acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Indian OS
From Schneier on Security

Indian OS

India is writing its own operating system so it doesn't have to rely on Western technology: India's Defence Research and Development Organisation (DRDO) wants...

Adverts in Your Head
From The Eponymous Pickle

Adverts in Your Head

A fairly good article in CNN on Neuromarketing.  They quote Roger Dooley: "the biggest development that I hope we see is some solid research validating neuromarketing...

Design for mobile and for public health
From Putting People First

Design for mobile and for public health

Two new articles in UX Magazine: Design for mobile by Juan Sanchez The Design For Mobile conference, which took place September 20-24 in Chicago, brought together...

Innovative ways of appropriating mobile telephony in Africa
From Putting People First

Innovative ways of appropriating mobile telephony in Africa

The French Ministry of Foreign and European Affairs and the International Telecommunication Union (ITU) have jointly published the report entitled “Innovative ways...

UX design in open source development
From Putting People First

UX design in open source development

Olli Savolainen has published a thesis entitled “User experience design in open source development: Approaches to usability work in the Moodle community” at the...

Device Design Day videos
From Putting People First

Device Design Day videos

Kicker Studio organised on 20 August a Device Design Day in San Francisco, exploring the design of the next generation of products. Most videos are now online:...

What the developing world can teach us about technology
From Putting People First

What the developing world can teach us about technology

“Creativity, Cost-Cutting & Keeping it Simple: what the Developing World can teach us about Technology” is the long title of a short feature story by Anna Leach...

mobile + africa
From Putting People First

mobile + africa

A contingent of Stanford University d.school students recently returned from Kenya, where they spent two weeks working with Nokia Research Africa, and the University...

US UX versus EU UX: What
From Putting People First

US UX versus EU UX: What

In response to questions from Amy Knox regarding US user experience and European user experience, S

Project explores human factor in
From Putting People First

Project explores human factor in

Boston University is participating in a $2 million National Science Foundation-funded Smart Neighborhood project that seeks to make a Boston neighborhood more energy...

Kodu Kamp for Educators
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kodu Kamp for Educators

OK so you know I am a big fan of Kodu. Perhaps you read about the Kodu workshop I did for students last weekend. Perhaps you just heard about Kodu from some random...

Who Owns Personal Data?
From The Eponymous Pickle

Who Owns Personal Data?

Thinking about who owns personal data.

Tableau 6 Includes What-If Modeling
From The Eponymous Pickle

Tableau 6 Includes What-If Modeling

The newest verison of Tableau 6, now in beta, has the ability to create variables for use in your analysis. We call these parameters, and they open up new possibilities...

Stealing Your Reality
From The Eponymous Pickle

Stealing Your Reality

Can your behavior on social netowrking sites be stolen and your 'reality' stolen?  I know that reality can be augmented, even replaced by being made virtual, but...

Tragedy of the Commons
From The Eponymous Pickle

Tragedy of the Commons

I looked up the concept of 'Tragedy of the Commons' concept recently to get additional historical information about the topic. .   Found that the Wikipedia has....

Picking a Single Voice out of a Crowd
From Schneier on Security

Picking a Single Voice out of a Crowd

Interesting new technology. Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...

From Computational Complexity

How hard is this problem?- I ask this non-rhetorically

I recently saw the following puzzle: Which two numbers come at the end of this sequence? (That is, what are x and y?) 2,4,5,30,32,34,36,40,42,44,46,50,52,54...

links for 2010-10-14
From Wild WebMink

links for 2010-10-14

FLOSS Weekly 139: Alfresco It was a long session, but the conversation flowed between me, John Newton and Luis Sala of Alfresco and FLOSS Weekly anchor Randal Schwartz...

Pen-and-Paper SQL Injection Attack Against Swedish Election
From Schneier on Security

Pen-and-Paper SQL Injection Attack Against Swedish Election

Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...

What does your school need?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What does your school need?

The What Our School Needs contest is being run by the Bing team at Microsoft. You are using Bing for your Internet search needs right? Well even if not (and you...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account