acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

What is an Elementary Proof?

What is an Elementary Proof? Different things in different contexts. An Elementary Proof is one that does not use Complex Analysis. Basic Calculus is fine. This...

BI Software Making Money
From The Eponymous Pickle

BI Software Making Money

Nice overview piece on business intelligence by Doug Lautzenheiser:BI Software Makes Money Business Intelligence isn't just about seeing how many cans of beans...

All Subversive Organizations Now Must Register in South Carolina
From Schneier on Security

All Subversive Organizations Now Must Register in South Carolina

This appears not to be a joke: The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...

Beginning to Rethink CS Education at NSF
From Computer Science Teachers Association

Beginning to Rethink CS Education at NSF

The President released his $3.8 trillion budget on Monday setting off a flurry of activity in the Nation's Capital. The budget sets the Administration's priorities...

Public vs Private Sector Costs
From The Eponymous Pickle

Public vs Private Sector Costs

Michigan economist Mark J. Perry continues to be an excellent source for gathering economic data and providing commentary on its implications. Recent post: the....

Martin Lindstrom on Personal Branding
From The Eponymous Pickle

Martin Lindstrom on Personal Branding

Intriguing learnings and video: Look at Me Now! Personal Branding on TODAY Show (Pt 1)New York City. In a world growing increasingly more obsessed by celebrities...

New Philips phone for the elderly
From Putting People First

New Philips phone for the elderly

Philips reports that its new Lifeline Cordless Phone System has been designed “to enable the frail and elderly to maintain independence, despite their changing...

? Leaving a bad taste
From Wild WebMink

? Leaving a bad taste

Study links soda, pancreatic cancer Looks like another damning finding against high sugar diets. Too late for me, but maybe you...

Outguessing the Terrorists
From Schneier on Security

Outguessing the Terrorists

Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this? Bill Tupman, an expert on counter-terrorism from Exeter University...

New Windows 7 Track on Microsoft
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

New Windows 7 Track on Microsoft

OK so maybe you

Designing financial services for the poor
From Putting People First

Designing financial services for the poor

The Institute for Money, Technology and Financial Inclusion (IMTFI) at the University of California, Irvine, headed by Bill Maurer, Professor of Anthropology, aims...

The Limits of Visual Inspection
From Schneier on Security

The Limits of Visual Inspection

Interesting research: Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...

Chefs, Not Bakers
From The Eponymous Pickle

Chefs, Not Bakers

A collaborator from some time ago, Mark Capper, pointed me to his blog: Chefs Not Bakers. I much like the premise and am adding it to my feed, add it to yours: ...

Networking is Key
From The Female Perspective of Computer Science

Networking is Key

Time and time again I find that networking truly is the key to a successful career. It's amazing what kind of opportunities arise because of who you know.During...

Trading latency for quality in research
From Daniel Lemire's Blog

Trading latency for quality in research

I am not opposed to the Publish or Perish mantra. I am an academic writer. I am what I publish. We all think of researchers as people wearing laboratory coats,...

Intel Monitors Social Networks
From The Eponymous Pickle

Intel Monitors Social Networks

Several reports are out about how Intel is monitoring the buzz in social networks regarding their Superbowl ads. This is hardly news, since if I had spent four...

Hill Tech Happenings, Week of February 8
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 8

February 10 Hearing: The Senate Judiciary Committee will hold a hearing on cybercrime and identity theft. 10 a.m., 226 Dirksen Building The House Science and...

links for 2010-02-08
From Wild WebMink

links for 2010-02-08

SourceForge turns off "blanket blocking" Good to see SourceForge being responsive here and deciding to take this risk. The draconian...

More Details on the Chinese Attack Against Google
From Schneier on Security

More Details on the Chinese Attack Against Google

Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...

Interesting Links 8 February 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 8 February 2010

Well did you watch the Super Bowl? I confess that I did not. I
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account