acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Every Song an App, Any Stream of Data also?
From The Eponymous Pickle

Every Song an App, Any Stream of Data also?

A recent Wired article made the case that songs can be Apps by adding visuals and anything else the Web can provide.  Every song can be an App.  It brought to mind...

Trojan Steals Credit Card Numbers
From Schneier on Security

Trojan Steals Credit Card Numbers

It's only a proof of concept, but it's scary nonetheless. It's a Trojan for Android phones that looks for credit-card numbers, either typed or spoken, and relays...

NFC: Near Field Communications
From The Eponymous Pickle

NFC: Near Field Communications

A Computerworld short article on the details of NFC.   The rumors are out that this technology will be used for i-Wallet applications in Smarpones usch as the I...

The Third & The Seventh
From Michael Nielsen

The Third & The Seventh

I’ve watched the video below more than a dozen times over the past year. It

Domodedovo Airport Bombing
From Schneier on Security

Domodedovo Airport Bombing

I haven't written anything about the suicide bombing at Moscow's Domodedovo Airport because I didn't think there was anything to say. The bomber was outside the...

$100 to Put a Bomb on an Airplane
From Schneier on Security

$100 to Put a Bomb on an Airplane

An undercover TSA agent successfully bribed JetBlue ticket agent to check a suitcase under a random passenger's name and put it on an airplane. As with a lot of...

Turning vanity publishing on its head
From Daniel Lemire's Blog

Turning vanity publishing on its head

It has never been easier to self-publish a book: Amazon has CreateSpace which offers a print-on-demand service and an ISBN if you want one. Self-publishing on the...

Giant Eagle Uses Behavioral Clusters
From The Eponymous Pickle

Giant Eagle Uses Behavioral Clusters

Not unusual, but a good direction for Giant Eagle:Giant Eagle will implement "behavioral cluster planning"Giant Eagle will begin using an automated computer system...

Whitelisting vs. Blacklisting
From Schneier on Security

Whitelisting vs. Blacklisting

The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model...

? O Artigo
From Wild WebMink

? O Artigo

O artigo “Direitos Humanos est

Superbowl Ad Research Competition
From The Eponymous Pickle

Superbowl Ad Research Competition

Sands Research reports on their annual comparison of Superbowl ads using neuromarketing techniques. An entertaining and instructive experiment of emerging marketing...

Here we go loopty loop
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Here we go loopty loop

I

Powerpointless Workshops
From The Female Perspective of Computer Science

Powerpointless Workshops

Today I put on a workshop for my fellow TA Mentors on Powerpointless Workshops.  While I don't think that using slides is totally evil, it's definitely the case...

Innovating in the French wine industry
From Putting People First

Innovating in the French wine industry

How does an entrepreneur successfully introduce innovation to a gastronomic tradition that is a cornerstone of French culture and identity? St

why I
From Apophenia

why I

Y’know how when you’re really really tired and your eyes refuse to focus unless you force them to? And if you force them to, you’re inviting a searing headache...

Security Theater, Illustrated
From Schneier on Security

Security Theater, Illustrated

Security theater, illustrated.

EmPower Research
From The Eponymous Pickle

EmPower Research

Newly discovered: EmPower Research.  " ... EmPower Research provides Custom Market and Media Intelligence services to Global 2000 companies, and Advertising and...

IT's Change of Focus to the Front End
From The Eponymous Pickle

IT's Change of Focus to the Front End

Interesting thoughts about a change in IT direction.  Mobile, Front-End, Sensor based, making just-in-time and place practical sense and value of lots of data (analytics)...

British Library App
From The Eponymous Pickle

British Library App

An interesting British Library App.  Capabilities continue to move to mobile. Even things you might expect to be there.

From Computational Complexity

The Ideal Conference

I found the perfect CS conference. A meeting where computer scientists from all its subdisciplines come together. Not with the purpose of presenting their current...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account