acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Google CPG Blog
From The Eponymous Pickle

Google CPG Blog

I was reminded that Google has a Consumer Package Goods vertical blog that I had not visited in some time, check it out.

Electronic Car Lock Denial-of-Service Attack
From Schneier on Security

Electronic Car Lock Denial-of-Service Attack

Clever: Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles...

President Obama Recognizes Science Superstars
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

President Obama Recognizes Science Superstars

Earlier this week President Obama hosted the winners of a number of major STEM (Science, Technology, Engineering and Math) competitions. Two of the students who...

Senses and Sales
From The Eponymous Pickle

Senses and Sales

Roger Dooley writes about the use of more senses to promote sales.  Along the way mentioning and quoting Dan Hill's new book:  About Face: The Secrets of Emotionally...

From Computational Complexity

Will there be a 50th CCC? Will you be there?

At the 25th CCC Juris Hartmanis gave a great talk to celebrate having a 25th. Will there be a 50th? I asked people at the conference. What did they say? Watch the...

The future is already here
From Daniel Lemire's Blog

The future is already here

It is not 9am yet. Nevertheless, I got a lot done: I attended the thesis proposal of my student Eduardo via Skype. I was literally in my basement with a fresh cup...

links for 2010-10-21
From Wild WebMink

links for 2010-10-21

Every email and website to be stored "Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial...

Adding Human Intelligence to Software
From The Eponymous Pickle

Adding Human Intelligence to Software

From CACM:    Whats interesting here is the connection to Amazon's Mechanical Turk, which we used to experiment with human intelligence tasks.  There are some things...

Girl Scouts Fight Photoshopping
From The Eponymous Pickle

Girl Scouts Fight Photoshopping

This is interesting, reminding me of the Dove ads of a few years ago.  What are the implications of 'healthy media' ?  Or is an act like this just censorship?

Primer for Using YouTube
From The Eponymous Pickle

Primer for Using YouTube

An Adage primer for using YouTube as a marketing tool.  I admit I am mostly a consumer of YouTube, and have just noticed some colleagues and companies starting...

Identifying People By Their Phones
From The Eponymous Pickle

Identifying People By Their Phones

More about using biometric behavior with devices like phones for identification." ... Tabletop touch screens such as Microsoft's Surface are designed for sharing...

Workshop on the Economics of Information Security
From Schneier on Security

Workshop on the Economics of Information Security

I am the program chair for WEIS 2011, which is to be held next June in Washington, DC. Submissions are due at the end of February. Please forward and repost the...

Store Simulation
From The Eponymous Pickle

Store Simulation

I just took a renewed look at the general problem of simulating  retail store operations.  We worked  with a UK vendor called Space Syntax on this at one time.  ...

License Compliance: Not An Open Source Problem
From Wild WebMink

License Compliance: Not An Open Source Problem

The New York Times featured the activities of the GPL enforcement community recently. While there’s a part of me that’s pleased there are people doing this, I’m...

Video Traffic to Explode
From The Eponymous Pickle

Video Traffic to Explode

Stan Dyck sends this along:  " ...By 2014 90% of all Internet traffic will be video. Every device will lead with video. Phone. Tv. PC. #cisco ceo chambers at #Nvtc...

Predator Software Pirated?
From Schneier on Security

Predator Software Pirated?

This isn't good: Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL...

? Gaming The System
From Wild WebMink

? Gaming The System

When a company asks for your copyright “When a company says which of these conditions it will accept, that will show you how far it plans to depart from the principles...

Guest Post over at Computational Complexity Blog
From My Biased Coin

Guest Post over at Computational Complexity Blog

For those still receiving this feed, I have a guest post briefly describing some aspects of life as Area Dean over at the Computational Complexity blog. 

From Computational Complexity

A Note from the Trenches (Guest Post from Michael Mitzenmacher)

Former blogger Michael Mitzenmacher talks about being chair and not blogging. In a day for guest posts, over at Geomblog, David Johnson wants to know practical ...

Finding a Place For Computer Science Education
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Finding a Place For Computer Science Education

While I spend a lot of time, some of it laying awake at night, thinking about the state of pre-collegiate computer science education it seems like many more people...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account