acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The world in 2036
From Putting People First

The world in 2036

To mark the 25th edition of “The World in”, The Economist’s annual collection of predictions for the year ahead, the newspaper asked some people to peer 25 years...

Follow The Data
From The Noisy Channel

Follow The Data

Today is my last day at Google. I have enjoyed an incredible year there, during which I’ve had the privilege to work with some of the smartest engineers on the...

Crowdsourcing Genetic Research
From The Eponymous Pickle

Crowdsourcing Genetic Research

Another example of a game aimed at serious work:Canadian scientists have stumbled on a novel way to conduct genetic studies: Using a game to crowdsource the deciphering...

Talking Across the K-12/Post Secondary Boundaries
From Computer Science Teachers Association

Talking Across the K-12/Post Secondary Boundaries

This post is based on remarks I gave at the Town Hall session on K-12 CS-Ed at the Grace Hopper Celebration of Women in Computing, Atlanta, October 1-2, 2010. ...

Need Help in Increasing Readership
From The Eponymous Pickle

Need Help in Increasing Readership

I am seeking help in increasing the readership of the blog.  Currently it has a quite select but limited group of readers, largely consisting of former colleagues...

RFID for Cold Chain Monitoring
From The Eponymous Pickle

RFID for Cold Chain Monitoring

The 'cold chain' includes the history of the changes in temperatures as products move through the supply chain.  Indicating potential damage from temperatures that...

Close the Washington Monument
From Schneier on Security

Close the Washington Monument

Securing the Washington Monument from terrorism has turned out to be a surprisingly difficult job. The concrete fence around the building protects it from attacking...

From Computational Complexity

A BREAKTHROUGH result on density and 3-AP's

We use the following terminology: [n] means the set {1,...,n}. k-AP means an arithmetic progression of length k. A 3-free set is one with no 3-AP.s in it. We use...

Over-normalization is bad for you
From Daniel Lemire's Blog

Over-normalization is bad for you

I took a real beating with my previous post where I argued against excessive normalization on the grounds that it increases complexity and inflexibility, and thus...

How to Build Predictive Models
From The Eponymous Pickle

How to Build Predictive Models

A set of simple, concise guidelines on how to build predictive models.  Yes, these are largely obvious for those with experience in analytics,  but I like their...

Brian Snow Sows Cyber Fears
From Schneier on Security

Brian Snow Sows Cyber Fears

That's no less sensational than the Calgary Herald headline: "Total cyber-meltdown almost inevitable, expert tells Calgary audience." That's former NSA Technical...

links for 2010-12-02
From Wild WebMink

links for 2010-12-02

Who's driving this thing? Well worth reading this explanation, and especially the Oracle VP's response. It's hard to think of a better case study for why communities...

UX efforts in a context of retail and marketing
From Putting People First

UX efforts in a context of retail and marketing

Two new articles in UX Magazine: Crafting the UX of REI’s retail experience by Samantha Starmer Video interview (with text transcript) on the strategy, techniques...

Characteristics of a Good Programming Project
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Characteristics of a Good Programming Project

H

Report calls for radical redesign of cities to cope with population growth
From Putting People First

Report calls for radical redesign of cities to cope with population growth

The Megacities on the Move report says authorities must start planning their transport infrastructure now for a future when two thirds of the world’s population...

Creating informal learning environments
From Putting People First

Creating informal learning environments

In the field of exhibition design, the quality of User Experience makes the difference between success and failure. When designing exhibits for museums or science...

Fingerprinting Devices on the Web
From The Eponymous Pickle

Fingerprinting Devices on the Web

In the WSJ:  A race to build device fingerprinting methods on the Web: " ... Advertisers no longer want to just buy ads ... . They want to buy access to specific...

Lessons fron the Web 2.0 Summit
From The Eponymous Pickle

Lessons fron the Web 2.0 Summit

Paul Gillin has a nice blog blog post on learnings from the recent Web 2.0 summit.   Paul does a good job in summarizing useful concepts from meetings that we can't...

Junaio Browser
From The Eponymous Pickle

Junaio Browser

A press release providing much more information on the Junaio augmented reality browser.  Am exploring on the IPhone, so far this is a good UI update for theiron...

Risk Reduction Strategies on Social Networking Sites
From Schneier on Security

Risk Reduction Strategies on Social Networking Sites

By two teenagers: Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesn
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account