acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Future of Computer Architecture Research
From The Computing Community Consortium Blog

The Future of Computer Architecture Research

As part of CCC

Things are Happening in Massachusetts
From Computer Science Teachers Association

Things are Happening in Massachusetts

Things are happening in Massachusetts on the Computer Science education front. First, Dot Diva, a program sponsored by WGBH and ACM to promote the field of Computer...

New Kind of Science on the iPad
From The Eponymous Pickle

New Kind of Science on the iPad

Stephen Wolfram blogs about the appearance of his mega book: A New Kind of Science on the IPad, with enhanced graphics. I bought this book when it first came out...

Super Wifi Space Approved
From The Eponymous Pickle

Super Wifi Space Approved

Engadget on Super Wifi. Followed Wimax for years and its potential application for retail. Is this the same thing? No it is not, but it is very likely to compete...

Gillette, Razor and Blade Strategy
From The Eponymous Pickle

Gillette, Razor and Blade Strategy

In the HBR blog, more history and discussion of the renowned Gillette razor and blade strategy. " ... What should we take away from this? Did Gillette just miss...

Reality Has a Gaming Layer
From The Eponymous Pickle

Reality Has a Gaming Layer

In O'Reilly Radar, a good interview piece on integrating reality and games. I know about attempts like FourSquare that make weak attempts to do this. In the world...

Evercookies
From Schneier on Security

Evercookies

Extremely persistent browser cookies: evercookie is a javascript API available that produces extremely persistent cookies in a browser. Its goal is to identify...

From Computational Complexity

Theorems that are less interesting because they are more interesting

(This post was inspired by Joe Kruskal's passing. Kruskal's tree theorem, trees under minor are a well quasi order, relates to example 2 below.) There are some...

Pay with Your Smartphone
From The Eponymous Pickle

Pay with Your Smartphone

An Engadget report. We saw experimental examples done in this space over two years ago, it is surprising that we are still not seeing the right hardware in smartphones...

Details Removed from Book at Request of U.S. Department of Defense
From Schneier on Security

Details Removed from Book at Request of U.S. Department of Defense

From the AFP: A publisher has agreed to remove US intelligence details from a memoir by a former army officer in Afghanistan after the Pentagon raised last-minute...

links for 2010-09-23
From Wild WebMink

links for 2010-09-23

BSA's Piracy Numbers: Less than They Seem Glyn's research here is very useful. The BSA use of statistics is very regrettable, as is their use of inuendo and framing...

Imagine Cup
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Imagine Cup

There are many indications that today

New Science of Retailing
From The Eponymous Pickle

New Science of Retailing

A book I had missed when it came out earlier this year: The New Science of Retailing: How Analytics are Transforming the Supply Chain and Improving Performance....

Digital Media Measurement
From The Eponymous Pickle

Digital Media Measurement

Accurate measurement is important:Why Measurement Is Still Screwing Up the Online Ad Business " ... Digital media measurement is a mess, and we're all responsible...

Human Centric Analysis
From The Eponymous Pickle

Human Centric Analysis

Well known visualization guru Stephen Few on human centric analysis." ... All of the traditional BI software vendors and most of the industry

Data Storm in mHealth
From The Eponymous Pickle

Data Storm in mHealth

Mark Montgomery of KYield continues his insightful writing about issues in mHealth. Make sure to read the whole thing: " ... Imagine the gasp from the family physician...

Keeping Retiree Knowledge in the Game
From The Eponymous Pickle

Keeping Retiree Knowledge in the Game

Keeping knowledge in the company is an increasingly difficult task. It is a key part of the whole process called knowledge management. Where is the knowledge...

UX developments at Telef
From Putting People First

UX developments at Telef

Some UX developments at Telef

The Stuxnet Worm
From Schneier on Security

The Stuxnet Worm

It's impressive: The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged...

Capturing the Biometrics of Motion
From The Eponymous Pickle

Capturing the Biometrics of Motion

In the RFID Journal, a development with a number of interesting applications. Michigan Researchers Develop RFID-based Sensors to Measure Physical ActivityThe system...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account