acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Experientia workshop on strategic UX design for Taiwanese businesses
From Putting People First

Experientia workshop on strategic UX design for Taiwanese businesses

Taiwan meets Italy this week, in a series of workshops and company visits hosted by Experientia for Taiwanese business people. The 15 chief customer experience...

From Computational Complexity

Cryptography and the NSA

Back at Northwestern I occasionally taught an undergraduate cryptography class since I was the local expert in the field (a statement not even remotely true atAdvanced...

Ed Felten on the NSA Disclosures
From Schneier on Security

Ed Felten on the NSA Disclosures

Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems: In security, the worst case -- the thing you...

1000 Robots for An Hour of Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

1000 Robots for An Hour of Code

BirdBrain Technologies has announced their intention to lend out 1,000 Finch robots as their contribution to this year's Computer Science Education Week and Code...

What are users up to when they have an experience?
From Putting People First

What are users up to when they have an experience?

Understanding the experience of using an object depends on understanding the context of use, argues Jeff Doemland in UX Magazine. However, “The prevailing understanding...

Managing Customer Experience
From The Eponymous Pickle

Managing Customer Experience

An impressive writeup about how companies like McDonald's are attempting to manage customer experience.  Can it really be optimized, as they say, when people are...

Matthew Green Speculates on How the NSA Defeats Encryption
From Schneier on Security

Matthew Green Speculates on How the NSA Defeats Encryption

This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later.

The consumer has spoken but is anyone listening?
From Putting People First

The consumer has spoken but is anyone listening?

One would expect that listening to your customers’ needs and wants is a basic prerequisite for any business active in a competitive industry. It also is understandable...

Design, innovation and government
From Putting People First

Design, innovation and government

Last week Joeri van den Steenhoven, attended the How Public Design? conference in Copenhagen, Denmark, which was organized by MindLab, the Danish design lab that...

The Nature of Book Reviews Here
From The Eponymous Pickle

The Nature of Book Reviews Here

I review books here from time to time.  If you have a book that has anything to do with the content subjects seen here, and want to have it reviewed, contact me...

Limits of Fingerprint Security
From The Eponymous Pickle

Limits of Fingerprint Security

The reported inclusion of fingerprint authentication in new iPhones means we will see this approach being used commonly.  It is very convenient, but has its limitations...

Cerf On the Age of Context
From The Eponymous Pickle

Cerf On the Age of Context

Vint Cerf interview on the Age of context.  His role as evangelist at at Google, and how the times are changing to adapt in a connected world.    " ... “I think...

Harassment in the Computer Science Classroom
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Harassment in the Computer Science Classroom

Two interesting and initially unrelated links came across my computer screen in the past couple of days. One was an image that said “Everyone talks about leaving...

iPhone Fingerprint Authentication
From Schneier on Security

iPhone Fingerprint Authentication

When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...

L'Oreal and E-Commerce
From The Eponymous Pickle

L'Oreal and E-Commerce

In AdAge CMO Strategy  What looks to be a rational way to think about e-commerce, as opposed to pure hype.    Contains detail about what L'Oreal and competitors...

CSTA 2014 CALL FOR PROPOSALS
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA 2014 CALL FOR PROPOSALS

CSTA members (you are a member right?) should have seen this in their email. The CSTA annual conference is in my humble opinion the single best professional development...

McKinsey is Bullish on Digital
From The Eponymous Pickle

McKinsey is Bullish on Digital

McKinsey provides a broad report from a survey and much statistics on the topic."Bullish on digital: McKinsey Global Survey resultsCEOs and other senior executives...

CISE Issues Mid-Scale Infrastructure Solicitation; Webinar Scheduled
From The Computing Community Consortium Blog

CISE Issues Mid-Scale Infrastructure Solicitation; Webinar Scheduled

The following is a special contribution to this blog by Keith Marzullo, division director for the National Science Foundation’s (NSF) Division of Computer and Network...

Interview on Big Data and Analytics for MidMarket
From The Eponymous Pickle

Interview on Big Data and Analytics for MidMarket

Friend Paul Gillin runs a Big Data Google Plus Hangout on the use of Big Data methods for Midmarket and beyond.  The 37 minute stream brings together current users...

The TSA Is Legally Allowed to Lie to Us
From Schneier on Security

The TSA Is Legally Allowed to Lie to Us

The TSA does not have to tell the truth: Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request? Sure, no problem! Evenclassified...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account