acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

RecSys 2012: Beyond Five Stars
From The Noisy Channel

RecSys 2012: Beyond Five Stars

I spent the past week in Dublin attending the 6th ACM International Conference on Recommender Systems (RecSys 2012). This young conference has become the premier...

Man-in-the-Middle Bank Fraud Attack
From Schneier on Security

Man-in-the-Middle Bank Fraud Attack

This sort of attack will become more common as banks require two-factor authentication: Tatanga checks the user account details including the number of accounts...

Agencies Announcing First Round of NRI Awards
From The Computing Community Consortium Blog

Agencies Announcing First Round of NRI Awards

The first round of awards for next-generation robotics R&D through the National Robotics Initiative (NRI) are being announced today, according to White House Office...

Protest  Monitoring
From The Eponymous Pickle

Protest Monitoring

I mentioned Recorded Future's monitoring analysis of the embassy attacks.  Now they have followed with a thirty minute video that examines the approach.   A good...

Transparent Mobile Computing
From The Eponymous Pickle

Transparent Mobile Computing

From CIO: The ability to have Apps run on multiple mobile platforms.  From Intel:  "...  "With transparent computing, software developers no longer must choose...

UGNazi
From Schneier on Security

UGNazi

Good article on the hacker group UGNazi.

Software Patent Solution Under Our Noses
From Wild WebMink

Software Patent Solution Under Our Noses

I was blown away by a paper by legal scholar Mark Lemley when I read it in full this week. He plausibly claims there’s a very simple and elegant solution to software...

Think Outside The Textbook
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Think Outside The Textbook

I was talking to a teacher, well chatting online via Facebook actually, and I described what he does as “thinking outside the textbook.” Speaking as someone who...

The age of data sharing (report)
From Putting People First

The age of data sharing (report)

We live in an age of sharing. As consumers and online, we regularly share personal information, and generate new data through our browsing or purchasing history...

The Connected Consumer
From The Eponymous Pickle

The Connected Consumer

Correspondent Gib Bassett curates The Connected Consumer. Which contains a number of items about consumer packaged goods that I had missed.   Worth checking out...

GS1 and VICS Merger
From The Eponymous Pickle

GS1 and VICS Merger

Via Kevin Judd of Fujitsu.Yesterday, September 10th 2012, GS1 US and the Voluntary Interindustry Commerce Solutions (VICS) Association announced that they haveThe ...

Estimating the Probability of Another 9/11
From Schneier on Security

Estimating the Probability of Another 9/11

This statistical research says once per decade: Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...

From Computational Complexity

Max Flow

A couple of weeks ago Suresh tweeted the following result of James Orlin Max flows in O(nm) time or better. jorlin.scripts.mit.edu/Max_flows_in_O… — Suresh Venkat...

Will tablets replace PCs?
From Geeking with Greg

Will tablets replace PCs?

I just bet Professor Daniel Lemire $100 that they won't. At least, any time soon. The specific terms of the bet are, "In some quarter of 2015, the unit salesWho...

“Socially Mediated Publicness”: an open-access issue of JOBEM
From Apophenia

“Socially Mediated Publicness”: an open-access issue of JOBEM

I love being a scholar, but one thing that really depresses me about research is that so much of what scholars produce is rendered inaccessible to so many people...

Winning the Show Rooming War
From The Eponymous Pickle

Winning the Show Rooming War

Good post on the growing behavior of shoppers using the retail environment to see and touch products, but then buying them elsewhere or online.   Good examplesGino...

Future Intelligence with Recorded Future
From The Eponymous Pickle

Future Intelligence with Recorded Future

An excellent case study of the use of Recorded Future for understanding the recent Middle East unrest and embassy attacks.    A use of semantic analysis of multiple...

Launching a New Feature: Show Us Your “Research in Motion”!
From The Computing Community Consortium Blog

Launching a New Feature: Show Us Your “Research in Motion”!

Every week for the last several years, the Computing Community Consortium (CCC) has showcased an interesting computing (or related) research project as a “Highlight...

A Look at Educational Technology
From The Eponymous Pickle

A Look at Educational Technology

An opinionated view.  " ... Education is in some respects one of the most stagnant of all major industries. A farmer from 150 years ago would not comprehend a modern...

Steganography in the Wild
From Schneier on Security

Steganography in the Wild

Steganographic information is embedded in World of Warcraft screen shots.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account