acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Looking At Curriculum From Different Angles
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Looking At Curriculum From Different Angles

My job at Microsoft was to promote the use of Microsoft tools for computer science education. It was a great job and I was promoting tools that I had and that I...

Designing empathy into an open Internet of Things
From Putting People First

Designing empathy into an open Internet of Things

The mobile technology of tomorrow may be real-time, always on and algorithm driven in its characteristics, writes designer Jessi Baker, but there is a real opportunity...

Why BI Fails
From The Eponymous Pickle

Why BI Fails

I agree with some of the commenters.  Tools may be necessary these days, but they are not sufficient.  Your BI project will mostly likely fail not because features...

Cultivating empathic design in an analytical world
From Putting People First

Cultivating empathic design in an analytical world

There is an empathy gap in technology development, argues April Demosky on the FT’s Tech Blog. “In the analytic, data-driven world of Silicon Valley, emotions often...

OSTP mandates free public access to publications
From The Computing Community Consortium Blog

OSTP mandates free public access to publications

The White House Office of Science and Technology Policy has directed that the published results of federally funded research (final peer-reviewed manuscripts or...

Congressional Briefing on Software Patent Reforms
From U.S. Public Policy Committee of the ACM

Congressional Briefing on Software Patent Reforms

Leading high-tech executives spoke this week on the best ways to promote innovation and improve the quality of software patents at an industry-sponsored Congressional...

Friday Squid Blogging: Land Squids
From Schneier on Security

Friday Squid Blogging: Land Squids

Funny. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Nominations sought for CCC Council
From The Computing Community Consortium Blog

Nominations sought for CCC Council

The Computing Community Consortium is governed by an 18-member Council, with members on 3-year staggered terms. The CCC’s Nominating Committee invites nominations...

Safeway Avoids Print
From The Eponymous Pickle

Safeway Avoids Print

In Adage: Safeway looks at a world without print ads, moves digital.   " ... Safeway is doing its best to eliminate print advertising in favor of more personalized...

I Was on <i>Inventing the Future</i>
From Schneier on Security

I Was on Inventing the Future

I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.

Nominations Form Available for CRA Outstanding Undergrad Researchers Award
From The Computing Community Consortium Blog

Nominations Form Available for CRA Outstanding Undergrad Researchers Award

The Computing Research Association (CRA) Outstanding Undergraduate Researchers award program recognizes undergraduate students in North American colleges and universities...

Research Questions About MOOCs
From The Computing Community Consortium Blog

Research Questions About MOOCs

In a Communications of the ACM Blog, Mark Guzdial raises some probing “Research Questions About MOOCs.” He points to recent articles that explore the impact of...

PD Points and Teacher Licensing: Chickens and Eggs
From Computer Science Teachers Association

PD Points and Teacher Licensing: Chickens and Eggs

I am nearing the end of my five year cycle for recertification, so I am reviewing what professional development activities I have participated in to see what qualifies...

iPad Addiction
From The Eponymous Pickle

iPad Addiction

In Baseline Mag:  Some thoughts and statistics about how people are getting addicted to the tablet format. Retailers and marketers should notice this.

Hacking the Papal Election
From Schneier on Security

Hacking the Papal Election

As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...

How to Create a Mind
From The Eponymous Pickle

How to Create a Mind

A piece on Ray Kurzweil's  (now at Google)  latest book: How to Create a Mind: the Secret of Human Thought Revealed.  Always fascinating, sometimes over the top...

On the Cost of Suspicion
From The Eponymous Pickle

On the Cost of Suspicion

An interesting HBR case study of the cost of suspicion in the enterprise.  Refreshingly different piece.  Also hints at how this can go beyond just the usual personnel...

Obama Endorses Programming Classes in High School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Obama Endorses Programming Classes in High School

On one hand this is great. The President of the United States promotes computer science education. On the other hand he talks about it primarily as a vocational...

All Those Companies that Can't Afford Dedicated Security
From Schneier on Security

All Those Companies that Can't Afford Dedicated Security

This is interesting: In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...

The curious cult of the connected thermostat
From Putting People First

The curious cult of the connected thermostat

Nick Hunn, CTO at Onzo, a “smarter than normal” Smart Energy start-up, criticizes the service model of the Nest thermostat: “A basic programmable thermostat in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account