acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Nicolas Nova interviewed on Ethnography Matters
From Putting People First

Nicolas Nova interviewed on Ethnography Matters

The people from Ethnography Matters, an ethnography group blog that is celebrating its first year anniversary today, interviewed their new regular contributor Nicolas...

How 3 million hours of user-testing fixed the Jawbone Up
From Putting People First

How 3 million hours of user-testing fixed the Jawbone Up

Pulled from store shelves after a month, the first high-profile wearable activity tracker was a humiliation for Jawbone. Now, the Up is back, and anyone vying for...

Strategic Marketing Mix Decisions
From The Eponymous Pickle

Strategic Marketing Mix Decisions

I have been recently been taking a look at the broad concept of marketing mix decisions.  The problem is old:  how do we decide how much promotional dollars toTheir...

An interview with three UX strategists
From Putting People First

An interview with three UX strategists

The role of UX Strategist is a relatively new one on UX design teams, and has recently addressed in two articles on UXmatters: “UX Strategy: The Heart of User-Centered...

Free Online Cryptography Course
From Schneier on Security

Free Online Cryptography Course

Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...

Project or Recipe
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Project or Recipe

Chris Lehmann is the principal of the Science Leadership Academy, a partnership school in Philadelphia, and a frequent speaker on educational issues. He’s a great...

A qualitative study of internet non-use in Great Britain and Sweden
From Putting People First

A qualitative study of internet non-use in Great Britain and Sweden

Living Offline – A Qualitative Study of Internet Non-Use in Great Britain and Sweden by Bianca Christin Reisdorf (U. of Oxford, UK), Ann-Sofie Axelsson (Chalmers...

Midsize Organizations: Simpler BI
From The Eponymous Pickle

Midsize Organizations: Simpler BI

Jeff Zabin via Gib Bassett on using simpler business intelligence applications.  Especially for the midsize company. Yes, I agree.  In fact I would take it even...

Keeping Plastic Cards
From The Eponymous Pickle

Keeping Plastic Cards

In GigaOm:   I had always expected that plastic cards would go away once the mobile smartphone-enabled wallet took over.  Here the case is made that cards will...

Another Look at Design and Analytics
From The Eponymous Pickle

Another Look at Design and Analytics

I met Joseph Kyoung-yun  of Wayne State at a talk I gave last week and he was nice enough to send along some background on the work he was doing.  He writes " ....

Fairy Wren Passwords
From Schneier on Security

Fairy Wren Passwords

Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors: She kept 15 nests under constant audiotheir...

Book: Advancing Ethnography in Corporate Environments
From Putting People First

Book: Advancing Ethnography in Corporate Environments

Advancing Ethnography in Corporate Environments: Challenges and Emerging Opportunities Edited by Brigitte Jordan Left Coast Press November 2012, 224 pages [Amazon...

Indie Game: The Movie
From The Female Perspective of Computer Science

Indie Game: The Movie

I am very grateful that I will (hopefully) be lucky enough to see my vision for my Gram's House game developed professionally with research grants.  After watching...

CIKM 2012: Notes from a Conference in Paradise
From The Noisy Channel

CIKM 2012: Notes from a Conference in Paradise

The moment I learned that CIKM 2012 would be held in Maui, I knew I had to be there. Having co-organized the CIKM 2011 industry event, I had enough karma to be...

Miriah Meyer Named a 2013 TED Fellow
From The Computing Community Consortium Blog

Miriah Meyer Named a 2013 TED Fellow

Every year since 2007, The TED Fellows program has recognized young innovators from around the globe for their “insightful, bold ideas that have the potential to...

Encryption in Cloud Computing
From Schneier on Security

Encryption in Cloud Computing

This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...

Interesting Links 12 November 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 12 November 2012

I spent a little time tweaking this blog layout last week. Just trying to make it look a little less cookie cutter. I also wanted to add the share buttons at the...

Simple Advice for Being Effective in School
From updated sporadically at best

Simple Advice for Being Effective in School

As a result of hijacking a few recitations in MIT's 6.005: Software Construction course to evangelize Scala, I have come into contact with numerous undergraduates...

Data By The People, For The People
From The Noisy Channel

Data By The People, For The People

I was fortunate this year not only to be able to attend the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012) in Maui, but also...

Drawing Together
From The Eponymous Pickle

Drawing Together

David Sibbet, on the use of visualization capabilities with groups, as demonstrated by a mentor and friend at TED. "...  It's a simple, inviting, clear demonstration...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account