acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Designing an Intro to CS for Non-Majors: From Objectives to Problems
From The Female Perspective of Computer Science

Designing an Intro to CS for Non-Majors: From Objectives to Problems

When working on my introductory computer science class for non-majors, I started with the objectives.  From there, I thought about the types of assignments andinquiry...

Combatting Patent Trolls
From The Eponymous Pickle

Combatting Patent Trolls

I recently commented on patent trolls.  I have been on the receiving end of being threatened by patent trolls.  I was informed that there is now an advertisingStop...

Don't Let them Underestimate You
From The Eponymous Pickle

Don't Let them Underestimate You

Very good piece in the HBR Blog.  Emphasizing about how you should set your self up and prepare for client meetings such that your capabilities are not underestimated...

Nanotechnology Conference
From The Eponymous Pickle

Nanotechnology Conference

From the Foresight Institute, an upcoming conference in February 2014 , an excellent source of information in nanotech.  Their site is well worth following.  Particularly...

In Store Gamification
From The Eponymous Pickle

In Store Gamification

Using in-store gamification. Via John Curran of 5th Screen Display Services, who worked with us at our Innovation centers and introduced us to advanced interactive...

Pinterest as Business Platform
From The Eponymous Pickle

Pinterest as Business Platform

Took a close look at Pinterest about a year ago.  Was interested in a largely non-text way of communicating, especially in a strong story format.  I was disappointed...

More on the NSA Commandeering the Internet
From Schneier on Security

More on the NSA Commandeering the Internet

If there's any confirmation that the U.S. government has commandeered the Internet for worldwide surveillance, it is what happened with Lavabit earlier this month...

Encrypting Cloud Data
From The Eponymous Pickle

Encrypting Cloud Data

Google decides to encrypt cloud data.  A very good idea to do this in general.  Cloud data is a target.

New Report on Computer Science Teacher Certification in the United States
From U.S. Public Policy Committee of the ACM

New Report on Computer Science Teacher Certification in the United States

Computer science teacher certification throughout the United States is “deeply flawed” and requires coordinated action by federal and state policymakers, education...

How Many Leakers Came Before Snowden?
From Schneier on Security

How Many Leakers Came Before Snowden?

Assume it's really true that the NSA has no idea what documents Snowden took, and that they wouldn't even know he'd taken anything if he hadn't gone public. The...

The Federal Trade Commission and Privacy
From Schneier on Security

The Federal Trade Commission and Privacy

New paper on the FTC and its actions to protect privacy: Abstract: One of the great ironies about information privacy law is that the primary regulation of privacy...

Patent Trolling Against Location Systems
From The Eponymous Pickle

Patent Trolling Against Location Systems

In GigaOM:   Lawsuits have been issued against Apple and others.  The patent mentions systems that can determine and utilize  their location.  Should could have...

CCC Sponsors Computational Sustainability Track at AAAI Conference on Artificial Intelligence (AAAI-13)
From The Computing Community Consortium Blog

CCC Sponsors Computational Sustainability Track at AAAI Conference on Artificial Intelligence (AAAI-13)

The following entry is a special contribution to this blog from Douglas H. Fisher, Associate Professor of Computer Science at Vanderbilt University. This year Doug...

User-centred mobile app development in Kenya
From Putting People First

User-centred mobile app development in Kenya

The success of a mobile app – its high adoption rate and actual use – largely depends on the degree of involvement of the end user during the development stage....

Unilever Crowd sourcing Shower Taking
From The Eponymous Pickle

Unilever Crowd sourcing Shower Taking

Not too many details, but consumer goods giant is exploring crowdsourcing for future consumer need and product development.  Using the online package eYeka.  The...

Brain to Brain Connections
From The Eponymous Pickle

Brain to Brain Connections

This progress at the U of Washington implies more. Once you can establish a brain to brain connection, you can also connect a brain to Internet to brain connection...

Skype Planning 3D Video
From The Eponymous Pickle

Skype Planning 3D Video

In Fast Company: Not sure this will be generally useful.  Would prefer interface and quality improvements to Skype.  Though in thinking it through it might be an...

Seeing the elephant: defragmenting user research
From Putting People First

Seeing the elephant: defragmenting user research

“Forget Big Data — right now, our bigger problem is fragmented data that comes from siloed user research teams.” Just as we favor the research tools that we find...

Kinect Launching a Surgical Revolution
From The Eponymous Pickle

Kinect Launching a Surgical Revolution

Manipulating virtual images in no touch environments: " .... virtual images can be difficult to retrieve and manipulate. A surgeon can't use a mouse or keyboard...

Innovation Power of the Cloud
From The Eponymous Pickle

Innovation Power of the Cloud

In Computing Now:  Insightful piece on why cloud computing is linked to innovation.   I admit that I started out thinking that the Cloud was simply an obvious tool...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account