acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Pharmacy on a Chip
From The Eponymous Pickle

Pharmacy on a Chip

In ComputerWorld:' ... Researchers at MIT have developed what they're hoping will be something of a pharmacy on a chip.  Scientists have developed a wirelessly...

Twitter Ad Platform
From The Eponymous Pickle

Twitter Ad Platform

Will this significantly alter the environment of Twitter?  In AdAge:" ... Twitter is rolling out the self-serve ad platform it's been testing to 10,000 small and...

Brands American Women and Men Desire Most
From The Eponymous Pickle

Brands American Women and Men Desire Most

In Forbes:   From a study by Buyology Inc, a former collaboration of mine:" ... According to the second-annual study just released by Buyology, a strategic neuromarketing...

Bitmaps are surprisingly efficient
From Daniel Lemire's Blog

Bitmaps are surprisingly efficient

Imagine you have to copy an array, and update a few values in the process. What is the most efficient way implementation? Let us look at a concrete example. I am...

What Is a Suspicious-Looking Package, Anyway?
From Schneier on Security

What Is a Suspicious-Looking Package, Anyway?

Funny comic.

Book Bundling
From The Eponymous Pickle

Book Bundling

David Carr on book bundling.   An interesting case of combining digital and physical content together.  Not  much different than providing a site for a book to...

QR Codes vs Mobile Visual Search
From The Eponymous Pickle

QR Codes vs Mobile Visual Search

Are QR codes days numbered?   The suggestion that MVS will take over from them soon is suggested.  People have just become trained in using MVP, so I doubt it....

From Computational Complexity

People solve math problems for the prize money! NOT!

Why do people or organizations offer Prize Money for mathematics? Paul Erdos: He offered money to solve problems that he found interesting. I assume he wanted...

Why personas are critical for content strategy
From Putting People First

Why personas are critical for content strategy

The most popular content strategy tools borrow from the discipline of information architecture, but there is one invaluable tool that is imperative to the process...

World IA Day 2012 keynote talks
From Putting People First

World IA Day 2012 keynote talks

World IA Day 2012 is about bringing the Information Architecture community together, and the first ever World IA Day, which took place on 11 February, featured...

How To Start A Computer Science Flame War
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How To Start A Computer Science Flame War

Computer Scientists and computer professionals who may not think of themselves as

Self-Domestication in Bonobos and Other Animals
From Schneier on Security

Self-Domestication in Bonobos and Other Animals

Self-domestication happens when the benefits of cooperation outweigh the costs: But why and how could natural selection tame the bonobo? One possible narrative...

Mobile Payments Not a Game Changer Yet
From The Eponymous Pickle

Mobile Payments Not a Game Changer Yet

In Knowledge @ Wharton:  Thoughts in advance of the March Pay-Pal phone wallet acceptance at Home Depot.  The uptake is still very small for the US consumer.  What...

Thinkvine Partners with Acxiom for Optimization
From The Eponymous Pickle

Thinkvine Partners with Acxiom for Optimization

Longtime collaborative vendor Thinkvine has announced their partnership with Acxiom.  They present an interesting purpose in simulation terms.  More of this should...

Business Intelligence Without Rules
From The Eponymous Pickle

Business Intelligence Without Rules

On business intelligence without rules.   Sometimes yo can formulate specific rules defining a business process, but sometimes you are better off using individual...

Dates for Data?
From Computer Science Teachers Association

Dates for Data?

It's high school. It's Valentine's Day. The air is thick with hormones. But just as important as x's and o's are 1's and 0's. As a part of the CS Principles pilot...

Cryptanalysis of Satellite Phone Encryption Algorithms
From Schneier on Security

Cryptanalysis of Satellite Phone Encryption Algorithms

From the abstract of the paper: In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....

Searching Without Tracking
From The Eponymous Pickle

Searching Without Tracking

Mashable reports on a new search engine that uses novel methods to remove any tracking from your searching.   Search privacy.   " ...  Stealth is a search engine...

Seven Languages in Seven Weeks: Prolog, Day 3
From Writing

Seven Languages in Seven Weeks: Prolog, Day 3

After a rocky day 2 of Prolog, I'm back for a 3rd day in my Seven Languages in Seven Weeks series of blog posts.Prolog, Day 3: ThoughtsToday, I got to see Prolog...

Advantages of a Bigger Class
From My Biased Coin

Advantages of a Bigger Class

I'm several weeks into the super-sized class this semester.  Mostly, I find it's going fine -- indeed, there are some advantages, I'm finding, to the larger class...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account