acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Peapod and Virtual Event Shopping
From The Eponymous Pickle

Peapod and Virtual Event Shopping

Peapod's use of lunch truck style vehicles to sell items at events.   The approach also reminds me ot the Schwan's model in suburban communities.   We experimented...

Multiple Definitions of Big Data
From The Eponymous Pickle

Multiple Definitions of Big Data

Via Gib Bassett.  Multiple definitions are discussed, seven in all. I like concise definitions, but this is a look at all the ways that big data is being used today...

Friday Squid Blogging: Giant Origami Squid
From Schneier on Security

Friday Squid Blogging: Giant Origami Squid

Giant origami squid photo found -- without explanation -- on Reddit. As usual, you can also use this squid post to talk about the security stories in the news...

A Change in License for Berkeley DB
From Wild WebMink

A Change in License for Berkeley DB

Reblogged from Meshed Insights & Knowledge: Perhaps you didn't spot it, but last month in their new Berkeley DB release Oracle changed the license associated with...

How Apple Continues to Make Security Invisible
From Schneier on Security

How Apple Continues to Make Security Invisible

Interesting article: Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a...

Earnest Games, Not Serious Games
From The Female Perspective of Computer Science

Earnest Games, Not Serious Games

Why is it that after ten years of Games for Change festivals guys like Ian Bogost are still making the same argument: games have the power to depict complexityGames...

Sixth Movie-Plot Threat Contest Winner
From Schneier on Security

Sixth Movie-Plot Threat Contest Winner

On April 1, I announced the Sixth Mostly-Annual Movie-Plot Threat Contest: For this year's contest, I want a cyberwar movie-plot threat. (For those who don't know...

This Blog
From The Eponymous Pickle

This Blog

Around this time of the year I like to post an item about this blog and its origins and purpose, so I repeat my post of 2008:This blog was established an in internal...

When they Say No
From The Eponymous Pickle

When they Say No

A post from Beverly Jones, via ThreeJoy on what to do about professional rejection.   What to do when they say no.  This is rarely discussed, but it is inevitable...

Pantene's Twitter Program
From The Eponymous Pickle

Pantene's Twitter Program

An interview about what they are calling Pantene's Powerful  Oscars Twitter Program.  Had missed the details of this, but the article is a good case study of the...

Search in an Augmented World
From The Eponymous Pickle

Search in an Augmented World

In SEO  a number of interesting implications for search in an augmented reality world.  Some obvious things here.  How do you add other dimensions to the search...

Is Cryptography Engineering or Science?
From Schneier on Security

Is Cryptography Engineering or Science?

Responding to a tweet by Thomas Ptacek saying, "If you're not learning crypto by coding attacks, you might not actually be learning crypto," Colin Percival published...

CS Educator Interview: Ian McTavish
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Ian McTavish

For today's computer science educator interview we head north of the (US) border to Huntsville High School in Huntsville, Ontario, Canada and talk with Ian McTavish...

From Gödel's Lost Letter and P=NP

Independence Day

Will logical independence have its day? John Adams was the second president of the United States. He predicted that July 2nd would be always remembered: “The second...

Sensor Life Logging with Saga
From The Eponymous Pickle

Sensor Life Logging with Saga

In Technology Review:    Using your smartphone sensors to monitor and record your every move.    Some interesting learnings that could be applied to other sensor...

Detecting  Access Fraud
From The Eponymous Pickle

Detecting Access Fraud

Brought to my attention,   Fraudlogix, a system that detects access fraud, resulting from artificial lead generation.  The included behavior analysis that separates...

Humanoid Robotics
From The Eponymous Pickle

Humanoid Robotics

Kurzweil on Samsung's humanoid robot.  The visual map aspect of the intelligence of the device is intriguing.  Geography and knowledge need maps.   I have often...

The Office of the Director of National Intelligence Defends NSA Surveillance Programs
From Schneier on Security

The Office of the Director of National Intelligence Defends NSA Surveillance Programs

Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...

TouchDevelop–Acceleration and GameLoop
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

TouchDevelop–Acceleration and GameLoop

Happy Fourth of July! If you are on the Internet today it should be for fun. For that reason I recorded a little video of using TouchDevelop to demo the GameLoop...

UX and The Museum: Converging perspectives on experience design
From Putting People First

UX and The Museum: Converging perspectives on experience design

Museums visitors are no longer as satisfied with rows of objects on display. They want the objects to tell a story. They want to understand the main message of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account