acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Live at Interaction
From Putting People First

Live at Interaction

Niklas Wolkert & Brad Nunnally round up their reporting on Johnnyy Holland on the Interaction10 conference in Savannah, Georgia – this time focused on the third...

Why do People Share Information?
From The Eponymous Pickle

Why do People Share Information?

A topic we studied in the enterprise. This NYTimes article presents some non-obvious answers. Because we wrote our own e-mail system in the 70s, we had lots of...

Recent Award for Network Coding
From My Biased Coin

Recent Award for Network Coding

I opened the January issue of IEEE Transactions on Information Theory and saw (what is probably old news to everyone) that Tracey Ho, Muriel Medard, Ralf Kotter...

Guest Post:  Giorgos Zervas from WSDM, Part 3
From My Biased Coin

Guest Post: Giorgos Zervas from WSDM, Part 3

I am back from WSDM and I have to say all in all it was a great experience. I think my talk went fairly well although I can see some ways in which it could have...

Google Buzz
From The Eponymous Pickle

Google Buzz

Google gets a social networking component within Gmail. ' ... Specifically, Buzz has been designed to help users deal with the often massive amount of information...

From Computational Complexity

What is an Elementary Proof?

What is an Elementary Proof? Different things in different contexts. An Elementary Proof is one that does not use Complex Analysis. Basic Calculus is fine. This...

BI Software Making Money
From The Eponymous Pickle

BI Software Making Money

Nice overview piece on business intelligence by Doug Lautzenheiser:BI Software Makes Money Business Intelligence isn't just about seeing how many cans of beans...

All Subversive Organizations Now Must Register in South Carolina
From Schneier on Security

All Subversive Organizations Now Must Register in South Carolina

This appears not to be a joke: The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...

Beginning to Rethink CS Education at NSF
From Computer Science Teachers Association

Beginning to Rethink CS Education at NSF

The President released his $3.8 trillion budget on Monday setting off a flurry of activity in the Nation's Capital. The budget sets the Administration's priorities...

Public vs Private Sector Costs
From The Eponymous Pickle

Public vs Private Sector Costs

Michigan economist Mark J. Perry continues to be an excellent source for gathering economic data and providing commentary on its implications. Recent post: the....

Martin Lindstrom on Personal Branding
From The Eponymous Pickle

Martin Lindstrom on Personal Branding

Intriguing learnings and video: Look at Me Now! Personal Branding on TODAY Show (Pt 1)New York City. In a world growing increasingly more obsessed by celebrities...

New Philips phone for the elderly
From Putting People First

New Philips phone for the elderly

Philips reports that its new Lifeline Cordless Phone System has been designed “to enable the frail and elderly to maintain independence, despite their changing...

? Leaving a bad taste
From Wild WebMink

? Leaving a bad taste

Study links soda, pancreatic cancer Looks like another damning finding against high sugar diets. Too late for me, but maybe you...

Outguessing the Terrorists
From Schneier on Security

Outguessing the Terrorists

Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this? Bill Tupman, an expert on counter-terrorism from Exeter University...

New Windows 7 Track on Microsoft
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

New Windows 7 Track on Microsoft

OK so maybe you

Designing financial services for the poor
From Putting People First

Designing financial services for the poor

The Institute for Money, Technology and Financial Inclusion (IMTFI) at the University of California, Irvine, headed by Bill Maurer, Professor of Anthropology, aims...

The Limits of Visual Inspection
From Schneier on Security

The Limits of Visual Inspection

Interesting research: Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...

Chefs, Not Bakers
From The Eponymous Pickle

Chefs, Not Bakers

A collaborator from some time ago, Mark Capper, pointed me to his blog: Chefs Not Bakers. I much like the premise and am adding it to my feed, add it to yours: ...

Networking is Key
From The Female Perspective of Computer Science

Networking is Key

Time and time again I find that networking truly is the key to a successful career. It's amazing what kind of opportunities arise because of who you know.During...

Trading latency for quality in research
From Daniel Lemire's Blog

Trading latency for quality in research

I am not opposed to the Publish or Perish mantra. I am an academic writer. I am what I publish. We all think of researchers as people wearing laboratory coats,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account