acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

USACM Comments on National Strategy for Trusted Identities in Cyberspace
From U.S. Public Policy Committee of the ACM

USACM Comments on National Strategy for Trusted Identities in Cyberspace

In late June the White House issued a second Draft of the National Strategy for Trusted Identities in Cyberspace. They opened a public comment process only on...

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

From Computational Complexity

Do you want to review a book

I will be sending my next book review column for SIGACT NEWS off on July 28, 2010. It has LOTS of books on its BOOKS I WANT REVIEWED list. YOU get a chance to look...

Intel and the Social Scientists
From The Eponymous Pickle

Intel and the Social Scientists

An interesting post of how Intel is increasingly adopting a social science view. It is intriguing to think of how a company of engineers can move in this direction...

The web means the end of forgetting
From Putting People First

The web means the end of forgetting

Legal scholars, technologists and cyberthinkers are wrestling with the first great existential crisis of the digital age: the impossibility of erasing your posted...

The unintended consequences of Facebook
From Putting People First

The unintended consequences of Facebook

Facebook is about to celebrate its 500-millionth user, but the social media application has had wide consequences, even for those who have never signed on, writes...

Coercing people into a brave new digital world
From Putting People First

Coercing people into a brave new digital world

Design consultant Martyn Perks thinks that a UK government-backed campaign to get the entire UK adult population online “threatens to make cyber slaves of us all...

links for 2010-07-21
From Wild WebMink

links for 2010-07-21

Phase relationships in the standardization process James Gosling wrote in 1990: "standards are increasingly being viewed as competitive weapons rather than as technological...

EU Counterterrorism Strategy
From Schneier on Security

EU Counterterrorism Strategy

Interesting journal article evaluating the EU's counterterrorism efforts.

MySpace and Facebook: How Racist Language Frames Social Media (and Why You Should Care)
From Apophenia

MySpace and Facebook: How Racist Language Frames Social Media (and Why You Should Care)

(This post was written for Blogher and originally posted there.) Every time I dare to talk about race or class and MySpace & Facebook in the same breath, a public...

Happy birthday Experientia
From Putting People First

Happy birthday Experientia


SIGIR 2010: Day 1 Posters
From The Noisy Channel

SIGIR 2010: Day 1 Posters

The first day of SIGIR 2010 ended with a monster poster session–over 100 posters to see in 2 hours in a hall without air conditioning! I managed to see a handful...

SIGIR 2010: Day 1 Technical Sessions
From The Noisy Channel

SIGIR 2010: Day 1 Technical Sessions

I’ve always felt that parallel conference sessions are designed to optimize for anticipated regret, and SIGIR 2010 is no exception. I decided that I’d try to attend...

SIGIR 2010: Day 1 Keynote
From The Noisy Channel

SIGIR 2010: Day 1 Keynote

As promised, here are some highlights of the SIGIR 2010 conference thus far. Also check out the tweet stream with hash tag #sigir2010. I arrived here on Monday,...

Wegmans Introduces Employee Blog
From The Eponymous Pickle

Wegmans Introduces Employee Blog

Always innovative retailer Wegmans has set up a blog contributed by employees. Worth a look.

Skin Whitening, Tanning, and Vaseline
From Apophenia

Skin Whitening, Tanning, and Vaseline

Growing up as a white girl in Pennsylvania, I was taught that being tan was beautiful. My wealthier classmates would go on vacations to Florida in the winter,...

Economic Considerations of Website Password Policies
From Schneier on Security

Economic Considerations of Website Password Policies

Two interesting research papers on website password policies. "Where Do Security Policies Come From?": Abstract: We examine the password policies of 75 different...

Google Image Search Improves
From The Eponymous Pickle

Google Image Search Improves

In GigaOM: Image search in Google has improved their user interface to allow you to see many more images per search. They have a reported ten billion images accessible...

The Ideas Project
From The Eponymous Pickle

The Ideas Project

Sponsored by Nokia, The ideas Project is a selection of video presentation by mostly well-known pundits in the area of communications and information tech. If they...

What's This Educational Games Stuff All About, Anyway?
From The Female Perspective of Computer Science

What's This Educational Games Stuff All About, Anyway?

As you may know, my research focus for my PhD is educational games and augmented reality. But what is this educational games stuff all about, anyway? Do video games...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account