acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

? Bite-Size Privacy and Anonymity
From Wild WebMink

? Bite-Size Privacy and Anonymity

A discussion broke out on Identi.ca recently where it became clear that the distinction between anonymity and privacy is not clear for some people. It led to the...

Recording the Police
From Schneier on Security

Recording the Police

I've written a lot on the "War on Photography," where normal people are harassed as potential terrorists for taking pictures of things in public. This article...

Pushing Game Narratives Beyond Linearity
From The Female Perspective of Computer Science

Pushing Game Narratives Beyond Linearity

I remember a student telling me the other week that she thought writing stories for games was easy, and wondered if there were jobs doing that.  I had been giving...

IBM Touts Predictive Analytics
From The Eponymous Pickle

IBM Touts Predictive Analytics

Having worked in this area for years, I have to agree.  The emergence of search has sometimes inappropriately substituted fast and easy for 'right'.   Good article...

Book Review: <i>Cyber War</i>
From Schneier on Security

Book Review: Cyber War

Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010. Cyber War is a fast and enjoyable...

A rich trove of articles in UX Magazine
From Putting People First

A rich trove of articles in UX Magazine

A rich trove of articles in UX Magazine: The importance of designing an experience culture By Cynthia Thomas / December 20th 2010 The outward focus on developing...

How not to teach programming
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How not to teach programming

Through the wonders of DZone I came across a blog post called Don't teach like you code. The target audience seems to be professional coders who are teaching beginners...

Facebook vs Twitter Infographic
From The Eponymous Pickle

Facebook vs Twitter Infographic

Colleague Stan Dyck sends along an infographic from digital surgeons of statistics about Facebbok versus Twitter in 2010.  Nicely done.  It catches your attention...

Nestle's Lok towards Health
From The Eponymous Pickle

Nestle's Lok towards Health

Nestle looks at deeper, health related aspects of food science.  Good detailed article in the WSJ.

On the Failure of Social Media
From The Eponymous Pickle

On the Failure of Social Media

GigaOm on the failure of social media campaigns.  I agree that it is far to early to predict when these campaigns will succeed or fail. Some good directional thoughts...

Sharing Your Car
From The Eponymous Pickle

Sharing Your Car

In another innovative personal transportation market, reported in Wired, you can share your car for cash. : " ... RelayRides lets car owners set their own rates...

Computational Forensics
From Schneier on Security

Computational Forensics

Interesting article from IEEE Spectrum: During two years of deliberation by the National Academy's forensic science committee (of which I was a member), a troubling...

Learn C# Programing in a Social Gaming Environment
From Computer Science Teachers Association

Learn C# Programing in a Social Gaming Environment

Check out Pex for Fun (http://bit.ly/PexLearn) for a challenging and engaging way for students to practice their programming skills. Pex for Fun enables programming...

From Computational Complexity

BREAKTHROUGH in algorithms: Improved algorithm for Metric TSP!!!!!!!!

BREAKTHROUGH in Algorithms: Improved Algorithm for Metric TSP, (Guest Blog by Mohammad Hajiaghayi) We all recently heard about the breakthrough complexity...

An App for an Airport
From The Eponymous Pickle

An App for an Airport

I reported previsously on developing specialized Apps for conferences.  Here is another example of something similar: A specialized App for an airport, here San...

For Your In-memory Databases, Do You Really Need an Index?
From Daniel Lemire's Blog

For Your In-memory Databases, Do You Really Need an Index?

For large data sets on disk, indexes are often essential. However, if your data fits in RAM, indexes are often unnecessary. They may even be harmful. Consider a...

Computational Photography
From The Computing Community Consortium Blog

Computational Photography

A few interesting news stories in the past week: What is “Watson”? Word came on Tuesday that “Watson,” an IBM supercomputer system, will take on Ken Jennings and...

links for 2010-12-20
From Wild WebMink

links for 2010-12-20

The Document Foundation joins Open Invention Network Smart move here – by joining now, they gain access to all those patents belonging to Novell that will leave...

"Architecture of Fear"
From Schneier on Security

"Architecture of Fear"

I like the phrase: N

Vodafone foresight on the world in 2020
From Putting People First

Vodafone foresight on the world in 2020

Vodafone has launched its new futureagenda website that presents the results of a 12 month insight and foresight programme on the world in 2020. The project, which...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account