acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

WikiLeaks
From Schneier on Security

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker. Assange is an international trafficker, of sorts. He and his colleagues collect...

Openness Audit
From The Eponymous Pickle

Openness Audit

Heard Charlene Li talk today introducing concepts in her new book: Open Leadership: How Social Technology Can Change the Way You Lead. Some excellent points. In...

Stories Sell
From The Eponymous Pickle

Stories Sell

In Roger Dooley's Neuromarketing blog: Why Stories Sell. With some links to previous posts on the subject. Certainly they do sell, and are much more memorable than...

From Computational Complexity

Talking about your work with a layperson

How to best describe what we do to the layperson? It depends on what you mean by layperson. I was in Austin Texas visiting my nephew Jason. I was also giving...

Scented Spaces
From The Eponymous Pickle

Scented Spaces

Discovered! An excellent site and scented spaces blog by Tracy Pepe on scent design. I am following, check it out. See also her recent post on CPG scent branding...

Social Media Terms
From The Eponymous Pickle

Social Media Terms

A useful glossary of social media terms. Terms in play are always changing, worth knowing.

links for 2010-06-24
From Wild WebMink

links for 2010-06-24

Marten Mickos says open source doesn't have to be fully open This was the received wisdom among the senior VPs at Sun just before the fall of the company. While...

Getting Close to ISTE Time
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Getting Close to ISTE Time

I am starting to put stuff together to take with me to ISTE this weekend. I get in Sunday sometime and already have a dinner meeting set up. And some stuff do to...

Content strategy and the future of the online experience
From Putting People First

Content strategy and the future of the online experience

Two new articles in UX Magazine: Fusing content strategy with design by David Gillis Context maps and content flow diagrams are just two possible ways to integrate...

Auction Followup
From The Eponymous Pickle

Auction Followup

In recent posts I have been exploring auction technologies, mobile and otherwise. Part of the exploration I did was to attend a local auction at Cowan's Auctions...

eBay buys RedLaser
From The Eponymous Pickle

eBay buys RedLaser

Barcode reading has been on my mind lately, see recent posts. And just as that occurs eBay buys RedLaser, with more than just code-reading on their mind. RedLaser...

Sexting: Youth Practices and Legal Implications
From Apophenia

Sexting: Youth Practices and Legal Implications

Dena Sacco and her team have put together a fantastic document that maps out the legal and socio-legal issues surrounding sexting: Sexting: Youth Practices and...

Tremor CEO Interview
From The Eponymous Pickle

Tremor CEO Interview

A CGT interview with Steve Knox, CEO of P&G's Tremor. " ... Have you ever wondered why consumers talk? Thought-leader Steve Knox shares tricks for building consumer...

Popsicle Makers a Security Threat
From Schneier on Security

Popsicle Makers a Security Threat

Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival: No...

A Checklist Manifesto
From The Eponymous Pickle

A Checklist Manifesto

Interesting piece on the power of the checklist and our aversion to it: " Checking Everything Off -- Except the Resistance to Changefrom Knowledge@WhartonErrors...

The huge challenge of Nokia
From Putting People First

The huge challenge of Nokia


? Why Do Open Source Advocates Attack Each Other?
From Wild WebMink

? Why Do Open Source Advocates Attack Each Other?

Maybe it’s a trend, or maybe I just noticed because I was looking, but following my article last week about the strange parallels between Life of Brian and the...

From Computational Complexity

The Future of STOC

I set up a new blog, Future of STOC to discuss role of our main conference and how to achieve it. At STOC this year we had a relatively large attendance of 350...

How Much Counterterrorism Can We Afford?
From Schneier on Security

How Much Counterterrorism Can We Afford?

In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote: "High-tech, low-tech, we can't...

Why we desire, display and design
From Putting People First

Why we desire, display and design

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account