acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Interface Appeal in BI Tools
From The Eponymous Pickle

Interface Appeal in BI Tools

A good report, includes overview of a number of common BI packages. Requires registrationEase of Use and Interface Appeal in Business Intelligence Tools, by Cindi...

Acrobatic Thieves
From Schneier on Security

Acrobatic Thieves

Some movie-plot attacks actually happen: They never touched the floor

Fax App With Signatures
From The Eponymous Pickle

Fax App With Signatures

A Fax App for the IPhone that includes a digital signature mode. Faxes are one of the oldest digital transmission modes. Yet despite their age, there is still...

Janie Irwin - 2010 ACM-W Athena Lecturer
From ACM-W supporting, celebrating and advocating for Women in Computing

Janie Irwin - 2010 ACM-W Athena Lecturer

We celebrate Ada Lovelace Day today by honoring Janie Irwin, recent recipient of the ACM-W Athena Lecturer Award. I have known Janie for a while now, and she is...

Ada Lovelace Day: A Researcher I Admire
From The Female Perspective of Computer Science

Ada Lovelace Day: A Researcher I Admire

Today is Ada Lovelace Day, a day we write about technical women we admire. Last year, I wrote about how much I admired my fellow CU-WISE executives. This year...

? Public Statements
From Wild WebMink

? Public Statements

OpenSolaris Board results, Stallman on SaaS, ACTA text leaked and seaweed.

Dead on the No-Fly List
From Schneier on Security

Dead on the No-Fly List

Such "logic": If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity. Butanyone's...

From Computational Complexity

What I'm Doing Over Spring Break, Part I

It's spring break at Northwestern and as I write this Tuesday morning, I'm on a plane from San Francisco to Denver on my way to Columbus, Ohio. My kids have their...

Ada Lovelace Day 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Ada Lovelace Day 2010

It

Herb Sorensen Articles
From The Eponymous Pickle

Herb Sorensen Articles

An index of a number of articles by consumer behavior scientist Herb Sorensen. See also my review of his recent book and other technical pieces on shopper behavior...

Data Mining in Social Networks
From The Eponymous Pickle

Data Mining in Social Networks

In the World Flattener, from Sammy Haroon: ... ' ... Behram Mistree talks about his data mining and analytics experiment using Facebook while he was at MIT ......

USACM and CRA Express Concerns Over Cybersecurity Legislation
From U.S. Public Policy Committee of the ACM

USACM and CRA Express Concerns Over Cybersecurity Legislation

Lost within all the health care legislation coverage was the release of a new draft of S.773, the Cybersecurity Act of 2010. The new draft was released a week...

New Book: <i>Cryptography Engineering</i>
From Schneier on Security

New Book: Cryptography Engineering

I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...

Electronic Health Record Security Analysis
From Schneier on Security

Electronic Health Record Security Analysis

In British Columbia: When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...

The Deep Dark Web
From The Eponymous Pickle

The Deep Dark Web

Instructive, most people assume the search engines find everything:" ... Google sees only a fraction of the content that appears on the internet. Stuart Andrews...

Interaction Dynamics and Behavioral Economics
From The Eponymous Pickle

Interaction Dynamics and Behavioral Economics

I recently discovered Interaction Dynamics via their Twitter presence. See also their blog: ' ... Interaction Dynamics is a tool to increase online customer conversions...

? Fixes, needed and delivered
From Wild WebMink

? Fixes, needed and delivered

The EU ACTA Consultation: European Commission vs. European Parliament In the gentlest possible way considering the reactions of other commentators, Geist points...

Back Door in Battery Charger
From Schneier on Security

Back Door in Battery Charger

Amazing: The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...

Eleven gambits for influencing user behaviour
From Putting People First

Eleven gambits for influencing user behaviour

In his blog, Dan Lockton, a Ph.D. researcher at Brunel University (UK), describes eleven behavioural change patterns “drawn from games or modelled on more playful...

Rethinking Hello World
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Rethinking Hello World

Is it time to rethink and replace
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account