acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

SSTD 2011 Vision & Challenge Track Winners Announced
From The Computing Community Consortium Blog

SSTD 2011 Vision & Challenge Track Winners Announced

The following is a special contribution to this blog from Shashi Shekhar and Mohamed Mokbel, faculty in the Department of Computer Science & Engineering at the...

The Market and Hurricane Preparedness
From The Eponymous Pickle

The Market and Hurricane Preparedness

M J Perry writes about how companies like Wal-Mart and Home Depot can deliver predictable disaster materials through the magic of the modern supply chain.  The...

IDEO Apps
From The Eponymous Pickle

IDEO Apps

We used IDEO consulting for several components of the innovation centers. Napkin Laps Turns IDEO's Innovation Process Into Web Apps For All ... An off-the-shelf...

Testing the Kroger PAL System
From The Eponymous Pickle

Testing the Kroger PAL System

In aisle checkout with Kroger PAL.  We tested extensively the concept of shoppers using devices like this in the retail innovation center.   Providing new kinds...

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea
From Schneier on Security

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea

The industry is in decline: A generation ago, most of the island's 10,000 residents worked in the squid industry, either as sellers like Kim or as farmer-fishermen...

Forecasting Hurricane Irene
From The Computing Community Consortium Blog

Forecasting Hurricane Irene

Despite some slight weakening over the last few hours, Hurricane Irene is being called the “storm of a lifetime” — on its current path, it will affect over 65 million...

Preventing the Theft of Wire Cutters
From Schneier on Security

Preventing the Theft of Wire Cutters

This is a picture of a pair of wire cutters secured to a table with a wire. Someone isn't thinking this through....

CISE Names Deputy Assistant Director
From The Computing Community Consortium Blog

CISE Names Deputy Assistant Director

The NSF’s CISE Directorate today announced

? The Entrepreneur
From Wild WebMink

? The Entrepreneur

Following on from my Road To (Software) Freedom posting, I’ve written today about why I think the need for contributor agreements is a matter of choice and not...

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks
From Schneier on Security

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks

Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors: The problem with threat inflation and misapplied history is that there...

On High Performance Analytics
From The Eponymous Pickle

On High Performance Analytics

SAS Voice on high performance analytics.  " ... The promise of high-performance analytics, as I understand it, is this: Regardless of how you store your data or...

Encouraging Entrepreneurial Spirit
From The Eponymous Pickle

Encouraging Entrepreneurial Spirit

Hubspot as a case study in getting people excited about their jobs. " ...  Everyone talks about wanting entrepreneurial employees. At HubSpot, a marketing software...

? Classifications
From Wild WebMink

? Classifications

Court Ruling Opens The Door To Rejecting Many Software Patents As Being Mere ‘Mental Processes’ The incremental adjustment of software patent law in the USA continues...

On Cognitive Computing
From The Eponymous Pickle

On Cognitive Computing

Still skeptical about how close this is, but have recently seen some hints of it approaching: In the CACM: Cognitive Computing:  Unite neuroscience, supercomputing...

Technology Frustration
From The Eponymous Pickle

Technology Frustration

We all experience multi-device frustrations.  Everything is somewhat different, does not work exactly as we expect, work together with other devices, and over time...

Terrorism in the U.S. Since 9/11
From Schneier on Security

Terrorism in the U.S. Since 9/11

John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...

2011 NCWIT Award for Aspirations in Computing
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2011 NCWIT Award for Aspirations in Computing

Calling all digital divas, web chix & coder girls! It’s time to start thinking about the NCWIT Award for Aspirations in Computing. This is a great program which...

Search that Includes What You Know
From The Eponymous Pickle

Search that Includes What You Know

I recall this idea brought up often in the enterprise.   A person, or an enterprise,  already knows many things.  The problem is that 'it' does not know what it...

Funniest Joke at the Edinburgh Fringe Festival
From Schneier on Security

Funniest Joke at the Edinburgh Fringe Festival

Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival: Nick Helm: "I needed a password with eight characters so I picked Snow White and...

Using Facial Recognition to Tailor Advertising
From The Eponymous Pickle

Using Facial Recognition to Tailor Advertising

The basic idea has been around for some time.  Recognize people's faces via a camera facing outward  on a sign and then adapt the promotional interaction basedNow...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account