acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Preserving Your Giant Squid
From Schneier on Security

Friday Squid Blogging: Preserving Your Giant Squid

Plastination: For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...

3D Universe
From The Eponymous Pickle

3D Universe

You can experience Hubble's 3D universe in 3D. More background and images here.-

New Supply Chain Analytics Needed
From The Eponymous Pickle

New Supply Chain Analytics Needed

In Sascom Magazine, at a recent conference of industry practitioners: ' ... Industry incumbents, academia and industry analysts all agreed that in the new-economy...

Bringing Lots of Liquids on a Plane at Schiphol
From Schneier on Security

Bringing Lots of Liquids on a Plane at Schiphol

This would worry me, if the liquid ban weren't already useless. The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...

SETI at 50 - No Evidence Yet
From The Eponymous Pickle

SETI at 50 - No Evidence Yet

Searching for extra-terrestrial intelligence. Despite extensive crowd sourced efforts there has yet to be any evidence of ET. There are some useful comments (and...

Bringing the Epic Win to Real Life
From The Female Perspective of Computer Science

Bringing the Epic Win to Real Life

Jane McGonigal said at TED 2010 that the world spends 3 billion hours per week playing games, but she'd like to see that number increase to 21 billion hours. You...

You Are Who You Know
From The Eponymous Pickle

You Are Who You Know

Intriguing paper with privacy implications:You Are Who You Know:Inferring User Profiles in Online Social NetworksIn this paper, we ask the question: given attributes...

From Computational Complexity

Unique Games Redux

With spring quarter arriving, I will take a break from book writing on P v. NP and come back to blogging. I hit my goal of getting past the point of no return (about...

NSF Searching for Assistant Director for CISE
From The Computing Community Consortium Blog

NSF Searching for Assistant Director for CISE

The National Science Foundation is commencing a national search for the NSF’s Assistant Director for Computer and Information Science and Engineering (CISE) and...

Security Trade-Offs and Sacred Values
From Schneier on Security

Security Trade-Offs and Sacred Values

Interesting research: Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...

Google-Viacom Documents
From My Biased Coin

Google-Viacom Documents

I don't blog about my work as an expert witness, but for those who are interested in such things, since I (currently) have nothing to do with the case, I can happily...

Architecture of Apps
From The Eponymous Pickle

Architecture of Apps

John Battelle makes make the case that the architecture of apps is broken. They do not each rise above the level of a single purpose and do not communicate. -

Virtual Events for Educators and School Administrators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Virtual Events for Educators and School Administrators

I regularly receive announcements about Microsoft events for educators. Some of them are directly of interest to computer science teachers so obviously I blog about...

Netezza Retail Analytic Appliance
From The Eponymous Pickle

Netezza Retail Analytic Appliance

I have had a number of conversations with Netezza in the past. They announced their Retail Analytics Appliance this January. I just got an offer for their white...

Navigation in Rigorous Environments
From The Eponymous Pickle

Navigation in Rigorous Environments

Rockwell Collins handheld GPS receivers. ' ... For today's soldiers, handheld navigation is a necessity for situational awareness and surviving the rigorous environments...

What Employers Want
From Computer Science Teachers Association

What Employers Want

I write this having just finished grading another set of programs. (Or is it that I am more or less always grading sets of programs, so that no matter when I blog...

Having an Impact on Cybersecurity Education
From CERIAS Blog

Having an Impact on Cybersecurity Education

The 12th anniversary of CERIAS is looming (in May). As part of the display materials for our fast-approaching annual CERIAS Symposium (register now!), I wantedpresented...

Creating new concepts, products and services with user driven innovation
From Putting People First

Creating new concepts, products and services with user driven innovation

From the Nordic Innovation website: User driven innovation is emerging as one of the successful ways of creating breakthrough innovations for companies and organisations...

Disabling Cars by Remote Control
From Schneier on Security

Disabling Cars by Remote Control

Who didn't see this coming? More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...

The camera never lies
From Putting People First

The camera never lies

Brands are starting to catch on to lifelogging – a technique that uses a tiny digital camera to capture every moment of a consumer
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account