acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cryptography Broken on American Military Attack Video
From Schneier on Security

Cryptography Broken on American Military Attack Video

Any ideas? At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...

How Games can Build Leaders
From The Eponymous Pickle

How Games can Build Leaders

An interview with Stanford Prof Byron Reeves of Seriosity. " ... On Leadership: Stanford professor Byron Reeves on how online multiplayer games like 'World of Warcraft'...

Fewer Shopping Trips
From The Eponymous Pickle

Fewer Shopping Trips

Progressive Grocer reports on the continuation of fewer shopping trips and fewer purchases per trip. Interesting statistics.

Panel #3: The Evolution of Research Funding and Projects (Symposium Summary)
From CERIAS Blog

Panel #3: The Evolution of Research Funding and Projects (Symposium Summary)

Wednesday, March 31, 2010 Panel Members: David Bell Joe Pekny, Purdue University Kenneth Brancik, Northrop Grumman Petros Mouchtaris, Telcordia Summary by...

Interested in a Procter Franchise?
From The Eponymous Pickle

Interested in a Procter Franchise?

I recently posted about P&G doing franchising of product oriented processes. Well known products like Tide and Mr Clean. As part of the Procter alumni networkYou...

CERIAS Seminar Presentation: David Bell (Symposium Summary)
From CERIAS Blog

CERIAS Seminar Presentation: David Bell (Symposium Summary)

Wednesday, March 31, 2010 Summary by Robert Winkworth “Everything I Needed to Know About Security I Learned in 1974” Security luminary David Bell concluded this...

Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)
From CERIAS Blog

Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)

Wednesday, March 31, 2010 Summary by Gaspar Modelo-Howard Day two opened with a keynote from Under Secretary Beers, who has had a long and interesting career3...

Fireside Chat (Symposium Summary)
From CERIAS Blog

Fireside Chat (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Mike McConnell, Booz Allen Hamilton Rand Beers, DHS Eugene H. Spafford, CERIAS Summary by Derril Lucci The fireside...

Panel #2: Infosec Ethics (Symposium Summary)
From CERIAS Blog

Panel #2: Infosec Ethics (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Nicolas Christin, Carnegie Mellon University Cassio Goldschmidt, Symantec Corporation Aaron Massey, North Carolina State...

Panel #1: Visualization of Security (Symposium Summary)
From CERIAS Blog

Panel #1: Visualization of Security (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Donald Robinson, Northrop Grumman Ross Maciejewski, Purdue Alok Chaturvedi, Purdue Summary by Ryan Poyar The first...

Opening Keynote: Mike McConnell (Symposium Summary)
From CERIAS Blog

Opening Keynote: Mike McConnell (Symposium Summary)

Tuesday, March 30, 2010 Summary by Jason Ortiz Mike McConnell, retired Admiral of the Navy, former Director of NSA and former Director of National Intelligence...

Interview with Zakta
From The Eponymous Pickle

Interview with Zakta

An interview with long time connection Sundar Kadayam about his very innovative search and knowledge system Zakta. We used some of Sundar's previous systems. Also...

Build Your Own NYT Linked Data Application
From The Noisy Channel

Build Your Own NYT Linked Data Application

Regular readers may recall hearing about the New York Times Annotated Corpus (which is the basis for the HCIR Challenge), and decision to publish their tags as Linked...

From Computational Complexity

But seriously now folks- what do you make of barrier results?

In my April Fools Day Post I said the following: Here are problems that I believe can be solved with current techniques. That was indeed true- since they were...

New York and the Moscow Subway Bombing
From Schneier on Security

New York and the Moscow Subway Bombing

People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...

60-40 papers
From My Biased Coin

60-40 papers

A recent paper I worked on was a 60-40 paper.  That's what I call it when one of the authors does noticeably more of the work.  Really, it could be a 70-30 paper...

links for 2010-04-07
From Wild WebMink

links for 2010-04-07

IBM: Back to the Bad Old Days? Pretty good analysis of the IBM patent aggression from ESR: "IBM has reached a critical juncture. For the last decade the company...

2010 US Imagine Cup Community Showcase
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2010 US Imagine Cup Community Showcase

Please join Microsoft for the 2010 US Imagine Cup Community Showcase The US Imagine Cup team would like to extend an invitation to you...

Foundation of Semantic Web Technologies
From The Eponymous Pickle

Foundation of Semantic Web Technologies

I had a very good conversation today with Prof Pascal Hitzler. Author of the books: Semantic Web - Grundlagen and Foundations of Semantic Web Technologies. He is...

Brand Names in Scrabble Games
From The Eponymous Pickle

Brand Names in Scrabble Games

In the BBC: Proper nouns are now allowed in new versions of the Scrabble board game. Think of the opportunity for product placement! Though how many people play...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account