acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

On the design of design
From Daniel Lemire's Blog

On the design of design

Following a blog post by John D. Cook, I started reading Fred Brooks‘ latest book. Brooks is famous, among other things, for his earlier book, the Mythical Man...

Terrorist Attacks and Comparable Risks, Part 2
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 2

John Adams argues that our irrationality about comparative risks depends on the type of risk: With "pure" voluntary risks, the risk itself, with its associated...

McDonalds Social Media Chief
From The Eponymous Pickle

McDonalds Social Media Chief

How can it not be serious of McDonald's has just added its first social media chief?-

What's the Co-Author Line?
From My Biased Coin

What's the Co-Author Line?

Continuing the past discussion on authorship issues, I've been considering the questions: at what point has a person involved in the project done so little work...

Epic Systems Trend Compass
From The Eponymous Pickle

Epic Systems Trend Compass

I was just sent a promo piece by Epic Systems on their visualization system called Trend Compass. With a brief examination, it creates bubble charts and includes...

Office vs Google Docs
From The Eponymous Pickle

Office vs Google Docs

Have been an Office user since the beginning and just in the last year have started to use some of Google Docs. Some new features, like easier sharing have made...

From Computational Complexity

Choosing a Graduate School

Besides being tax day, Thursday is the deadline to decide where to attend graduate school. How should you choose? I've blogged on this topic before but a few recent...

Celebration a Success!
From The Female Perspective of Computer Science

Celebration a Success!

Last week Carleton's Women in Science and Engineering hosted the very first Carleton Celebration of Women in Science and Engineering, and it was a great success...

Terrorist Attacks and Comparable Risks, Part 1
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 1

Nice analysis by John Mueller and Mark G. Stewart: There is a general agreement about risk, then, in the established regulatory practices of several developed...

Visual Studio 2010 Now Available
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Visual Studio 2010 Now Available

Well it is official

? Digital Liberty Missing From UK Election
From Wild WebMink

? Digital Liberty Missing From UK Election

Take action to put digital liberty issues on the British election agenda. #ge10

Twitris at Knoesis
From The Eponymous Pickle

Twitris at Knoesis

Demonstrated at the Kno.e.sis Center at Wright State University today: Twitris, a semantic technology based social signal analysis system, where you can Twitter...

Simulating Evacuation
From The Eponymous Pickle

Simulating Evacuation

In ACM News: simulating the evacuation of 70,000 avatars from an e-stadium. We did a number of projects that deal with the simulation of shoppers in a store, so...

Will Gen Y Lead us into Recovery?
From The Eponymous Pickle

Will Gen Y Lead us into Recovery?

Report Sees Recovery Led by Gen Y: ' ... Members of Generation Y, not baby boomers, have money to spend and will end the recession with their purchases, says a...

More Google Map Maker Locations
From The Eponymous Pickle

More Google Map Maker Locations

I was reminded of Google Map Maker by this post. A means for users to share more about their part of the world. It appears to continue to prosper, with many new...

Putting People First content partner of Appliance Design
From Putting People First

Putting People First content partner of Appliance Design

Putting People First has become a content partner of Appliance Design, the site of the US-based magazine of the same name that caters to designers and engineers...

Man-in-the-Middle Attacks Againt SSL
From Schneier on Security

Man-in-the-Middle Attacks Againt SSL

Says Matt Blaze: A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...

Mobile app developers tackle Africa
From Putting People First

Mobile app developers tackle Africa

Mobile app developers are sprouting in Africa to help tackle that continent’s problems. Many create applications that can be used with phone text messages. The...

From Computational Complexity

Deriving sum of squares: How much to cheat?

In discrete math (or other courses) we teach AND DERIVE the formula for 1+2+3+...+n. We then look at the sum 12+22+...+n2. Here there are some options. State...

Hill Tech Happenings, Week of April 12
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of April 12

April 15 Hearing: The Communications, Technology and the Internet subcommittee of the House Energy and Commerce Committee will hold a hearing on the national...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account