acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Theorems that you simply don't believe

There are some theorems that are surprising. I've already blogged on that (I can't seem to find the link). However, there are some theorems that some people simply...

Wanted: Trust Detector
From Schneier on Security

Wanted: Trust Detector

It's good to dream: IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...

Elegant technologies for complex lives
From Putting People First

Elegant technologies for complex lives

The Socio-Digital Systems (SDS) group of Microsoft Research aims to use an understanding of human values to help to change the technological landscape in the 21st...

BBC on the future of the internet
From Putting People First

BBC on the future of the internet

Twenty years after the emergence of the world wide web, Rory Cellan-Jones of the BBC World Service’s Discovery series looks at the science driving its third decade...

IBM
From Putting People First

IBM

Among cell-phone users in developed countries, IBM is betting the market with the biggest growth potential is…people over the age of 65. Fast Company reports. IBM’s...

NRC Prize for Cyberdeterrence
From The Computing Community Consortium Blog

NRC Prize for Cyberdeterrence

At the request of the Office of the Director of National Intelligence, the National Research Council (NRC) is undertaking a project entitled

From The Computing Community Consortium Blog

A CACM “Viewpoints” column by Cameron Wilson (ACM) and Peter Harsha (CRA), inspired by the Transition Team white papers commissioned by the Computing Community...

Computing Architecture Workshop
From The Computing Community Consortium Blog

Computing Architecture Workshop

In the area of Computing Architectures there are some well known discontinuity-inducing trends staring us in the face. The entire computing community is planning...

Turning on a Paradigm
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Turning on a Paradigm

I

CG Direct Selling to the Consumer
From The Eponymous Pickle

CG Direct Selling to the Consumer

In StoreFrontBackTalk, a discussion of manufacturers direct selling to consumers online. This has been avoided for a long time in big CG to avoid antagonizing the...

Nose Biometrics
From Schneier on Security

Nose Biometrics

Really: Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance. The researchers say noses have been overlooked...

A Conflict Question
From My Biased Coin

A Conflict Question

I was recently asked the following question:Suppose you're the PC chair, and someone who has submitted a paper asks you NOT to have the paper reviewed by a specific...

Mindspace: Influencing behaviour through public policy
From Putting People First

Mindspace: Influencing behaviour through public policy

New insights from science and behaviour change could lead to significantly improved outcomes, and at a lower cost, than the way many conventional policy tools are...

From Computational Complexity

Turing Award and Waterman Award and the variety of our field

As Lance tweeted: The Turing Award for 2009 was given recently to Chuck Thacker LINK. See here. He developed the first modern PC. The Alan T. Waterman award...

Nokia designers on their work
From Putting People First

Nokia designers on their work

Izwan Ismail, a journalist at Malaysia’s New Strait Times newspaper, talked to Nokia

Bring Your Laptop to Work
From The Eponymous Pickle

Bring Your Laptop to Work

An idea discussed at Procter & Gamble for years, but always shied away from due to security and data ownership issues. Driven in part by complaints from new-hires...

Are we about to witness a digital service revolution?
From Putting People First

Are we about to witness a digital service revolution?

Introducing new digital services in cities promises the change the way citzens live in cities around the world. “Only a few years ago, digital services were about...

Staffing for Intelligence
From The Eponymous Pickle

Staffing for Intelligence

A good CW report on the general use of analytics in the enterprise. Its the use data, models and intelligence to find better solutions. It is a domain that I...

Paper Reviews In Class
From The Female Perspective of Computer Science

Paper Reviews In Class

Our Open Source Engineering class is a little different from most here at Carleton's School of Computer Science. The professor wants to give students an opportunity...

The Limits of Identity Cards
From Schneier on Security

The Limits of Identity Cards

Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account