acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Ada Lovelace Day: A Researcher I Admire
From The Female Perspective of Computer Science

Ada Lovelace Day: A Researcher I Admire

Today is Ada Lovelace Day, a day we write about technical women we admire. Last year, I wrote about how much I admired my fellow CU-WISE executives. This year...

? Public Statements
From Wild WebMink

? Public Statements

OpenSolaris Board results, Stallman on SaaS, ACTA text leaked and seaweed.

Dead on the No-Fly List
From Schneier on Security

Dead on the No-Fly List

Such "logic": If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity. Butanyone's...

From Computational Complexity

What I'm Doing Over Spring Break, Part I

It's spring break at Northwestern and as I write this Tuesday morning, I'm on a plane from San Francisco to Denver on my way to Columbus, Ohio. My kids have their...

Ada Lovelace Day 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Ada Lovelace Day 2010

It

Herb Sorensen Articles
From The Eponymous Pickle

Herb Sorensen Articles

An index of a number of articles by consumer behavior scientist Herb Sorensen. See also my review of his recent book and other technical pieces on shopper behavior...

Data Mining in Social Networks
From The Eponymous Pickle

Data Mining in Social Networks

In the World Flattener, from Sammy Haroon: ... ' ... Behram Mistree talks about his data mining and analytics experiment using Facebook while he was at MIT ......

USACM and CRA Express Concerns Over Cybersecurity Legislation
From U.S. Public Policy Committee of the ACM

USACM and CRA Express Concerns Over Cybersecurity Legislation

Lost within all the health care legislation coverage was the release of a new draft of S.773, the Cybersecurity Act of 2010. The new draft was released a week...

New Book: <i>Cryptography Engineering</i>
From Schneier on Security

New Book: Cryptography Engineering

I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...

Electronic Health Record Security Analysis
From Schneier on Security

Electronic Health Record Security Analysis

In British Columbia: When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...

The Deep Dark Web
From The Eponymous Pickle

The Deep Dark Web

Instructive, most people assume the search engines find everything:" ... Google sees only a fraction of the content that appears on the internet. Stuart Andrews...

Interaction Dynamics and Behavioral Economics
From The Eponymous Pickle

Interaction Dynamics and Behavioral Economics

I recently discovered Interaction Dynamics via their Twitter presence. See also their blog: ' ... Interaction Dynamics is a tool to increase online customer conversions...

? Fixes, needed and delivered
From Wild WebMink

? Fixes, needed and delivered

The EU ACTA Consultation: European Commission vs. European Parliament In the gentlest possible way considering the reactions of other commentators, Geist points...

Back Door in Battery Charger
From Schneier on Security

Back Door in Battery Charger

Amazing: The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...

Eleven gambits for influencing user behaviour
From Putting People First

Eleven gambits for influencing user behaviour

In his blog, Dan Lockton, a Ph.D. researcher at Brunel University (UK), describes eleven behavioural change patterns “drawn from games or modelled on more playful...

Rethinking Hello World
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Rethinking Hello World

Is it time to rethink and replace

3M Tracking and Inventory System
From The Eponymous Pickle

3M Tracking and Inventory System

In an interesting development: -- 3M Launches Asset and Inventory Tracking System ... The solution includes 13.56 MHz passive RFID tags, handheld and pad readers...

Connectile dysfunction
From Putting People First

Connectile dysfunction

Designers can play a pivotal role, writes Mark Baskinger, associate professor in the School of Design at Carnegie Mellon University, in empowering elders towards...

From Computational Complexity

Stoc Travel Support/WELCOME BACK LANCE!

(REMINDER AND UPDATE: If you are a a grad student you can apply for travel support for STOC 2010. See here for details. One update on that: since registration and...

PDF the Most Common Malware Vector
From Schneier on Security

PDF the Most Common Malware Vector

MS Word has been dethroned: Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account