acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Mobile Intelligence
From The Eponymous Pickle

Mobile Intelligence

In the January/February issue of IEEE Intelligent Systems, a number of papers devoted to mobile information retrieval and contextual knowledge systems. Including...

links for 2010-02-17
From Wild WebMink

links for 2010-02-17

Music Journalism is the New Piracy yet another illustration why the proposed three-strikes laws are unbalanced and unjust. TheRights...

Botnets Attacking Each Other
From Schneier on Security

Botnets Attacking Each Other

A new Trojan Horse named Spy Eye has code that kills Zeus, a rival botnet.  

Where is the Computer Science at Education Technology Conferences?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Where is the Computer Science at Education Technology Conferences?

I

Creative Destruction and Gillette
From The Eponymous Pickle

Creative Destruction and Gillette

Walter Riker sends this interesting quote and link along. Profound thoughts. Read it all.Gillette, Razor Blades, and Creative Destructionby Jeff StibelGillette...

Online Communities Building Loyalty
From The Eponymous Pickle

Online Communities Building Loyalty

A general article on the topic, but concentrates too much on the current rather than the future possibilities, which are building rapidly. Worth a look.

From Computational Complexity

e to the pi vs pi to the e

(ANSWER to Trivia Questions from Last Post: The last president who became president NOT by being VP and having the prez die, but then did not run again, was Rutherford...

Detecting Cheating by Analyzing Erased Answers
From Schneier on Security

Detecting Cheating by Analyzing Erased Answers

I had no idea this was being done, but erased answers are now analyzed on standardized tests. Schools with a high number of wrong-to-right changes across multiple...

links for 2010-02-16
From Wild WebMink

links for 2010-02-16

Three-Strikes Can't Work In A World Of Compromised PCs Read this important discussion from the "IP" list, which explores the reasons...

Make Haste Slowly
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Make Haste Slowly

On Monday I posted a link to An idiots guide to really bad programming. It is an interesting list but as I read though it I realized that most of what is lists...

Agent-Based Consumer Market Modeling
From The Eponymous Pickle

Agent-Based Consumer Market Modeling

A number of my former colleagues at Procter & Gamble have co-authored a paper with some great people I met at Argonne National Labs. Abstract below. Fascinating...

FOCS/STOC : What's the Big Deal?
From My Biased Coin

FOCS/STOC : What's the Big Deal?

As mentioned recently, the FOCS submission site is now up, and STOC acceptances have come out. Related blog posts have arrived, including an amusing one by Dick...

Guest Demo: Eric Iverson
From The Noisy Channel

Guest Demo: Eric Iverson

I’m back from vacation, and still digging my way out of everything that’s piled up while I’ve been offline. While I catch up, I thought I’d share with you a demo...

Layar Takes a Big Step Forward
From The Eponymous Pickle

Layar Takes a Big Step Forward

The Layar augmented reality application (AR) has taken a big step forward. It is in talks with some top handset manufacturers, which has led to the speculationpress...

Multiple Mobile IPhone Gmail Accounts
From The Eponymous Pickle

Multiple Mobile IPhone Gmail Accounts

For those of you like me that have multiple Gmail accounts, mine based on multiple clients, there is a new IPhone App that lets you handle these from one place....

From Computational Complexity

Prediction on Presidents Day

Its PRESIDENT"S DAY so I have two predictions: One about the election of 2012 and one about P vs NP. ON P VS NP: I have one prediction about P vs NP. It isON...

Gillette Acquisition Being Realized
From The Eponymous Pickle

Gillette Acquisition Being Realized

An adage article on the acquisition of Gillette, five years later. I saw some of the exchange and I agree there was much hidden value there, and carefully curated...

Learning Biology and Habitats with Augmented Reality
From The Female Perspective of Computer Science

Learning Biology and Habitats with Augmented Reality

This is the second in a three-part series of design proposals for augmented reality learning applications. These are from a paper I wrote in my computers and cognition...

Interesting Links 15 February 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 15 February 2010

I

James Fallows on the Chinese Cyber Threat
From Schneier on Security

James Fallows on the Chinese Cyber Threat

Interesting. I wrote this about Chinese cyberattacks in 2008.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account