ACM in the News 2013
|Viewing Where the Internet Goes
The New York Times, December 30, 2013
At issue is the technical principle that is the basis for the Internet, its “any-to-any” connectivity. That capability has defined the technology ever since Vinton Cerf and Robert Kahn sequestered themselves in the conference room of a Palo Alto, Calif., hotel in 1973, with the task of interconnecting computer networks for an elite group of scientists, engineers and military personnel. After serving as a program manager at the Pentagon’s Defense Advanced Research Projects Agency, Vinton Cerf joined MCI Communications Corp..... In 2005, he became a vice president and “Internet evangelist” for Google. Last year he became the president of the Association for Computing Machinery, a leading international educational and scientific computing society.
|Professor Matthias Jarke zum ACM Fellow ernannt
Pressebox, December 12, 2013
Professor Matthias Jarke wurde von der weltweit größten Vereinigung für Informatik, der Association for Computing Machinery (ACM), zum Fellow ernannt. Unter den fünfzig ernannten Fellows 2013 ist Jarke der einzige deutsche Wissenschaftler und erst der zehnte überhaupt seit Start des Fellow-Programms. Jarke leitet den Lehrstuhl für Informationssysteme & Datenbanken an der RWTH Aachen und das Fraunhofer-Institut für Angewandte Informationstechnik FIT in Sankt Augustin.
|From Grace Hopper to Ada Lovelace: women who revolutionized computer science
Christian Science Monitor, December 9, 2013
When computers were still the size of a room, Jean E. Sammet was there, coding and even creating languages that provided a fundamental base for computing today. Sammet continued working at IBM for 27 years, and has been given numerous computing awards including the ACM Distinguished Service Award, Ada Lovelace Award from the Association for Women in Computing, and was named a Computer History Museum Fellow.
|Kids, Code, and the Future of Technology
Forbes, December 9, 2013
CS Ed Week continues to grow in scope. This year, Dr. Chris Stephenson, executive director of the Computer Science Teachers Association (CSTA), expects increased public involvement. “The whole community of stakeholders is engaged—teachers, students, school administrators, business people, community leaders, politicians—all coming together to learn about why this is so important and what we can do to help,” she says.
|Parc Leaders for Notable Achievements
GlobeNewsWire, December 3, 2013
Today, PARC is highlighting three distinct awards, honoring PARC employees for their outstanding achievements. The Association for Computing Machinery (ACM) Special Interest Group on Operating Systems (SIGOPS) selected the article "Tenex, A Paged Time Sharing System for the PDP-10*," as a SIGOPS Hall of Fame paper for the impact it has had on the field of operating systems research. Daniel Bobrow, lead author, is a Research Fellow at PARC, and is currently working to develop software in the field of digital design and manufacturing. Bobrow has penned more than 100 published papers, books, and issued patents.
|The Power of Tiny Bubbles
EBN, November 28, 2013
This year's prestigious Gordon Bell Prize has gone to IBM's ETH Zurich lab in Switzerland, in collaboration with the Technical University of Munich and Lawrence Livermore National Laboratory, for the world's most complex fluid dynamics simulation of cloud cavitation collapse. The simulation could lead to advances in everything from protecting fluid-handling equipment from damage to destroying cancer cells in humans. The Association for Computing Machinery (ACM) awarded the prize at Supercomputer 2013 last week in Denver.
|WSO2: Redefining Sri Lanka's Corporate Culture
Business Today, November 29, 2013
Each work floor of the seven-story building depicts a theme-graffiti, ACM Turing Awards, automotive, nature, computer parts and space. The themes were selected by the staff through an open voting process that is used in all decision making at WSO2. Each theme of the floor is linked to the functions carried out at the respective departments which occupies the space. For instance, the engineering teams who need to ‘tinker with' everything have a floor themed under automotive and computer parts. The ACM Turing Award, which is the pinnacle of achievement in computer science, has been used as another theme for one out of the three floors occupied by the engineering teams, as inspiration to strive for best results.
|IBM's fluid dynamics simulation bags Gordon Bell Prize
Electronic Design, November 26, 2013
This year's prestigious Gordon Bell Prize has been awarded to IBM and ETH Zurich in Switzerland, in collaboration with the Technical University of Munich and Lawrence Livermore National Laboratory, for the world's most complex fluid dynamics simulation of cloud cavitation collapse. According to them, the simulation could pave the way to advances in everything from protecting fluid-handling equipment from damage to destroying cancer cells in humans. The Association for Computing Machinery (ACM) awarded the prize at Supercomputer 2013 in Denver.
|Thompson, Ritchie and Kernighan: The Fathers of C
Electronic Design, November 26, 2013
Ritchie and Thompson received the ACM Turing Award in 1983 for their work on C as well as UNIX. Thompson wrote the first version of UNIX in assembler, followed by many iterations written in C. “Our collaboration has been a thing of beauty. In the 10 years that we have worked together, I can recall only one case of miscoordination of work,” Thompson said about Ritchie in his ACM Turing Award Lecture: Reflections on Trusting Trust.
|Geeks get the glory
Bangkok Post, November 27, 2013
It might appear like a competition for computer geeks, but the ACM-ICPC Asia Phuket Regional Programming Contest 2013, held at the Prince of Songkla University in Phuket last week, actually served as a as a platform for tech-savvy youngsters to shine. At the ACM-ICPC Asia Phuket Regional Programming Contest 2013, the team from Peking University was announced the winner, with the first runner-up from Shanghai Jiao Tong University (SJTU) and the second runner-up from National Taiwan University (NTU).
|Anisotropic triangles help enhance graphic medical images
EDN Asia, November 22, 2013
A novel 3D imaging technique being developed by University of Texas at Dallas scientists may improve the representation of human organs for the benefit of clinical research, including studies for cancer treatment. A team led by Dr. Xiaohu Guo used anisotropic triangles as well as the Nash embedding theorem to achieve smoother images of objects at a rate up to 125 times faster than other imaging approaches. Guo and his team presented the study at the Association for Computing Machinery SIGGRAPH Conference earlier this year.
|Seven New Presidential Hires: A Cheat Sheet to Obama's Picks
Wall Street Cheat Sheet, November 16, 2013
Dr. Susan Graham has been appointed for membership on the President’s Council of Advisors on Science and Technology. Dr. Graham is one computer savvy lady, with the honor of the IEEE CS Ken Kennedy Award for “foundational compilation algorithms and programming tools; research and discipline leadership; and exceptional mentoring” only one of her many accomplishments. Her mentoring history has included activity at the University of California Berkeley where she was a faculty advisor for Women in Computer Science and Engineering, as well as for the Society of Women Engineers.
|For once, a hackathon minus the gendre skew
The Hindu, November 14, 2013
Every third day in Bangalore, technology groups, communities and companies organise a hackathon. Some have agendas to promote a platform or company, while others are looking to encourage code contribution to community projects. But what they all have in common is that women are poorly represented. This hackathon is part of the ongoing three-day conference organised by the Anita Borg Institute in association with the Association of Computing Machinery India (ACM India). Geetha Kannan, India head of the ABI, said it was a “resounding success”.
|A Girl Who Codes
Fast Company, November 13, 2013
This winter, Partovi is organizing a major PR push around Computer Science Education Week, including a campaign to get every teacher in the country to give students an hour of coding instruction. "I'm sure you know," he says, "girls tend to think of computer science as not for girls, and something only the boys do." If everyone is doing it, so the logic goes, the girls will too.
|Where is the next generation of coders
UKWired News, November 13, 2013
To head off a global coding crisis, something needs to be done to persuade youngsters that there is more to coding than dark rooms, pizzas and unsociable hours. "Computer science education has got worse in the last 20 years rather than better," he said. A 2010 report from the Computer Science Teachers Association seems to bear this out. The report concluded that the US had "fallen woefully behind in preparing students with the fundamental computer science knowledge and skills they need for future success".
|It's official: Computer scientists pick stronger passwords
Ars Technica, November 8, 2013
The landmark study is among the first to analyze the plaintext passwords that a sizable population of users choose to safeguard high-value accounts. The researchers examined the passwords of 25,000 faculty, staff, and students at Carnegie Mellon University used to access grades, e-mail, financial transcripts, and other sensitive data. The paper, which was presented in Berlin at this week's 20th ACM Conference on Computer and Communications Security, is also important because its findings may one day help people who secure computer networks and websites provide better password guidance and policies.
|Inkblots Improve Security of Online Passwords
Science Daily, November 7, 2013
This new type of password, dubbed a GOTCHA (Generating panOptic Turing Tests to Tell Computers and Humans Apart), would be suitable for protecting high-value accounts, such as bank accounts, medical records and other sensitive information. The researchers described GOTCHAs at the Association for Computing Machinery's Workshop on Artificial Intelligence and Security in Berlin, Germany, Nov. 4. Because the user's descriptive phrases for inkblots are stored, users don't have to memorize their descriptions, but have to be able to pick them out from a list.
|What is Computational Thinking?
Tech & Learning, October 31, 2013
Produced by the Computer Science Teachers Association (CSTA) and the International Society for Technology in Education (ISTE), this is a very practical guide, as its title suggests. One thing I’d like to observe: the term “computational thinking” sounds a lot more horrible than it really is.
|Anonymity Network Tor Needs a Tune-up to Protect Users From Surveillance
Technology Review, October 25, 2013
...new research shows how a government agency could work out the true source and destination of Tor traffic with relative ease. Aaron Johnson of the U.S. Naval Research Laboratory and colleagues found that the network is vulnerable to a type of attack known as traffic analysis. The work of Johnson and his colleagues will be presented at the ACM Conference on Computer and Communications Security in Berlin next month. ...“There are many plausible cases in which someone would be in a position to control an ISP,” says Johnson.
|ACM Conference Features Expanded Focus on High Integrity Language Technology
TMCnet, October 23, 2013
Leading experts in language technology for high-integrity systems will present their findings at a forum featuring innovative research, practical experience, and workable solutions. The High Integrity Language Technology (HILT) conference, (http://www.sigada.org/conf/hilt2013) to be held November 10-14 at the Wyndham Pittsburgh University Center Hotel, is presented by ACM's Special Interest Group on Ada (SIGAda).
|ACM Report Confirms Growth in Graduates with Computing Skills
Huffington Post, October 23, 2013
This is good news for the increasing number of university students currently pursuing non-doctoral degrees in computing science, as evidenced in a new ACM study of non-doctoral-granting Departments in Computing (NDC). The results of the ACM NDC study provide a previously unavailable snapshot of the students and faculty at institutions that produce the majority of graduates with an educational foundation in computing skills.
|The most detailed, technical explanation of how high-frequency trading works we've ever read
Washington Post Wonkbook, October 21, 2013
"The reality is that automated trading is the new marketplace, accounting for an estimated 77 percent of the volume of transactions in the U.K. market and 73 percent in the U.S. market...As long as another order is behind you, you can unwind the trade, meaning you can aggress the order behind." Jacob Loveless in ACM Queue.
|A call to focus on copyright
Inside Higher Ed, October 21, 2013
...Pam Samuelson also said it was important for more academics to "push back" and to refuse to sign over copyright to publishers, or to impose limits on any rights they turn over. And when faculty members find journals that have reasonable policies about use by authors and for educational purposes, Samuelson said, they should favor such outlets and share their enthusiasm with colleagues. (She did just that by noting that she regularly publishes in the access-friendly technology journal Communications of the ACM.)
|Yoga Accessible for the Blind with New Kinect-Based Program
Science Daily, October 17, 2013
The program, called Eyes-Free Yoga, uses Microsoft Kinect software to track body movements and offer auditory feedback in real time for six yoga poses, including Warrior I and II, Tree and Chair poses. Rector and her collaborators published their methodology in the conference proceedings of the Association for Computing Machinery's SIGACCESS International Conference on Computers and Accessibility in Bellevue, Wash., Oct. 21-23.
|How to Design-And Defend Against-the Perfect Back Door
Wired, October 16, 2013
We know from subliminal channel and kleptography research that it’s pretty much impossible to guarantee that a complex piece of software isn’t leaking secret information. We know from Ken Thompson’s famous talk on “trusting trust” (first delivered in the ACM Turing Award Lectures) that you can never be totally sure if there’s a security flaw in your software.
|ACM Joins Call for 'Hour of Code" to Underscore Critical Role of Computing in All Careers
Hispanic Business, October 15, 2013
"The U.S. is facing a 3-1 gap between computing jobs and graduating students," said John White, ACM CEO and Executive Director. "With the Hour of Code initiative, we intend to demystify computing for people who think programming is hard or requires math, and to deepen their understanding of computer science and the potential for rewarding careers in the digital age."
|Meet Squee, the First Robot Squirrel
Tested.com, October 15, 2013
Squee came from the mind of Edmund Berkeley, who was a computer science pioneer and author of the book Giant Brains, or Machines That Think. Even before he wrote some very forward-looking stuff about the future of "thinking machines," Berkeley founded the Association for Computing Machinery, which still exists today. And in 1951, Berkeley did two things: He published the plans for Simon, the first personal computer, and he came up with the robot Squee.
|The top superstars who are donors to Code.org
San Jose Mercury News, October 14, 2013
Code.org, a non-profit with the goal of ensuring that every K-12 school in the country teaches computer science has rounded up an eye-popping list of donors and other partners. Code.org has also rounded up many companies that have promised to support its efforts in non-monetary ways, such as helping publicize its effort to get millions of people to spend an hour coding during one week in December. And the organization is building partnerships with educational enterprises, such as Kahn Academy and the Computer Science Teachers Association to push its agenda forward.
|Top sites (and maybe the NSA) track users with "device finger printing"
Ars Technica, October 11, 2013
Close to 1.5 percent of the Internet's top websites track users without their knowledge or consent, even when visitors have enabled their browser's Do Not Track option, according to an academic research paper that raises new questions and concerns about online privacy. The paper—titled "FPDetective: Dusting the Web for Fingerprints"—will be presented next month at the 20th ACM Conference on Computer and Communications Security in Berlin. The research is important because it highlights a practice that few people have any idea is taking place.
|Dongarra Honored with Ken Kennedy Award for Contributions to Supercomputing
HPC Wire, October 8, 2013
ACM President Vint Cerf called attention to Dongarra's achievements and years of service to the HPC community. "Jack saw the need to keep pace with the evolution in HPC hardware and software in a world that demands higher speeds and performance levels," said Cerf. "His innovations have contributed immensely to the steep growth of high performance computing and its ability to illuminate a wide range of scientific questions facing our society."
|What if the smart cities of the future are chock full of bugs?
The Design Observer Group, October 7, 2013
Buffering, which serves as a kind of transmission gearbox to sync fast-flowing and congested parts of the Internet, is a key tool to smoothing out surges of data and reducing errors. But in 2010 Jim Gettys, a veteran Internet engineer, noticed that manufacturers of network devices had taken advantage of rapidly falling memory prices to beef up buffers far beyond what the Internet’s original congestion-management scheme was designed for. “Manufacturers have reflexively acted to prevent any and all packet loss and, by doing so, have inadvertently defeated a critical TCP congestion-detection mechanism,” concluded the editors of ACM Queue, a leading computer networking journal, referring to the Internet’s traffic cop, the Transmission Control Protocol.
|Judea Pearl Examines the Science of Cause and Effect
SC Online News, October 2, 2013
Renowned computer scientist Judea Pearl will deliver the 15th Annual Lynford Lecture on Monday, November 4, 2013, on the campus of the Polytechnic Institute of New York University (NYU-Poly), in the heart of Downtown Brooklyn's Tech Triangle. Pearl, the winner of the ACM A.M. Turing Award, is an alumnus of NYU-Poly and currently a professor emeritus at UCLA. He also serves as the president of the Daniel Pearl Foundation, an organization founded in memory of his son, a Wall Street Journal reporter who was kidnapped and murdered by terrorists in Pakistan in early 2002.
|Empowering women leaders in technology
The Times of India, September 28, 2013
Anita Borg Institute, a non-profit organization focused on the advancement of women in computer science and engineering, ... announced the third edition of Women Entrepreneur Quest (WEQ) 2013 which will be held during the 4th Annual Grace Hopper Celebration of Women in Computing India (GHC-India) conference. The annual conference, presented by the Anita Borg Institute and the Association for Computing Machinery (ACM-India), will take place from November 13 to 15, 2013 in Bangalore.
|'Viceroi' algorithm eases detection of fraud
Computerworld, September 26, 2013
A group of researchers have devised an algorithm they say could help advertising networks better detect fraudulent clicks. The researchers' algorithm, called Viceroi, ... looks for publishers who have abnormally high per-user revenues, which may be an indication of fraud. The research paper ... will be presented at the ACM Conference on Computer and Communications Security in Berlin, which will be held Nov. 4-8.
|Why So Few Mathematicians? II
Scientific American, September 25, 2013
◦Conferences play a different and more important role in the culture of computer science. In particular, a conference talk is often equivalent to a published paper, which is not true in mathematics. ◦Many of the computer science laureates recently attended the ACM (Association for Computing Machinery) meeting, so this is almost like a continuation of that meeting for them. They also might have had more peer pressure, or peer encouragement.
|Curtain up! The first Heidelberg Laureate Forum begins! (Translated from German)
Pressebox, September 22, 2013
"The HLF is a networking event, which did not exist as in the fields. Because here everyone can exchange ideas, to seek advice or find mentors," said Klaus Tschira. "....even the Presidents of the award-giving institutions, Association for Computing Machinery (ACM), the International Mathematical Union (IMU) and the Norwegian Academy of Science and Letters" attended the opening. .
|ACM Turing Award Laureates to Meet with Young Scientists at First Forum for Computing and Math Luminaries
TMC.net, September 18, 2013
ACM President Vint Cerf said "We need to foster environments that appeal to our scientific leaders, students and researchers who dream about making a difference in their world. This forum offers an ideal venue for finding the vision, trust, encouragement and technical expertise that can mobilize interactions between the innovators who have changed the world and the young scientists who will follow them."
|It is easier to catch .. a liar by WhatsApp ... than a lame person (translated from Spanish
Periodista Digital, September 17, 2013
"The talks are digital terrain that encourages cheating because people can hide and make your posts look credible," says Tom Meservy, professor of Information Systems and one of the authors of the study reported in the journal ACM Transactions on Management Information Systems'.
|Cryptographers Have an Ethics Problem
Technology Review, September 13, 2013
I noticed a poster taped to the wall—the kind put up to inform or inspire students. It was the code of ethics of ACM, the world’s largest professional association of computer scientists. Eugene Spafford, executive director of the CERIAS institute at Purdue University and an officer of the ACM, cautioned me against reaching simplistic ethical judgments. He said if a person is hacking computers and stealing messages to prevent a terrorist attack, they’re not necessarily in violation of the society’s code, which allows for “varying interpretations.”
|People Who Lie While Texting Take Longer to Respond
Science News, September 5, 2013
A Brigham Young University study finds when people lie in digital messages -- texting, social media or instant messaging -- they take longer to respond, make more edits and write shorter responses than usual. The findings appear online this week in the academic information systems journal ACM Transactions on Management Information Systems. The researchers are furthering this line of research by using a variety of other sensors including Microsoft's Kinect to track human behavior and see how it connects with deception.
|Founder of programming methodology Edward Yourdon performs at Russian Code Cup
Iks Media.ru, September 5, 2013
Translated from Russian: IT-finals of the main championship this fall Russian Code Cup 2013 will be held with the participation of world stars of programming. On September 23, before the audience and the participants of the last stage of the competition will perform, in particular, the famous Edward Yourdon, a pioneer in the development of programming methodology and the author of Yourdon method. "Lately, sports programming has become quite popular in the world ( nearly 100 countries ), but it all began in the late 1970s in the US in such professional organizations as ACM." says Edward Yourdon .
|'Backscatter' network could support the network of things
PC World, September 1, 2013
The communication technique—dubbed "ambient backscatter" by University of Washington scientists—allows devices to communicate with each other by reflecting or absorbing preexisting radio signals from TV and mobile transmissions. "We can repurpose wireless signals that are already around us into both a source of power and a communication medium," said lead researcher Shyam Gollakota. "It's hopefully going to have applications in a number of areas including wearable computing, smart homes and self-sustaining sensor networks." The researchers published their results at ACM's SIG Data Communication 2013 conference in Hong Kong.
|iOS and Android weaknesses allow stealthy pilfering of website credentials
Ars Technica, August 27, 2013
"The problem here is that iOS and Android do not have this origin-based protection to regulate the interactions between those apps and between an app and another app's Web content," XiaoFeng Wang, a professor in Indiana University's School of Informatics and Computing, told Ars. "As a result, we show that origins can be crossed and the same XSS and CSRF can happen." The paper, titled Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation, was recently accepted by the 20th ACM Conference on Computer and Communications Security.
|Computer Science Teachers Certification 'Deeply Flawed,' Report Says
Education Week, August 21, 2013
The report from the Computer Science Teachers Association describes the certification landscape as "confused, disparate, and sometimes absurd." "Computer science teacher certification across the nation is typified by confounding processes and illogical procedures—bugs in the system that keep it from functioning as intended," says the report, which was conducted with financial support from Google. The report also makes the case that the situation is contributing to a missed opportunity to prepare students for a field that promises solid careers.
|Software that Exposes Faked Photos
The New York Times, August 19, 2013
Using algorithms designed to sniff out suspicious shadows, computer scientists from Dartmouth and the University of California, Berkeley, say they have developed software that can reliably detect fake or altered photos....the software uses geometric formulas to analyze shadows to determine if they are all physically consistent with a light source. Analyzing shadows is a common technique in photo forensics, said the study, being published in the September issue of ACM Transactions on Graphics.
|Will TV Stations Power the Internet of Things
Scientific American, August 19, 2013
...using a technique called “ambient backscatter,” University of Washington researchers ....have transformed existing wireless signals into both a power source and a communication medium for a sensor network. The researchers presented their work (pdf) last week at the ACM Special Interest Group on Data Communication 2013 conference in Hong Kong. Devices in the researchers’ sensor network send and receive messages to one another by either absorbing or reflecting ultra high radio frequency TV signals produced by a nearby tower.
|No batteries! Wireless tech recycles airborne radio waves
NBC News, August 13, 2013
A world full of Internet-connected devices is a giant step closer to reality thanks to a new communications system that works without batteries or wires for power. "We just use existing signals all around us," Shyam Gollakota, an assistant professor of computer science and engineering at the University of Washington in Seattle, explained to NBC News. The research was presented ... at the Association for Computing Machinery's Special Interest Group on Data Communications 2013 conference in Hong Kong.
|What is the Worst Mistake Ever Made in Computer Programming
Huffington Post, August 13, 2013
Over-reliance on the von Neumann model in our design of computers and programming languages. This may be better recognizable today as the "imperative vs functional programming" debate.) This was argued by John Backus (inventor of FORTRAN and Backus-Naur Form) when he received the ACM Turing Award in 1977 for "profound, influential, and lasting contributions to the design of practical high-level programming systems". This answer will simply be highlights of his 29-page Turing Award lecture (2.9 MB PDF) titled: "Can Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programs".
|Changing the Face of Technology: Code Like a Girl
The White House, August 12, 2013
Cheryl Swanier,a Champion of Change, honored by White House. "I also advise the undergraduate chapter of the FVSU Association of Computing Machinery (ACM), and I actively encourage community service. Every semester, my students and I are tutoring local middle school students in mathematics and providing workshops to teach middle and high school students how to write code using a visual programming language, to develop websites as well as how to program robots."
|New software to detect forged photos
CNN IBN, August 6, 2013
Scientists have developed a new software to detect forged photos and have used it to debunk claims that the 1969 Apollo 11 lunar landing photo is fake. The technique analyses a variety of shadows in an image to determine if they are physically consistent with a single illuminating light source. The study will be published in the journal ACM Transactions on Graphics.
|Reliable Communication, Unreliable Networks
Science Daily, August 5, 2013
At the Association for Computing Machinery's Symposium on Principles of Distributed Computing in July, past and present researchers from the Theory of Distributed Systems Group at MIT's Computer Science and Artificial Intelligence Laboratory presented a new framework for analyzing ad hoc networks in which the quality of the communications links fluctuates. Within that framework, they provide mathematical bounds on the efficiency with which messages can propagate through the network, and they describe new algorithms that can achieve maximal efficiency.
|NSA Surveillance Can Penetrate VPNs
Information Week, August 1, 2013
Whether or not the NSA is able to crack more robust implementations remains to be seen. Given the resources available to the NSA, the issue may be how much the NSA wants to break a given code rather than its ability to do so. After all, in cases where codes cannot be broken, people can be. As Danish developer Poul-Henning Kamp argues in ACM Queue, politics trumps cryptography.
|Code.org partners with ACM on computer education push
Seattle Times, July 31, 2013
Six months after its launch, Seattle nonprofit Code.org has partnered with the Association for Computing Machinery to lead the ACM’s educational outreach. Code.org is merging with an educational coalition that ACM formed in 2010 with the backing of Microsoft, Google, the Computer Science Teachers Association and the National Center for Women and Information Technology. “Reforming K–12 education to incorporate serious computer science seems vital to producing an informed public that has a deeper appreciation for the power of computing than video games and social networking,” said ACM President Vinton Cerf in the release.
|ACM Partners with Code.org to Expand K-12 Computer Science Education
TMCNet, July 31, 2013
“Reforming K–12 education to incorporate serious computer science seems vital to producing an informed public that has a deeper appreciation for the power of computing than video games and social networking,” said ACM President Vinton Cerf. He noted that computer science education will enable students to be better prepared for the projected 1.5 million job openings in computing-related fields over the next ten years.
|'Secret sauce' for web image searches
Irish Times, August 1, 2013
Torresani .... addresses one of the key problems preventing more productive searches: the fact that popular search engines base results on an analysis of the text on a page alone. Information about digital images is encoded in a different language of visual descriptors that mean little to a text-based search engine. In Dublin this week to present his group’s work at the 36th annual ACM SIGIR (Special Interest Group on Information Retrieval) conference, Torresani set out to see whether there might be a way that the contents of an image could also be understood by search engines, improving search results for both documents and images.
|The Future of Graphics and Gaming
Technology Review, July 31, 2013
Dazzling new techniques in computer graphics and provocative new ideas about interaction were shown off by researchers from academia and industry at the Sigggraph conference sponsored by ACMSIGGRAPH in Anaheim, California, last week. New technology included Face Replacer, Interactive Water, Water Games, Air-Blast Feedback, FakeFinder, Balancing Act, Hair Today, and TV-Busting Games.
|Disney's Aireal lets you feel the imaginary
The Verge, July 25, 2013
You feel a touch, and as you lift your hand to see what's happening you feel it moving up your arm. The invention that makes this illusion possible is called Aireal and Disney Research is showing it off at the Siggraph conference in Anaheim. The new haptic technology promises to let people interact with imaginary objects, rendered out of thin air.
|Perfect digital imaging
R&D Magazine, July 24, 2013
Hanspeter Pfister and Todd Zickler, computer science faculty at the Harvard School of Engineering and Applied Sciences (SEAS), are working to narrow the gap between “virtual” and “real” by asking a common question: how do we see what we see? Between them, Pfister and Zickler are presenting three papers this week at SIGGRAPH 2013, the 40th International Conference and Exhibition on Computer Graphics and Interactive Techniques. The Association for Computing Machinery SIGGRAPH conference continues from July 21 to 25 in Anaheim, California. The three papers will be published in ACM Transactions on Graphics.
|Hundreds across New England drawn to international activist's Mass. event
India New England, July 23, 2013
In 2010, Amrita University organized the ACM-W Celebration of Women in Computing conference, the first ever conference of its kind in India. The conference drew 800 delegates from around the globe, including prominent women in computing from the United States, such as keynote speakers Rema Padman of Carnegie Mellon University and Radha Nandakumar of the University of Illinois at Urbana Champaign.
|MIT researchers teach TCP new tricks with software named Remy
CIO magazine, July 19, 2013
Remy is the brainchild of MIT professor Hari Balakrishnan and graduate student Keith Winstein, who are scheduled to present a paper entitled "TCP ex Machina: Computer-Generated Congestion Control" at an Association for Computing Machinery conference [on Data Communication]this summer. Remy works by testing a wide array of possible configurations to arrive at the best possible results. The user can specify characteristics of the network in question, provide a profile of common user activity, and define the goals and metrics that Remy should shoot for.
|Computer System Automatically Generates TCP Congestion-Control Algorithms
Science Daily, July 18, 2013
At the annual conference of ACM's Special Interest Group on Data Communication this summer, researchers from MIT's Computer Science and Artificial Intelligence Laboratory and Center for Wireless Networks and Mobile Computing will present a computer system, dubbed Remy, that automatically generates TCP congestion-control algorithms. In the researchers' simulations, algorithms produced by Remy significantly outperformed algorithms devised by human engineers.
|Grant helps college students recruit, retain women
R&D Magazine, July 17, 2013
The National Center for Women & Information Technology (NCWIT) and Symantec have awarded $10,500 in seed funding to 14 student-run projects that work to increase the numbers of women studying computer science and information technology disciplines. University of South Alabama will use its funds to grow its on-campus ACM-W chapter.
|Out in Front: Uh Oh for Information
GPS World, July 2, 2013
According to Adam Jacobs, writing in the ACMQueue of the Association for Computing Machinery, big data is so hefty that “[its] analysis requires massively parallel software running on tens, hundreds, or even thousands of servers.” Sounds like a job for Biggest Brother.
|Theft-as-a-Service: Blocking the Cybercrime Market
Slashdot, July 4, 2013
A group of engineering researchers from MIT has demonstrated one approach to making secure servers harder to access using a physical system that prevents attackers from reading a server's memory-access patterns to figure out where and how data are stored. Ascend, which the group demonstrated at a meeting of the ACM/IEEE International Symposium on Computer Architecture in Tel Aviv in June (PDF), is designed to obscure both memory-access patterns and the length of time specific computations take to keep attackers from learning enough to compromise the server.
|Doug Engelbart Delivered the Mouse and Other Large Inventions
Wall Street Journal, July 3, 2013
Mr. Engelbart was awarded the National Medal of Technology in 2000 and the Association for Computing Machinery's A.M. Turing Award in 1997. Mr. Saffo, of Discern Analytics, says that many of Mr. Engelbart's ideas remain to be explored—or perfected, such as allowing several people to edit a document simultaneously. "How many times have you worked simultaneously on a shared screen on a shared document?" Mr. Saffo asks. "It's just too hard to do."
|Vint Cerf, 2013 Future in Review Conference Centerpiece Guest, Awarded Queen Elizabeth Prize for Engineering
NBC News, July 2, 2013
The former Chair of the Internet Corporation for Assigned Names and Numbers (ICANN), Vint is the co-designer of the TCP/IP protocols. He and his colleague Robert Kahn were awarded the U.S. National Medal of Technology in 1997, the Presidential Medal of Freedom in 2005, and the 2004 ACM Alan M. Turing award, considered the "Nobel Prize of Computer Science."
|Cuba to Attend World Final Programming Contest
Kazakhstan News, June 25, 2013
Cuba will send a delegation of youth to the world final contest of the Association for Computing Machinery (ACM - ICPC) to be held in St. Petersburg, Russia, the University of Havana authorities reported in this capital today. According to the institution, the group that will attend the event is composed of a team from the Faculty of Mathematics and Computer Science of the University of Havana, and another group from the University of Computer Sciences.
|Five Predictions for (Bit)Coin/
SlashDot, June 19, 2013
"I recently wrote an article about Bitcoin and the law for Communications of the Association for Computing Machinery. In researching it I ran into plenty of wishful thinkers, ridiculous greedheads, and out-and-out nutbags promising a rosy future. I also found the expected blowback from vehement naysayers who think the best way to combat crazy is with more crazy.
|Gaming the System
MIT Technology Review, June 18, 2013
As engineers began bringing game theory to bear on questions within their field, however, they also realized that the tools of their trade were applicable to outstanding questions of game theory. MIT EECS professor Constantinos Daskalakis is a good example. In 2008, he won the Association for Computing Machinery’s dissertation prize by showing how techniques drawn from theoretical computer science could shed new light on one of the central concepts in game theory: equilibrium.
|Journal: Report Astana Economic Forum ASTEX 2013
IT Manager Connection, June 17, 2013
"...we will talk about the extensive innovation and research advantages of an online digital library (DL), using the experiences of the Association for Computing Machinery or ACM. The ACM is the world’s largest scientific, educational, professional computing association well known for their awards (example, Turing Award often considered the Nobel Prize of Computing), 35+ special interest groups (example, SIGGRAPH), 70+ publications/newsletters, learning center resources, 500+ conferences/events, live webcasts, videos, and 1.5 million users of their digital library.”
|Book Review: Super Scratch Programming for Kids
Education Week, June 17, 2013
Computer science enables students to express themselves more fully and creatively, helps them develop as logical thinkers, and helps them understand the workings of the new technologies that they encounter everywhere in their everyday lives. According to Mitch Resnick and his co-authors, who wrote a 2009 Communications of the ACM article: As Scratchers program and share interactive projects, they learn important mathematical and computational concepts, as well as how to think creatively, reason systematically, and work collaboratively: all essential skills for the 21st century.
|"Hugging Saint" and social activist to make New England tour stop next month
India New England, June 14, 2013
Affectionately known as Amma, the Indian native has been helping groups around the world through a number of various initiatives. The social activist is the founder and chancellor of Amrita University, one of the fastest growing institutions for higher learning in India. In 2010, Amrita University organized the ACM-W Celebration of Women in Computing conference, the first ever conference of its kind in India. The conference drew 800 delegates from around the globe, including prominent women in computing from the United States, such as keynote speakers Rema Padman of Carnegie Mellon University and Radha Nandakumar of the University of Illinois at Urbana Champaign.
|All Expectations Exceeded: One Out of Three Laureates Attends the 1st Heidelberg Laureate Forum
PresseBox, June 14, 2013
38 Abel, Fields and Turing Laureates confirmed their attendance at the 1st Heidelberg Laureate Forum (HLF), which will take place from September 22 until 27, 2013. The laureates will meet 200 of the most talented young researchers in the fields of mathematics and computer science from 47 countries. The Forum is organized in collaboration with the Association for Computing Machinery (ACM; Turing Award), the International Mathematical Union (IMU; Fields Medal) and the Norwegian Academy for Science and Letters (DNVA; Abel Prize).
|Distracted by technology
EE Times India, June 13, 2013
The roads of the world are filled with drivers yakking on their phones and texting/emailing friends and associates. Not a few even update Facebook pages while behind the wheel. According to "The Problem With Hands-Free Dashboard Cell Phones" (Communications of the ACM, April 2013) , GM is modifying OnStar to allow drivers to do hands-free Facebook updates at highway speeds. One wonders what makes a social media update more important than road safety.
|Tech firms call for mandatory computer classes
Boston Globe, June 11, 2013
“When we look at what jobs are available, and what paths students are pursuing, what we see is a profound disconnect,” said Chris Stephenson, executive director of the Computer Science Teachers Association. She said the tech executives are right to pressure Massachusetts to add more computer-specific education, as opposed to making it a small part of a broader science and engineering curriculum. “The industry folks are starting to speak up because they can’t hire the people that they need,” she said.
|Martin Casado of VMware Honored With Grace Murray Hopper Award as Outstanding Young Computer Professional of the Year
Cloud Computing Journal, June 12, 2013
"Casado's outstanding contribution to advancements in network virtualization illustrates the impact of computer science in solving real-world problems," said Melanie Baljko, professor of computer science at York University in Toronto and chair of the ACM Grace Murray Hopper Award Committee. "Starting with his research, and continuing with his commitment to developing practical applications, he has helped to define the future of networking itself."
|Even Hands-free Phone Use May be Hazardous in Cars
TechNews World, June 5, 2013
That's because people talk on the phone so regularly that they have developed learned habits that take over their awareness, according to Robert Rosenberger, an assistant professor in the School of Public Policy at Georgia Institute of Technology. Rosenberger's theories are outlined in the April issue of ...Communications of the ACM.
|Researchers teach Wi-Fi to "see," identify gestures
Ars Technica, June 5, 2013
Flipping off your television may gain a whole new meaning thanks to a technology being developed by a team of researchers at the University of Washington. The team, led by Assistant Professor of Computer Science and Engineering Shyam Gollakota, developed a system dubbed WiSee, which uses radio waves from Wi-Fi to sense human body movements and detect command gestures from anywhere within a home or office. The results of the WiSee team's research have been submitted to the ACM's 19th International Conference on Mobile Computing and Networking (Mobicom '13).
|Whatever happened to Google?
The H Open, June 4, 2013
Google looms large over the internet, and hence computing. It has announced that it will pay the open access fees for all articles by Google researchers that are published in Association for Computing Machinery journals, taking advantage of a new option there. But alongside this good stuff, there are a growing number of moves that have led many to ask whether something has changed at Google – and whether Google is still such a deeply-committed ally of openness.
|Data protection in the EU: the certainty of uncertainty)
The Guardian, June 5, 2013
Princeton's Ed Felten – formerly of the US Federal Trade Commission –said: "A decade of computer science research shows that many data sets can be re-identified. Removing obvious identifiers is not enough to prevent re-identification. Removing all data about individuals may not be enough. Felten suggested Arvind Narayanan and Vitaly Shmatikov's Privacy and Security Myths and Fallacies of 'Personally Identifiable Information, an excellent primer on the technical issues from the June 2010 Communications of the Association for Computing Machinery.
|Europe loses the connection: Technology in Germany is at risk due to lack of IT skills (Translated from German)
Pressebox, June 4, 2013
The global computer science professional society Association for Computing Machinery (ACM) has in a recent study entitled "Informatics education - Europe can not afford to miss the boat" found that Europe risks due to lack of professionals in computer science to lose the connection to the technical development (see: http://www.informatik.org/upload/pdf/ACMandIEreport.pdf). Translated from German
|Now THIS is How You Promote Your Conference
Core 77, June 4, 2013
SIGGRAPH isn't an acronym—if you must know, it stands for "Special Interest Group on Computer Graphics and Interactive Techniques"; its qualifier, ACM, stands for the Association for Computing Machinery—hence, ACM SIGGRAPH. The organization was originally founded in the late 60's and its annual conference launched just a few years later, which means that this is the 40th Anniversary of the event (they've since launched a second yearly conference, in Asia, as of 2008).
|Is Coding the New Second Language?
Smithsonian Magazine, May 24, 2013
Dr. Chris Stephenson, executive Director at the Computer Science Teachers Association, says ultimately it’s up to parents to lobby principals and school boards to invest in the kind of rigorous, wide-ranging instruction students need. But first, she says, parents need to understand just how little their kids know. What we need for tomorrow is students who know how to adapt computers to their own use and for their own interests,” says Stephenson.
|Why Don't We Learn From Mistakes in IT?
Wired, May 16, 2013
Software development expert Bertrand Meyer offered an explanation in a January 2012 article in Communications of the ACM. He cites accidents as the main reason. Every accident is analyzed by using the data contained in the airliner’s “black box” and other sources to extract the maximum amount of information about the cause. The results are then shared with all the stakeholders ....The same cannot be said for the IT industry. Meyer points out that we do not learn from mistakes — they are all too often swept under the carpet.
|Three organizations pressing for change in society's approach to computing
O'Reilly Radar, May 16, 2013
When the notorious SOPA and PIPA bills came up, for instance, the USACM didn’t issue the kind of blanket condemnation many other groups put out, supported by appeals to vague concepts such as freedom and innovation. Instead, they put the microscope to the bills’ provisions and issued brief comments about negative effects on the functioning of the Internet, with a focus on DNS.
|Digital formats split up electronic market
Futurity, May 8, 2013
Consumers now have more choice, and firms may be able to increase total market shares by accommodating themselves to compatible formats, cross-licensing, and avoiding standards wars. Published in Communications of the ACM (Association for Computing Machinery), the study draws on research demonstrating that in many corners of the business world, competition among digital products is no longer ending with clear winners—marking a move away from business environments distinguished by “standards wars” between similar but incompatible technologies.
|Computer coding efforts go viral - outside the school
Atlanta Journal-Constitution, May 6, 2013
Rebecca Schatz, who advocates for more computing education with the website CodeSavvy.org, said there is a "groundswell" of similar programmers worldwide working to pass along skills to the next generation. Schatz cites research from the Association for Computing Machinery and the Computer Science Teachers Association that found Minnesota students lag much of the nation in access to computer-science courses that would prepare them for jobs in the digital age. "This is a basic communication skill for our time," she said. We teach children how to read and write, even though they won't all be professional writers. We should be teaching them to code."
|Top Collegiate Software Programmers to Vie for IBM-Sponsored "Battle of the Brains"
Bloomberg Business News, May 3, 2013
The next generation of elite software engineers will meet in St. Petersburg, Russia, June 30 through July 4 to compete in the 37th Annual World Finals of the IBM-sponsored (NYSE: IBM) Association for Computing Machinery (ACM) International Collegiate Programming Contest (ICPC. f the 120 teams competing in the contest, 17 represent the United States. Each team comprises three students and only one team will emerge victorious to claim "The World's Smartest Trophy."
|Your Smartphone Just Diagnosed You with Postpartum Depression
Scientific American, May 3, 2013
“What’s exciting is that we could identify individuals potentially at risk for having an emotional downturn just by looking at streams of publicly shared data,” in this case Twitter feeds, says Eric Horvitz, managing co-director of the Microsoft Research lab. Horvitz and his colleagues presented the results of their efforts to predict postpartum emotional and behavioral changes via social media this week at an Association for Computing Machinery conference on Human Factors in Computing Systems in Paris.
|Study: One Third of Facebook Users Deactivate Their Account
ABC News Radio, May 2, 2013
Over a third of Facebook users take breaks from the site by deactivating their account for reasons ranging from avoiding a boss’s friend request to addiction, according to a new study from Cornell University. The study, presented Tuesday at the Association for Computing Machinery’s Conference Human Factors in Computing Systems in Paris, France, asked 410 people about their Facebook habits.
|'MorePhone': Flexible Phone Changes Shape Based on Caller, Type of Message
Huffington Post, May 1, 2013
Forget curved displays. With the introduction of a new flexible phone prototype, users can literally make the smartphone bend to their will. Unveiled Tuesday at the 2013 ACM Human Factors in Computing Systems conference in Paris, France, Human Media Lab's "MorePhone" changes shape and lets users choose specific movement configurations based on the caller or type of message. Created by researchers at Queen's University in Ontario, Canada, the concept is unlike traditional smartphones because of its thinness and type of display.
|Seeking fairness in ads
Harvard Gazette, April 30, 2013
The determination of which ad ultimately shows up on your computer screen is made by an algorithm that considers everything from how much a company pays for an ad to how well its website is designed. Latanya Sweeney, Harvard professor of government and technology in residence, wants to add another factor to the mix, one that measures bias. As described in a paper published simultaneously in Queue and Communications of the Association for Computing Machinery, Sweeney described how such a calculation could be built into the ad-delivery algorithm used by Google.
|New app reveals painting's past with a swipe
Slashdot, April 27, 2013
Repentir, a free app developed by researchers in the United Kingdom's Newcastle University and Northumbria University, works so far with only one painting. But the developers say that the technology could soon be applied to many new paintings, and maybe even old ones. Both the app and the painting are being formally revealed in Paris today (April 26) at the 2013 Association for Computing Machinery Conference on Human Factors in Computing.
|The Sustainability of CS Education Through Game Design
Slashdot, April 25, 2013
Researchers at the University of Colorado have been running the worlds largest study exploring how to integrate computer science education through game design in public schools. Instead of just exposing a handful of self-selected students in after school programs the curriculum called Scalable Game Design exposes a large number of students (in some middle schools 350 students per year, per school) to computer science. The focus of the paper presented at the 2013 ACM SIGCSE conference and part of the National Science Foundation showcase is the exploration of sustainability.
|Tops National Championship ACM Programming (Google Translation from Persian)
Islamic Republic of Iran Broadcasting, April 20, 2013
Winners of the Fifth National Games Programming Student at Shahrood University of ACM were introduced. Programming Competition ACM with the aim of strengthening students computer programming skills and problem solving became organized in teams of 3 players in the specified time / Questions awgoridm computing and solving the specific.
|Babe of the Week: Karungi proud of her girl-geek status
The Observer, April 18, 2013
Karungi’s inclination towards technology has paid off with awards such as top female achiever by Old Budonians Club University Chapter, 2013 and the Innovations award by the Zawadi Education Fund. She is also a member of GirlGeekKampala, Google Developer Group Kampala, Women in Technology Uganda (WITU) and the Association of Computing Machinery (ACM).
|Experimental Video Game Teaches Kids How to Program Java
Wired, April 11, 2013
Yes, kids can learn programming in more traditional ways, but finding qualified teachers is hard. Organizations like Code.org and the Computer Science Teachers Association are trying to solve this problem, and the Mozilla Foundation has gotten into the game with extra-curricular programs such as Summer Code Party, which pair kids with volunteer coders. But the UC San Diego researchers aimed to work around this problem.
|Computer Scientists Develop Video Game That Teaches How to Program in Java
Science Daily, April 8, 2013
The researchers tested the game on a group of 40 girls, ages 10 to 12, who had never been exposed to programming before. They detailed their findings in a paper they presented at the ACM SIGCSE conference in March in Denver. Computer scientists found that within just one hour of play, the girls had mastered some of Java's basic components and were able to use the language to create new ways of playing with the game.
|ACM Honors Computing Innovators
TMCnet, April 10, 2013
ACM (Association for Computing Machinery) today announced the winners of six prestigious awards for their innovations in computing technology. These innovators have made significant contributions that enable computer science to solve real-world challenges. The awards reflect achievements in computer networks, information retrieval, computer science education, multiagent systems, versatile compiler technologies, and computer-human interactive technologies.
|IT gets its groove back
Computer World, April 8, 2013
Perhaps the biggest driver of the new optimism is an increased demand for IT professionals in what recruiters are calling an employee's job market. The Association for Computing Machinery, for example, projects that the number of new computing jobs will increase by 150,000 per year for the next eight years. Meanwhile, the unemployment rate among U.S. IT workers was significantly lower than the overall unemployment rate in the fourth quarter of 2012 -- 3.3% versus 7.8% -- according to technology job board Dice.com.
|A DS&M leaf for STEM?
Continuity Central, April 6, 2013
An American University approach which abandons the traditional linear approach to science, technology, engineering and math learning, has its students show increased aptitude and interest in electronics, physics and math. Burg's research results, "Computer Science 'Big Ideas' Play Well in Digital Sound and Music (DS&M)," was published during a recent ACM SIG (Special Interest Group) on Computer Science Education conference in Denver.
|RAID reaches 25
Continuity Central, April 5, 2013
Panasas, Inc., has highlighted that it is 25 years since the publication of ‘A Case for Redundant Arrays of Inexpensive Disks (RAID),’ the groundbreaking paper that introduced the concept of redundancy for data protection and proposed the fundamental approach to data protection that remains the industry standard today. Authored by David A. Patterson, Randy H. Katz and Garth Gibson, Panasas founder and chief scientist, the Berkeley RAID Paper, as it has come to be known, was first published in March 1988 during the proceedings of the 1988 ACM SIGMOD International Conference on Management of Data.
|Learn to Code Movement: For All Students
Huffington Post, April 3, 2013
While tech companies scramble to hire workers from overseas to fill jobs, there is a severe lack of talent-development happening here in the United States. Code.org reports that nine out of ten schools do not offer computer science courses. Schools have difficulty finding certified teachers to lead computer science courses -- in most states, teacher certification requirements for computer science are either obscure or non-existent. The Computer Science Teachers Association reports that certification requirements that do exist are often unrelated to computer science content.
|Kinect-Powered Virtual Therapist Tracks Your Body Language to Help Diagnose You
Popular Science, March 29, 2013
Could a computer program catch what a human psychiatrist can't? SimSensei is one of several programs under development now that look to log the differences in how people with depression make eye contact, smile, shift in their chairs, and give off other small clues to their condition. ACM is even hosting a contest between the programs, to see which is best at picking out depressed patients among a database of videos of depressed and non-depressed people.
|Free Online Courses Mean College Will Never Be The Same
Smithsonian, March 29, 2013
Michael Cusumano, a professor of the Sloan School of Management at MIT, sees a troubling parallel with what happened with newspapers. “Free is actually very elitist,” Cusumano wrote recently in the monthly magazine of the Association for Computing Machinery. The result, he warns, could be a “few, large well-off survivors” and far more casualties. His worst case scenario is “if increasing numbers of universities and colleges joined the free online education movement and set a new threshold price for the industry–zero–which becomes commonly accepted and difficult to undo.”
|UK ambassador celebrates national science week at Talbot Heath
Daily Echo, March 27, 2013
To celebrate National Engineering and Science Week Talbot Heath School in Bournemouth welcomed guest speaker Dr Jan Peters. She is currently the UK ambassador to the American Association for Computing Machinery. Dr Peters discussed her personal career journey into engineering, from starting out as an 18 year old science journalist, to then gaining degrees in chemistry, oceanography and engineering.
|Amazon's online workforce not so anonymous after all
Phys.org, March 28, 2013
The findings regarding AMT's security vulnerabilities were made during the Association for Computing Machinery's Computer Supported Cooperative Work and Social Computing (CSCW) conference and published online to the Social Science Research Network on March 6. In addition to disclosing AMT's specific privacy vulnerability, the paper also includes broader recommendations for how similar security breaches might be avoided in today's global marketplace of online crowd work.
|Cryptography pioneers snag 2012 Turing Award
SD Times, April, 2013
Modern cryptography involves protecting oneself from potential enemies, a definition shaped by Shafi Goldwasser and Silvio Micali, researchers at the Massachusetts Institute of Technology whose pioneering work earned them the 2012 A.M. Turing Award last month. The Association for Computing Machinery (ACM) announced in March that the professors had won the award for their work in the field of provable security, efforts that helped lay the mathematical foundations that made modern cryptography possible.
|Praise for outstanding female researcher
Scientific Computing World, March 26, 2013
The Association for Computing Machinery's Council on Women in Computing (ACM-W) has announced that Katherine Yelick of the Lawrence Berkeley National Laboratory (LBNL) is the 2013-2014 Athena Lecturer. The award honours outstanding women researchers who have made fundamental contributions to computer science. Among Yelick’s substantial body of work is co-creation of Unified Parallel C (UPC) and core contributions to the theory and practice of performance analysis, modeling, and optimization for the field of high performance computing.
|ACM, Infosys Foundation Hounour Google Developers
Net India 123, March 26, 2013
The Association for Computing Machinery and the Infosys Foundation have honoured Jeffrey Dean and Sanjay Ghemawat of Google Inc with ACM-Infosys Foundation Award for 2012 in the Computing Sciences. They led the conception, design, and implementation of much of Google's revolutionary software infrastructure, which underlies the company's web search and indexing, as well as numerous applications across the industry. This technology has been emulated by virtually every major Internet company in the world.
|Beware the Cost of 'Free' Online Courses
The New York Times, March 25, 2013
Michael A. Cusumano, a professor at the Sloan School of Management at M.I.T., raises a different issue in an essay published this week: the economics of MOOCs and the implications. His article appears in Communications of the ACM, the monthly magazine of the Association for Computing Machinery, and he had circulated a version of it earlier to his M.I.T. colleagues. After reading it, L. Rafael Rief, M.I.T.’s president, asked Mr. Cusumano to serve on a task force on the “residential university” of the future, including online initiatives.
|5,4,3,2,1 Things About Karen Tanenbaum
MAKE, March 23, 2013
Four tools you can't live without. Maybe this is stretching the definition of a tool, but I’m a researcher at heart, so my go-to move with any new project or idea is to start with a lit review. The ACM Digital Library is where I usually start my search.
|Researchers Demo Fingernail Displays for Mobile Devices
PC Magazine, March 20, 2013
Chao-Huai Su and fellow researchers at National Taiwan University in Taipei have developed a prototype display that doesn't get around the "fat finger" problem—it works with it by putting the obscured letter or number on a mobile device screen right on a user's fingertip. Called NailDisplay, this technology is in the very early stages, according to New Scientist. The researchers will be presenting a paper describing their work next month at the Human Factors in Computing Systems (ACM CHI) conference in Paris.
|Two MIT professors win computing Award
Boston Globe, March 13, 2013
Some 30 years after professors Shafi Goldwasser and Silvio Micali began working in the field of modern cryptography, the two were awarded the prestigious A.M. Turing Award Wednesday from the Association for Computing Machinery for their pioneering work on the kind of data encryption used to protect electronic commerce from malicious hackers and thieves. “We are indebted to these recipients for their innovative approaches to ensuring security in the digital age,” said Vint Cerf, president of the association, the world's largest education and scientific computing society.
|Turing Award Goes to MIT Crypto Experts Goldwasser and Micali
Network World, March 13, 2013
ACM has named Massachusetts Institute of Technology (MIT) professors Shafi Goldwasser and Silvio Micali as the recipients of the 2012 A.M. Turing Award, renowned as the "Nobel Prize in Computing." The Turing Award, ACM's top technical honor, is bestowed on recipients who have made significant contributions with a lasting impact on computing.
|MIT crypto experts win 2012 Turing Award ("Nobel Prize in Computing")
Slashdot, March 13, 2013
A pair of MIT professors and security researchers whose work paved the way for modern cryptography have been named winners of the 2012 A.M. Turing Award, also known as the “Nobel Prize in Computing.” Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science at MIT and a professor at the Weizmann Institute of Science in Israel, and Silvio Micali, the MIT Ford Professor of Engineering, are recipients of the award, which will be formally presented by the Association for Computing Machinery (ACM).
|Computer graphics pioneer awarded Kyoto Prize
EETimes, March 13, 2013
The "father of computer graphics" Ivan Sutherland was awarded the Kyoto Prize in Advanced Technology yesterday at the Kyoto Symposium in San Diego, Calif, for his "pioneering achievements in the development of computer graphics and interactive interfaces." Sutherland's Sketchpad was software, running on MIT's fabled Lincoln TX-2 computer, that constrained hand-drawn line segments and arcs so that they could be easily combined into figures and shapes, for which he received the Turing Award from the Association for Computing Machinery in 1988.
|Symantic and NCWIT Give Grants to College Students for Recruiting Women in Technology
GlobeNewswwire, March 13, 2013
...the recipients of the NCWIT Student Seed Fund awards include University of Puget Sound, which has formed a joint ACM-W chapter with Pacific Lutheran University and will use the funds to expand its activities in the community.
|Making cloud computing more efficient
Kurzweil Accelerating Intelligence, March 12, 2013
MIT researchers are developing a new system called DBSeer that should help solve problems with cloud-computing services, such as inefficient use of virtual machines, pricing of cloud services, and diagnosis of application slowdowns....And in June, at the annual meeting of ACM's Special Interest Group on Management of Data (SIGMOD), they will unveil the algorithms at the heart of DBSeer, which use machine-learning techniques to build accurate models of performance and resource demands of database-driven applications.
|Fostering Gender Diversity in Computing
IEEE CS Computer Magazine, March 2013
This issue also includes contributions that provide an overview of the pipeline that feeds higher education. In “More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education,” Chris Stephenson of the Computer Science Teachers Association and Rebecca Dovi, who teaches at Patrick Henry High School, Richmond, Virginia, explore the necessity of making access to computer science education equitable across both gender and ethnicities.
|Sing a new song: Computer scientists use music to lure students to STEM majors
ECN magazine, March 8, 2013
To students in Jennifer Burg's computer science classes, making music is the main objective. But her goal is to get them to understand how the underlying technology works – and to love it so much they decide on a science-based career path. The results of Burg's research, "Computer Science 'Big Ideas' Play Well in Digital Sound and Music," will be published during the upcoming Special Interest Group on Computer Science Education conference, on March 9 in Denver.
|Mayor Bloomberg and Schools Chancellor Walcott Announce the 20 Schools Selected for the New Software Engineering Pilot Program
NYC.gov, February 25, 2013
“Giving students an opportunity for a bright future is the goal of every educator, and opportunity is what students will get when exposed to rigorous and engaging computer science education,” said Cameron Wilson, Director of Public Policy for the Association for Computing Machinery. “The question we face is whether students will have access to this critical discipline because far too often they do not.
|Academy Still Counting on PwC to Pick Oscar Winners
Forbes, February 24, 2013
A group of cyber security experts and voting rights advocates released a statement on February 14 warning that Internet voting for this year’s Academy Awards should not become a model for public elections. Common Cause, Verified Voting and scientists including Ron Rivest, co-founder of RSA and Verisign and recipient of the Turing Award and Dr. Barbara Simons, former President of ACM and author of “Broken Ballots: Will Your Vote Count?” voiced concerns. "...we found ourselves compelled to remind the general public that it is dangerous to deploy voting by email, efax, or through internet portals in public governmental elections at this time,” the experts said.
|Maryland's proposed online ballot system called vulnerable to cyberattack
Washington Post, February 23, 2013
Last fall, Alex Halderman, David Jefferson, and Barbara Simons, researchers at the University of Michigan, the Lawrence Livermore National Laboratory and a former president of the Association for Computing Machinery, respectively, wrote to Maryland elections officials urging them to take immediate steps to better protect the state’s online voter registration system. The three sent a follow-up letter Wednesday, saying they were concerned that Maryland’s system remained “up and running and open to large-scale, automated registration fraud.”
|Google offers tips on reducing latency on large-scale systems
Computer World, February 8, 2013
Running the world's most popular website, Google engineers know a thing or two about keeping a site responsive under very high demand. In the latest issue of the ACM monthly magazine Communications of the ACM, Google reveals a few secrets to maintaining speedy operations on large-scale systems. When you have a [user] request that needs to gather information from many machines, inherently some of the machines will be slow," said Ion Stoica, an ACM reviewer who is a computer science professor at the University of California Berkeley, as well a co-founder of video stream optimization software provider Conviva.
|Research could ensure that crowd work becomes a career option, not a dead end
ECN News, February 7, 2013
Leading researchers in crowd work from Carnegie Mellon University and other institutions will present their plan, hashed out in a special workshop last spring, at the Association for Computing Machinery's Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2013, Feb. 27 in San Antonio, Texas. Finding ways to enhance collaboration, incorporate artificial intelligence and create ways for workers to build reputations are among the research challenges ahead.
|Thoughts on meeting a father of the Net
Hindustan Times, February 3, 2013
In covering information technology (IT) and the Internet for nearly two decades, I have had the privilege of meeting some of its hottest names,....But none perhaps gave me the special thrill I felt last week when I met Vinton G Cerf, who is currently the chief Internet evangelist at Google...he co-created one of the most critical building blocks of the Internet, the Transmission Control Protocol/Internet Protocol (TCP-IP). Kahn and Cerf were named recipients of the ACM Alan M Turing award in 2004 for their work. The award is called the "Nobel Prize of Computer Science."
|Computer Security Expert Available for Interviews on Hacker Attacks on The New York Times
Newswise, February 1, 2013
Following the disclosure by the Times, the publishers of The Wall Street Journal reported that its computer systems also had been infiltrated by Chinese hackers, apparently to monitor its China coverage. Available for interviews on this topic is Avi Rubin, a professor of computer science in The Johns Hopkins University’s Whiting School of Engineering and technical director of the university’s Information Security Institute. He has written or contributed to books on computer voting and Web security. He is associate editor of ACM Transactions on Internet Technology.
|Tale of 'Bob':Does outsourcing new software pose cyber security risk? (+ video)
The Christian Science Monitor, January 30, 2013
The cybersecurity risk from outsourcing isn't new. Back in 2005, Dr. Goodman chaired the cyber security panel for the Association for Computing Machinery, which found that "offshoring [of software development] magnifies existing risks and creates new and often poorly understood or addressed threats to national security, business property and processes." But the threat continues to grow as companies outsource not just software for smart phone apps, but also software tools that run corporate websites, networks, and databases.
|Computing guru makes case for better education
Gulf News, January 27, 2013
“We have more data than ever before, yet not enough IT professionals to meet the demand,” Chuck Thacker, a professor and technical fellow at Microsoft Research, said. “That is why improved education for all is crucial. Thacker received the Association for Computing Machinery’s A.M. Turing Award in 2009 for his numerous contributions to the field, including his pioneering design and realisation of the Alto, the first modern personal computer, the prototype for networked personal computers.
|India's net penetration not good, says father of Internet
Deccan Herald, January 26, 2013
American computer scientist Vinton Gray Cerf, hailed worldwide as “father of the Internet”, quoted recent statistics on internet distribution and users to show that its “penetration” in India is just 11.4 per cent of the country’s population, even as the average internet use in Asia remained only 27.5 per cent. Taking part in an interaction organised by IIT Madras and the Pune-based Association For Computing Machinery (ACM) on Thursday, Vint said India has about 137 million internet users and the net penetration is not so good.
|Grammar rules undermine security of long computer passwords
Homeland Security News Wire, January 25, 2013
A team led by Ashwini Rao, a software engineering Ph.D. student in the Institute for Software Research, developed a password-cracking algorithm that took into account grammar and tested it against 1,434 passwords containing sixteen or more characters. “We should not blindly rely on the number of words or characters in a password as a measure of its security,” Rao concluded. She will present the findings on 20 February at the Association for Computing Machinery’s Conference on Data and Application Security and Privacy (CODASPY 2013) in San Antonio, Texas.
|CSTA K-12 Computer Science Standards correlated with the Common Core
Computer Science Teacher, January 24, 2013
To help teachers, administrators, and policy makers see how computer science addresses a wide variety of standards, the CSTA K-12 Computer Science Standards have now been correlated with the Common Core State Standards, the STEM Cluster Topics, and the Partnership for 21st Century Essential Skills.
|Computer science leader Jim Horning dies at 70
Network World, January 24, 2013
James "Jim" Horning, described by ACM as "a leading figure in the evolution of computer science as a discipline and a profession," has died at the age of 70 in Palo Alto. Horning, who described himself as having been "hooked on computing since 1959" (when he wrote his first program), was a founding member and chair of the University of Toronto's Computer Systems Research Group, a Research Fellow at Xerox PARC and a founding member and senior consultant with Digital Equipment Corp.'s Systems Research Center. Horning was heavily involved with co-chairing its Awards Committee from 2002 to 2012.
|'Intellectual property industry must move information into public domain
The Hindu, January 24, 2013
Widely known as the ‘Father of the Internet’, Vint Cerf is a dapper man, who is rarely seen without his three-piece suit. After co-creating the TCP/IP protocol in the early 1980’s, he went on to become the Chief Internet Evangelist for Google, campaigning for internet freedom. The technologist is in town as part of an Association for Computing Machinery (ACM) conference taking place in Chennai over the next few days and is speaking about (apart from the future of the Internet), the need for greater sharing of information and open-access.
|Cloud Security Threat: Vulnerable APIs
Information Week, January 16, 2013
Researchers from the University of Texas at Austin and Stanford University surveyed a variety of high-profile Web services and found that the interfaces exposed to third-party developers contained significant vulnerabilities. The result are applications that can be fooled into allowing some access to a customer's data through the API, according to a paper presented at the 19th ACM Conference on Computer and Communications Security.
|ACM 2013 Annual India Event
The Hindu, January 7, 2013
The annual event of the Association of Computing Machinery (ACM) India will be held between January 23-25, at IIT Madras. ACM India has been organising an annual flagship event to discuss the trends in information science and technology, and to celebrate ACM's spirit and India's accomplishments in computing. The list of speakers includes Vint Cerf (Current ACM President, Turing Award Winner, 2004), recognised as one of the fathers of the Internet.