ACM Sign In
  • ACM.org
  • Join ACM
  • About Communications
  • ACM Resources
  • Alerts & Feeds

Communications of the ACM

Blogs


About the Blogs spacer Blogroll Blogs Archive
Refine your search:
DATE
Past WeekPast MonthPast YearMore Than a Year Ago
SUBJECT
Communications / NetworkingComputer ApplicationsComputer SystemsHuman Computer InteractionComputers And SocietyData / Storage And RetrievalEducationHardwareInformation SystemsLegal AspectsManagementPerformance And ReliabilityPersonal ComputingSearchSecuritySoftwareTheory
AUTHOR
Anna WojnarowskaJohn L KingRan Libeskind-HadasBruce SchneierschneierDaniel TunkelangDaniel LemireKWReganPipRenee DopplickSimon PhippsEllen WalkerAlfred ThompsonMichael MitzenmacherzephoriaCSTA staff and volunteersrjliptonsite adminGail CarmichaelAndrew McCallum
spacer
spacer
Fast Sets of Integers
From Daniel Lemire's Blog

Maintaining a set of integers is a common problem in programming. It can also be implemented in many different ways. Maybe the

Daniel Lemire | November 13, 2012

Blogroll


spacer
From Daniel Lemire's Blog

What I do with my time

I am not a very productive person. I also do not work long hours. However, I sometimes give the impression that I productive. I have been asked to explain how I... Daniel Lemire
From Daniel Lemire's Blog | November 21, 2012 at 11:19 PM

spacer
From Computer Science Teacher–Thoughts and Information From Alfred Thompson

ACM/IEEE-CS Computer Science Curricula 2013 - Ironman v0.8 Draft Available for Comments

Dear Colleagues, We are happy to announce the availability of the ACM/IEEE-CS Computer Science Curricula 2013 - Ironman v0.8 draft.  The draft is available at... Alfred Thompson
From Computer Science Teacher–Thoughts and Information From Alfred Thompson | November 21, 2012 at 11:19 PM

spacer
From The Eponymous Pickle

Mobile Marketing Toothpaste

Good overview of the use of mobile marketing for something as common as toothpaste.  " ... Marketing toothpaste can be a challenge for brands because even though... Franz Dill
From The Eponymous Pickle | November 21, 2012 at 09:43 PM

spacer
From Schneier on Security

Cell Phone Surveillance

Good article on the different ways the police can eavesdrop on cell phone calls. schneier
From Schneier on Security | November 21, 2012 at 08:06 PM

From Computer Science Teachers Association

Seize the Professional Development!

The Philadelphia Area chapter started providing professional development workshops to our members because they asked for it. We regularly query our membership as...
From Computer Science Teachers Association | November 21, 2012 at 07:47 PM

From The Computing Community Consortium Blog

Developing New Ways to Search for Web Images

Collections of photos, images, and videos are quickly coming to dominate the content available on the Web. But how can text be used to search visual mediums? Currently... Shar Steed
From The Computing Community Consortium Blog | November 21, 2012 at 06:58 PM

spacer
From The Female Perspective of Computer Science

Things I Like About Python

Back in May I wrote a popular post about which was a better beginners language: Processing or Python.  Although I concluded that Processing was better for the audiences... Gail Carmichael
From The Female Perspective of Computer Science | November 21, 2012 at 03:36 PM

spacer
From The Eponymous Pickle

Midsize Insiders

Some of my blog posts will start to appear in Midsize Insiders.  Quite an interesting group of other bloggers as I have read them so far: " ... Insiders are independent... Franz Dill
From The Eponymous Pickle | November 21, 2012 at 03:05 PM

spacer
From The Eponymous Pickle

The Need for Thank You

In the HBR:   In a long career, before search became common, and I had become a rumored expert, I was often asked to do a simple online search.  Later their admins... Franz Dill
From The Eponymous Pickle | November 21, 2012 at 02:52 PM

spacer
From Schneier on Security

Decrypting a Secret Society's Documents from the 1740s

Great story, both the cryptanalysis process and the Oculists. schneier
From Schneier on Security | November 21, 2012 at 12:34 PM

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.