acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Do I Want to Be an Entrepreneur?
From The Female Perspective of Computer Science

Do I Want to Be an Entrepreneur?

Even though it's early, I have been starting to think about what I want to do when I graduate. Teaching is high up there is I can find a good local job doing it...

Skype on the iPad
From The Eponymous Pickle

Skype on the iPad

Skype now has an available native App on the iPad. Tested it and it works quite well on wifi.Could use better contact management and additional client options....

Developments in Facial Recognition
From Schneier on Security

Developments in Facial Recognition

Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a microphone that will automatically...

The Science Fiction Behind Search
From The Eponymous Pickle

The Science Fiction Behind Search

In the Google Quarterly. A looking at what works very well, not quite so well and not at all in search by Google, and how we may start to think about the future...

Eight Pillars of Innovation
From The Eponymous Pickle

Eight Pillars of Innovation

In the Google Quarterly. "... The greatest innovations are the ones we take for granted, like light bulbs, refrigeration and penicillin. But in a world where the...

Book: Design for Services
From Putting People First

Book: Design for Services

Design for Services Series: Design for Social Responsibility Authors: Anna Meroni and Daniela Sangiorgi Gower Publishing, August 2011, 298 pages In Design for Services...

Design research: what is it and why do it?
From Putting People First

Design research: what is it and why do it?

In a long post on reBoot, Panthea Lee has laid out some basic principles, approaches, and tools of design research so public institutions can better understand...

Could the Next Big Thing
From The Computing Community Consortium Blog

Could the Next Big Thing

It’s not everyday the national news media envisions computing research. But it happened on Sunday, when

Brain and Brain Vibrations
From The Eponymous Pickle

Brain and Brain Vibrations

Martin Lindstrom in his latest article writes about phantom cellphone vibrations That have us reaching for our pockets even without any conscious cues. He relates...

Attacking PLCs Controlling Prison Doors
From Schneier on Security

Attacking PLCs Controlling Prison Doors

Embedded system vulnerabilities in prisons: Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...

Congratulations Louis Zulli Jr. and Doug Bergman
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Congratulations Louis Zulli Jr. and Doug Bergman

There were nine winners in the Partners in Learning 2011 U.S. Innovative Education Forum, four second place winners and five first place winners (one of these was...

Fun Links, via Google+
From My Biased Coin

Fun Links, via Google+

One fun aspect of being on Google+ is occasionally a link comes along worth further notice.The first, from David Karger, is a link to a report (by Democrats, says...

? Kiva Free Trial
From Wild WebMink

? Kiva Free Trial

Kiva is a project that allows you to make tiny loans, together with many other people, that accumulate to make a larger loan that will prove huge for an otherwise...

Is Computer Science Antithetical to the Liberal Arts?
From Computer Science Teachers Association

Is Computer Science Antithetical to the Liberal Arts?

Many of us who teach college level computer science have been happy with the latest news about computing and IT related jobs. With the promise of fast growth in...

The
From The Computing Community Consortium Blog

The

The NSF’s Science Nation has a great feature today on the “Science of Shopping,” describing how computer scientists Rajeev Sharma and Satish Mummareddy have developed...

Scavenging Power
From The Eponymous Pickle

Scavenging Power

Fascinating Fastcompany article about scavenging power from waste paper and data. Must be some sort of energy conservation involved, though we will always have...

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption
From Schneier on Security

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption

It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...

Meeting Shopper Expectations
From The Eponymous Pickle

Meeting Shopper Expectations

In e-commerce Times: '... In-content ad delivery is tightly integrated with the content a consumer is most interested in -- e.g., a post in a forum, an article...

Hill Tech Happenings, Week of August 1
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of August 1

Yes, there is more to Washington right now than negotiations and voting on the results. August 2 Briefing: The Strategic Forces Subcommittee of the Senate Armed...

Scientists are communists
From Daniel Lemire's Blog

Scientists are communists

Overconfident individuals often win by claiming more resources than they could defend (Johnson and Fowler). If nobody knows who is strongest, whoever thinks he...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account