acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fake Amazon Receipt Generators
From Schneier on Security

Fake Amazon Receipt Generators

They can be used to scam Amazon Marketplace merchants: What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...

Mechanical Turk Challenged by Spam
From The Eponymous Pickle

Mechanical Turk Challenged by Spam

We used Amazon's Mechanical Turk to successfuly solve several human intelligence tasks in the enterprise.  Unfortunately it is now reported that a large percentage...

Retailers and In Store Smart Phones
From The Eponymous Pickle

Retailers and In Store Smart Phones

A very good article in the WSJ about the increasing use of smartphones in stores to compare prices and other information about products via search and barcode scanning...

Computer Science Teacher Education
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Teacher Education

Mark Guzdial makes a strong case that the Best hope for CS Teacher Education is in-service, not pre-service. Basically there is not enough demand for strong pre...

Blogging has Peaked Says Pew Report
From The Eponymous Pickle

Blogging has Peaked Says Pew Report

In ReadwriteWeb:  It importantly varies by demographic, but the Pew Internet Report appears to indicate that the frequency of Blogging appears to have peaked on...

NGram Visualization Tool
From The Eponymous Pickle

NGram Visualization Tool

New from Google Labs, the ability to plot the usage of words or phrases in Google's huge and growing scanned corpora of text.   Easy to use and simple to applyThe...

PCAST:  The Role of NIT R&D in National Priorities
From The Computing Community Consortium Blog

PCAST: The Role of NIT R&D in National Priorities

The

The Story of My Comps
From The Female Perspective of Computer Science

The Story of My Comps

I did my oral defence for my comprehensive exam this morning and wanted to share what I learned, since it might help others.  The details aren't important, butDolly...

CS Ed Week a Success!
From Computer Science Teachers Association

CS Ed Week a Success!

The 2nd annual Computer Science Education Week (CSEdWeek) wrapped up last week, and thanks to some incredible partner support and engagement from the computingwebsite...

Computer Science Education Week Extends Its Reach
From U.S. Public Policy Committee of the ACM

Computer Science Education Week Extends Its Reach

This is a repost from Blog@CACM, the blog connected to Communications of the ACM It was written by Debra Richardson, Chair of the 2010 Computer Science Education...

Does Analytics Need a Soul?
From The Eponymous Pickle

Does Analytics Need a Soul?

Article in SASCOM. " ...

From Computational Complexity

Low, Superlow, supersuperlow sets, and Paywalls

Recall the following: If A is a set then A' (pronounced 'A jump') is the halting set relative to A. Formally it is: { e | MeA(e) converges } A set A is ...

Geo-Fenced Advertising in Test
From The Eponymous Pickle

Geo-Fenced Advertising in Test

Intriguing direction that could provide better shopper behavior  and location understanding.   For example this could be used to understand when a shopper enters...

Humans vs Computers in Jeopardy
From The Eponymous Pickle

Humans vs Computers in Jeopardy

An interesting artificial intelligence challenge.  This has been planned for a few years now,  here is new information about an IBM computer challenging a human...

Procter Move to Social Media
From The Eponymous Pickle

Procter Move to Social Media

ReadwriteWeb posts about P&G's move from Soap Operas to Social Media.  This is a very thin article, but worth a scan.   Wish they had looked for and provided more...

Security in 2020
From Schneier on Security

Security in 2020

There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...

links for 2010-12-16
From Wild WebMink

links for 2010-12-16

An FBI backdoor in OpenBSD? If this is true, it punches a massive hole in the integrity of software that the whole hacker community relies upon. (tags: Security...

Microsoft bliink
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Microsoft bliink

I’ve talked about Bliink in the past. (See bliink) Over the last couple of years Microsoft has run this web development competition in schools across the county...

Book: User Experience Management
From Putting People First

Book: User Experience Management

User Experience Management: Essential Skills for Leading Effective UX Teams By Arnie Lund Morgan Kaufmann Publishers (Elsevier) May 2011 ISBN: 978-0-12-385496-4...

EU action plan to drive take up of online public services
From Putting People First

EU action plan to drive take up of online public services

The European Commission unveiled an ambitious agenda to bring public services online across Europe so that it could “serve an economy which relies on the networks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account