Sign In

Communications of the ACM

Blogs


Blogroll


Intercepting Predator Video
From Schneier on Security

Intercepting Predator Video

Sometimes mediocre encryption is better than strong encryption, and sometimes no encryption is better still. The Wall Street Journal reported this week that Iraqi...

On the Future of Analytics
From The Eponymous Pickle

On the Future of Analytics

Eric Siegel on the future of analytics in the SAS COM Blog.-

New Result : Tight Asymptotic Bounds for the Deletion Channel with Small Deletion Probabilities
From My Biased Coin

New Result : Tight Asymptotic Bounds for the Deletion Channel with Small Deletion Probabilities

Posting will be light over winter break, in part because so little is going on, but more because I'm busy working on papers for upcoming deadlines. I'll describe...

Holiday Reading Corner
From Computer Science Teachers Association

Holiday Reading Corner

Ah, the holiday break. Time to relax, catch up on sleep, and perhaps read a book or two. If you are looking for some interesting reading related to CS education...

Global Networks
From The Eponymous Pickle

Global Networks

The value of understanding a dynamic system as a quantifiable network with a distinct architecture has always intrigued me. Very early on we constructed networks...

Being Honest with Yourself
From The Eponymous Pickle

Being Honest with Yourself

On the consequences of fooling yourself. With implications for private label purchasing decisions?

Plant Security Countermeasures
From Schneier on Security

Plant Security Countermeasures

The essay is about veganism and plant eating, but I found the descriptions of plant security countermeasures interesting: Plants can

Microsoft bliink Contest in the State of Illinois
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Microsoft bliink Contest in the State of Illinois

I made mention of this announcement when it was first made in October. I hope that if you are at a high school in Illinois you know about this and are getting involved...

links for 2009-12-23
From Wild WebMink

links for 2009-12-23

Some thoughts on Copyright Assignment Excellent and typically thorough treatment of copyright assignment from Michael Meeks. I'm...

Reinvention of BI
From The Eponymous Pickle

Reinvention of BI

Good piece in Information Management by David M Raab: The Reinvention of BI as We Know itTotal cost of ownership analyses must be expanded to properly capture the...

Luggage Locator
From Schneier on Security

Luggage Locator

Wow, is this a bad idea: The Luggage Locator is an innovative product that travellers or anyone can use to locate items. It has been specifically engineered to...

From Computational Complexity

How to tell how good a TV show is

(This is my last blog of the year. Lance will interupt his blog sabbatical to do an END OF THE YEAR blog later.) The TV show MONK recently finished its 8thHow...

Virtual Gifts do Better than Banner Ads
From The Eponymous Pickle

Virtual Gifts do Better than Banner Ads

So called 'virtual gifts', which are basically ads that are passed along in social networks, appear to be more effective than banner ads. Some good examples and...

Howard Schmidt to be Named U.S. Cybersecurity Czar
From Schneier on Security

Howard Schmidt to be Named U.S. Cybersecurity Czar

I head this rumor two days ago, and The New York Times is reporting today. Reporters are calling me for reactions and opinions, but I just don't know. Schmidt...

Women and Computer Science
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Women and Computer Science

The Internet was a buzz last week with reports of a study done on the effects of environment on women’s interest in computer science. (Links to articles below)Rock...

WolframAlpha Year-end Update
From The Eponymous Pickle

WolframAlpha Year-end Update

An update on what WolframAlpha has done and plans to do in the coming year. I like their direction, but they still have far to go. They have very impressive demonstrations...

Auto Wifi
From The Eponymous Pickle

Auto Wifi

Wired view of the current state of using cars as mobile hotspots and their planned usage. New specific work by Ford is detailed. I am less interested in how I could...

Keeping Advanced Students Challenged
From Computer Science Teachers Association

Keeping Advanced Students Challenged

How do you keep your advanced students challenged? My school is a magnet school for 11th and 12th grade students who excel in math and science. Every junior takes...

Groundswell on Social Tech
From The Eponymous Pickle

Groundswell on Social Tech

I saw this Forrester/Groundswell post on the growth of social tech lately, it describes the participation growth from 2007-2009 based on Forrester's useful classifications...

Santa's Naughty
From Schneier on Security

Santa's Naughty

This is very serious.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo