acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Google Business Photo Tours
From The Eponymous Pickle

Google Business Photo Tours

Google giving business tours.  Stepping inside from just giving the street view.   I like the general idea.

More on Procter & Gamble Virtual Retail
From The Eponymous Pickle

More on Procter & Gamble Virtual Retail

I mentioned in a previous post P&G building virtual retail spaces and using this idea to better understand the shopping consumer.  Now an article about how they...

Full Disclosure in Biology
From Schneier on Security

Full Disclosure in Biology

The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology: The virus...

Applied Concept Mapping
From The Eponymous Pickle

Applied Concept Mapping

I recently met with Brian Moon of Perigean Technology,  practitioner of the what is called 'Concept Mapping', an advanced form of what is also called mind mapping...

DEBUT, Gig City
From The Computing Community Consortium Blog

DEBUT, Gig City

Two relevant challenges announced recently that are placing emphasis on prize-based innovation: DEBUT Challenge (for undergraduate students): The National Institute...

Bad CIA Operational Security
From Schneier on Security

Bad CIA Operational Security

I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied: But others inside the American intelligence...

The Perfect Educational Computer Lab
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Perfect Educational Computer Lab

I had the following question via Twitter the other day

NOTICE: Email sabbatical will start December 15
From Apophenia

NOTICE: Email sabbatical will start December 15

It’s that time of the year again. If you don

Security Systems as a Marker for High-Value Targets
From Schneier on Security

Security Systems as a Marker for High-Value Targets

If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world: Maize plants, like many others, protect themselves...

DARPA May Pursue Crowdsourced Software Testing
From The Computing Community Consortium Blog

DARPA May Pursue Crowdsourced Software Testing

The Defense Advanced Research Projects Agency’s (DARPA)

Neuromarketing Grows  in China
From The Eponymous Pickle

Neuromarketing Grows in China

Steve Sands of SandsResearch reports on neuromarketing activity in China.  The link below constains considerable detail: It's the fastest growing market and neuromarketing's...

Visualizing Lots of Data Artfully
From The Eponymous Pickle

Visualizing Lots of Data Artfully

I like doing things artfully, but I always prioritize being able to objectively understand and interact with data first beyond sheer 'Form'.  Nevertheless the following...

Koha Shows We Need Foundations
From Wild WebMink

Koha Shows We Need Foundations

Apache has been criticised for preventing new Incubator projects using Git. In its defence, some have claimed this is a criticism of the idea of the Foundation....

Gamifying College
From The Female Perspective of Computer Science

Gamifying College

Gamification is certainly a hot topic these days.  Jesse Schell opened Pandora's Box with his Visions of the Gamepocalypse talk.  Sebastian Deterding discussedpromises...

From The Computing Community Consortium Blog

An interesting computer security research result making news this morning — and stirring some controversy — courtesy of msnbc.com: Could a hacker from half-way...

Shopper Surveillance Using Cell Phones
From Schneier on Security

Shopper Surveillance Using Cell Phones

Electronic surveillance is becoming so easy that even marketers can do it: The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...

Know What Your Customers Want
From The Eponymous Pickle

Know What Your Customers Want

The power of knowing what your customers want before they do.

On the Value of Social Proof (Informal Social Influence)
From Putting People First

On the Value of Social Proof (Informal Social Influence)

Aileen Lee, partner at venture firm Kleiner Perkins Caufield & Byers, believes that the best way to cost-effectively attract valuable users is harnessing a concept...

12th Annual Computer Science & Information Technology Conference.
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

12th Annual Computer Science & Information Technology Conference.

The Computer Science Teachers Association runs what I consider the single best and most important professional development events of the year for computer science...

iPads in Marketing
From The Eponymous Pickle

iPads in Marketing

Keith Weed, Chief Marketing and Communications Officer of Unilever writes:
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account