acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Who is in Charge of Analytics?
From The Eponymous Pickle

Who is in Charge of Analytics?

I have started to see corporate explorations of this topic.   In a number of experiments we started to build executive information systems (EIS) to try to change...

CRA Launches Effort to Understand Opinions About Recent PostDoc Surge
From The Computing Community Consortium Blog

CRA Launches Effort to Understand Opinions About Recent PostDoc Surge

The Computing Research Association — the umbrella organization of the CCC — today launched an effort to engage the computing research community in a conversation...

USACM Responds to Department of Commerce Online Privacy Report
From U.S. Public Policy Committee of the ACM

USACM Responds to Department of Commerce Online Privacy Report

Last month the Internet Policy Task Force (a Commerce Department group drawing on expertise from the Patent and Trademark Office, the International Trade Administration...

Hacking HTTP Status Codes
From Schneier on Security

Hacking HTTP Status Codes

One website can learn if you're logged into other websites. When you visit my website, I can automatically and silently determine if you're logged into Facebook...

Save the Date - Computers, Freedom and Privacy Conference 2011
From U.S. Public Policy Committee of the ACM

Save the Date - Computers, Freedom and Privacy Conference 2011

The Computers, Freedom and Privacy Conference (CFP) will take place this year June 14 through the 16th in Washington D.C. ACM is one of the conference sponsors...

Buyology Inc Releases NeuroTypes
From The Eponymous Pickle

Buyology Inc Releases NeuroTypes

I see that the neuromarketing firm Buyology Inc has released their Neurotype approach, applying it to determine the ranking of the most desired brands for men and...

Developing Mobile Apps
From The Eponymous Pickle

Developing Mobile Apps

Interesting piece in Computerworld:Escape the App Store: 4 ways to create smartphone Web apps By Peter Wayner" So you want to get your software in the hands of...

? Learning Opportunities
From Wild WebMink

? Learning Opportunities

On WebM again: freedom, quality, patents The arguments made against WebM video by H.264 advocates turn out to be at best wildly exaggerated and at worst baseless...

Kip Hawley Comments on the Domodedovo Airport Bombing
From Schneier on Security

Kip Hawley Comments on the Domodedovo Airport Bombing

This is the first piece of writing I've seen from Kip Hawley since he left the TSA in 2009. It's mostly generalities and platitudes.

Prototypes from Microsoft Education Labs
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Prototypes from Microsoft Education Labs

Microsoft Education Labs is a sort of technology playground for the Microsoft Education Products group. They have a blog and other pages to share ideas and have...

Wikipedia Now 10 Years Old, and it Works
From The Eponymous Pickle

Wikipedia Now 10 Years Old, and it Works

Everyone has problems with the Wikipedia, now over ten years old, but it does work and it is often the place to go first for encyclopedia style information. ...

USACM Comments on Proposed Web Accessibility Rules
From U.S. Public Policy Committee of the ACM

USACM Comments on Proposed Web Accessibility Rules

The Americans with Disabilities Act (ADA) was passed in 1990, and did not address the Internet. However, the Department of Justice established, most notably through...

? The Open-By-Rule Governance Benchmark
From Wild WebMink

? The Open-By-Rule Governance Benchmark

With Oracle’s OpenJDK Project about to announce new community governance, many people have asked what I look for in good open source project and community governance...

The Shelf Life of Great Ideas
From The Eponymous Pickle

The Shelf Life of Great Ideas

In VentureBeat/Entrepreneur Corner: Some interesting startup lessons and ideas.  These are the kinds of ideas that aim to set the stage, and are to a large degree...

Me on Color-Coded Terrorist Threat Levels
From Schneier on Security

Me on Color-Coded Terrorist Threat Levels

I wrote an op-ed for CNN.com on the demise of the color-coded terrorist theat level system. It's nothing I haven't said before, so I won't reprint it here. The...

? Rebooting Procurement
From Wild WebMink

? Rebooting Procurement

European Commission consults on the modernisation of the European Public Procurement Market The European Commission’s consultation is in progress until April. It...

? Sirius News
From Wild WebMink

? Sirius News

When we started last year, it was thrilling to see how many companies responded when we asked who would be interested in reselling ForgeRock subscriptions, consulting...

New encyclopedia on interactive design, usability and user experience
From Putting People First

New encyclopedia on interactive design, usability and user experience

The people behind Interaction-Design.org introduced a new type of top-quality and free encyclopedia dealing with Interactive Design, Usability, and User Experience...

Recursive Loops
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Recursive Loops

Last week I wrote about loops and how some students seem to have trouble with them. On the link to it from Facebook one friend of mine asked

Social Network Connector from IBM
From The Eponymous Pickle

Social Network Connector from IBM

I have talked to IBM several times about their development of social connectivity software.  What I saw, developed for internal use, was impressive.  Now they have...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account