acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Phishing Has Gotten <i>Very</i> Good
From Schneier on Security

Phishing Has Gotten Very Good

This isn't phishing; it's not even spear phishing. It's laser-guided precision phishing: One of the leaked diplomatic cables referred to one attack via emailwrote...

The Google Glass feature no one is talking about
From Putting People First

The Google Glass feature no one is talking about

The Google Glass feature that (almost) no one is talking about is the experience – not of the user, but of everyone other than the user, writes Mark Hurst in a...

In a world of connected devices, focus on what they do
From Putting People First

In a world of connected devices, focus on what they do

Stacey Higginbotham reports on a the GigaOM Internet of things meetup in San Francisco a few days ago: “All of the participants agreed that the connected device...

3D Desktops
From The Eponymous Pickle

3D Desktops

More from TED:  The next logical step in interface?   Or does this go a dimension too far?  Even a real desktop is flattened, unless you are dealing with 3D architectural...

Txt Speak as Linguistic Miracle
From The Eponymous Pickle

Txt Speak as Linguistic Miracle

Ars Technica on a TED Talk.   I am still skeptical that our languages will evolve into a simpler, acronym ridden shortening of tokens and meme pointers.   The article...

Naked Statistics
From The Eponymous Pickle

Naked Statistics

Part of my role long ago was to explain analytics to executives.  That included many things, from analytical methods, predictive systems to statistics.  So I was...

What We're Not Doing to Tackle the Women in Tech Issue
From The Female Perspective of Computer Science

What We're Not Doing to Tackle the Women in Tech Issue

Venture Beat recently ran an article about tackling tech's gender problem the right way (according to them, by teaching women to code). Part of the article discusses...

The Court of Public Opinion
From Schneier on Security

The Court of Public Opinion

Recently, Elon Musk and the New York Times took to Twitter and the Internet to argue the data -- and their grievances -- over a failed road test and car review....

CCC Sponsored Workshop on Extreme Scale Design Automation (ESDA)
From The Computing Community Consortium Blog

CCC Sponsored Workshop on Extreme Scale Design Automation (ESDA)

The following is a special contribution to this blog from Patrick H. Madden, Associate Professor of Computer Science at Binghamton University. In this blog entry...

Social Marketing Analytics
From The Eponymous Pickle

Social Marketing Analytics

An interesting set of examples, from GE and others:  " ... Offloading content development has allowed the company to develop an overarching social media strategy...

Revolutionizing Disease Treatment
From The Eponymous Pickle

Revolutionizing Disease Treatment

Via a social network.  Noted in the CACM:  Relates to some of my own writings on health care networks,    " ... The social network PatientsLikeMe plans to build...

Online Grocery Shopping
From The Eponymous Pickle

Online Grocery Shopping

Interesting connections that are driving the increasing use of online for grocery shopping.  " ... According to a Hartman Group report, 18% of households purchased...

How teachers are using technology at home and in their classrooms
From Putting People First

How teachers are using technology at home and in their classrooms

A survey by the Pew Internet & American Life Project of teachers who instruct American middle and secondary school students finds that digital technologies have...

Future Imperfect: Evgeny Morozov vs. Steven Johnson
From Putting People First

Future Imperfect: Evgeny Morozov vs. Steven Johnson

A couple of weeks ago Evgeny Morozov and Steven Johnson had a very public spat (writers’ favorite kind), prompted by Evgeny’s review of Johnson’s latest book in...

On legitimacy, place and the anthropology of the Internet
From Putting People First

On legitimacy, place and the anthropology of the Internet

In this thoughtful piece for Ethnography Matters, Sarah Kendzior (@sarahkendzior) discusses the ways in which the internet has transformed the relationship between...

Computer interfaces: tech’s next great frontier
From Putting People First

Computer interfaces: tech’s next great frontier

Since the invention of personal computing three decades ago, how we interact with computers has remained about the same: monitor, keyboard, mouse. Monitors have...

From Computational Complexity

Our Government at Work

Barring a surprise deal, the sequester goes into effect tomorrow. NSF Director (and soon to be CMU President) Subra Suresh announced a sequestration impact statement...

Brazen Physical Thefts
From Schneier on Security

Brazen Physical Thefts

Three brazen robberies are in the news this week. The first was a theft at a small museum of gold nuggets worth $750,000: Police said the daring heist happened...

Your ideas needed: Coding is to computer science as X is to Y
From The Computing Community Consortium Blog

Your ideas needed: Coding is to computer science as X is to Y

Yesterday we posted a link to a terrific new video by code.org extolling the virtues of learning to program. Despite the “learn to code” rhetoric, code.org is really...

CSTA Annual Conference News
From Computer Science Teachers Association

CSTA Annual Conference News

Planning is well underway for 2013 CSTA Annual Conference, formerly known as the CS&IT Symposium. This year's conference will be held in Quincy, MA (just outside...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account