acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Changing Your Privacy Mind
From The Eponymous Pickle

Changing Your Privacy Mind

EchoEcho: A startup that lets you ask of anyone: Where are you? - The receiver can provide or deny the information. The approach is different because you can change...

RFID Location of Sponges, Instruments
From The Eponymous Pickle

RFID Location of Sponges, Instruments

In RFID Journal: The FDA has approved the use of passive RFID tags for the location of instruments and sponges. I recall this being brought up in sessions ten years...

Friday Squid Blogging: Jewel of the Sea
From Schneier on Security

Friday Squid Blogging: Jewel of the Sea

Pretty.

On Luring Shoppers to the Store
From The Eponymous Pickle

On Luring Shoppers to the Store

A good WSJ article on various uses of technology to get people to physical retail. This was an area we worked on extensively with a number of vendors.

Students Need Both Knowledge and Facts
From Computer Science Teachers Association

Students Need Both Knowledge and Facts

As the new school year starts, an old complaint resurfaces. A recent opinion piece has said once again that US higher education is failing US employers. Students...

Character Amnesia in Chinese
From The Eponymous Pickle

Character Amnesia in Chinese

Lots of thoughts out about how technology is altering aspects of literacy. This article from Language Log, about how text messaging is influencing Chinese characters...

Me at the EastWest Institute
From Schneier on Security

Me at the EastWest Institute

Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...

Seaswarm Spill Robotics
From The Eponymous Pickle

Seaswarm Spill Robotics

Report about an MIT project called Seaswarm. Autonomous robotics to address oil spills. Includes an interesting video. I do always wonder about the contextual complexity...

Computing Research in Astronomy
From The Computing Community Consortium Blog

Computing Research in Astronomy

Every 10 years, U.S. astronomers come together to generate what has become a highly influential report recommending which astronomy and astrophysics projects should...

Is the Whole Country an Airport Security Zone?
From Schneier on Security

Is the Whole Country an Airport Security Zone?

Full-body scanners in roving vans: American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...

Learn from Old Spice
From The Eponymous Pickle

Learn from Old Spice

This received considerable publicity. Is it for everyone? Likely not, but it does indicate what can work: What Marketers Can Learn From the Old Spice 'Your Man'...

links for 2010-08-27
From Wild WebMink

links for 2010-08-27

The long, sordid tale of Sun RPC, abbreviated somewhat, to protect the guily and the irresponsible. One of the long-running projects I had at Sun was to get the...

From Computational Complexity

Theory Journals

I got the following request from a reader. I have a question about TCS journals. As I am trying to follow your advice on being more diligent about journalizing...

From Wild WebMink

The debate over the demise of "Open Core" has led to a reprise of "which open source license is best" arguments again. But the real driving force is not the licence...

HCIR 2010: Bigger and Better than Ever!
From The Noisy Channel

HCIR 2010: Bigger and Better than Ever!

Last Sunday was HCIR 2010, the Fourth Annual Workshop on Human-Computer Interaction and Information Retrieval, held at Rutgers University in New Brunswick, collocated...

Regulating the Use of Social Media Data
From Apophenia

Regulating the Use of Social Media Data

If you were to walk into my office, I’d have a pretty descent sense of your gender, your age, your race, and other identity markers. My knowledge wouldn’t be perfect...

Millenials
From The Eponymous Pickle

Millenials

Paul Gillin deftly discusses Millenials Coming soon to a cubical near you. I see the same behavior in my millenial children.

Weak Link between Popularity and Influence
From The Eponymous Pickle

Weak Link between Popularity and Influence

HP Researchers find only weak link between popularity and influence. " ... It is worth emphasizing that HP's studies are designed to the highest scientific standards...

From Computational Complexity

Cryptography if P = NP

Bill is at Barriers II in Princeton and promises a full report upon his return. Ask many computer scientists what happens if P = NP and you'll get the response...

links for 2010-08-26
From Wild WebMink

links for 2010-08-26

Jabber Support at WordPress.com This is outstanding; I can now have WordPress ping me when someone comments on my blog (as well as subscribing to other blogs to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account