acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Quite Liked
From The Eponymous Pickle

Quite Liked

 I was introduced to QuiteLiked today: What

Friday Squid Blogging: LOLCat and Squid Toy
From Schneier on Security

Friday Squid Blogging: LOLCat and Squid Toy

Cute.

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park
From Schneier on Security

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park

Neat: The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...

Supermarkets Morphing to Restaurants
From The Eponymous Pickle

Supermarkets Morphing to Restaurants

Prepared foods continue to increase in availability in supermarkets, due to bigger margins.  The next step is to wrap in the restaurant as well.  More margin and...

Dunnhumby Acquires BzzAgent
From The Eponymous Pickle

Dunnhumby Acquires BzzAgent

BzzAgent is a company that seeks to get people talk about brands.They are being acquired by loyalty data agent Dunnhumby.  BzzAgent reminds, in name and direction...

Security vs. Privacy
From Schneier on Security

Security vs. Privacy

Daniel Solove on the security vs. privacy debate.  

Student Insiders and Imagine Cup Game Teams
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Student Insiders and Imagine Cup Game Teams

I thought I might highlight a few student related things going on at Microsoft these days.  I

Internet of things blurs the line between bits and atoms
From Putting People First

Internet of things blurs the line between bits and atoms

In the past few months, companies ranging from giants such as Google to small start-ups have been touting the possibility of interconnecting people and objects...

Open-Source Software Feels Insecure
From Schneier on Security

Open-Source Software Feels Insecure

At first glance, this seems like a particularly dumb opening line of an article: Open-source software may not sound compatible with the idea of strong cybersecurity...

Online Currency: Bitcoin
From The Eponymous Pickle

Online Currency: Bitcoin

Bitcoin, the experiment with encrypted online currency.  Dangerous? A Scam? Revolutionary or just a renaming of something old? Will it be made illegal? It ultimately...

Spear Phishing Attacks from China Against Gmail Accounts
From Schneier on Security

Spear Phishing Attacks from China Against Gmail Accounts

Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...

Digital You: a NESTA discussion on telepresence
From Putting People First

Digital You: a NESTA discussion on telepresence

Digital You was an early morning discussion in London, organised by NESTA, that looked at telepresence and the psychology of electronic communications. NESTA is...

Is car sharing the future of the automobile industry?
From Putting People First

Is car sharing the future of the automobile industry?

As much as the car chieftains of Detroit try to fight it, America is slowly but surely turning away from the concept of car ownership. Instead, hundreds of thousands...

Five similarities between collaborative consumption and open-source technology
From Putting People First

Five similarities between collaborative consumption and open-source technology

Tim Hyer, the founder of Rentcycle (an online rental marketplace for those looking to share access rather than retain ownership), was hugely inspired by his previous...

From The Computing Community Consortium Blog

This following a special contribution to this blog by Cindy L. Bethel, a 2009 Computing Innovation Fellow (CIFellow) working with Brian Scassellati in the Social...

From Computational Complexity

Partioning Students

One last Molly post for the end of the school year. Tomorrow is her birthday and I enter that moment I have been dreading for the past thirteen years: Two teenage...

Archiving Everything
From The Eponymous Pickle

Archiving Everything

Remembering being surprised in 2010 that the US Library of Congress was archiving Twitter.   Lots of details about that effort here.  So many data mining opportunities...

Man-in-the-Middle Attack Against the MCAT Exam
From Schneier on Security

Man-in-the-Middle Attack Against the MCAT Exam

In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...

Crowd Sourced Eyetracking
From The Eponymous Pickle

Crowd Sourced Eyetracking

A look at YouEye ... An interesting concept that is likely very cheap. But what will the quality be like? Tracks using your own camera for user interface design...

Touchscreen vs Heavy Lifting OS
From The Eponymous Pickle

Touchscreen vs Heavy Lifting OS

A look at touchscreen as an interface versus full operating systems. Praises an early look at Windows 8, but says it cannot match the simplicity of an iPad. But...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account