acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Unilever Ice Cream Smile Machine
From The Eponymous Pickle

Unilever Ice Cream Smile Machine

In StoreFrontBackTalk: " ... Even for an ice cream story, you can

Frontiers of Collaboration
From The Eponymous Pickle

Frontiers of Collaboration

Detailed piece that is interesting, but a tough thing to predict:In Knowledge@Wharton: Frontier of Collaboration:The Evolution of Social Networking Social networking...

Negative Social Stereotypes and Deep Learning
From The Female Perspective of Computer Science

Negative Social Stereotypes and Deep Learning

The next chapter to cover in my series of reflections on Ken Bain's What the Best College Teachers Do (started here and here) is on what teachers expect of their...

The Threat of Cyberwar Has Been Grossly Exaggerated
From Schneier on Security

The Threat of Cyberwar Has Been Grossly Exaggerated

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

Habitar
From Putting People First

Habitar

Today I received the catalogue of the Habitar exhibition, organised by LABoral Art and Industrial Creation Centre, an exhibition centre for art, science, technology...

"Don't Commit Crime"
From Schneier on Security

"Don't Commit Crime"

This sign is from a gas station in the U.K. My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...

From Computational Complexity

Drowning in Data

At a CCC Council meeting last week, a common theme emerged. The Army is "swimming with sensors and drowning in data". Biologists are considering trashing some of...

? Join Me At Open World Forum
From Wild WebMink

? Join Me At Open World Forum

The conference landscape evolves constantly. Old events pass away, new ones arrive and it’s good to get pointers to know what’s worthwhile. I can recommend this...

Lego Robotics
From The Eponymous Pickle

Lego Robotics

Learing the scientific method through Lego Robotics. Making the point that simple rules can lead to complex behavior. Now when shown complex behavior can we determine...

links for 2010-07-07
From Wild WebMink

links for 2010-07-07

We

Gas vs Stamps vs CPI
From The Eponymous Pickle

Gas vs Stamps vs CPI

MJ Perry does a good job of comparing the US price of postage stamps, vs Gasoline, versus the Consumer Price Index. Very telling about the increasing lack of efficiency...

Beyond Social Currency
From The Noisy Channel

Beyond Social Currency

A research study I like enough to have blogged about it a few times is Princeton sociologist

Layers for Foursquare
From The Eponymous Pickle

Layers for Foursquare

FourSquare has introduced a layer concept that will allow you to view physical map spaces through a number of outside sources of information. More examples at...

Data Shaping Store Shelves
From The Eponymous Pickle

Data Shaping Store Shelves

Good overview article in a local paper about how companies are using advanced technologies to understand the shopping progress. With frequent mention of P&G. Yes...

At the Interface between Computer Science and Economics
From The Computing Community Consortium Blog

At the Interface between Computer Science and Economics

NSF/CISE has just announced a new program at the Interface between Computer Science and Economics & Social Science (ICES): Computational thinking has the potential...

CS Going Mobile?
From Computer Science Teachers Association

CS Going Mobile?

I recently ran across some statistics from the U.S. Census Bureau that I found interesting. By 2008, the number of text messages sent on cell phones (357 per...

Writing for IPhone and Android
From The Eponymous Pickle

Writing for IPhone and Android

Good introductory CWorld piece on writing Apps for multiple mobile smartphone platforms. I have talked to friends who have done both and there is lots of support...

links for 2010-07-06
From Wild WebMink

links for 2010-07-06

Woot calls out Associated Press for plagiarism Lovely Woot piece today, pointing out that if Woot quoted AP the way AP quoted Woot, they would demand payment. AP's...

The Five Most Important Algorithms?
From Daniel Lemire's Blog

The Five Most Important Algorithms?

Bernhard Koutschan posted a compilation of the most important algorithms. The goal is to determine the 5 most important algorithms. Out of his list, I would select...

Research Report on Cyberattack Capabilities
From Schneier on Security

Research Report on Cyberattack Capabilities

From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account