acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Forever online: Your digital legacy
From Putting People First

Forever online: Your digital legacy

Your photos, status updates and tweets will fascinate future historians. Will these online remains last forever? In this special report, newscientist.com editor...

From The Computing Community Consortium Blog

There’s a great article in today’s

links for 2011-05-07
From Wild WebMink

links for 2011-05-07

Skype bug gives attackers access to Mac OS X machines Serious, exploitable bug in the Mac version of Skype. Best not to run Skype until they have it fixed. Actually...

New Science of Retailing: Assortment Planning
From The Eponymous Pickle

New Science of Retailing: Assortment Planning

Today at UC,  Heard Marshall Fisher talk about work in chapter 2 of his book: The New Science of Retailing: How Analytics are Transforming the Supply Chain andhis...

Friday Squid Blogging: Noise Pollution and Squid
From Schneier on Security

Friday Squid Blogging: Noise Pollution and Squid

It literally blows holes in their heads: In the study, led by Michel Andr

Friday Squid Blogging: Squids in Space
From Schneier on Security

Friday Squid Blogging: Squids in Space

There are live squids on the last Endeavor mission.

The value of Google Maps directions logs
From Geeking with Greg

The value of Google Maps directions logs

Ooo, this one is important. A clever and very fun paper, "Hyper-Local, Direction-Based Ranking of Places" (PDF), will be presented at VLDB 2011 later this year...

Sony-Prompted Hearing Features Testimony from USACM Chair
From U.S. Public Policy Committee of the ACM

Sony-Prompted Hearing Features Testimony from USACM Chair

Prompted by the massive data breaches of Sony's networks, the Subcommittee on Commerce, Manufacturing and Trade of the House Energy and Commerce Committee held...

? Special 301
From Wild WebMink

? Special 301

I’ve read the USTR‘s Special 301 report so you don’t have to. The worrying conclusions are over on ComputerWorldUK.

Forged Memory
From Schneier on Security

Forged Memory

A scary development in rootkits: Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...

Google Talks Location Strategy
From The Eponymous Pickle

Google Talks Location Strategy

In Fast Company, well  worth understanding:  Marissa Mayer Talks Location Strategy:  The longtime VP tells us how a simple call for a pizza delivery influences...

NLM:
From The Computing Community Consortium Blog

NLM:

The National Library of Medicine has announced a software development challenge, seeking innovative software applications that use the library’s vast and free biomedical...

NearBuy Systems
From The Eponymous Pickle

NearBuy Systems

Another example of location based interaction with retail and warehouse:" ... There are many business situations when you need to know

Stolen Camera Finder
From Schneier on Security

Stolen Camera Finder

Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.

Teaching Students To Create Their Own Business
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teaching Students To Create Their Own Business

One of the things that I tell students when I do career talks is that it has never been easier to start a software business than it is today. Many great companies...

Fuzzy Look up In Excel
From The Eponymous Pickle

Fuzzy Look up In Excel

Something I could have used a long time ago, an add-in that does fuzzy look up in Excel.  Thanks.

Mobile Business Intelligence from Tableau
From The Eponymous Pickle

Mobile Business Intelligence from Tableau

I continue to be impressed by Tableau's easy to use BI system, now providing mobile solutions, and touch interaction:" ... Tableau 6.1 provides many new and exciting...

Why is Tesco Struggling in the US?
From The Eponymous Pickle

Why is Tesco Struggling in the US?

From the BBC:  It is not quite so quick and easy as Tesco struggles in US.  Some details.

Choosing Conference Sessions
From Computer Science Teachers Association

Choosing Conference Sessions

The CS&IT Annual Conference is coming up and I am getting more excited all the time. As a computer science teacher, it's always been the best professional development...

Extreme Authentication
From Schneier on Security

Extreme Authentication

Exactly how did they confirm it was Bin Laden's body? Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account