Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Archive for the ‘Uncategorized’ category

 

“Yes, Computer Scientists Are Hypercritical”

October 7th, 2011 / in Uncategorized / by Erwin Gianchandani

We’ve talked about the notion of hypercriticality in computer science in this space before (see here and here), and now Jeannette M. Wing — the former National Science Foundation (NSF) Assistant Director for Computer and Information Science and Engineering (CISE) and current Department Head of Computer Science at Carnegie Mellon University — has written about it with some hard numbers over on the Communications of the ACM Blog: Are computer scientists hypercritical? Are we more critical than scientists and engineers in other disciplines? Bertrand Meyer’s August 22, 2011 The Nastiness Problem in Computer Science blog post partially makes the argument referring to secondhand information from the [NSF]. Here are some NSF numbers to back the claim that we are hypercritical. […]

CISE Names Deputy Assistant Director

August 26th, 2011 / in Uncategorized / by Erwin Gianchandani

The NSF’s CISE Directorate today announced the appointment of Cynthia Dion-Schwarz as the Deputy Assistant Director, effective Sept. 12: Dr. Dion-Schwarz will be joining us from the Department of Defense (DoD), where she served as the Director of Information Systems & Cyber Security Research in the Office of the Assistant Secretary of Defense for Research and Engineering. In this position, she was responsible for the strategic oversight of the science and technology research in Information Technologies and for serving as the program executive for research programs in tactical networked communications, software initiatives, cyber security, and high performance computing. She also served as the DoD representative to the Networking and Information Technology […]

Stanford AI Course Goes Online

August 16th, 2011 / in Uncategorized / by Ran Libeskind-Hadas

Today’s New York Times reports on a Stanford AI course that will be available online and has already attracted nearly 60,000 students.

Barbara Liskov receives an honorary degree from Northwestern …

June 18th, 2011 / in Uncategorized / by Ed Lazowska

… and a shout-out early in Stephen Colbert’s hilarious commencement address. Congratulations Barbara!  Watch Colbert’s remarks here.

“Rescue Robots Don’t Replace People or Dogs, but People and Dogs Can’t do it All by Themselves”

May 31st, 2011 / in Uncategorized / by Ran Libeskind-Hadas

I’ve been interacting with the international press quite a bit with the spate of disasters in Japan and here in the US. I’m thrilled with the “where are the robots?” questions for a couple of reasons. First, there’s the Sally Fields effect- they like robots! Finally, I was getting tired of hearing about the Terminator and robot uprisings. Second, I get to point that out that there is a set of land, sea, and marine vehicles sufficiently hardened to be of use- while putting in a pitch for the government to fund acquisition. (But no worries, these robots are the first generation and need lots of improvements and fundamental research […]

“Spammers and Their Bankers”

May 29th, 2011 / in Uncategorized / by Ed Lazowska

It’s unusual for computing research to be featured in an editorial in the New York Times, but it happened today:   An editorial in today’s New York Times follows up on an article ten days ago describing an end-to-end analysis of the spam value chain which determined that 95% of spam-advertised pharmaceutical, replica and software products are monetized using merchant services from just a handful of banks. The New York Times editorial states:  “The Times’s John Markoff reported that computer scientists at two University of California campuses have found another vulnerability:  spammers’ banks.  To track the flow of information, the researchers made hundreds of purchases.  Buying Viagra from the Pharmacy Express […]