acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Blogging for Free is Exploitation
From The Eponymous Pickle

Blogging for Free is Exploitation

I have been asked by several groups to post for their blogs in technology and innovation areas.  Mostly for free, with the argument that it gives me publicity.legal...

Google Opens Data Explorer
From The Eponymous Pickle

Google Opens Data Explorer

Rather late to this, just now started to examine it.  " ... [W]e

Optimizing Your Linkedin Profile
From The Eponymous Pickle

Optimizing Your Linkedin Profile

Good, straightforward article about optimizing your Linkedin article for recruiting.  I have helped several people get started with Linkedin lately and this is...

From Computational Complexity

Workshop/Award/Conference/Who wants to review books?

The Center for intractability at Princeton is having a Workshop on Approximation Algorithms. Here is the schedule of talks. Vijay Vazirani, one of the organizers...

links for 2011-04-13
From Wild WebMink

links for 2011-04-13

Open Standards law approved in Portugal The law is a great thing, as long as the actual implementation leads to greater software freedom. I humbly suggest the Portuguese...

Euro Coin Recycling Scam
From Schneier on Security

Euro Coin Recycling Scam

This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...

? Sentinel Principle Article Available
From Wild WebMink

? Sentinel Principle Article Available

My article proposing using openness sentinels – the existence of an open source co-developer community working on an implementation as validation of the openness...

Trivantis E-Learning Software
From The Eponymous Pickle

Trivantis E-Learning Software

I was recently introduced to Trivantis.  And their e-learning delivery software Lectora. " ... Lectora Inspire makes online course development fast and simple....

Google's Cloud
From The Eponymous Pickle

Google's Cloud

In GigaOm:  Google's infrastructure czar talks about the advantages of the cloud for making Google run.

Competing With or Capitalizing On Pop Culture
From Computer Science Teachers Association

Competing With or Capitalizing On Pop Culture

How do we try to encourage students to do computer science or engineering? How much does pop culture play into it? Does it hurt it? Can it help? I recentlyKnight...

Open IDEO
From The Eponymous Pickle

Open IDEO

Tom Holme, the design director of IDEO, talks about an open IDEO, from Intersections. We worked with IDEO a number of times in the enterprise innovation spaces. ...

Israel's Counter-Cyberterrorism Unit
From Schneier on Security

Israel's Counter-Cyberterrorism Unit

You'd think the country would already have one of these: Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...

Amazon Ad Services
From The Eponymous Pickle

Amazon Ad Services

Amazon adds product Ad Services.

Intel on Digital Signage
From The Eponymous Pickle

Intel on Digital Signage

Very good report on experimental field trials with digital signage in retail by Intel.  Via their acquisition Cognovision.   I like the fact that this is real observational...

Panel #1: Traitor Tracing and Data Provenance (Panel Summary)
From CERIAS Blog

Panel #1: Traitor Tracing and Data Provenance (Panel Summary)

Tuesday, April 5, 2011 Panel Members: David W. Baker, MITRE Chris Clifton, Purdue Stephen Dill, Lockheed Martin Julia Taylor, Purdue Panel Summary by Nikhita...

From Computational Complexity

Do You Know the Way to San Jose?

Lots of CS Goodness going on at FCRC June 4-11. New for 2011 the STOC Poster Session: Share your exciting research on theory's greatest stage! Submission deadline...

Opening Keynote: Neal Ziring (Symposium Summary)
From CERIAS Blog

Opening Keynote: Neal Ziring (Symposium Summary)

Tuesday, April 5, 2011 Keynote Summary by Mark Lohrum Neal Ziring, the current technical director for the Information Assurance Directorate at the NSA, was given...

? Freedom and Long Life
From Wild WebMink

? Freedom and Long Life

Freedom through a clear governance model But the observation that I found most telling was that the governance model has actually freed up blockages in the decision...

How did the CIA and FBI Know that Australian Government Computers were Hacked?
From Schneier on Security

How did the CIA and FBI Know that Australian Government Computers were Hacked?

Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...

Interesting Links
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links

I
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account