Thumbnail
Access Restriction
Subscribed

Author Linden, Greg ♦ Hong, Jason
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.<br /><br />twitter<br />Follow us on Twitter at http://twitter.com/blogCACM<br /><br />http://cacm.acm.org/blogs/blog-cacm<br /><br />Jason Hong writes about security breaches and offers a three-pronged approach. Greg Linden discusses the differences between computers and the human brain and their tolerance of errors.
Description Affiliation: Carnegie Mellon University (Hong, Jason) || Geeky Ventures (Linden, Greg)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 55
Issue Number 6
Page Count 2
Starting Page 10
Ending Page 11


Open content in new tab

   Open content in new tab
Source: ACM Digital Library