acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Rejected From CHI and I Feel Fine
From The Female Perspective of Computer Science

Rejected From CHI and I Feel Fine

I remember seeing a non-zero amount of grumbling last year when acceptance notifications for CHI came out.  In particular, those who were rejected listed all kinds...

Visualizing 500 Million Facebook Members
From The Eponymous Pickle

Visualizing 500 Million Facebook Members

In the BBC, an article on visualizing all of the world facebook connections.  What is driven home here is the impressive density of the connections world-wide. ...

Maps for That: Crowdsourcing Your Mind
From The Eponymous Pickle

Maps for That: Crowdsourcing Your Mind

Mindjet a vendor of mind mapping software that I have successfully used in the past, has come out with a map sharing site called Maps-for-that.  Nice idea.  The...

Realistic Masks
From Schneier on Security

Realistic Masks

They're causing problems: A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...

Library Science Blogs
From The Eponymous Pickle

Library Science Blogs

Brought to my attention for some work I am doing regarding cataloging and classification: 50 Excellent Library Science Blogs Worth Reading.

iPads and Archaeology
From The Eponymous Pickle

iPads and Archaeology

Doug Lautzenheiser gives another example of iPad usage, in one of my favorite areas of interests, Archaeology.  As a means of simply gathering information as one...

Reminder:  PCAST to Release NITRD Review on Thursday
From The Computing Community Consortium Blog

Reminder: PCAST to Release NITRD Review on Thursday

As previously noted in this space, on Thursday, December 16th at 2:15 p.m. EST, the President’s Council of

Lady Gaga and Computer Science
From Computer Science Teachers Association

Lady Gaga and Computer Science

Recently I heard a British author on the radio lamenting that the world is more obsessed with what Lady Gaga wears (I would think it probably goes beyond her clothes...

Evan Kohlmann
From Schneier on Security

Evan Kohlmann

Interesting profile of Evan Kohlmann: Evan Kohlmann spends his days lurking in the darkest corners of the Internet, where jihadists recruit sympathizers from across...

Free E Books from Microsoft
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Free E Books from Microsoft

I “borrowed” this list from the  Microsoft UK Higher Education blog (Free Microsoft ebooks) Most of  these I have linked to in the past but it is nice to have a...

Cloud Risks Article Available
From Wild WebMink

Cloud Risks Article Available

My article on learning from the Wikileaks experience and managing the risks of cloud computing is now available in the Essays section.

Internet users say, Don
From Putting People First

Internet users say, Don

Most Americans don’t want to be tracked on the Internet and are unwilling to trade their privacy for web ads that are tailored to their interests. So suggest the...

Vinimaya Introduces New Capabilities
From The Eponymous Pickle

Vinimaya Introduces New Capabilities

I have mentioned the Vinimaya virtual marketplace package in this blog a number of times.   Talked to them about their system.   A number of new capabilities have...

Google Latitude App
From The Eponymous Pickle

Google Latitude App

Introduced for the IPhone, the Google Latitude App.  What this does is share information about the locations of friends that permit it.  Obvious applications for...

QR Codes as Magnet for Shoppers
From The Eponymous Pickle

QR Codes as Magnet for Shoppers

A short Phil Lempert article: QR Codes as a Magnet for Tech Savvy Shoppers with some excellent examples:"Supermarkets will soon have a potentially powerful way...

White House Issues Federal IT Reform Plan
From U.S. Public Policy Committee of the ACM

White House Issues Federal IT Reform Plan

Last Thursday the national Chief Information Officer (CIO), Vivek Kundra, issued an implementation plan for reforming federal information technology. It's a very...

Proprietary Encryption in Car Immobilizers Cracked
From Schneier on Security

Proprietary Encryption in Car Immobilizers Cracked

This shouldn't be a surprise: Karsten Nohl's assessment of dozens of car makes and models found weaknesses in the way immobilisers are integrated with the rest...

Sometimes CCTV Cameras Work
From Schneier on Security

Sometimes CCTV Cameras Work

Sex attack caught on camera. Hamilton police have arrested two men after a sex attack on a woman early today was caught on the city's closed circuit television...

From Computational Complexity

Math- Old School

In the last month we have reported on NEW RESULTS by Williams, Katz and Guth, Sanders, and Pinkerton and Setra. For a change of pace lets look at some really OLD...

Out of our brains
From Putting People First

Out of our brains

Andy Clark, professor of logic and metaphysics in the School of Philosophy, Psychology, and Language Sciences at Edinburgh University, Scotland, wonders whether...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account