acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Follow The Frog
From Wild WebMink

Follow The Frog

Love this video. Pass it on.

Research Snapshot for Fall 2012
From The Female Perspective of Computer Science

Research Snapshot for Fall 2012

Now that I'm back in school full time, it's a good time to have a look at where I am research-wise.  Here are some of the projects I'm working on and what progress...

The Good News about Computer Science
From Computer Science Teachers Association

The Good News about Computer Science

As is my usual practice, I have been mulling over what to write in my blog post for approximately the last month. The good news about computer science is that ...

Book: Configuring the Networked Self
From Putting People First

Book: Configuring the Networked Self

Configuring the Networked Self: Law, Code, and the Play of Everyday Practice by July E. Cohen Yale University Press, 2012 352 pages Free pdf version | Amazon link...

How the Kenyan Base of the Pyramid uses their mobile phone
From Putting People First

How the Kenyan Base of the Pyramid uses their mobile phone

In order to understand mobile phone usage at the Base of the Pyramid (BoP) in Kenya, iHub Research and Research Solutions Africa conducted a 6-month study, funded...

Want proof that market fit is everything? Test your app in the slums of Sao Paulo
From Putting People First

Want proof that market fit is everything? Test your app in the slums of Sao Paulo

For the Stanford-educated founders of Emprego Ligado, creating a successful app in Brazil required dismantling every assumption about the target audience. Emprego...

From Computational Complexity

Planarizing Gadgets for Perfect Matching do not Exist!

At Dagstuhl I was delighted when I saw the title of a talk to be given Planarizing Gadgets for Perfect Matching do not Exist because I had asked the question about...

The Risks of Trusting Experts
From Schneier on Security

The Risks of Trusting Experts

I'm not sure what to think about this story: Six Italian scientists and an ex-government official have been sentenced to six years in prison over the 2009 deadly...

What Parc Learned
From The Eponymous Pickle

What Parc Learned

On what Xerox spinoff Parc learned about open innovation.   We visited Parc many times  and they us, always interesting.  " ... The concept of open innovation has...

FLOSS Weekly on Baserock
From Wild WebMink

FLOSS Weekly on Baserock

I was co-host on today’s FLOSS Weekly episode, about the Baserock continuous integration system for Linux (and also the amazing 8 CPU/32 core Baserock Slab server...

Computing Projects for Girls
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computing Projects for Girls

This is a big topic on my mind of late. There is some discussion of this in the comments on my Boring Projects post and well as some responses via Twitter. Joanne...

DARPA Officially Launches Robotics Grand Challenge – Watch Pet-Proto Robot in Action
From The Computing Community Consortium Blog

DARPA Officially Launches Robotics Grand Challenge – Watch Pet-Proto Robot in Action

Today, the Defense Advanced Research Projects Agency (DARPA) officially kicked off its newest Grand Challenge, DARPA Robotics Challenge (DRC). As we’ve blogged previously...

Risks of Data Portability
From Schneier on Security

Risks of Data Portability

Peter Swire and Yianni Lagos have pre-published a law journal article on the risks of data portability. It specifically addresses an EU data protection regulation...

Core77 report on the Design Research Conference
From Putting People First

Core77 report on the Design Research Conference

A few days before the EPIC conference in Savannah, Chicago’s IIT Institute of Design organised and hosted its yearly Design Research conference. Although no videos...

Dash Boards and all that
From The Eponymous Pickle

Dash Boards and all that

Interestingly thoughts by Stephen Few. On the use of dash board displays for control. Dashboards are just simple displays.

Weaponizing Office Supplies
From Schneier on Security

Weaponizing Office Supplies

Now this is interesting.

Up again,  Learning Again.
From The Eponymous Pickle

Up again, Learning Again.

I have many close watchers who have noticed this blog has been dark for several days.  This is the first time this happened for years.   A number of people noticed...

STOC 2013 Submissions
From My Biased Coin

STOC 2013 Submissions

I was asked to post the following regarding STOC 2013 submissions:1) Please read the Call for Papers carefully and pay special attentionto length and formatting...

Let Me Buy You a Beer: A Message from a CSTA Advocate
From Computer Science Teachers Association

Let Me Buy You a Beer: A Message from a CSTA Advocate

While I'm truly honored to be the first recipient of the CSTA Leadership Cohort APP (Advocacy Points Program) award, I wish to recognize members of CSTA Chicago...

NSF Announces “Exploiting Parallelism and Scalability” (XPS) Program
From The Computing Community Consortium Blog

NSF Announces “Exploiting Parallelism and Scalability” (XPS) Program

This week, the National Science Foundation issued a solicitation for its new Exploiting Parallelism and Scalability (XPS) program. The program aims to support groundbreaking...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account