acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Details on Skype Eavesdropping
From Schneier on Security

New Details on Skype Eavesdropping

This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...

From Computational Complexity

Automate Me

An economist friend asked me if there were still productivity gains to be had for office workers (like us). After all, we have email, social networks, skype and...

Love Letter to an NSA Agent
From Schneier on Security

Love Letter to an NSA Agent

A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity." A similar sentiment is expressed in this video.

Your GPA Doesn’t Mean Anything Useful
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Your GPA Doesn’t Mean Anything Useful

A recent interview in the New York Times with Laszlo Bock, senior vice president of people operations at Google had some interesting things to say about the value...

Waiting in Line
From The Eponymous Pickle

Waiting in Line

A long time interest of mine is covered in the current Knowledge @ Wharton,  why and when do people balk in a queue?   What are the dynamics involved and how can...

What Does Data Gate Mean for Marketers?
From The Eponymous Pickle

What Does Data Gate Mean for Marketers?

In Ad Age:  Insightful, thinking now how about the interaction of privacy and big data.  Are the algorithms involved also privacy sensitive?   " ... In addition...

The US Uses Vulnerability Data for Offensive Purposes
From Schneier on Security

The US Uses Vulnerability Data for Offensive Purposes

Companies allow US intelligence to exploit vulnerabilities before it patches them: Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...

Two Sides: APCS Principles
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Two Sides: APCS Principles

Last week there was an announcement of a multi-year $5.2 million grant from the NSF to fund creation of a new Advanced Placement Computer Science course calledCS...

Two Sides: Putting Industry Professionals in the Classroom
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Two Sides: Putting Industry Professionals in the Classroom

Mark Guzdial is one of the people I most respect in the area of computer science education so when he says something is good or bad I tend to take it very seriously...

Book: Trust is a Choice
From Putting People First

Book: Trust is a Choice

Trust is a Choice – Prolegomena of Anthropology of Trust(s) by Stephanie A. Krawinkler 189 pages, 2013 Carl-Auer Verlag (Publisher) [Amazon link] [Extract] Trust...

Take Our Quick Survey
From The Computing Community Consortium Blog

Take Our Quick Survey

We invite you to take a few minutes to complete a brief survey by the Computing Research Association (CRA). Your feedback is important to us and helps improve our...

Petition the NSA to Subject its Surveillance Program to Public Comment
From Schneier on Security

Petition the NSA to Subject its Surveillance Program to Public Comment

I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on: In a request today...

USACM Notes Technology In Letter to Voting Commission
From U.S. Public Policy Committee of the ACM

USACM Notes Technology In Letter to Voting Commission

On Friday the Presidential Commission on Election Administration, established earlier this year by Executive Order, will hold its first public meeting in Washington...

CPG Growing With Innovation
From The Eponymous Pickle

CPG Growing With Innovation

Short piece on the use of innovation and digital marketing to improve CPG sales.    " ... A new report by the GMA and PwC found that despite lagging sales in 2012...

Finding Sociopaths on Facebook
From Schneier on Security

Finding Sociopaths on Facebook

On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media. My hypothesis is that scienceknow...

Managing Creative People
From The Eponymous Pickle

Managing Creative People

In Fastcompany.  Good view.  Frequently an issue.  Especially if the people involved do not have the very best people skills.  How many of us do.  Individual creativity...

GE and Industrial Data in the Cloud
From The Eponymous Pickle

GE and Industrial Data in the Cloud

In CWorld:  " ... GE thinks it's time to put industrial data in the cloud. The company is introducing a platform for collecting and analyzing data from industrial...

Fake Shops
From The Eponymous Pickle

Fake Shops

In our innovation labs we experimented with using false front displays to set contexts for consumers in a laboratory.  Interesting and obvious idea, but the coverings...

Cost/Benefit Questions NSA Surveillance
From Schneier on Security

Cost/Benefit Questions NSA Surveillance

John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...

Brazil’s Half-Miracle
From Wild WebMink

Brazil’s Half-Miracle

On all the social media networks, there’s a hashtag that I have kept seeing the last few days: #ChangeBrazil, associated with unrest across Brazil. Since I may...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account