acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Five experts on what comes after the touchscreen
From Putting People First

Five experts on what comes after the touchscreen

Post-touch hasn’t found the killer use case that the mouse found with GUIs and the touchscreen found with mobile web browsing and apps — but it’s not for lack of...

Can ethnography save enterprise social networking?
From Putting People First

Can ethnography save enterprise social networking?

In this guest post for Ethnography Matters, Mike Gotta from Cisco Systems, makes the case for bringing the human back into enterprise software design and development...

The workplace of 2025 will be wherever you want it
From Putting People First

The workplace of 2025 will be wherever you want it

Sampling views from a panel representing Imperial College London, the Massachusetts Institute of Technology (MIT), the University of Washington, other international...

Book: Communicating the User Experience
From Putting People First

Book: Communicating the User Experience

Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation by Richard Caddick and Steve Cable Wiley 2011, 352 pages ISBN 978-1119971108...

Gait Recognition Revisited
From The Eponymous Pickle

Gait Recognition Revisited

In New Scientist:   When we explored a number of methods of identity recognition, the one that surprised me then was the ability to recognize people by the pattern...

Surprising Sponsor
From Wild WebMink

Surprising Sponsor

You’ll never guess who’s bankrolling open source. In my column in InfoWorld this week, I look at an initiative to get some crucial software written for America’s...

HCIR 2012 Symposium: Oct 4-5 in Cambridge, MA
From The Noisy Channel

HCIR 2012 Symposium: Oct 4-5 in Cambridge, MA

It’s the event you’ve been waiting for: the Sixth Symposium on Human-Computer Interaction and Information Retrieval! HCIR 2012 will take place October 4th and 5th...

Future of Smart Systems
From The Eponymous Pickle

Future of Smart Systems

In PEW Internet on the future of smart systems.   Read all of it. " ... By 2020, experts think tech-enhanced homes, appliances, and utilities will spread, but many...

Accountable Algorithms
From Schneier on Security

Accountable Algorithms

Ed Felten has two posts about accountable algorithms. Good stuff.

What period is it? Let me check my phone
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What period is it? Let me check my phone

The Center for Advanced Technology is a great program at Lakewood Senior High School in Florida. Students in this program learn and use technology in interesting...

Extra Sensory Shoppers
From The Eponymous Pickle

Extra Sensory Shoppers

A short piece on 'extra sensory' means of understanding the consumer.  Along the way some new mentions of work being done I had not seen before that is worth aVia...

Technologies to Dominate Retail
From The Eponymous Pickle

Technologies to Dominate Retail

Kevin Judd sends this notice of a one day conference on Technology in retail.  Combining speakers from a number of companies.  On September 24 in Cambridge Mass...

Analytics as a Database Operation
From The Eponymous Pickle

Analytics as a Database Operation

An interesting example of how a mid market company can gather and integrate and leverage data.    here transforming the way that it does business.  It seems like...

Kroger Expands
From The Eponymous Pickle

Kroger Expands

Kroger experimenting with more general merchandise, like clothing, in Ohio.   A natural,higher profitability approach for the grocery retailer.

To Be Published: Understanding the Power of Augmented Reality for Learning
From The Female Perspective of Computer Science

To Be Published: Understanding the Power of Augmented Reality for Learning

I'm pleased to say that my work on cognitive theories and augmented reality is finally going to be published. 'Understanding the Power of Augmented Reality for2012...

The 25 “Coolest” Computer Networking Research Projects
From The Computing Community Consortium Blog

The 25 “Coolest” Computer Networking Research Projects

Network World is out with a list of the 25 “coolest” computer networking research projects: University labs, fueled with millions of dollars in funding and some...

NCWIT Award for Aspirations in Computing!
From Computer Science Teachers Association

NCWIT Award for Aspirations in Computing!

Do you know a digital diva, web chix, or coder girl? Encourage her to apply for the NCWIT Award for Aspirations in Computing! It is time to start those applications...

From Computational Complexity

Poset Games are PSPACE-complete

Consider the following game on a poset, each player takes turns picking an element x of a finite poset and removes all y ≥ x. First one to empty the poset wins....

New Secure and Trustworthy Computing Solicitation Issued
From The Computing Community Consortium Blog

New Secure and Trustworthy Computing Solicitation Issued

The National Science Foundation (NSF) last week issued a new solicitation for its Secure and Trustworthy Computing (SaTC) program: Cyberspace — a global “virtual”...

The NSA and the Risk of Off-the-Shelf Devices
From Schneier on Security

The NSA and the Risk of Off-the-Shelf Devices

Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account