acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0
From Schneier on Security

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0

It's the Browser Exploit Against SSL/TLS Tool, or BEAST: The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...

Comparing Neuromarketing and Traditional Market Research
From The Eponymous Pickle

Comparing Neuromarketing and Traditional Market Research

Traditional market research or neuromarketing methods?  I have always believed that it is worth thinking of neuromarketing methods as an augmentation of traditional...

ThinkVine Gets Forrester Nod
From The Eponymous Pickle

ThinkVine Gets Forrester Nod

Local company ThinkVine, who I have have talked to  now for a number of years,  has been a leader in marketing mix and promotion analysis work,using unique simulation...

Research Snapshot for Fall 2011
From The Female Perspective of Computer Science

Research Snapshot for Fall 2011

For those of you wondering what the heck I've been up to lately research-wise, wonder no longer! Here's a snapshot of what I've been working on lately and planCognitive...

Marketing Automation
From The Eponymous Pickle

Marketing Automation

In E-Commerce Times:  A good look at what is called marketing automation.  Is it science or not?  Or just a way to push for attention.

Computer Science Education Act
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Education Act

One of the big issues with computer science education is that it is not an integral part of the curriculum It is almost always an elective and doesn

Practical Quantum Computing
From The Eponymous Pickle

Practical Quantum Computing

Getting closer to practical computing. " ... Physicists find quantum versions of both feedback control and classical computer architecture ... " 

From Computational Complexity

Mahaney's Theorem

Bill has a lot of posts where he questions whether to teach Mahaney's theorem in a graduate complexity class. Since it is one of my favorite theorems and most of...

Apply for NSF
From The Computing Community Consortium Blog

Apply for NSF

The National Science Foundation has issued a solicitation for its East Asia and Pacific Summer Institutes (EAPSI), providing U.S. science and engineering graduate...

The Unintended Consequences of Cyberbullying Rhetoric
From Apophenia

The Unintended Consequences of Cyberbullying Rhetoric

We all know that teen bullying – both online and offline – has devastating consequences. Jamey Rodemeyer’s suicide is a tragedy. He was tormented for being gay....

Three Emerging Cyber Threats
From Schneier on Security

Three Emerging Cyber Threats

On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...

An Interesting Software Liability Proposal
From Schneier on Security

An Interesting Software Liability Proposal

This proposal is worth thinking about. Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...

Sales Motivation With Games
From The Eponymous Pickle

Sales Motivation With Games

   Just received from notable gamification vendor Bunchball.   Some nice ideas embedded here, and where better to try gamification than with a heavily extroverted...

Please enter your password, again and again
From Putting People First

Please enter your password, again and again

Khoi Vinh reflects on the fact (and the user experience) that almost everything on all of his computers and all of his mobile devices can only be accessed with...

Book: Mobile First
From Putting People First

Book: Mobile First

Mobile First Luke Wroblewski A Book Apart October 2011 Abstract Our industry

Reflections on the internet of things and yet another revolution
From Putting People First

Reflections on the internet of things and yet another revolution

The internet of things and yet another revolution The “internet of things” is viewed as the next big thing, but when will it allow people to create their own stuff...

ACM Education Policy Chair Testifies to Congress on IT Research and Development
From U.S. Public Policy Committee of the ACM

ACM Education Policy Chair Testifies to Congress on IT Research and Development

Dr. Robert Schnabel, Dean of the School of Informatics at the University of Indiana and Chair of ACM’s Education Policy Committee, testified before the House Research...

How Computer Scientists Can Empower Journalists
From The Eponymous Pickle

How Computer Scientists Can Empower Journalists

In CACM:  Computational Journalism: How computer scientists can empower journalists, democracy's watchdogs, in the production of news in the public interest ......

Unilever App that Rewards Shoppers at Wal-Mart
From The Eponymous Pickle

Unilever App that Rewards Shoppers at Wal-Mart

This uses a simple check-in loyalty model at Wal-Mart and Sam's.   A collaboration with Unilever.  " ...  Unlike most location-based apps, Check In To Win focuses...

Recent IARPA, DARPA, NIH RFPs Require Computational Expertise
From The Computing Community Consortium Blog

Recent IARPA, DARPA, NIH RFPs Require Computational Expertise

The Defense Advanced Research Projects Agency (DARPA), Intelligence Advanced Research Projects Activity (IARPA), and National Institutes of Health (NIH)
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account