acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

? Avoiding Skype
From Wild WebMink

? Avoiding Skype

As you may recall from my links a few days ago, I actively avoid using Skype. I’ve explained why in more detail over on ComputerWorldUK today.

A Slice of the History of Executive Information Systems
From The Eponymous Pickle

A Slice of the History of Executive Information Systems

I have been doing some exploration of Executive Information Systems (EIS) and BI, which I was involved in for a number of years, and was sent this excerpt: - "Executive...

Brain Computer Implant
From The Eponymous Pickle

Brain Computer Implant

A novel in brain computer-neural  implant has now passed the 1000 day milestone: " ... A paralysed woman was still able to accurately control a computer cursor...

Authenticating the Authenticators
From Schneier on Security

Authenticating the Authenticators

This is an interesting read: It was a question that changed his life, and changed mine, and may have changed -- even saved -- all of ours by calling attention...

The Difference One Woman Can Make
From The Female Perspective of Computer Science

The Difference One Woman Can Make

I was at the Board of Advisers meeting for the Anita Borg Institute for Women and Technology (ABI) last week in Mountain View when it struck me just how much of...

Why Only Some Apps Succeed
From The Eponymous Pickle

Why Only Some Apps Succeed

A GigaOm look at why some Apps work and some do not, by Om Malik.  Fundamentally he suggests its all about either utility or happiness. 

The Psychology of Collaboration
From The Eponymous Pickle

The Psychology of Collaboration

As in most cases where groups of people are involved, it is not mostly about the technology.  We used Greif's work in the 80s about 'Computer  Supported Cooperative...

NSF Announces Round Two of Its
From The Computing Community Consortium Blog

NSF Announces Round Two of Its

Last Wednesday, the NSF announced the second round of an international grant competition designed to spur cutting-edge research in the humanities and social sciences...

Design!publiC: design for governance in India
From Putting People First

Design!publiC: design for governance in India

LiveMint.com, the Indian online partner publication of the Wall Street Journal, reports on India

Identifying Tor Users Through Insecure Applications
From Schneier on Security

Identifying Tor Users Through Insecure Applications

Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users": Abstract: Tor is a popular low-latency anonymity...

Trolls and Copyrights
From The Eponymous Pickle

Trolls and Copyrights

A judicial case addresses the right to re-post. But I don't think this is the last we will hear about fair-use in blogs.

The Politics of Queering Anything
From Apophenia

The Politics of Queering Anything

Sitting at an academic conference years ago, I was struck by the marginalization of various voices under the guise of inclusion. There were queer panels and race...

? The Tyranny Of The Urgent
From Wild WebMink

? The Tyranny Of The Urgent

I’m nearing the end of the amazingly busy patch that March has turned out to be for me, and I can tell I must be getting older because I am running out of energy...

Leadership Lessons from P&G
From The Eponymous Pickle

Leadership Lessons from P&G

From the Burghard Group: Leadership Lessons From P&G,   10  Lessons from Leaders: 1.Get to know people as individuals. Group activities are great for building teams...

Open Algorithm Contests Powering Predictive Analyses
From The Computing Community Consortium Blog

Open Algorithm Contests Powering Predictive Analyses

A number of news organizations

Putting Money Where it Counts: Teacher Salaries
From Computer Science Teachers Association

Putting Money Where it Counts: Teacher Salaries

President Obama wants to spend $90 million on ARPA-ED, an Advanced Research Projects Agency for Education. The goal is to fund porjects that will "transform teaching...

Google Books Settlement Remains Unsettled
From U.S. Public Policy Committee of the ACM

Google Books Settlement Remains Unsettled

The ongoing saga of the Google Books case will continue, according to a recent opinion from the judge overseeing the negotiated settlement. Google Books prompted...

Detecting Words and Phrases in Encrypted VoIP Calls
From Schneier on Security

Detecting Words and Phrases in Encrypted VoIP Calls

Interesting: Abstract: Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse...

Starbucks Mobile Payment Popular
From The Eponymous Pickle

Starbucks Mobile Payment Popular

Starbucks payment method using mobile phones and 2D bar code scanning is apparently quite successful. Now over three million people have used the capability.  There have...

Transmitting Data Through Steel
From Schneier on Security

Transmitting Data Through Steel

This is cool: Tristan Lawry, doctoral candidate in electrical and computer engineering, has developed equipment which can transmit data at high rates through thick...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account