acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Brainwashed Review
From The Eponymous Pickle

Brainwashed Review

In the WSJ: A balanced review of correspondent Sally Satel and Scott Lilienfeld's  book:  Brainwashed: The Seductive Appeal of Mindless Neuroscience.

Neuroscience and Marketing
From The Eponymous Pickle

Neuroscience and Marketing

In Mediapost, Elissa Moses posts a good introduction about a number of non conscious methods and their use in marketing analysis. For a largely contrary critical...

Technical + Creative
From The Female Perspective of Computer Science

Technical + Creative

It's amazing how many people fail to realize that computing can be a creative field.  In fact, in many cases, it has to be! For example, it makes no sense for me...

Sixth Annual Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Sixth Annual Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Sixth Annual Movie Plot Threat Contest: I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...

Free Computers For ISTE Attendees
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Free Computers For ISTE Attendees

Wow! Free computers. Hard to ignore that one. If you are heading out to San Antonia for ISTE 2013 Microsoft has a deal for you. They are giving away free Microsoft...

Mini Windows Stores at Best Buy
From The Eponymous Pickle

Mini Windows Stores at Best Buy

I mentioned some time ago visiting a new Microsoft Store in the local mall.  Located very close to the Apple store, which had been around for a couple of years....

Retail Data Synchronization
From The Eponymous Pickle

Retail Data Synchronization

Kroger and GS1 are beginning a three year Project Mercury effort to synchronize data.  A key element of running any large, complex retail operation.  " ... Under...

Moving to the Cloud Saves Energy
From The Computing Community Consortium Blog

Moving to the Cloud Saves Energy

Researchers at Lawrence Berkeley National Laboratory and Northwestern University have conducted a study and found that moving common applications to the cloud can...

Unemployed Geniuses
From The Eponymous Pickle

Unemployed Geniuses

An intriguing article on the employment of genius.  By their carefully limiting definition.  Seen this effect relatively often.  Genius does not always combine...

Telepresence Robotics in the Office
From The Eponymous Pickle

Telepresence Robotics in the Office

In IEEE Spectrum:  Cisco and iRobot working to produce a telepresence robot.  Conceptually an appealing idea, but I wonder about the practicality before robotic...

Ricin as a Terrorist Tool
From Schneier on Security

Ricin as a Terrorist Tool

This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction: Abstract: In recent yearsThis...

Mitigating Risk in the Supply Chain
From The Eponymous Pickle

Mitigating Risk in the Supply Chain

In Industry Week:" ... Supply chain managers adopt new strategies to mitigate risks Research has shown that major interruptions in the supply chain can sap a company's...

Tesco Supply Chain Big Data
From The Eponymous Pickle

Tesco Supply Chain Big Data

From Tableau Software:   Major global retailer on the use of visualization:  " ... Tesco uses Teradata to warehouse their supply and inventory data. They've got...

Trading Privacy for Convenience
From Schneier on Security

Trading Privacy for Convenience

Ray Wang makes an important point about trust and our data: This is the paradox. The companies contending to win our trust to manage our digital identities all...

From Computational Complexity

The Internship

Last weekend I took my teenage daughters to see The Internship, the Vince Vaughn-Owen Wilson vehicle where they play two forty-year old interns at Google. It basically...

More on Feudal Security
From Schneier on Security

More on Feudal Security

Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...

FCC Emergency Access Advisory Committee Meeting on June 14
From U.S. Public Policy Committee of the ACM

FCC Emergency Access Advisory Committee Meeting on June 14

The FCC Emergency Access Advisory Committee (EEAC) will meet tomorrow, Friday, June 14, from 10:30 am to 3:30 pm EDT, to discuss the technologies and protocols...

A Short History of TV
From The Eponymous Pickle

A Short History of TV

Though there is starting to be some serious competition at the edges, Television continues to be a very big means of one to many conversation.  Ars Technica has...

Essays Related to NSA Spying Documents
From Schneier on Security

Essays Related to NSA Spying Documents

Here's a quick list of some of my older writings that are related to the current NSA spying documents: "The Internet Is a Surveillance State ," 2013. The importance...

To get the most out of tablets, use smart curation
From Putting People First

To get the most out of tablets, use smart curation

In a second article in a four-part series on the use of tablets in educational settings, Justin Reich of MindShift examines the topic of curation. “As technologies...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account