acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

In Line Help
From The Eponymous Pickle

In Line Help

Google has added inline help in several of its services.  More here.  Slightly more convenient in the actual context of the problem.  Intelligence always exists...

Architects don’t listen to people
From Putting People First

Architects don’t listen to people

Christine Outram left the architecture profession because, she says, architects “don’t listen to people“. “The truth is, most of you don’t try. You rely on rules...

The design of Copenhagen as a bicycle friendly city
From Putting People First

The design of Copenhagen as a bicycle friendly city

In a ten part video series, Copenhagenize Design Co explores the top 10 design elements that make Copenhagen a bicycle-friendly city. In the embedded video above...

Observations from an ethnography conference
From Putting People First

Observations from an ethnography conference

Alexa Curtis recently attended EPIC, the Ethnographic Praxis in Industry Conference, a truly international gathering of ethnographers, anthropologists, strategists...

Graphics Chips for High Speed Visualization
From The Eponymous Pickle

Graphics Chips for High Speed Visualization

In Technology Review:  Work from MIT.  Reviewing.   See their public interface and demonstration which looks at Twitter data. Lets you look at a database of  11...

Educause Conference Reprise
From The Eponymous Pickle

Educause Conference Reprise

Been a long time reader of Educause, even before the Web,  as a newsletter.   I see that the Cisco blog is writing about their conference.  Some good posts recently...

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video
From Schneier on Security

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video

Even I think this is weird.

CSEA Legislation Timeline
From Computer Science Teachers Association

CSEA Legislation Timeline

There is so much momentum around the need for more computer science education in the country's schools, and many organizations in addition to CSTA are now working...

D-Link Router Backdoor
From Schneier on Security

D-Link Router Backdoor

Several versions of D-Link router firmware contain a backdoor. Just set the browser's user agent string to "xmlset_roodkcableoj28840ybtide," and you're in. (Hint...

Dilbert in the Enterprise
From The Eponymous Pickle

Dilbert in the Enterprise

In the HBR:   We were heavy users of the Dilbert strip in the enterprise.   They found their way into many slide shows.  We thought that Scott Adams must have been...

Amazon and Google in the Supply Chain
From The Eponymous Pickle

Amazon and Google in the Supply Chain

So true, worth looking at again:Why distributors should pay attention to Amazon, Google Amazon's B2B online channel Amazon Supply and Google's Google Shopping for...

Call for Participation: 2014 Workshop on ACM History
From The Computing Community Consortium Blog

Call for Participation: 2014 Workshop on ACM History

The ACM History Committee (http://history.acm.org/) is sponsoring a two-day archiving workshop to help diffuse knowledge of professional archival practices into...

Deadline for Proposals for CSTA Conference Approaching
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Deadline for Proposals for CSTA Conference Approaching

The deadline for session and workshop proposals for the 2014 CSTA conference on K-12 computer science education is November 15, 2013. In addition to 3-hour workshops...

Identifying Cell Phones Through Sensor Imperfections
From Schneier on Security

Identifying Cell Phones Through Sensor Imperfections

There seems to be a bunch of research into uniquely identifying cell phones through unique analog characteristics of the various embedded sensors. These sortsSlashdot...

What behavioral economics is not
From Putting People First

What behavioral economics is not

Essay: The Nature of the BEast: What Behavioral Economics Is Not 10/16/13 Matthew Darling, Saugato Datta, and Sendhil Mullainathan People are complex; they defy...

An obstacle to patient-centered care: poor supply systems
From Putting People First

An obstacle to patient-centered care: poor supply systems

It is widely acknowledged that patients and their families should be deeply involved in the design of and decisions about the health care that the former receive...

P&G Gym from IDEO
From The Eponymous Pickle

P&G Gym from IDEO

For a recent talk I had to research some of the work that IDEO did for P&G.  I re-discovered this Bloomberg article about the design work that IDEO did to helpWayne...

Injecting Serious CS into a STEM Course
From Computer Science Teachers Association

Injecting Serious CS into a STEM Course

My school district has a STEM course in the high school that is meeting the district's computer science graduation requirement. That means that the STEM students...

Topology Mapping for Analytics
From The Eponymous Pickle

Topology Mapping for Analytics

Seems Vincent Granville has been thinking similarly lately.  See his article and code in Data Science Central:   A little known component that should be part of...

"A Court Order Is an Insider Attack"
From Schneier on Security

"A Court Order Is an Insider Attack"

Ed Felten makes a strong argument that a court order is exactly the same thing as an insider attack: To see why, consider two companies, which we'll call Lavabit...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account