acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

On Linkedin
From The Eponymous Pickle

On Linkedin

I have had a presence on Linkedin from the very beginning of that service.  I have just edited my profile there . Review that to find out more about me and the...

Ad Impression Dead?
From The Eponymous Pickle

Ad Impression Dead?

In AdAge:The Lowly Ad 'Impression' Has Become Meaningless, So Lets Kill It ... Forcing the impression to be the catch-all metric to compare media ad performance...

Behind the Scenes With Watson
From The Eponymous Pickle

Behind the Scenes With Watson

From CNN:  A largely non-technical view of IBM's natural language computer Watson, to be competing on the Jeopardy quiz program next week.

The Sharer: New Blog on Search and Knowledge
From The Eponymous Pickle

The Sharer: New Blog on Search and Knowledge

A new blog by colleague Sundar Kadayam of Zakta. that I am following: " ... I am a technology entrepreneur. I have more than 23 years of experience in the software...

What Do You Want and How Can We Help?
From Computer Science Teachers Association

What Do You Want and How Can We Help?

Recently, I was forwarded an email from one of our CSTA members asking for some help finding curriculum resources for teaching computer science in the classroom...

? Procurement And Copyright Article Available
From Wild WebMink

? Procurement And Copyright Article Available

My article about how procurement policies need to address copyright ownership is now available from the Essays section.

Experientia at Milan service design conference
From Putting People First

Experientia at Milan service design conference

Experientia will present its expertise in service design next week, at a conference specially dedicated to raising the profile of service design as a discipline...

Hacking Scratch Lottery Tickets
From Schneier on Security

Hacking Scratch Lottery Tickets

Design failure means you can pick winning tickets before scratching the coatings off. Most interesting is that there's statistical evidence that this sort of attack...

18 Monkeys in a Room
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

18 Monkeys in a Room

“18 monkeys in a room” is how a friend of mine described the typical high school programming competition. You take a much of kids, usually in groups of three to...

Research on the importance of collaborative user innovation
From Putting People First

Research on the importance of collaborative user innovation

New research suggests the traditional division of labor between innovators and customers is breaking down as more individual consumers invent and improve products...

Computer Scientist Maja Mataric Receives Presidential Mentoring Award
From The Computing Community Consortium Blog

Computer Scientist Maja Mataric Receives Presidential Mentoring Award

Professor Maja J. Matari?, a computer scientist at USC’s Viterbi School of Engineering, has been awarded the the Presidential Award for Excellence in Science, Mathematics...

New Neuroscience Blog
From The Eponymous Pickle

New Neuroscience Blog

A new Law and Biosciences blog that often covers legal neuroscience topics. " ... The Law and Biosciences Daily Digest provides relevant summaries of legal opinions...

Forcing Internet Access
From The Eponymous Pickle

Forcing Internet Access

Relating to recent events. It was evident early on that internet access points, like any wireless connectivity, can be remotely provided to a population.  Examples...

Marketing Value Customer Experience
From The Eponymous Pickle

Marketing Value Customer Experience

From Forrester, interesting analysis about experience in particular (excerpt of full document) :The marketing value of customer experience  by Josh Bernoff Customer...

Business Intelligence Tools for the IPad
From The Eponymous Pickle

Business Intelligence Tools for the IPad

A quick survey in ReadWriteWeb.  I have now seen several examples of going mobile with BI  in the enterprise, and it is impressive what some standardization,  interactivity...

Introducing the Data Engine
From The Eponymous Pickle

Introducing the Data Engine

Building Interfaces for Data Engines by Matthew HurstThere is a new category of online experience - the data engine. These sites (which include timetric, Data Market...

Bomb-Sniffing Mice
From Schneier on Security

Bomb-Sniffing Mice

I was interviewed for this story on a mouse-powered explosives detector. Animal senses are better than any detection machine current technology can build, which...

The Beauty of Content and Structure
From The Female Perspective of Computer Science

The Beauty of Content and Structure

I recently created a website for our lab at school: Graphics, Imaging, and Games Lab (GIGL).  I found it strangely satisfying, even though I didn't write a single...

From Computational Complexity

STOC 2011 accepte papers posted.You heard it here...12th!

For those who did not read yesterdays comments or Lance's Tweet (the empty set?) the list of accepted STOC papers is here. 84 papers accepted. I personallygrow...

? Is Open Source Good For Security?
From Wild WebMink

? Is Open Source Good For Security?

I’ve two stories about the discovery and resolution of bugs in important software packages – Solaris and Java – that suggest a properly-functioning open source...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account