Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

March 2015


From Schneier on Security

Friday Squid Blogging: Using Squid Proteins for Commercial Camouflage Products

Friday Squid Blogging: Using Squid Proteins for Commercial Camouflage Products

More research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From The Eponymous Pickle

Cisco Beacon Management System

Cisco Beacon Management System

In RFIDJournal. Includes a screen shot of how the beacons are managed." ... Several companies, including sports arenas, hotels and shopping areas, are piloting a new beacon-management dashboard provided by network technology


From insideHPC

Supercomputing the Mass Difference of Neutron and Protons

Supercomputing the Mass Difference of Neutron and Protons

Researchers using the JUQUEEN supercomputer have computed the small mass difference between protons and neutrons. The fact that the neutron is slightly more massive than the proton is the reason why atomic nuclei have exactly


From The Computing Community Consortium Blog

NSF CAREER Awards Given To Two CS Education Researchers

NSF CAREER Awards Given To Two CS Education Researchers

The follow is a guest blog post by Ran Libeskind-Hadas, R. Michael Shanahan Professor and Computer Science Department Chair at Harvey Mudd College.  This year, NSF CISE made its first CAREER awards for research in computer science


From The Eponymous Pickle

DARPA Promoting New Tracking Methods

DARPA Promoting New Tracking Methods

What are the broader implications of these new methods commercially?   What comes to mind are technologies that will be more precise and reliable inside buildings,  notably for retail applications and emergency response.In CWorld


From The Eponymous Pickle

Extracting Data from PDF Documents

Extracting Data from PDF Documents

Could have used this idea a number of years ago. In projects meant to gather and archive enterprise knowledge.  Data tables are often embedded in PDF documents, and extracting these systematically, in volume, sometimes ends up


From The Eponymous Pickle

Misunderstanding Social Media

Misunderstanding Social Media

Via Knowledge@Wharton, Podcast and text by Nancy Rothbard and Amanda GaileyWhen Using Social Media, Beware the Invisible AudienceSocial media has augmented our ability to communicate, but it has also made it easier to misunderstand


From The Eponymous Pickle

Future of Learning Assessment: Sero!

Future of Learning Assessment: Sero!

Brian Moon is a collaborator,  he writes:Our company is currently competing in Destination Innovation, a program hosted by the Northern Virginia Technology Council and Capital Business @ The Washington Post. Next week, from Monday


From The Eponymous Pickle

Visualizing Sets

Visualizing Sets

Interesting example of a novel data visualization.  From Microsoft Labs.


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Morse Code Project

Morse Code Project

Project ideas come from all sorts of places. Textbooks, other teachers I work with, blogs, random conversations, conferences (do you know about Nifty Assignments from SIGCSE?) and more. Some of the best come from students. Not


From Schneier on Security

Yet Another Computer Side Channel

Yet Another Computer Side Channel

Researchers have managed to get two computers to communicate using heat and thermal sensors. It's not really viable communication -- the bit rate is eight per hour over fifteen inches -- but it's neat....


From insideHPC

HPC News Roundup for March 27, 2015

HPC News Roundup for March 27, 2015

I'm on my way home from a series of Springtime HPC conferences with boatload of new videos and interviews on the latest in high performance computing. Here are some notable items that may have not made it to the front page.

The


From insideHPC

HPC Market Update from Intersect360 Research

HPC Market Update from Intersect360 Research

"The drive toward exascale computing, a renewed emphasis on data-centric processing, energy efficiency concerns, and the limitations of memory and I/O performance are all working to reshape High Performance Computing platforms


From insideHPC

Video: Special Training Session for HPC Systems Managers and Users

Video: Special Training Session for HPC Systems Managers and Users

In this video from the 2015 HPC Advisory Council Switzerland Conference, Oded Paz presents: Special Training Session for HPC Systems Managers and Users: EDR InfiniBand, Multicast Operations (setup flow and diagnostic tools),

The


From Putting People First

Sharp methodological critiques on current Big Data practices

Sharp methodological critiques on current Big Data practices

Two methodological critiques on Big Data that caught our attention: In the Financial Times, economist and journalist Tim Harford points out that sampling bias and statistical errors are, if anything, magnified in Big Data research


From XRDS

XRDS: Crossroads, The ACM Magazine for Students

XRDS: Crossroads, The ACM Magazine for Students


From XRDS

Alice and Bob in the new world

Alice and Bob in the new world

Shashank Agrawal


From XRDS

ACM-W chapters at home and abroad: An initiative on women, not of women

ACM-W chapters at home and abroad: An initiative on women, not of women

Claudia Schulz


From XRDS

Chronicling ciphers

Chronicling ciphers

Jay Patel


From XRDS

The Ph.D. journey: tips from somebody who managed to defend his thesis

The Ph.D. journey: tips from somebody who managed to defend his thesis

Vaggelis Giannikas


From XRDS

Computer science faculty careers at liberal arts colleges

Computer science faculty careers at liberal arts colleges

Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee


From XRDS

Exception handling evaluation of large APIs

Exception handling evaluation of large APIs

Maria Kechagia


From XRDS

On the evolution of security bugs

On the evolution of security bugs

Dimitris Mitropoulos


From XRDS

Kristin Lauter on cryptography and mathematics

Kristin Lauter on cryptography and mathematics

Shashank Agrawal, Billy RathjeThere are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.


From XRDS

Fully homomorphic encryption: cryptography's holy grail

Fully homomorphic encryption: cryptography's holy grail

David J. WuFor more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve


From XRDS

Encrypted search

Encrypted search

Seny KamaraThe need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?


From XRDS

Secure your data and compute on it, too

Secure your data and compute on it, too

Mike RosulekModern cryptography provides techniques to perform useful computations on sensitive data.


From XRDS

Exploring the risks to identity security and privacy in cyberspace

Exploring the risks to identity security and privacy in cyberspace

Jason R. C. NurseCyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?


From XRDS

The Wrens of Bletchley Park

The Wrens of Bletchley Park

Michael SmithThe lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.


From XRDS

Counting stars: pattern counting in networks

Counting stars: pattern counting in networks

Tomaz Hočevar

« Prev 1 2 3 14 Next »