acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Experience design is now part of business logic
From Putting People First

Experience design is now part of business logic

Om Malik of GigaOm argues that the cambrian explosion of mobile apps and cloud-based services as well as the exponential growth of data has led him to a very simple...

Selected videos from “The Conference” in Sweden
From Putting People First

Selected videos from “The Conference” in Sweden

Media Evolution The Conference is an international conference organized annually in Malmö, Sweden. The event focuses on factors that are affecting our society,...

Thoughts on clever cities
From Putting People First

Thoughts on clever cities

The multiplexed metropolis Enthusiasts think that data services can change cities in this century as much as electricity did in the last one. The Economist – in...

Rebecca Solnit on the downside of social and mobile technology
From Putting People First

Rebecca Solnit on the downside of social and mobile technology

Rebecca Solnit writes – in an excellent piece – that she feels as though she is in a bad science fiction movie where everyone takes orders from tiny boxes that...

The Book on Intelligent Data Analysis
From The Eponymous Pickle

The Book on Intelligent Data Analysis

This book was brought to my attention during our artificial intelligence days.   It has gone through another edition since I taught from it.   Profited from its...

Pictures of My New Office
From The Female Perspective of Computer Science

Pictures of My New Office

I moved into my new office on Tuesday, and finally decorated a little bit.  Here are some photos of my new home!My teaching and office hours are now posted on the...

The NSA is Breaking Most Encryption on the Internet
From Schneier on Security

The NSA is Breaking Most Encryption on the Internet

The new Snoden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics...

The Effect of Money on Trust
From Schneier on Security

The Effect of Money on Trust

Money reduces trust in small groups, but increases it in larger groups. Basically, the introduction of money allows society to scale. The team devised an experiment...

U.S. Access Board Public Meeting on September 11
From U.S. Public Policy Committee of the ACM

U.S. Access Board Public Meeting on September 11

The U.S. Access Board, an independent federal agency, will hold its regular public Board Meeting on Wednesday, September 11, 2013, in Washington, D.C. The meeting...

State Assessment Requirements and the CSTA Resources
From Computer Science Teachers Association

State Assessment Requirements and the CSTA Resources

How have you used the resources on the CSTA website? Have you read the new reports? Are you familiar with the CSTA K-12 Computer Science Standards? The crosswalks...

<i>Journal of Homeland Security and Emergency Management</i>
From Schneier on Security

Journal of Homeland Security and Emergency Management

I keep getting alerts of new issues, but there are rarely articles I find interesting.

Games Engaging Customers
From The Eponymous Pickle

Games Engaging Customers

In Innovation Excellence:  About game dynamics engaging your customers.   Includes a number of examples I had not heard of.   Also makes an often forgotten point...

Gamification and Sales
From The Eponymous Pickle

Gamification and Sales

An example of using Gamification for sales support.    " .... created a remote online customer sales chat platform that implements gamification to encourage remote...

Human/Machine Trust Failures
From Schneier on Security

Human/Machine Trust Failures

I jacked a visitor's badge from the Eisenhower Executive Office Building in Washington, DC, last month. The badges are electronic; they're enabled when you check...

Pew: 86% of USA adults make efforts to hide digital footprints online
From Putting People First

Pew: 86% of USA adults make efforts to hide digital footprints online

Pew Research Center found that 86 percent of surveyed adult Internet users in the U.S. have made efforts to obscure their “digital footprints” — which could include...

Experientia designs mobile site for UN affiliate to promote mobile learning
From Putting People First

Experientia designs mobile site for UN affiliate to promote mobile learning

This week, the ITC-ILO, a United Nations affiliate, officially launched an Experientia-designed mobile site to promote mobile learning tools within the organisation...

From Gödel's Lost Letter and P=NP

Euler’s Constants

Having a constant named after you is cool Jeffrey Lagarias was a Distinguished Member of Technical Staff at AT&T Bell Laboratories for years, and later joined the...

Future of Laundry
From The Eponymous Pickle

Future of Laundry

Though it may seem an odd topic for here, have for a long time followed innovations in the process of doing the laundry.  Despite it seeming a very mundane thing...

Air Interfaces
From The Eponymous Pickle

Air Interfaces

In GigaOM: Saw something similar at graphics show.   Required some hard to manage setup, but was impressively mysterious. But that example was display only andDisplair...

SHA-3 Status
From Schneier on Security

SHA-3 Status

NIST's John Kelsey gave an excellent talk on the history, status, and future of the SHA-3 hashing standard. The slides are online.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account