acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Problems of Profiling at Security Checkpoints
From Schneier on Security

The Problems of Profiling at Security Checkpoints

Good article.

Programming as a super power
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Programming as a super power

From the time I wrote my first computer program about 38 years ago as a college student there has always been a bit of magic about the process. A bit of a super...

Real-time video in 2020
From Putting People First

Real-time video in 2020

Skype commissioned the Institute for the Future to research and start a conversation about the future of real-time video communication and what will it feel like...

If your kids are awake, they
From Putting People First

If your kids are awake, they

The average young American now spends practically every waking minute

Nokia
From Putting People First

Nokia

In recognition of the importance that good design and user experience plays in creating successful products and services, Forum Nokia has renewed and extended it...

Housework
From My Biased Coin

Housework

The Chronicle of Higher Education has an article up titled Time Crunch for Female Scientists : They Do More Housework Than Men. Worth reading, understanding, and...

HP's Wall of Touch
From The Eponymous Pickle

HP's Wall of Touch

Another example of 'walls' of information, which we experimented with extensively. Think of it as also useful for creating certain '2D environments' like the store...

Meaning of Client Silence
From The Eponymous Pickle

Meaning of Client Silence

Peter Bregman on silence. Have we all not experienced this?. What is the useful reaction to client silence as the most dangerous form of feedback?

Big Company IT at NRF
From The Eponymous Pickle

Big Company IT at NRF

Storefrontbacktalk reports on a number of big company IT leaders at NRF and their innovation views.

It's a Great Day for CS!
From Computer Science Teachers Association

It's a Great Day for CS!

Ever since Computer Science Education Week, I couldn't help but notice all the positive signs that have come through my email about what a great time it is to teach...

Packing Intelligence in a Tweet
From The Eponymous Pickle

Packing Intelligence in a Tweet

James Kobielus looking at the business intelligence value of Twitter. I still see Twitter as an alert leading to more information. Sometimes all of the intelligence...

From Computational Complexity

Should CCC2012 be at the North Pole?

The last few posts on ICS in China have lead to off-topic (though maybe they were not off topic) comments on whether we should have conferences in countries who...

Privacy Violations by Facebook Employees
From Schneier on Security

Privacy Violations by Facebook Employees

I don't know if this is real, but it seems perfectly reasonable that all of Facebook is stored in a huge database that someone with the proper permissions can access...

Microsoft at TCEA
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Microsoft at TCEA

In a couple of weeks I’ll be heading down to Austin Texas for the annual TCEA conference. This is one of the biggest and best (we are talking Texas after all) educational...

Analytics for Humanitarian Logistics
From The Eponymous Pickle

Analytics for Humanitarian Logistics

Just added to Analytics Magazine, a short article and podcast on the use of logistics analytics in the Haiti earthquake. Linked to the Center for Humanitarian Logistics...

Hill Tech Happenings, Week of January 18
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of January 18

January 20 Hearing: The House Science and Technology Committee will hold a hearing on the reauthorization of the America COMPETES Act, taking testimony from business...

From Putting People First

Interesting Google Blog article on how user research dramatically improved driving directions on Google Maps India. The research was based on the fact that street...

Eavesdropping in the Former Soviet Union
From Schneier on Security

Eavesdropping in the Former Soviet Union

Interesting story: The phone's ringer is a pretty simple thing: there's a coil, a magnet and a hammer controlled by the magnet that hits the gongs when there is...

Book: Pervasive Information Architecture
From Putting People First

Book: Pervasive Information Architecture

Pervasive Information Architecture – Designing information space in ubiquitous ecologies is a book being written by Andrea Resmini and Luca Rosati for Morgan Kaufmann...

Whose Voice do you Hear? Gender Issues and Success
From Apophenia

Whose Voice do you Hear? Gender Issues and Success

Growing up, I loved to debate. With anyone. My debating tone used to drive my mother batty because she thought I was yelling at her. Exasperated, I would often...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account