acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Rerouting Internet Traffic by Attacking BGP
From Schneier on Security

Rerouting Internet Traffic by Attacking BGP

Renesys is reporting that Internet traffic is being manipulatively rerouted, presumably for eavesdropping purposes. The attacks exploit flaws in the Border Gateway...

Consortium Forming an Industrial Internet
From The Eponymous Pickle

Consortium Forming an Industrial Internet

Via colleague Shoumen Datta:US Consortium Forming an Industrial InternetSAN JOSE, Calif. – As many as ten companies including AT&T, Cisco Systems, GE, IBM, andAnd...

Analytics e-News Newsletter
From The Eponymous Pickle

Analytics e-News Newsletter

Another good resource, and links to papers from Informs, the authoritative resource for modeling and business systems improvement.   Always worth reading.

Big Data and HR
From The Eponymous Pickle

Big Data and HR

In the Atlantic:  Good general, non technical piece.  True as the article says, they are watching you at work.  They are also watching you as you work in your social...

Chocolate Martini Redux
From Wild WebMink

Chocolate Martini Redux

Almost ten years ago I posted a recipe for a very different style of chocolate martini. Most of the variants of this drink I have tried have had a chocolate taste...

Questions for the C-Suite
From The Eponymous Pickle

Questions for the C-Suite

The earliest experiences I had with the global enterprise were working directly with the CEO.   He had built a system that ran on an early desktop, I helped with...

The changing nature of service and experience design
From Putting People First

The changing nature of service and experience design

The ubiquitous nature of smart products and smart systems underscores the fact that the definitions of “service design” and “experience design” are becoming moving...

The intersection of UX, CX & corporate strategy: The holy grail for 21st century business?
From Putting People First

The intersection of UX, CX & corporate strategy: The holy grail for 21st century business?

Chris Allen (CUA – HFI US Sales Director Eastern Region; Global Accounts Director) went to the UX STRAT Conference in Atlanta and came back with one big question...

CSEdWeek poster featuring Susan Wojcicki, Google
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSEdWeek poster featuring Susan Wojcicki, Google

Passing this along from the CSTA announcement mailing list. It surprises me that women in the computer field were not more willing to take part in this effort by...

iBeacon for Retailers at Macy's
From The Eponymous Pickle

iBeacon for Retailers at Macy's

In TechCrunch: I Had known that Macy's had been doing work with Shopkick for some time.   I have the App on my iPhone.  A favorite experimental topic in our innovation...

PR Firms and the Wikipedia
From The Eponymous Pickle

PR Firms and the Wikipedia

In CIO Today:  I remember being part of a team to decide how we should react to the Wikipedia.  Issue warnings to our employees not to edit it?  When 'public interest'...

Impact of Simulation
From The Eponymous Pickle

Impact of Simulation

Using Simulation:   Well yes, based upon my background I am a big believer.  It is an essential approach of business analytics.   It was the first analytical technique...

From Gödel's Lost Letter and P=NP

Finding Patterns In Ancient Objects

Ancient mathematical objects can still contain secrets Recreational Mathematics source David Singmaster is a mathematician who is now retired from London South...

Update: Acquisti speaking at Washington Area Trustworthy Computing Hour
From The Computing Community Consortium Blog

Update: Acquisti speaking at Washington Area Trustworthy Computing Hour

On Monday, November 25, 2013, Alessandro Acquisti from Carnegie Mellon University will present at the next Washington Area Trustworthy Computing Hour (WATCH), a...

We Need a Grant Program for Teachers to Attend the CSTA Conference
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

We Need a Grant Program for Teachers to Attend the CSTA Conference

I had a thought spawned by a comment on a recent blog post and some conversations I have had recently. I wish there was a grant program to give attendance funding...

Changing the World One Step at a Time: Introducing CS in the Middle School
From Computer Science Teachers Association

Changing the World One Step at a Time: Introducing CS in the Middle School

I've taught middle school for fifteen years. Every year, after the students have graduated and moved on to high school, most of them return to thank me. Normally...

Why One PhD Student in Psychology Learned Python
From The Female Perspective of Computer Science

Why One PhD Student in Psychology Learned Python

I posted a few testimonials about why arts and social science needs code last week.  I have a new one from a PhD student in psychology here at Carleton, and since...

Internet of Things and Ubiquitous Sensing
From The Eponymous Pickle

Internet of Things and Ubiquitous Sensing

In Computing Now:  Mentions my colleague and IOT pioneer Kevin Ashton.  Start of a series that will address many of the aspects and issues in the Internet of Things...

Teens in the digital age
From Putting People First

Teens in the digital age

Two talks on teens in the digital age: The App Generation: identity, intimacy and imagination in the digital era (video – 21:18) Talk at The RSA, London, UK – October...

How to Avoid Getting Arrested
From Schneier on Security

How to Avoid Getting Arrested

The tips are more psychological than security.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account