acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

"I Understood Your Talk"
From My Biased Coin

"I Understood Your Talk"

Often, after I give a talk, the feedback I hear back is "I understood your whole talk," or something near that.  I take it as a compliment (although I don't think...

Teaching to the Test
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teaching to the Test

OK let me be clear upfront that I am not a big fan of the current Advanced Placement Computer Science exam. And it

SIGIR 2010: Day 2 Technical Sessions
From The Noisy Channel

SIGIR 2010: Day 2 Technical Sessions

On the second day of the SIGIR 2010 conference, I did start shuttling between sessions to attend particular talks. In the morning session, I attended three talks...

Relationship Economy Expedition
From The Eponymous Pickle

Relationship Economy Expedition

Jerry Michalski talks about public and private side of the REXpedition: The relationship economy expedition. See the video. And at the REXpedition site.

Bubble Generation
From The Eponymous Pickle

Bubble Generation

By economist Umair Haque:The Bubble Generation "?EVOLUTIO?ARY ORGANIZATIONS CHANGE the WORLD. HERE'S HOW to BECOME ONE. create thick value. spark smart growth....

Getting the Best
From The Eponymous Pickle

Getting the Best

The Seriosity blog on getting the best out of your employees. More in this blog about Seriosity's work on games and engaging customers and employees. Including...

Five Billion Connections
From The Eponymous Pickle

Five Billion Connections

In the BBC: there are now over 5 billion phone connections worldwide. Staggering thought. The globe is a heavily interconnected network.

From Computational Complexity

CRA Snowbird Part I

I just returned home from my first trip to the CRA Snowbird Conference, the biennial meeting of CS chairs and other leaders in the CS community. I really enjoyed...

SIGIR 2010: Day 2 Keynote
From The Noisy Channel

SIGIR 2010: Day 2 Keynote

The second day of the SIGIR 2010 conference kicked off with a keynote by TREC pioneer Donna Harman entitled “Is the Cranfield Paradigm Outdated?”. If you are at...

links for 2010-07-22
From Wild WebMink

links for 2010-07-22

ForgeRock Releases OpenAM 9.5 Software Quite a milestone – this is our first independent release, sourced entirely from community members. It's good stuff too –...

More Research on the Effectiveness of Terrorist Profiling
From Schneier on Security

More Research on the Effectiveness of Terrorist Profiling

Interesting: The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...

? First Post!
From Wild WebMink

? First Post!

Today is a significant milestone for the new venture I’m helping, ForgeRock. We’ve announced availability of our first full independent release of OpenAM, the open...

Questions for Microsoft Research
From Putting People First

Questions for Microsoft Research

Indrani Medhi, associate researcher in the Technology For Emerging Markets Group at Microsoft Research India, was recently rated one of the

Packaged Goods Company Develops Game
From The Eponymous Pickle

Packaged Goods Company Develops Game

In Mediapost. I like the approach, will follow to see how it develops. ' ... Reckitt Benckiser has created a branded social-media game called poweRBrands, in which...

DARPA a year later
From The Computing Community Consortium Blog

DARPA a year later

Dr. Ken Gabriel, the deputy director of DARPA, delivered a plenary address at CRA

Over-Educated, Yet Under-Qualified?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Over-Educated, Yet Under-Qualified?

You

USACM Comments on National Strategy for Trusted Identities in Cyberspace
From U.S. Public Policy Committee of the ACM

USACM Comments on National Strategy for Trusted Identities in Cyberspace

In late June the White House issued a second Draft of the National Strategy for Trusted Identities in Cyberspace. They opened a public comment process only on...

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

From Computational Complexity

Do you want to review a book

I will be sending my next book review column for SIGACT NEWS off on July 28, 2010. It has LOTS of books on its BOOKS I WANT REVIEWED list. YOU get a chance to look...

Intel and the Social Scientists
From The Eponymous Pickle

Intel and the Social Scientists

An interesting post of how Intel is increasingly adopting a social science view. It is intriguing to think of how a company of engineers can move in this direction...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account