acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Turning down a Fields Medal is eccentric, turning down the Millennium Prize is INSANE!

NEWS on Poincare Conjecture: Recall that Perelman was given the Fields Medal in 2006 for proving the Poincare Conjecture. He declined the award. Recent news...

Carleton Celebration of Women in Science and Engineering
From The Female Perspective of Computer Science

Carleton Celebration of Women in Science and Engineering

Ever since I attended my first Grace Hopper Celebration of Women in Computing in 2008, I've dreamt of having a celebration of our own. Today I released a schedule...

Side-Channel Attacks on Encrypted Web Traffic
From Schneier on Security

Side-Channel Attacks on Encrypted Web Traffic

Nice paper: "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow," by Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang. Abstract.explains...

? Monkey Business
From Wild WebMink

? Monkey Business

Microsoft and FOSS, Behind the scenes ACTA, Android & less-than-free, new music and new copyright.

Eye Tracking Tablets
From The Eponymous Pickle

Eye Tracking Tablets

Considering adaptive text: '... What if the words you're reading were watching you? Some fear for the demise of reading real books and magazines, but some tech...

Where does Computer Science Belong?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Where does Computer Science Belong?

To some extent Computer Science is the red headed step child of K-12 education. It just doesn

Micro Industries Retail Signage Blog
From The Eponymous Pickle

Micro Industries Retail Signage Blog

Micro Industries, who contributed advanced digital signage to our innovation centers, has just added a blog to their site. A number of posts have been made, including...

Things Tweet
From The Eponymous Pickle

Things Tweet

Twitter is starting to animate things in the evolving 'Internet of Things'. Seems like a very trivial way to talk about interaction of people and things. Some interesting...

I'll be in Second Life Tonight
From Schneier on Security

I'll be in Second Life Tonight

James Fallows and I are being interviewed in Second Life tonight, 9:00 PM Eastern Time.

Cheap e-Book Reading Devices
From The Eponymous Pickle

Cheap e-Book Reading Devices

It's not unexpected, relatively inexpensive uni purpose e-book reading devices emerging. Not unlike the very inexpensive calculators that also emerged in the 1980s...

Do Contests Promote Computer Science?
From Computer Science Teachers Association

Do Contests Promote Computer Science?

I am just coming off the spring local programming contest circuit, as many of the nearby universities held their contest during their spring break. Unfortunately...

OSTP proposes initiative for student-led innovations in broadband apps
From The Computing Community Consortium Blog

OSTP proposes initiative for student-led innovations in broadband apps

The White House Office of Science & Technology Policy seeks comments on a proposed initiative for student-led innovations in broadband applications. In doing so...

Curriculum, Companies, Cooperation and Conflict
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Curriculum, Companies, Cooperation and Conflict

Where does curriculum come from? Where should it come from? What involvement should industry in general have in creating curriculum? These are all questions suggested...

How to Become a Nuclear Power
From Schneier on Security

How to Become a Nuclear Power

Sarcastic, yet a bit too close to the truth.

Privacy in the Era of DIgital Glass Houses
From The Eponymous Pickle

Privacy in the Era of DIgital Glass Houses

In CACM: ' ... As the boundaries for privacy have been redrawn by the connected world, the social norms and legal support structure that we count on to preserve...

? OSI Opposes BBC DRM
From Wild WebMink

? OSI Opposes BBC DRM

OSI joins the Open Rights Group in opposing the introduction of DRM to UK broadcast TV.

Natural Language Shellcode
From Schneier on Security

Natural Language Shellcode

Nice: In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...

A Look at Metcalfe's Law
From The Eponymous Pickle

A Look at Metcalfe's Law

A look at long quoted Metcale'e law, about how value grows as networks grow. It has been the 'rule' of Web 2.0, in GigaOm:' ... Networks

? Broken Democracy
From Wild WebMink

? Broken Democracy

Italian democracy, citizen surveillance, DRM from the BBC and even the BCS rejecting a petition. May I get depressed?

Africa Calling: can mobile phones make a miracle?
From Putting People First

Africa Calling: can mobile phones make a miracle?

Africa Calling: Can Mobile Phones Make a Miracle? is the title of a long article by Jenny C. Aker (Assistant Professor, The Fletcher School) and Isaac M. Mbiti...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account