acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

OpenIDM Design Summit Announced
From Wild WebMink

OpenIDM Design Summit Announced

One of the key control points in enterprise software is the provisioning or IDM software. It’s the point all the threads of directory, authentication, authorisation...

Happy New Year! Now What About the Summer?
From Computer Science Teachers Association

Happy New Year! Now What About the Summer?

Now is the time for students (and teachers) to start thinking about their summer. I know the new year just began, but it's never to early to plan. For the last...

Smartphone as a Dangerous Possession
From The Eponymous Pickle

Smartphone as a Dangerous Possession

In CNN Money, Your Smartphone as your most dangerous posssesson.  Overplayed, yes, but each of the cautions about the security of your data and devices is worth...

Looking at Business Intelligence
From The Eponymous Pickle

Looking at Business Intelligence

I continue to enjoy Doug Lautzenheiser's blog:  Business Intelligence Software, where he provides his insightful  " ... personal opinions on the Business Intelligence...

Effectiveness of Distributed Teams
From The Eponymous Pickle

Effectiveness of Distributed Teams

This is something we wrestled with a number of times.  Experience did seem to show that a team should be co located to achieve the best effectiveness.  Though the...

Literary Allusion and Google
From The Eponymous Pickle

Literary Allusion and Google

In Roughtype, a good piece on literary allusion and the effect of things like Google Search on communicating.  We live in a world where fewer and fewer of the classics...

Cellular Automata
From The Eponymous Pickle

Cellular Automata

New book on a favorite topic, Cellular Automata, by Thomas M. Li    The paradigm was used in the enterprise.   Too expensive to assure that I will acquire this,...

links for 2011-01-15
From Wild WebMink

links for 2011-01-15

"Word

Private Data Analysis
From The Eponymous Pickle

Private Data Analysis

In the CACM: A Firm Foundation for Private Data Analysis.  What does it mean to preserve privacy? There is lots to do here.

Friday Squid Blogging: Deep-Sea Squid Video
From Schneier on Security

Friday Squid Blogging: Deep-Sea Squid Video

"Anthology of Deep-Sea Squids," from the Monterey Bay Aquarium.

Sneaking Computer Science Into Physics
From The Female Perspective of Computer Science

Sneaking Computer Science Into Physics

I have been trying to convince local participants in the Let's Talk Science program that I can connect almost any of their course material to computer science. ...

Sell to Your Customer's Buying Process
From The Eponymous Pickle

Sell to Your Customer's Buying Process

  Another book added to the stack: Slow Down, Sell Faster!: Understand Your Customer's Buying Process and Maximize Your Sales, by Kevin Davis.  We always tried...

Me on Airport Security
From Schneier on Security

Me on Airport Security

Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...

Loaded Gun Slips Past TSA
From Schneier on Security

Loaded Gun Slips Past TSA

I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...

Why of Buy, How of Buy
From The Eponymous Pickle

Why of Buy, How of Buy

IMedia Connections interviews Donna Sturgess of Buyology Inc. about what her company does to understand the non conscious interactions of consumer to media and...

What's Our "Brand"?  Do We Need a New Promotional Plan?
From Computer Science Teachers Association

What's Our "Brand"? Do We Need a New Promotional Plan?

Almost every day I receive electronic newsletters with articles discussing STEM and robotics competitions, but I rarely see a mention of Computer Science. So,ACTE...

Surviving a Terrorist's Nuclear Attack
From Schneier on Security

Surviving a Terrorist's Nuclear Attack

Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb. A terrorist bomb is likely to be relatively small -- possibly only a fraction...

? Indemnity
From Wild WebMink

? Indemnity

A Walled Wide Web for Nervous Autocrats I have been making the core point that this good WSJ article makes in my discussions with governments all over the world...

From Putting People First

Sherry Turkle, has been an ethnographer of our technological world for three decades, hosted all the while at one of its epicenters: MIT. A professor of the social...

Global Economy in 2011
From The Eponymous Pickle

Global Economy in 2011

A good piece in Knowledge at Wharton about key aspects and directions of  of the global economy in countries  such as India and China.  Particularly useful for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account