acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Top Most Read Posts of 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...

Wasted Hour(s)
From My Biased Coin

Wasted Hour(s)

Last night I was running some code for a queuing simulation related to some research I'm doing.  This is the Nth time I've used this code;  I wrote up the basic...

Considering Gamification
From The Eponymous Pickle

Considering Gamification

When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...

Wikipedia of Maps
From The Eponymous Pickle

Wikipedia of Maps

A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...

Teach Kid's Ruby
From The Eponymous Pickle

Teach Kid's Ruby

Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details...

Hacking Subway's POS System
From Schneier on Security

Hacking Subway's POS System

The story of how Subway's point-of-sale system was hacked for $3 million.

Interesting Links 26 December 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 26 December 2011

Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didn

Top Most Read Posts of 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away...

Customer Lifetime Value Equation
From The Eponymous Pickle

Customer Lifetime Value Equation

Is it of value to Tech?   From Wharton. It is always useful to think about, but may not be the key measurement for all innovations.   The Kindle Fire is brought...

Merry Christmas from the TSA
From Schneier on Security

Merry Christmas from the TSA

Cupcakes deemed security threat: Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...

Ipsos Neuroscience and Emotion
From The Eponymous Pickle

Ipsos Neuroscience and Emotion

I like adding the emotion part.  News release:" ... In the US, EmSense

Rules of Thumb
From The Eponymous Pickle

Rules of Thumb

Good WSJ piece on Heuristics.  Not random hunches, but rules of thumb that work.  Not always perfectly,  or optimally, but are very useful to get to a real conclusion...

Alternative Digital Recipe Libraries
From The Eponymous Pickle

Alternative Digital Recipe Libraries

As a long time cook this is a challenge.  Some alternatives.  But no, not impossible.  As simple as a file folder. Or as complex as an associative memory.

? Open Source Xmas
From Wild WebMink

? Open Source Xmas

LibreOffice Xmas, originally uploaded by elianedomingos. A very happy Christmas to everyone who reads Wild Webmink. May you find software freedom waiting for you...

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor
From Schneier on Security

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor

It's a metaphor that will not die. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

On Mobile Payments
From The Eponymous Pickle

On Mobile Payments

Good overall piece in GigaOM on the state of mobile smartphone payments.   Have followed the idea for years, and it has been a long road.  Finally in 2012? 2013...

Santa Hacked
From Schneier on Security

Santa Hacked

Mildly amusing video.

Time to Change the Conversation from Consuming to Creating
From Computer Science Teachers Association

Time to Change the Conversation from Consuming to Creating

At a recent family gathering, my father-in-law delighted in the accomplishments of his four year old granddaughter who effortlessly navigated her mother's iPad....

The CCC Blog in 2011: Our Top Posts from the Year Revisited
From The Computing Community Consortium Blog

The CCC Blog in 2011: Our Top Posts from the Year Revisited

As we celebrate the holidays and get set to close the books on 2011 — a banner year for the CCC Blog, with more than twice as many page views as in any previous...

An Examination of RFID ROI
From The Eponymous Pickle

An Examination of RFID ROI

In the apparel industry where RFID item level tagging has been generally successful. We commissioned a similar study years ago with MIT and  the University of Arkansas...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account