Sign In

Communications of the ACM

Blogroll



2011 in review
From Wild WebMink

2011 in review

The WordPress.com stats helper monkeys prepared a short 2011 annual statistics report for this blog. Here’s an excerpt: In 2011, there were 287 new posts, growing...

Google Official Blog Sums Most all of it up
From The Eponymous Pickle

Google Official Blog Sums Most all of it up

The official google blog sums up the last year of posts, reminding me of a number of things I had followed up on and some I had forgotten. Many still remain interesting...

Personal Brand Audit
From The Eponymous Pickle

Personal Brand Audit

The Burghard Group Suggests:Simple steps for a personal brand Audit. Good set of straightforward ideas.

An Exciting New Year
From The Female Perspective of Computer Science

An Exciting New Year

2011 was special, particularly with the arrival of our daughter Molly.  But 2012 is looking pretty great, too!Although I wasn't able to get an NSF grant application...

Wearable Computing
From The Eponymous Pickle

Wearable Computing

A topic we followed.. Not an unexpected direction. Integrated computing and clothing. We are not far off today, with buzzing devices in pockets altering us to...

Continuous Revisions
From The Eponymous Pickle

Continuous Revisions

By Nicholas Carr: A consequence of e-books: the ability to continually revise. Yes, I agree ... If we want that, but the same technology allows us to specifically...

Finding New Customers
From The Eponymous Pickle

Finding New Customers

In Mashable: Intriguing thoughts on how to get new customers. Not an obvious set of examples." ... The subject of finding customers is one of the most mysterious...

New Year's Thanks
From My Biased Coin

New Year's Thanks

There are many things I'm thankful for this year.  Perhaps most notably, the new year marks the halfway point of my 3-year stint as "Area Dean for Computer Science"...

Let
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Let

I was watching an episode of Mythbusters the other day. I always enjoy that show and while most of the attention goes to the two main stars my favorite is Grant...

Leveraging Semantics in 2012
From The Eponymous Pickle

Leveraging Semantics in 2012

Excellent post by Mark Montgomery: Strategic IT Alignment in 2012: Leverage Semantics ... read it here

Explaining Why Computing is Important
From The Computing Community Consortium Blog

Explaining Why Computing is Important

IBM Fellow Grady Booch, co-creator of UML and object-oriented programming, has launched “a transmedia project” seeking to engage “audiences of all ages in the story...

Studying Airport Security
From Schneier on Security

Studying Airport Security

Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...

Technology Evolution
From The Eponymous Pickle

Technology Evolution

In ReadWriteWeb. A look at Kevin Kelly's new book on technology evolution. Makes me want to read it. "... It's a highly ambitious and expansive book, which looks...

From Computational Complexity

Complexity Year in Review 2011

Result of the Year goes to the new bounds on Matrix Multiplication by Andrew Stothers and Virginia Vassilevska Williams. It's not every year that we see progress...

Tying Up Phone Lines as a Cyberattack Tactic
From Schneier on Security

Tying Up Phone Lines as a Cyberattack Tactic

There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...

Top Ten CSTA Blog Posts of 2011
From Computer Science Teachers Association

Top Ten CSTA Blog Posts of 2011

10. January 12, 2011- A Joint Call for Research Why Computer Science Education is Important for K-12. This post is well worth a second look to provide a good reminder...

Grace Hopper Interview
From The Eponymous Pickle

Grace Hopper Interview

An interview with computer pioneer Grace Hopper, who I met while working at the Pentagon. A reminder of how far we have come.

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A great story: Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...

WiFi Vending Machines
From The Eponymous Pickle

WiFi Vending Machines

In Japan, the home of universal vending, machines that will provide free registration-less WiFi and product. Assuming they will sell advertising for companies that...

Cross-Cultural Learning Curve: Sending a Paper to Science
From My Biased Coin

Cross-Cultural Learning Curve: Sending a Paper to Science

We decided to submit our paper on MIC and MINE to Science it's a venue that my co-authors were familiar with and very interested in applying to.  I was happy to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account