acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Wanted: Skein Hardware Help
From Schneier on Security

Wanted: Skein Hardware Help

As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...

Aesthetics of interaction
From Putting People First

Aesthetics of interaction

The latest issue of the International Journal of Design, eer-reviewed, open-access journal devoted to publishing research papers in all fields of design, is devoted...

A weird way of thinking has prevailed worldwide
From Putting People First

A weird way of thinking has prevailed worldwide

If a provocative new study is to be believed, the world lives in a situation where American undergraduates monopolize our knowledge of human nature, writes Anand...

Digital dinosaurs and public gardens
From Putting People First

Digital dinosaurs and public gardens

Two new articles in UX Magazine: Don’t become a digital dinosaur by Samantha Starmer UX professionals can

Technology aside, most people still decline to be located
From Putting People First

Technology aside, most people still decline to be located

Mostly the young are interested in letting others know their physical location. Others are reticent for safety reasons, or against providing too much information...

Neighborly borrowing, over the online fence
From Putting People First

Neighborly borrowing, over the online fence

The New York Times reports on how online start-ups are allowing people to rent out their belongings locally, for a small fee. “The Roomba was mine for only 24 hours...

K-Anonymity Privacy Models
From The Eponymous Pickle

K-Anonymity Privacy Models

In CACM: Privacy protection models for large databases. " ... The "K-anonymity" method of providing anonymity to large data sets has raised excitement in realms...

AisleBuyer on CNBC
From The Eponymous Pickle

AisleBuyer on CNBC

Andrew Paradise has sent along a link about his Aislebuyer venture in the news on CNBC. A great example of in-store shopper convenience and engagement via smartphones...

Hannaford's Site
From The Eponymous Pickle

Hannaford's Site

In Progressive Grocer: Hannaford grocer revamps their site to include a number of mobile friendly ideas. Another example of mobile to retail plays. Expect to see...

French ethnographic research on smartphone use
From Putting People First

French ethnographic research on smartphone use

Le Monde newspaper published (Google translation) today a summary of an ethnographic research project on smartphone use by young adult, presented yesterday at a...

From Computational Complexity

Intelligent questions about the alleged P NE NP proof

People have asked me how much the alleged proof of P NE NP was discussed at Barriers II. Actually, nobody discussed the proof; however, we did discuss the aftermath...

links for 2010-09-01
From Wild WebMink

links for 2010-09-01

The End of OpenSolaris Patrick Finch with an informed view of what happened in the past and informed conjecture about the present and future. (tags: OpenSolaris...

More Skein News
From Schneier on Security

More Skein News

Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...

Dublin, Ireland to host Interaction 12
From Putting People First

Dublin, Ireland to host Interaction 12

The City of Dublin and the Institute of Art, Design & Technology (IADT) will act as co-hosts for Interaction 12, the annual conference of the Interaction Design...

DreamSpark
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

DreamSpark

I

On
From Wild WebMink

On

Contributor agreements that aggregate the copyrights of open source code in favour of a single corporate sponsor are a sure sign of a community where one member...

Eavesdropping on Smart Homes with Distributed Wireless Sensors
From Schneier on Security

Eavesdropping on Smart Homes with Distributed Wireless Sensors

"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse: Abstract: In...

New Developments in the Exploring Computer Science Curriculum
From Computer Science Teachers Association

New Developments in the Exploring Computer Science Curriculum

Many of you are familiar with the Exploring Computer Science (ECS) curriculum, developed in partnership with CSTA as part of an NSF grant. Though initially developed...

Yield Management of Knowledge
From The Eponymous Pickle

Yield Management of Knowledge

Mark Montgomery of KYield posts about Realizing the Theory: Yield Management of Knowledge. He defines it as: " ... Yield Management of Knowledge: The process by...

Managing Social Media Presence
From The Eponymous Pickle

Managing Social Media Presence

A short article on how to manage time for social media presence. Mostly common sense, but also worth a look.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account