acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A great story: Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...

WiFi Vending Machines
From The Eponymous Pickle

WiFi Vending Machines

In Japan, the home of universal vending, machines that will provide free registration-less WiFi and product. Assuming they will sell advertising for companies that...

Cross-Cultural Learning Curve: Sending a Paper to Science
From My Biased Coin

Cross-Cultural Learning Curve: Sending a Paper to Science

We decided to submit our paper on MIC and MINE to Science it's a venue that my co-authors were familiar with and very interested in applying to.  I was happy to...

2011:
From The Computing Community Consortium Blog

2011:

…became “the center of your world.” So says technology writer/editor

Sands Research Nails VW Ad
From The Eponymous Pickle

Sands Research Nails VW Ad

An interesting result that starts to connect new ad analysis methods with classic methods:------Wall St. Journal and AdWeek Agree with

Telling a Business Story with Slideshare
From The Eponymous Pickle

Telling a Business Story with Slideshare

Telling a business story. Simple advice overall. " ... Because presentations are generally about very specific topics, companies use SlideShare for inbound marketing...

Butt Identification
From Schneier on Security

Butt Identification

Here's a new biometric: how you sit: ...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...

My favorite posts from 2011
From Daniel Lemire's Blog

My favorite posts from 2011

January: Innovating without permission Not even eventually consistent February: Taking scientific publishing to the next level Ten things Computer Science tells...

From The Computing Community Consortium Blog

msnbc.com’s Cosmic Log is out with its list of the top 11 scientific twists from 2011 this morning: The past year brought us the supercomputer that trounced

Quick links
From Geeking with Greg

Quick links

Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...

Visualizing the Flavor Network
From The Eponymous Pickle

Visualizing the Flavor Network

A flavor network. From FlowingData. The different relationships of flavor and location. An interesting example of visual relationships.

Some of The Fun of Collaborating...The Other People
From My Biased Coin

Some of The Fun of Collaborating...The Other People

One of the things I enjoy most about working in algorithms is the breadth of work I get to do.  And while I've worked on a variety of things, almost all have been...

Computer Science Entrepreneurs
From Computer Science Teachers Association

Computer Science Entrepreneurs

During the last few weeks I have been fondly reminded of the joys I experienced when teaching and working with a student organization and encountering that rare...

Common Statistical Mistakes
From The Eponymous Pickle

Common Statistical Mistakes

Very common examples. I have seen variants of all of these. Still, should be well known to all saavy managers. If you see anything that is similar to these...

From The Computing Community Consortium Blog

The New York Times

The Collar Bomb Robbery
From Schneier on Security

The Collar Bomb Robbery

Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.

Top Most Read Posts of 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...

Wasted Hour(s)
From My Biased Coin

Wasted Hour(s)

Last night I was running some code for a queuing simulation related to some research I'm doing.  This is the Nth time I've used this code;  I wrote up the basic...

Considering Gamification
From The Eponymous Pickle

Considering Gamification

When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...

Wikipedia of Maps
From The Eponymous Pickle

Wikipedia of Maps

A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account