acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Design Lessons from the Bottom of the Pyramid
From The Eponymous Pickle

Design Lessons from the Bottom of the Pyramid

From the Harvard Blogs: Design Lessons from the Bottom of the Consumer Pyramid. " ... At the BOP, affordability is necessary but not sufficient. Tastes and aspirations...

Stop Typing, Start Shouting
From The Eponymous Pickle

Stop Typing, Start Shouting

ShoutOMatic.  A kind of audio twitter.  " ... Think of each shout as an audible status update.  In between some of your regular 'text'  tweets and status updates...

Open Source Tag Generation
From The Eponymous Pickle

Open Source Tag Generation

A number of solutions to the problem, imperfect, but useful.  The methods I have tried in the past have not worked well.

Always Mount A Scratch Monkey
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Always Mount A Scratch Monkey

Do today

Fingerprint Scanner that Works at a Distance
From Schneier on Security

Fingerprint Scanner that Works at a Distance

Scanning fingerprints from six feet away. Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....

Daily Updates
From My Biased Coin

Daily Updates

Getting slowly back into blogging, some happenings from the day.I've gotten a couple of nice notes from students saying they learned a lot from my class this semester...

Sharing Data Corrupts Wisdom of Crowds
From The Eponymous Pickle

Sharing Data Corrupts Wisdom of Crowds

Some experiments are showing that sharing information makes a knowledge pool less diverse and leads to worse results.  In a test we saw something similar, but we...

Time-saving versus work-inducing software
From Daniel Lemire's Blog

Time-saving versus work-inducing software

At a glance, office software like Word, PowerPoint or Excel, are great time savers. Nobody would want to go back to the era before Word Processors? Unfortunately...

CS&IT and Summertime PD
From Computer Science Teachers Association

CS&IT and Summertime PD

The flowers are blooming (finally) here in Massachusetts so spring has indeed arrived, which means, summer is not too far away. Some of us think, can it get here...

Hill Tech Happenings, Week of May 16
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of May 16

May 19 Meeting: The President’s Council of Advisors on Science and Technology will meet. The meeting will be webcast. 9 a.m., Marriott Metro Center, 775 12th Street...

Reading:  Reality is Broken
From The Eponymous Pickle

Reading: Reality is Broken

I am doing some research in the area of 'gamification' and the use of games to solve serious work processes.  That and some emerging project work has led me toReality...

Jeff Naughton
From The Computing Community Consortium Blog

Jeff Naughton

Jeff Naughton, a top database researcher from the University of Wisconsin – Madison, has made available a superb keynote that he gave at the 26th IEEE International...

From Computational Complexity

On demand Publishing (guest post)

Cambridge Press (and others) offers PRINT-ON-DEMAND for some books. This is a guest post by Lauren Cowles from Cambridge Books about this, and then my commentsWhats...

Marginalia in the Digital World
From The Eponymous Pickle

Marginalia in the Digital World

It is not as easy as it once once.  Yet is still exists.  Good thoughts and software that can help.  And in one sense isn't all of the Web and hyperlinks a form...

A Look at Edward Tufte
From The Eponymous Pickle

A Look at Edward Tufte

In the Washington Monthly, a good article on visualization guru Edward Tufte.  " ... Edward Tufte occupies a revered and solitary place in the world of graphic...

Flying Robots Form Emergency Network
From The Eponymous Pickle

Flying Robots Form Emergency Network

From IEEE Computer.Org a kind of mobile computer sourcing. 

Live Webcast:  The U.S. Ignite Gigabit Applications Workshop
From The Computing Community Consortium Blog

Live Webcast: The U.S. Ignite Gigabit Applications Workshop

The

The Inner Workings of an FBI Surveillance Device
From Schneier on Security

The Inner Workings of an FBI Surveillance Device

This FBI surveillance device, designed to be attached to a car, has been taken apart and analyzed. A recent ruling by the 9th U.S. Circuit Court of Appeals affirms...

Interesting Posts 16 May 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Posts 16 May 2011

Computer Science teacher Pat Yongpradit  seems to be everywhere on the educational blogosphere lately. I posted about his 5-6 week XNA course curriculum last week...

? Speaking at OSBC
From Wild WebMink

? Speaking at OSBC

If you’re at the Open Source Business Conference, OSBC, in San Francisco today and tomorrow, you have three opportunities to hear me speak (or three sessions to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account