Sign In

Communications of the ACM

Blogroll


bg-corner

On News Aggregation: Added Value Facts
From The Eponymous Pickle

On News Aggregation: Added Value Facts

In CACM:  News aggregation is a common thing in the internet.  Many sites and blogs find news in their specialty areas, and the results are redistributed to different...

$99 Tablet
From The Eponymous Pickle

$99 Tablet

Akin to the $99 laptop, the $99 tablet, which I wrote about in the enterprise some long time ago with the hope of getting some support to drive it world-wide.  Is...

Reinventing American Manufacturing – The Role of Innovation
From The Computing Community Consortium Blog

Reinventing American Manufacturing – The Role of Innovation

An excellent article by MIT’s Bill Bonvillian, just out in the MIT Press journal Innovations.  Bill’s prescription: The U.S. must develop an integrated strategy...

Reorganizing the Web to Get Stuff Done
From The Eponymous Pickle

Reorganizing the Web to Get Stuff Done

A big part of this is reorganizing search, a big component of our use of the Web.  This article talks about that from the search engine Bing's perspective.   Isee...

The Importance of Mentoring
From Computer Science Teachers Association

The Importance of Mentoring

My school celebrated CS Ed Week with a visit from alumni who are working in CS-related careers. One alumnus spoke to my students over skype about his career in...

War Gaming Innovation Strategy
From The Eponymous Pickle

War Gaming Innovation Strategy

Battle testing an innovation strategy.  In the McKinsey  Quarterly.    This does remind me of defense department approaches, that were reimplemented in big enterprise...

<i>Cryptography Engineering</i> Available as an eBook
From Schneier on Security

Cryptography Engineering Available as an eBook

Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...

A Belated Brief on Barcelona
From updated sporadically at best

A Belated Brief on Barcelona

Notes from a more decadent time...Itinerary: Barcelona with Kate, April 2012.  Photos here.Day 1.  Arrive in Barcelona by plane close to midnight on a Friday evening...

Hackers Use Backdoor to Break System
From Schneier on Security

Hackers Use Backdoor to Break System

Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required...

Holiday Shopping Behavior
From The Eponymous Pickle

Holiday Shopping Behavior

Mintel releases some holiday shopping behavior statistics in Progressive Grocer.

Merry Christmas 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Merry Christmas 2012

Merry Christmas and a Healthy, Happy and Prosperous New Year to all my readers and friends. Maligayang Pasko at Manigong Bagong Taon Boas Festas e Feliz Ano Novo...

Magazine: Driving Innovation in Big Data
From The Eponymous Pickle

Magazine: Driving Innovation in Big Data

New and appears to be quite interesting.  Including: " ... Our interview with Principal Scientist at NASA, Ashok Srivastav ... ".   Registration required.

Peruvian Spider Species Creates Decoys
From Schneier on Security

Peruvian Spider Species Creates Decoys

Clyclosa spiders create decoys to fool predators.

Storytelling Daily
From The Eponymous Pickle

Storytelling Daily

A Paper.li collection of information about storytelling ideas and technology.

B-Reel
From The Eponymous Pickle

B-Reel

Selling high tech ideas at B-Reel.  An example of using a mix of digital and other media to sell product.  Some interesting examples of 2011 are described.  ...

Myers-Briggs as Assessment
From The Eponymous Pickle

Myers-Briggs as Assessment

We never used the well known Myers-Briggs personality test for specific decisions.  But it was promoted as a means for self-understanding.  I was convinced it was...

Phishing via Twitter
From Schneier on Security

Phishing via Twitter

Interesting firsthand phishing story: A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me,...

How are students actually using IT? An ethnographic study
From Putting People First

How are students actually using IT? An ethnographic study

This ECAR research bulletin describes an anthropological ethnographic analysis of student practices relating to the use of information technology on the University...

Interesting Links 24 December 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 24 December 2012

It’s the day before Christmas and at my house we have been cooking for days getting things prepared that can be prepared  early. I haven’t spent as much time on...

Disrupt Yourself with Dreams
From The Eponymous Pickle

Disrupt Yourself with Dreams

My former colleague Julie Anixter  interviews Whitney Johnson  about using dreams as a vehicle for disruption.  "  ... Join me for the webinar interview Innovation...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account