acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Oxford University Blocks Google Docs
From Schneier on Security

Oxford University Blocks Google Docs

Google Docs is being used for phishing. Oxford University felt that it had to block the service because Google isn't responding to takedown requests quickly enough...

The Noisy Channel Has Moved To LinkedIn
From The Noisy Channel

The Noisy Channel Has Moved To LinkedIn

If you’re reading this, then you’re probably interested in my current writing. You can find my latest posts on my LinkedIn author page.

Finding and Amplifying Creativity
From The Eponymous Pickle

Finding and Amplifying Creativity

In the HBR Blog:  Why we implemented an innovation center in 2000.  "  ... In 2010, IBM ran a survey of 1,500 CEOs and found that the most valuable management skill...

Changing Role of IT
From The Eponymous Pickle

Changing Role of IT

Bill Inmon on the changimg role of IT.  The evolution of technology and how the IT department reacted.  Including a look at some of the glorious failures we have...

CPGs Load for Mobile
From The Eponymous Pickle

CPGs Load for Mobile

A survey of CPG spending that points towards much more spending in the mobile space.  Not unexpected, the new consumer is moving quickly, and they are increasingly...

Where Are the Teachers in Code.org?
From Computer Science Teachers Association

Where Are the Teachers in Code.org?

Earlier this month, computer science education fever spread throughout the nation as promotional videos from code.org were publicly released. The media frenzy can...

From Gödel's Lost Letter and P=NP

Checking the Higgs Boson

Reliability and scientific discovery Cropped from src. Dennis Overbye is Deputy Science Editor of the New York Times. He has just written the lead article for Tuesday’s...

Disappearing Interface
From The Eponymous Pickle

Disappearing Interface

On the disappearing Interface:  " ... Instead of all-purpose, full-focus devices, these new tools are migrating outward, on and around our bodies, to our fingers...

How the FBI Intercepts Cell Phone Data
From Schneier on Security

How the FBI Intercepts Cell Phone Data

Good article on "Stingrays," which the FBI uses to monitor cell phone data. Basically, they trick the phone into joining a fake network. And, since cell phones...

Addressing Showrooming with Price Matching
From The Eponymous Pickle

Addressing Showrooming with Price Matching

In Shopperception.  Good thoughts on this threat:  " ... Throughout this article we presented a possible threat and how retailers are reacting with defensive campaigns...

A Broken Promise
From Wild WebMink

A Broken Promise

Microsoft was fined for being a scofflaw and for failing to self-regulate as it had promised, not (just) for a “technical oversight”. I explain more on InfoWorld...

Browser Security
From Schneier on Security

Browser Security

Interesting discussion on browser security from Communications of the ACM. Also, an article on browser and web privacy from the same issue.

What form of behaviour change does climate change call for?
From Putting People First

What form of behaviour change does climate change call for?

Jonathan Rowson @Jonathan_Rowson, who leads the RSA Social Brain Centre, recently gave a 15 minute presentation on the Social Brain Centre’s emerging ideas relating...

Reaching those beyond Big Data
From Putting People First

Reaching those beyond Big Data

Opening up the Stories to Action edition of Ethnography Matters is Panthea Lee’s @panthealee moving story about a human trafficking outreach campaign that her company...

Tableau Webinar Tomorrow
From The Eponymous Pickle

Tableau Webinar Tomorrow

Of interest: " ... web seminar Tableau is hosting tomorrow (3/6). The webinar starts at 2p eastern and will feature current Tableau customers speaking about how...

To Sell is Human
From The Eponymous Pickle

To Sell is Human

FromWharton:  Excellent interview and video with Daniel Pink, a favorite author of mine.  He was recently a guest lecturer at my Alma Mater.   About his new book...

The NSA's Ragtime Surveillance Program and the Need for Leaks
From Schneier on Security

The NSA's Ragtime Surveillance Program and the Need for Leaks

A new book reveals details about the NSA's Ragtime surveillance program: A book published earlier this month, "Deep State: Inside the Government Secrecy Industry...

Challenges of Mobile Business Intelligence
From The Eponymous Pickle

Challenges of Mobile Business Intelligence

A topic I am currently exploring.   Scale of display, security, effectiveness of interaction are among the concerns.  And software that can properly deal with that...

Measuring Advertising
From The Eponymous Pickle

Measuring Advertising

Measurement of outcomes is always interesting to me, so this led to the announcement below:The Wharton Customer Analytics Initiative (WCAI) and the SEI Center's...

Airwriting
From The Eponymous Pickle

Airwriting

In Popsci: Understanding gestural generation of text.  Airwriting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account