acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Revisiting
From The Computing Community Consortium Blog

Revisiting

A little over two years ago, we blogged about the

Design prototypes as boundary objects in innovation processes
From Putting People First

Design prototypes as boundary objects in innovation processes

Holger Rhinow, Eva K

Ecosystems rule over products now. Here
From Putting People First

Ecosystems rule over products now. Here

In order for designers to navigate the complex ecosystem of digital platforms, they’ll need to master business modeling and become comfortable working across disciplines...

Future of Gamification
From The Eponymous Pickle

Future of Gamification

PEW report on the topic of gamification. Useful overview.

Scaling and Power Laws
From The Eponymous Pickle

Scaling and Power Laws

Good examination of power laws in the newly revived Exploring Complexity blog. An important idea that is introduced clearly here.

From Computational Complexity

STOC Business Meeting

Last night I ran my last STOC business meeting as SIGACT chair. It was a three-hour affair until the hotel staff kicked us out at midnight. Lots of highlights.online...

Computer Science: The Big Picture
From Computer Science Teachers Association

Computer Science: The Big Picture

As I prepare to meet with a local School Board member and a magnet high school principal to discuss implementing computer programming in the high school, I have...

Racism as a Vestigal Remnant of a Security Mechanism
From Schneier on Security

Racism as a Vestigal Remnant of a Security Mechanism

"Roots of Racism," by Elizabeth Culotta in Science: Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend...

Creating incentives for better science
From Daniel Lemire's Blog

Creating incentives for better science

Popper argued that science should be falsifiable. To determine truth, we simply try to disprove an hypothesis until we are exhausted. It is a nice theory, but actual...

Non-travel
From My Biased Coin

Non-travel

For the past few years, I've been the chair for one of the international review panels for Country X's research funding bodies.  (It's probably all a matter of...

Security Incentives and Advertising Fraud
From Schneier on Security

Security Incentives and Advertising Fraud

Details are in the article, but here's the general idea: Let's follow the flow of the users: Scammer buys user traffic from PornoXo.com and sends it to HQTubeVideos...

Supply Dynamics
From The Eponymous Pickle

Supply Dynamics

Recently visited:  Material Demand Aggregation: Your Solution for Better Supply Chain PerformanceLeverage aggregate demand WITHOUT consigning material, installing...

Occasion-Based Marketing at Coke
From The Eponymous Pickle

Occasion-Based Marketing at Coke

In CPGMatters:   A classic approach to quantifying  in-store behavior.  Coke finds some insight along the way:Occasion-Based Marketing Triggers Coca-Cola's Solutions ...

From The Computing Community Consortium Blog

The New York Times

Mobile Grocery Shopping
From The Eponymous Pickle

Mobile Grocery Shopping

Are you ready?   Catalina's acquisition of Modiv media.  What will the outcome of this be?  Are consumers ready to broadly utilize in-store scanning?  Based on "...

A Business Intelligence Tool
From The Eponymous Pickle

A Business Intelligence Tool

I have worked for a number of small and medium size business intelligence applications.  When a business has to address these kinds of problems without a consultant...

Fast bitmap decoding
From Daniel Lemire's Blog

Fast bitmap decoding

An old programming trick is to represent sets of integers as bitmaps. For example, the sequence of integers 1, 4, 6 becomes the number 0b1010010 in binary (or 82...

Summer School on Massive Data Mining in Copenhagen
From My Biased Coin

Summer School on Massive Data Mining in Copenhagen

Rasmus Pagh asked me to advertise the following summer school he is organizing.  Looks like a good deal to me:SUMMER SCHOOL ON MASSIVE DATA MININGAugust 8-10, 2012...

Mini-Course 2012: The Games
From The Female Perspective of Computer Science

Mini-Course 2012: The Games

I have posted the 13 games I received from my mini-course students onto my website.  They are in exe format that should work on Windows machines without Game Maker...

Portrait of a Counterfeiter
From Schneier on Security

Portrait of a Counterfeiter

Interesting article from Wired.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account