Sign In

Communications of the ACM

Blogroll



Wolfram Alpha API
From The Eponymous Pickle

Wolfram Alpha API

Interesting, technical discussion of Wolfram Alpha's API.  Dealing in particular with its openness.

Data Blogs
From The Eponymous Pickle

Data Blogs

ReadWriteWeb presents some links about blogs that discuss data.   Some I had not seen yet. 

Disconnect Between Intelligence and Analytics
From The Eponymous Pickle

Disconnect Between Intelligence and Analytics

The disconnect between intelligence and analytics? " .... Being analytics savvy is no longer an option for most businesses but a matter of survival. If a company...

Blowfish in <i>Good Time Max</i>
From Schneier on Security

Blowfish in Good Time Max

This screen shot is from the movie "Good Time Max." 17 minutes and 52 seconds into the movie, it shows Blowfish being used as an encryption algorithm.

Procurement and Indemnity
From Wild WebMink

Procurement and Indemnity

Legacy procurement rules that insist on indemnity from open source subscription suppliers are an unnecessary barrier to open source adoption. Read about this on...

? Speaking at Campus Party Brasil on Saturday
From Wild WebMink

? Speaking at Campus Party Brasil on Saturday

I’ve reached S

Cyberwar is Overhyped
From Schneier on Security

Cyberwar is Overhyped

A new report from the OECD says the threat of cyberwar has been grossly exaggerated. (Hey, that's what I said.) There are lots of news articles. Also worth...

Teach Me How to Research
From The Female Perspective of Computer Science

Teach Me How to Research

How many of you were formally taught how to research? I'm guessing that for many of you, like me, there was never a class or workshop available to show you howWho...

R Waldo Roth
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

R Waldo Roth

Computer science education in 1972 was a lot different from what it is today. Back then most computers were huge, expensive, intimidating and kept locked away in...

The Legality of the Certificate Authority Trust Model
From Schneier on Security

The Legality of the Certificate Authority Trust Model

Interesting research: We looked at the standard legal documents issued by the certificate authorities or "CAs," including exemplar Subscriber Agreements (agreements...

Google Launching Groupon Competitor
From The Eponymous Pickle

Google Launching Groupon Competitor

Mashable reports that Google is about to launch a Groupon competitor.  A pretty obvious direction, finally happening. More detail at link.

ACM Tech Packs: Cloud Computing
From The Eponymous Pickle

ACM Tech Packs: Cloud Computing

I see that the Association of Computing Machinery has created a concept they call Tech Packs.  You have to be a member of ACM to get access to these.  Most recently...

B2B vs B2C Marketing
From The Eponymous Pickle

B2B vs B2C Marketing

Paul Gillin posts on how B2B abd B2C Marketing differ.  He also covers this in his new book:  Social Marketing to the Business Customer.  You can download a free...

Cost-Benefit Analysis of Full-Body Scanners
From Schneier on Security

Cost-Benefit Analysis of Full-Body Scanners

Research paper from Mark Stewart and John Mueller: The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...

From Computational Complexity

Does Tiger Woods know what Venn Diagram is?

In prior blogs I noted that the terms Turing Test and Prisoner's Dilemma have been used in articles for non-math people. In the age of Google people can look...

Chance to Provide Feedback on Federal CS Policies for K-12
From Computer Science Teachers Association

Chance to Provide Feedback on Federal CS Policies for K-12

The federal government asks for advice about education fairly regularly. But it isn't often that it asks specifically what is needed to advance K-12 computer science...

Alone Together
From The Eponymous Pickle

Alone Together

A teaser for a review of Sherry Turkels book: Along Together in Kurzwel AI.  I anticipate reading the book.  " ... Sherry Turkle, the widely noted MIT professor...

Who Will Pay?
From The Eponymous Pickle

Who Will Pay?

Essay on who will pay for content.   Advertisers or the consumer?  Will the emergence of new devices start a move away from the free Web content model?   If the...

HBR on Managing Innovation
From The Eponymous Pickle

HBR on Managing Innovation

I have worked with many o the technologies mentioned here.  They include a number that I would call analytical, but serve to analyze proposed innovations.  These...

Do Corporations Have a Right to Privacy?
From Schneier on Security

Do Corporations Have a Right to Privacy?

This week, the U.S. Supreme Court will hear arguments about whether or not corporations have the same rights to "personal privacy" that individuals do. Thisbrief...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo