Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Archive for May, 2014

 

May 15 WATCH Talk: STAR-Vote – A Secure, Transparent, Auditable and Reliable Voting System

May 9th, 2014 / in Uncategorized / by Shar Steed

On May 15, the National Science Foundation (NSF) will host it’s next Washington Area Trustworthy Computing Hour (WATCH) talk. The talk will be “STAR-Vote – A Secure, Transparent, Auditable and Reliable Voting System.” The speaker will be Dan Wallach, professor in the Department of Computer Science and a Rice Scholar at the Baker Institute for Public Policy at Rice University in Houston, Texas. From the abstract: STAR-Vote is a collaboration between a number of academics and the Travis County (Austin), Texas elections office, which currently uses a DRE voting system and previously used an optical scan voting system. STAR-Vote represents a rare opportunity for a variety of sophisticated technologies, such as end-to-end cryptography and […]

NSF CISE Distinguished Lecture – The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant Technologies

May 8th, 2014 / in Uncategorized / by Ann Drobnis

The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a Distinguished Lecture on Monday, May 12, 2014 at 2:00 pm (EDT) by Dr. Erik Brynjolfsson titled The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant Technologies. Brynjolfsson is the Schussel Family Professor at the  MIT Sloan School of Management , Director of the MIT Center for Digital Business, Chair of the MIT Sloan Management Review, and the Editor of the Information Systems Network. His research and teaching focuses on how businesses can effectively use information technology in general and the Internet in particular. Abstract: We are at an inflection point in our economy.  A wave of exponential, digital and […]

CSTB Releases a Report on Cybersecurity and Public Policy

May 6th, 2014 / in Uncategorized / by Ann Drobnis

The Computer Science and Telecommunications Board (CSTB) released a new National Academies report, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. As we as a nation become more dependent on information and information technology, cybersecurity is becoming increasingly important.  The report highlights 6 key findings about cybersecurity and public policy: Cybersecurity is a never-ending battle, and a permanently decisive solution to the problem will not be found in the forseeable future. Improvements to the cybersecurity posture of individuals, firms, government agencies, and the nation have considerable value in reducing the loss and damage that may be associated with cybersecurity breachers. Improvements to cybersecurity call for two distinct […]

PCAST Report on Big Data and Privacy Released

May 2nd, 2014 / in Uncategorized / by Ann Drobnis

In January, President Obama asked for a comprehensive review of policy issues on big data and privacy during his speech on signals intelligence.  As a part of the comprehensive review, the President’s Council of Advisors on Science and Technology (PCAST) was asked to examine the topic.  PCAST setup a working group, co-chaired by Members William Press and Susan Graham, who is also the Chair of the Computing Community Consortium (CCC).  The working group has reviewed the technical literature, consulted with experts, and engaged with the broader community of social scientists and law for perspective to produce a report titled Big Data and Privacy: A Technological Perspective. The Report highlights five recommendations: […]