acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sundown
From Wild WebMink

Sundown

After nearly 10 years, I've now left Sun. Thanks to everyone for following my blog for all these years. Please follow my new blog, Wild Webmink, where I have posted...

Marketing Computer Science Courses
From Computer Science Teachers Association

Marketing Computer Science Courses

I joked as I left work on Friday that it was "my day of shame". I am responsible for recruiting students for a government-funded course that offers MCSE (Microsoft...

Eating a Flash Drive
From Schneier on Security

Eating a Flash Drive

How not to destroy evidence: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...

Language, Mathematics and Programming
From Daniel Lemire's Blog

Language, Mathematics and Programming

Even if you have extensive training in Mathematics, the average Mathematics paper is undistinguishable from the ramblings of a madman. Many of these papers seek...

From Computational Complexity

A HW policy- MORAL due date.

This semester I am using the following HW policy. HW is due on Tuesday. However, your dog died! Hence you get an extension to Thursday. That is, for all people...

Ethnography informs text-free UI for illiterate people
From Putting People First

Ethnography informs text-free UI for illiterate people

Indrani Medhi, an Associate Researcher at Microsoft Research India where she works in the Technology for Emerging Markets team, designed a text free user interface...

Lessons from a Restaurant App
From The Eponymous Pickle

Lessons from a Restaurant App

Well stated, I like simple apps with a recognizable and uniform interface. Because mobile often means we don't have the time to learn a new user interface on the...

Hill Tech Happenings, Week of March 8
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 8

March 10 Hearing: The House Foreign Affairs Committee will hold a hearing on U.S. cyberspace policy and foreign policy (rescheduled from February 10). 10 a.m....

De-Anonymizing Social Network Users
From Schneier on Security

De-Anonymizing Social Network Users

Interesting paper: "A Practical Attack to De-Anonymize Social Network Users." Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...

Interesting Links 8 March 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 8 March 2010

Well last week was another interesting week for me. I finished it off with a short trip to Houston TX for the annual HP Code Wars high school programming competition...

Carousel (NSDI Paper)
From My Biased Coin

Carousel (NSDI Paper)

The "final version" for our NSDI paper, Carousel: Scalable Logging for Intrusion Prevention Systems, is now up.Here's the main idea.  In IPS systems, the logger...

Micro Industries
From The Eponymous Pickle

Micro Industries

Micro Industries is a company that does some very innovative work in the area of retail signage. We worked with them in the innovation centers. They now have...

Google and Transparency
From The Noisy Channel

Google and Transparency

Let me preface this post with a clear disclaimer: I work at Google, but the views I express on this blog are my own personal views. Last week, Google head of webspam...

Do School Libraries Need Books?
From The Eponymous Pickle

Do School Libraries Need Books?

A debate in the NYT: I am the patron of a regional library that just relocated to a new modern building. There are fewer shelves of books now. There is an enormous...

Making the CWE Top 25, 2010 Edition
From CERIAS Blog

Making the CWE Top 25, 2010 Edition

As last year, I was glad to be able to participate in the making of the CWE Top 25. The 2010 Edition has been more systematically and methodically produced than...

Browse Popular Science
From The Eponymous Pickle

Browse Popular Science

You can now browse online the last 137 years of the magazine Popular Science for free. A good view of previous times. Pretty outrageous predictions at times, I...

Not All Queries Are Created Equal
From The Noisy Channel

Not All Queries Are Created Equal

A topic with which I developed an obsession in my last few years at Endeca is understanding how to predict query difficulty and performance–performance in the information...

HCIR 2010: A Pre-Announcement
From The Noisy Channel

HCIR 2010: A Pre-Announcement

We’re gearing up to officially announce the HCIR 2010 workshop, but I wanted to give folks here a heads up, as well as to put out a call for a volunteer. The Fourth...

Hand Touchscreen
From The Eponymous Pickle

Hand Touchscreen

Body acoustics can turn hand into a tochscreen. Work at Carnegie Mellon and Microsoft produces a system called Skinput.

WSJ on the Style of Inforamational Graphics
From The Eponymous Pickle

WSJ on the Style of Inforamational Graphics

Good review on this new book. A style guide on how to do mainly quantitative graphics. " .. Dona Wong, who had stints on the graphics teams at both the Wall Street...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account