acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Pads in Schools:Games as Learning
From The Eponymous Pickle

Pads in Schools:Games as Learning

Should devices like the iPad replace books and other learning materials in schools?  A recent experiment in the UK asks the question.  I am still a proponent of...

Endeca Business Intelligence
From The Eponymous Pickle

Endeca Business Intelligence

Newly discovered: Endeca. " ... For organizations seeking to improve daily decisions or purchase decisions for customers, Endeca is a search and business intelligence...

links for 2011-05-29
From Wild WebMink

links for 2011-05-29

Can We Kill Off This Myth That The Internet Is A Wild West That Needs To Be Tamed? | Techdirt Excellent article. — "The internet does not exist as untouchable....

U.S. Memorial Day Thoughts on Cyber War
From CERIAS Blog

U.S. Memorial Day Thoughts on Cyber War

We've been hearing about "cyber war" for some time now. It has been held out as an existential threat by some people, been the topic of scores of books, and led...

From Computational Complexity

75 Years of Computer Science

As Lipton and Felten note, today is the 75th anniversary of Turing's On Computable Numbers, With an Application to The Entscheidungsproblem, the seminal paper of...

Academics Move Closer to Wikipedia
From The Eponymous Pickle

Academics Move Closer to Wikipedia

I have been surprised that a large portion of academia was not sympathetic to the Wikipedia, perhaps seeing too much competition there.  But once many people start...

Gamifying Your Startup
From The Eponymous Pickle

Gamifying Your Startup

Rajat Paharia of Bunchball  on  ways to gamify your  startup. This takes you beyond just slapping some badge measures on your site, which I agree will not work ...

links for 2011-05-28
From Wild WebMink

links for 2011-05-28

John Perry Barlow Tells Copyright Maximalists That They've Got The Fundamentals Wrong Great stuff from JPB here. Shame of it all is despite hist stature in all...

Jesse Schell
From The Eponymous Pickle

Jesse Schell

The site of author,entrepreneur and game designer Jesse Schell.   A number of useful threads there.  I have just received his book: The Art of Game Design: A Book...

Turing Award Winner Talks Technology
From The Eponymous Pickle

Turing Award Winner Talks Technology

From the CACM: Turing Award winner Leslie Valiant discusses machine learning, parallel computing, and computational neuroscience. Machine learning is a favorite...

Friday Squid Blogging: Hand-Cut Paper Silhouette
From Schneier on Security

Friday Squid Blogging: Hand-Cut Paper Silhouette

Surprisingly pretty.

? eG8, Control Points and NameCoin
From Wild WebMink

? eG8, Control Points and NameCoin

As the pressure on and from political leaders to “regulate” the internet mounts, the need for basic infrastructure to switch from hierarchical to distributed control...

Thinking about Neuromarketing
From The Eponymous Pickle

Thinking about Neuromarketing

Excellent thoughtful post about Neuromarketing and it's criticism and potential value.

Trends in Knowledge Work
From The Eponymous Pickle

Trends in Knowledge Work

Very good piece on what is happening in this space.  I think that the continues overflow of information that is occuring makes just-in-time an essential element...

Automation will make you obsolete, no matter who you are
From Daniel Lemire's Blog

Automation will make you obsolete, no matter who you are

I was part of the first generation of kids to receive computers as gifts. I was also part of the first generation of professionals to adopt computer-assisted tele...

Windows Phone 7 Games in Visual Basic
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows Phone 7 Games in Visual Basic

I’ve been working all week in C#. Now C# is a wonderful language if you are going to use semi-colons and curly braces. It fixes almost all of the issues I haveYou...

? Future-proofing
From Wild WebMink

? Future-proofing

NameCoin at The Dot-bit Project With internet-control-freak politics everywhere now – just look at eG8 and PROTECTIP for example – the need for distributed infrastructure...

Reverse Engineering Public Criticism
From The Eponymous Pickle

Reverse Engineering Public Criticism

Good piece in the Harvard Blogs.   In particular with a useful retail example: Wal-Mart.  Which also includes criticism of how the company has handled things,. ...

Apple's iOS 4 Hardware Encryption Cracked
From Schneier on Security

Apple's iOS 4 Hardware Encryption Cracked

All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...

From The Computing Community Consortium Blog

In light of the tornadoes that have devastated parts of the Midwest and South over the past several weeks,
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account