acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Giant Eagle Uses Behavioral Clusters
From The Eponymous Pickle

Giant Eagle Uses Behavioral Clusters

Not unusual, but a good direction for Giant Eagle:Giant Eagle will implement "behavioral cluster planning"Giant Eagle will begin using an automated computer system...

Whitelisting vs. Blacklisting
From Schneier on Security

Whitelisting vs. Blacklisting

The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model...

? O Artigo
From Wild WebMink

? O Artigo

O artigo “Direitos Humanos est

Superbowl Ad Research Competition
From The Eponymous Pickle

Superbowl Ad Research Competition

Sands Research reports on their annual comparison of Superbowl ads using neuromarketing techniques. An entertaining and instructive experiment of emerging marketing...

Here we go loopty loop
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Here we go loopty loop

I

Powerpointless Workshops
From The Female Perspective of Computer Science

Powerpointless Workshops

Today I put on a workshop for my fellow TA Mentors on Powerpointless Workshops.  While I don't think that using slides is totally evil, it's definitely the case...

Innovating in the French wine industry
From Putting People First

Innovating in the French wine industry

How does an entrepreneur successfully introduce innovation to a gastronomic tradition that is a cornerstone of French culture and identity? St

why I
From Apophenia

why I

Y’know how when you’re really really tired and your eyes refuse to focus unless you force them to? And if you force them to, you’re inviting a searing headache...

Security Theater, Illustrated
From Schneier on Security

Security Theater, Illustrated

Security theater, illustrated.

EmPower Research
From The Eponymous Pickle

EmPower Research

Newly discovered: EmPower Research.  " ... EmPower Research provides Custom Market and Media Intelligence services to Global 2000 companies, and Advertising and...

IT's Change of Focus to the Front End
From The Eponymous Pickle

IT's Change of Focus to the Front End

Interesting thoughts about a change in IT direction.  Mobile, Front-End, Sensor based, making just-in-time and place practical sense and value of lots of data (analytics)...

British Library App
From The Eponymous Pickle

British Library App

An interesting British Library App.  Capabilities continue to move to mobile. Even things you might expect to be there.

From Computational Complexity

The Ideal Conference

I found the perfect CS conference. A meeting where computer scientists from all its subdisciplines come together. Not with the purpose of presenting their current...

links for 2011-01-27
From Wild WebMink

links for 2011-01-27

Bookdarts bookmarks – 50 count tin – bronze: Amazon.co.uk: Office Products I have loved these paper-thin metal page markers ever since I first discovered them in...

U.S. Strategy to Prevent Leaks is Leaked
From Schneier on Security

U.S. Strategy to Prevent Leaks is Leaked

As the article says, it doesn't get any more ironic than that. More importantly, it demonstrates how hard it is to keep secrets in the age of the Internet. ...

The near future of the user interface
From Putting People First

The near future of the user interface

Two articles and one prototype provide diverging viewpoints on the near future of the user interface: Microsoft plans a natural interface future full of gestures...

E-Mail Use Changes
From The Eponymous Pickle

E-Mail Use Changes

In Computerworld: E-mail use advances on mobile devices, declines on laptops. Fundamental change.

Wallet Apps
From The Eponymous Pickle

Wallet Apps

In Technology Review:  Apps that could change your smartphone into a wallet. Overview of the state of the technology.

Security Theater in the Theater
From Schneier on Security

Security Theater in the Theater

This is a bit surreal: Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature...

Wolfram on Jeopardy
From The Eponymous Pickle

Wolfram on Jeopardy

Fascinating piece in Stephen Wolfram's blog on the IBM assault on the Jeopardy game.  Includes some intriguing comparisons about how other online knowledge search...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account