points about the relationship of social media to mass media.  " ... Study Shows How Social Media Amplifies Mass Media  ... Social media is touted by...

Last Minute Preparations for our Celebration of Women in Science and Engineering
From The Female Perspective of Computer Science

Last Minute Preparations for our Celebration of Women in Science and Engineering

Tomorrow is our second annual Carleton Celebration of Women in Science and Engineering, hosted by CU-WISE.  This is an event I came up with last year after attending...

Message from Patrice Gans
From Computer Science Teachers Association

Message from Patrice Gans

Hello, My name is Patrice Gans. I'm running for the position of K-8 Representative on the CSTA Board of Directors and would like to introduce myself and ask for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account